Chapter 233: War Declassified
readx;
Chapter 233: War Declassified
This time, the patent acquisition negotiation of the infrared transmission agreement was discussed intermittently for more than a month, and Phyllis had other things to do, and the acquirer she faced this time was not simple, so she invited a professional agent to take charge of this matter this time. Pen | fun | pavilion www. biquge。 info
In the continuous confrontation and compromise between the two parties, the preliminary agreement of intent to acquire was finally signed.
The final price was $35.6 million.
More is no longer possible, and this is the highest price that the Infrared Data Association can accept.
This time, it's a little different from last time.
Although other companies are also interested in participating in the acquisition, but after seeing the infrared data association, they have given up this idea, after all, the members of this association are giants in the field of electronics or computers, on the one hand, the strength can not be compared, on the other hand, the purpose of their acquisition of this agreement is to specify the industry standard, there is no need to intervene.
A few days later, Lin Hong went to New York alone to attend the signing ceremony.
This ceremony did not invite outsiders over, and it was very low-key.
This is Lin Hong's request, and IRDA is happy to do so.
The $35.6 million received again, and Lin Hong became a billionaire in China.
With the last experience, he seemed very peaceful and calm this time, he returned to Boston from New York on the same day, the only difference is that he bought a Motorola latest compact mobile phone this time, gray and black, which can be put directly into his pocket, which is very convenient.
This was at the strong request of Phyllis to go to the e-mall to buy, with a mobile phone, Phyllis can contact Lin Hong at any time.
Lin Hong has actually had a certain interest in mobile phones since he watched Kevin demonstrate the functions of mobile phones.
He felt that the mobile phone was the most similar to the radio station he had been in contact with before, but the electronic components had become smaller.
After buying the mobile phone, he conducted a detailed study of the mobile phone, and called Motorola to ask for a detailed mobile phone technical manual, but he never wanted to be rejected by them, saying that they would not provide this kind of information to the public.
In desperation, Lin Hong decided to put into practice what he had learned about social engineering.
So, he hacked into Motoraro's employee database, found a technical engineer with a bit of weight in Boston, and spent some time studying the technical engineer's behavior and routine.
In the end, impersonating this technical engineer, he sent an email to the technical department of the headquarters to request a detailed technical document for this mobile phone, and asked the clerk in charge of these technical documents at the headquarters to mail it to the designated place.
For this reason, he also made a special call to this clerk.
The other party mailed this technical document to the Boston post office without any doubt, and then Lin Hong pretended to be a postal officer inside the post office and got this technical document in his hands.
In the process, he encountered several situations where he almost got out of the way, but in the end, he used his extraordinary wit and calm personality to get through.
This time, it was he who really used social engineering to achieve his own ends.
Although he had thought through all the possible details beforehand, he finally found that there were many unexpected situations that had not been dealt with properly, but fortunately this was not an important matter, and even if some people had doubts in their hearts, they did not delve into it.
He had to sigh in his heart, Kevin is really a genius in this regard, no matter how difficult the task is, in his hands, it seems to become easy in an instant, this kind of talent with his own body, Lin Hong sighed to himself.
After getting the technical documentation of the mobile phone, Lin Hong carefully studied the hardware fundamentals of this mobile phone, and after a simple modification, he realized the function of searching for the content of the attached call that Kevin showed him before.
In other words, he converted this mobile phone into a telephone radio. ()
After doing this, Lin Hong lost interest in this mobile phone, and usually put it on the shelf, and only took it out when needed.
In the past few days, the growth rate of bit messenger users has gradually begun to slow down, and during this period, people who have started to surf the Internet and chat with others are basically people who know a lot about technology, ordinary users, and use computers to print or play a few simple games at most.
So after the initial user surge stage, the growth of bit messenger has almost come to a standstill.
After the initial research and wait-and-see, many people found that no one had revealed that there was any backdoor or anything like that, so they began to gradually feel at ease and began to use the bit messenger to do some more secret things.
It was at this time that Lin Hong released the v0.2 version of Bit Messenger.
According to the original design, each client has an automatic upgrade function, and after Lin Hong released the upgrade version on a relatively secure and inconspicuous server, within a few minutes, almost all Bit Messenger users who were online at the time received a dialog box asking whether to upgrade Bit Messenger.
