Chapter 231: This thing is out of the world

readx;

"Hey, I'm Thunderbird One, Mendax, did you see that post?" Thunderbird One asked after dialing the phone. Pen, fun, and www.biquge.info

"See, I'm already using this software, it seems to be good." Mendax obviously expected that this post was not from Thunderbird One, "The other party is a master, but unfortunately, there is no open source." ”

"It's true that I checked both servers and didn't find any signs of intrusion, and the other party did a clean job." Thunderbird One had to admit it.

Masters are always respected.

Thunderbird One has completely lost the anger it had at the beginning, and the other party's technology is obviously more powerful than its own.

"If it's really like what this author says, then this software will definitely become popular quickly in the industry, I just hope it's not a trap." Mendax sighed, "It would be nice to be able to contact the author of this software, and his software may be able to realize my ideals." ”

"Mendax, are you really going to take that path?"

"I've decided. This software might be an opportunity, just wait and see how others use it. ”

Thunderbird One listened to the busy tone in the earpiece and couldn't help but sigh.

He hung up the phone, and by this time, his software download had also been completed.

There are a total of three versions of Bit Messenger, Microsoft's MS-DOS operating system, Apple's SystemSoft operating system.

Thunderbird One downloaded the version under DOS, but he didn't rush to install the software, but logged back into BBS and started to see other people's responses.

The first few posts were rather pointless. They thought it was Thunderbird 1 that came out with new software. So by the way, I praised a few words.

Then someone started to really talk about what the post was about, some people asked questions, and some people answered it below.

"Isn't this just a simple instant messaging app? Is it as good as you say? ”

"On the 3rd floor, look carefully at the principle, this software is not simple!"

"Doesn't that still require a server? A directory server is also a server. ”

"The existence of a directory server is only an auxiliary, and from the principle of this post, it is possible to do without a directory server, but there will be a delay in the data."

……

"Have you downloaded and tried it out? Is it really that good? Is it true that third parties can't listen to it? ”

"I've installed it and it's running, boss!

My bit messenger id is 1ftjfjcvnxd1ld1zvcgfjwa4lnphbxhxsv. Everyone, please ++++++"

“oh**! , this id is also too long, who can remember? ”

"Don't remember it, just copy it and send it to the other party."

……

"I've been in touch with the friend in front of me. It is possible to communicate. But after analysis, the message can be intercepted! So, this post from the boss is a bit out of character! ”

"Did the brother upstairs really analyze it seriously? You hack it and try it to see if the message you intercept is yours!

According to my analysis, it may be because there are too few people using this software now, so some information is being intercepted, but please be careful. This is RSA algorithm encryption, I don't know the key you can crack out? ”

……

"It's too awesome. Boss, can you publish the source code? ”

"Yes,It is strongly recommended that Thunderbird No. 1 publish the source code,Although I have more confidence in the character of the webmaster,But I still hope to publish the source code,According to the principle described in the post,Even if the government knows the source code,,It is impossible to monitor the news......"

……

Thunderbird One saw that as everyone realized the power of this software. More and more people are demanding that they publish the source code themselves, and even the Free Software Manifesto has been proposed, saying that since he is a supporter of free software, he should publish the source code.

Many people, like him, from the beginning of the doubt, verified. Amazed, then shocked, finally loved but frightened.

That's how they want Thunderbird One to publish the source code, worrying about what backdoors he will set up in the software.

Once they find out that the software really doesn't have a backdoor, then the software will be their primary tool for secret contact.

This is the case on both BBS, and it's no wonder that the "elf" came to call him before, saying that everyone was going to make a fuss.

Thunderbird No. 1 became depressed again, and said in his heart, this master is too, or just register a new account to publish, why steal your own account to publish?

He had to post announcements on both the Pacific Islands and ZEN that his account had been compromised and that the software was not written by him.

At first, there were doubts about this, but when everyone learned that the same post appeared in several other well-known hacker forums in Australia, the doubts suddenly disappeared.

At the beginning, Thunderbird No. 1 admitted that his server was hacked and felt a little embarrassed, but when he learned that several of the top ten BBSs in the United States were also hacked, and published a post, he suddenly felt that this seemed to be a glory, not enough BBS, and the other party still didn't look down on it.

