Chapter 348: Threat
In addition to the United States, other countries in the Americas are welcome to Yunsou, because Yunsou's attitude is very friendly, helping local enterprises to develop, and giving local search engine support in technology. Pen @ fun @ pavilion wWw. ļ½ļ½ļ½Uļ½Eć ļ½ļ½ļ½ļ½
As for how much to support, this is a clash of interests.
Yunsou also has the essence of Chen Yu's business, and the companies it supports will silently acquire its shares, and the way the countryside surrounds the city is a decentralized acquisition.
Each time each party acquires very little, but these are concentrated, it is a holding, and it is an absolute control of 70%.
As for War Dragon Technology, the United States will naturally have an address, but Chen Yu directly sent an email to the private information of the President of the United States and the CIA of the Ministry of Defense of the United States.
There is not much content in the email, only one sentence: "Do not interfere with the development of War Dragon Technology, otherwise the Prism Gate will be displayed in the eyes of the world." ā
When this email appeared in the eyes of the three of them, they were all stunned.
What the Prism Gate was, the three of them knew better than anyone else.
Project PRISM is a top-secret electronic surveillance program implemented by the National Security Agency (NSA) since 2005 (2007 to 2005) during George W. Bush's administration, officially known as "US-984XN".
In 2005, the National Security Agency (NSA) and the Federal Bureau of Investigation (FBI) launched a secret surveillance program codenamed "Prism", which directly entered the central servers of American Internet companies to mine data and collect intelligence, and nine international Internet giants, including Microsoft, Yahoo, Google, Apple, etc., participated in it.
These nine companies can be said to inform more than 70 percent of the world's Internet market.
If this plan is exposed, it will definitely be an unprecedented blow to the United States and for companies such as Microsoft.
Just think about how big the loss is, and more importantly, the reputation will be ruined.
Although Crazy stores the data in the United States, the United States has not tried to obtain the data, but the reason given by Crazy is that the data is encrypted, and no one can know what is in it without a user password.
And gave a part of the data to the relevant departments, and told the other party the encryption method, but in the face of 1024-bit encryption, even if they knew the encryption method, it was difficult for them to crack, even if they worked hard to crack a message, but there was no use for birds.
On the contrary, a lot of manpower and material resources are wasted.
At the beginning of Chen Yu's redesign of the system, the data was designed to be encrypted, but these data can be retrieved within the company, but only two people can have permissions, one is Chen Yu and the other is Gao Feiyan.
The permissions that Gao Feiyan can get are only vague big data, and only Chen Yu can get detailed personal data.
In order to prevent data leakage and bring disaster to the company.
For data, Chen Yu attaches great importance to it, and for any company, the reply is this, the data can be given to you, but it is all encrypted data, and you can even extract data directly from the database.
The United States Security Bureau does not believe in evil, and under the sudden attack, it extracted the information of the database and found that it could not be opened at all, and these data will be automatically destroyed after being cracked more than 1024 times.
According to the FBI's intelligence, Crazy officials have no way to obtain data, even if the headquarters with the highest authority, it can only count the approximate data as a form, and there is no detailed data at all.
This is the result of any country, but there is still no selfishness, and the official hackers are organized to crack the encryption system of Crazy, but it is found that the encryption system is a hurdle that cannot be bypassed.
If the data wants to be stored and transmitted, it must be called encryption, which is equivalent to the blood in the human body, and if there is any flaw, it will be felt.
What's more, the encryption system is still being upgraded.
crazy technology uses the matrix algorithm provided by Chen Yu to develop a unique protection method, the protection method is varied, the matrix changes endlessly, no one dares to say that they can eat the matrix thoroughly, the matrix algorithm is very difficult to learn, those top bulls are also very difficult to learn, but also cooperate with mathematicians to assist on the side, so that it can be carried out slowly, but despite this, the results are still not to be underestimated.
Crazy has also derived a lot of black technology with this technology, and has also won countless geniuses to join.
Crazy's generous R&D funding makes these geniuses even more excited.
You can study whatever you want, but only on the basis of satisfying the tasks I have given you.
After completion, the remaining time is yours, and how much research funding is needed, as long as the application is reasonable, there is no limit.
But the results of the research must be owned by crazy.
Of course, it is not for nothing, and a generous salary is waiting for you every month.
House! Money! Sister! Whatever you want, as long as you can make something.
This is what Chen Yu told Gao Feiyan about Google's practice in later generations, but Gao Feiyan remembered it in his heart and did the same.
Although Crazy is a network company, Crazy is definitely not far behind in technology research and development.
Even those who have already launched their own operating systems have been developed.
Naturally, they were developed based on the Unix kernel, and the system they developed was more inclined towards the networking aspect.
The operating system will be targeted at netbooks, compact and low-cost PCs. This open-source software will be named CrazyOS!
A lightweight open source operating system!
The vast majority of applications will be completed in the Web, fast, concise, and secure are the key features of CrazyOS, CrazyOS users do not have to worry about viruses, malware, Trojans, security updates and other annoying things.
It also provides support for Intelx86 and Loongson architectures as well as ARM processors, and the software structure is extremely simple, which can be understood as running a browser using the new window system on the core of Unix.
For developers, the web is the platform, all existing web applications can run perfectly in CrazyOS, and developers can also develop new web applications for them in different development languages. Of course, the programs developed for CrazyOS can also run in various traditional browsers under the Windows/MacOSX/Linux/IOS platforms, which also builds a large enough user base for developers' programs.
Because the traditional system market is almost occupied by Linux and window, as well as MacOSX and the IOS system launched by War Dragon Technology. (To be continued.) )