About 70% of users chose yes, and these users basically simply think of Bitmessenger as an alternative to IRC-based chat software, and in their opinion, no matter how confidential it is, it makes no difference to them. They only care about how many people use this software, so it's not convenient.
The remaining 30 percent are wary of it.
They must confirm that there is no bad impact after the upgrade before they choose to upgrade.
After all, they don't know what features will be added to the new version, so let's wait and see and wait for other people's feedback.
Everyone's feedback has been released in the "Bit Messenger" one after another.
The new version of Bit Messenger, referring to Mendax's post, turns the "appeal account" into "appeal cancellation", and the more prominent feature is the friend backup function, which can choose to import and export your own friends, so that even if your account is stolen or lost, you can easily import your previous friends into a new account.
In addition to this, the latest version of Bitmessenger has also added a feature that everyone is very excited about, and that is the proxy service.
Not only can the sent messages be shielded from third-party surveillance as much as possible, but they can also be used to use other network services, such as browsing BBS, connecting to the server, sending and receiving emails, etc...... Wait a minute.
All traffic can be forwarded through this proxy feature of BitMessenger and finally reach its destination.
After the advent of this feature, many hackers were ecstatic, because they finally had a software that could easily hide their tracks. Previously, if they wanted to hide their online behavior, they had to go to great lengths to set up proxy servers on broilers and then jump to those proxy servers.
Even so, highly skilled people can find out where and where they come from by backtracking, and many hackers have been arrested for it.
After the appearance of this function of bit messenger, they can directly use the proxy function of bit messenger to jump in the anonymous node and easily hide the source and destination.
Few people know that this feature actually appeared in the first version, but Lin Hong didn't open it up.
In addition, on the v0.2 version, Lin Hong also released a brief announcement, hoping that everyone will continue to help test this software, once the technology of the entire software is mature in all aspects, he will fully publish the source code, and you can choose to compile the client by yourself.
As soon as the new version came out, it immediately attracted great attention again.
This version is relatively more important than the previous one.
The significance of the first version lies in the decentralized design structure of Bit Messenger and the principle of implementing anonymous messaging.
For chat software, the vast majority of people don't usually feel the need for special encryption in this regard.
But network proxies have a very large market for hackers.
The old birds often warn the rookies that they must take safety precautions, otherwise they will be easily found by the other party along the way, and I don't know how many beginners who want to try their skills are scared. How to engage in agents, the difficulty is not generally high, they are novices, where do they come from broilers? Isn't that a paradox?
Well, now that the off-the-shelf proxy server is out, and the security has been proven by many experts, it is indeed as the software author said, which basically eliminates the risk of being tracked and snooped.
This is simply a hacker artifact!
Everyone poured into the "Bit Messenger" to discuss the topic.
So much so that the previous features that were improved for chat tools were ignored.
Two hours after the release of the v0.2 version of Bit Messenger, a very politically inclined post suddenly appeared in the "Bit Messenger Family".
Titled "Declassified: The US-British Coalition Mistreatment of Iraqi Prisoners Scandal!" 》
In this post, the author published a lot of very detailed data that proves that the US-led multinational coalition tortured most Iraqi prisoners during the Gulf War against Iraq at the beginning of this year. These included beatings, electric shocks, nakedness, nose cutting, and even torture and rape of prisoners......
What is even more outrageous is that two Pakistani diplomats were secretly held in Abu Ghraib prison by the US military for a year! Under international law, diplomats enjoy immunity in the host country. Article 22, paragraph 1, of the Vienna Convention on Diplomatic Relations clearly stipulates that "the premises of an embassy shall be inviolable"; Article 29 further provides that "the person of a diplomatic agent shall be inviolable".
Moreover, the United States has conducted internal investigations into these matters, but in the end, it has not been resolved, and the prisoners have not been punished.
The author is not unfounded, and in this post, he attached a large number of FTP addresses, in which there are video and audio scans of the U.S. F.B.I. internal investigation documents, as well as some photos of prisoner abuse.
After this post was published, it immediately attracted everyone's shock and attention, and it spread to the outside world at a very fast speed.