Almost within two hours, posts with the same content appeared on the internal BBS of major hacking groups around the world.

This software has attracted the attention of many organizations and individuals in the first time.

The leading hacker groups in the United States, "Mask Island", "Anonymous", "Mocking the World", the US FBI Cyber Division, the US Computer Emergency Response Team Coordination Center, the German Security and Computer Emergency Response Team, ......

After trying out the software, they immediately realized the importance of the software and began to analyze and reverse engineer the software as soon as possible.

This day is destined to go down in the history of the world of hacking.

Bit Messenger, a communication software that is less than 1m, has caused great attention and sensation in the entire hacking world and computer security community.

At the same time, there are many people who are constantly looking for clues on these BBS servers. Hope to be able to find the author of this software.

Of course. Many more are keen to spread the word about the software to their friends, because the authors of the introductory paper make it clear that the more people who use it, the more secure the messages you send and the harder it will be for others to listen to them.

As a result, the software spread within the hacker community in a very short period of practice.

Many hackers have started to spontaneously run directory servers on servers around the world, contributing to the entire communication network.

The topology of the client on the directory server is like a spider's web, from point to surface, and it explodes instantly. In just two hours, a huge network of more than 2,000 nodes was quickly formed, and it is still growing at a rapid rate.

For a while, whether it was in various chat rooms or in mailing list newsgroups. The most common thing is the series of hash hashes that don't have any regularity, because everyone is sending their own bit messenger IDs like their friends, asking them to add them as friends.

The number of registrations of Bit Messenger has also increased with the propaganda of these people, and the growth curve seems to be climbing rapidly at an angle of almost 90 degrees.

Australia, north-east of Melbourne metropolitan area.

After Mendax ended the call with Thunderbird One, he continued to study the bit messenger.

He retrieves other people's messenger IDs from BBS and adds them to his friends list.

He was constantly chatting with other people. At the same time, it runs its own network packet capture software to capture packets in and out of the bit messenger, and then analyzes them.

While others have claimed that they have analyzed the BIT Messenger, even if they intercepted the packets, it is not easy to decipher the information encrypted by the RSA encryption algorithm. Unless you have a supercomputer with extremely fast speed, it is possible to crack the content in a relatively short time. Obviously, ordinary people do not have such conditions at all. The time and cost required to crack is much more than the information itself, and perhaps the packet you intercept is just a simple hello statement.

However, Mendax still believes in himself, and does not verify it himself. He couldn't rest assured at all.

The end result, as the author of the software explained in the post, is that this is an extremely secure piece of software, and there is nothing that a third party can do unless the information is intercepted at the point of import and exit. And because of encryption, even if it is intercepted, it is a very headache to crack it.

Mendax proved it after that. Eventually lit a cigarette.

Green smoke rose and hovered over the house for a long time.

"Smack."

Mendax pressed the cigarette butt out behind the ashtray and turned on the lamp next to it.

The inside of his room was very simple, with two closets, a bed, and a desk with a computer on it, and a window in front of the desk that looked out into the neighbor's backyard, which was closed at the moment.

On the long desk, there is also a bound book of PC magazines, as well as several computer programming textbooks and manuals. In addition to this, there are several science fiction books and a pocket-sized Chinese dictionary for learning Mandarin Chinese.

Under the Chinese dictionary, a manuscript is pressed, and an article is written with scribbled notes, most of the content of the article is blocked by the Chinese dictionary, and only the title of the article is revealed - "Human society has entered the era of information explosion!" 》

If Lin Hong is here, he will remember that he once saw this article on an Australian BBS, and two trends were predicted in the article.

First, there are huge business opportunities in the huge amount of information; Second, the information explosion means that we are getting closer and closer to the truth of the world.

And the author of that post is none other than Mendacks.

Mondax exits the debugger and enters a hidden directory in the system, and keeps re-entering and re-entering, which is a full level 6 deep.

Eventually, he entered the password and unzipped the final zip file, revealing a series of image files.

He opened one of them.

A scanned image of a document appeared on the monitor, and in the upper left corner of the document was a prototype badge logo, and below this sign was a line of small letters "FEDD al_bu Hot au_of_i Female Estigation", which is the full name of the FBI.

In the upper right corner of the document, there is a seal, and the text in the seal is-

"Top Secret!" (To be continued)