CHAPTER 374 ECASH
readx;
As a technician, Ponyma still has a strong sense of pride in his software, and after internal testing and continuous improvement, he is quite satisfied with the OICQ software. Pen | fun | pavilion www. biquge。 info
Because HELLC is a master and has written similar software in the past, Ponyma didn't send him the beta version in the first place, but after some refinement, he emailed him.
Ponyma is an aristocratic figure in the domestic Huiduo network circle, on the one hand, because his family situation is better, and he can do it when others can't set up a server in Laduo Line. On the other hand, his own skills are also very good, and he set up a website named after his English name very early. From this point of view, he is still very confident in himself, even a little narcissistic.
Sending the software to Lin Hong for testing is actually more about showing his own results.
Prior to this, he and Lin Hong's previous technical exchanges, most of the time he was asking Lin Hong technical questions, and Lin Hong was responsible for answering.
Invisibly, the status of the two of them is a little tilted.
At least, in front of Hellc, Ponyma has a feeling that he is a cut short of him, this can't be helped, Hellc's technology is really awesome, and among the difficult questions he asked, he has never stumped the other party.
Now, he has finally written the OICQ, and added a lot of his own understanding and improvements, and he and his partner feel very good, and I think the level of foreign countries is like this. After all, their software is more convenient to use than ICQ.
Therefore, Ponyma sent the software to Lin Hong, in fact, he wanted to get some affirmation and praise from him.
Numerous compliments from the average user who doesn't understand technology. It's not as good as a connoisseur's words, it's a very subtle psychology.
When I opened the email and saw the text on the first line, "I have tried the software, it feels good", Ponyma's mood suddenly soared.
This feeling is like the joy of being rewarded with a little red flower by the teacher when I was in kindergarten.
He continued to look at it, and his face suddenly experienced a wonderful change. From joy, to slight surprise, then shock, shock, and disbelief......
See the back. A fine layer of cold sweat was already breaking out on his forehead.
"There aren't so many loopholes, are they?"
Ponyma looked at the long list, and it was still marked, and wondered if she was blinded.
Even if this software has some vulnerabilities, it is not so outrageous, right?
Ponyma looked at the time, the time for the other party to reply to the email. The interval between the time and the time he sent was just over two hours.
The other party found so many loopholes in such a short period of time?
According to what he described, there were several vulnerabilities that could even be fatal if discovered. You can even get into their data servers at will and get maximum permissions. Add or delete all kinds of data at will.
Most of the vulnerabilities raised by HELLC are understandable to Ponyma. That's why he sweats on his forehead.
He thinks that the software is very good, but in the eyes of others, it is like a leaky sieve, which can come in and out at will, can this not make him embarrassed and shocked?
This software was developed for the purpose of bidding for a telecommunications project, if so, how could it be possible to win the bid? As long as any of these vulnerabilities are known to competitors, it is a fatal blow to them.
And there are a lot of loopholes in it, which Ponyma doesn't see very clearly and thinks it shouldn't be a loophole.
He found one of them and tried it according to the ideas proposed in the email, only to find that this seemingly inconspicuous bug was actually on the same level as those high-risk vulnerabilities, and it could also break through the permission blockade and endanger the security of the server.
At this moment, he even felt a little sweaty on his back.
He immediately picked up the phone on the table and called his classmate and partner Liu Zhidong.
"Pony, what's going on?"
Liu Zhidong felt a little strange, he and Pony only separated half an hour ago, and now the other party called him again, there must be something important.
"Tony, do you have time now? Let's talk about OICQ. ”
"Okay, I'll go live right away."
The English names of the two of them, one is Pony and the other is Tony. Since OICQ came out, the two of them were the first users to use the software. Ma Huateng's OICQ number is 10001, while Liu Zhidong's number is 10002.
After Liu Zhidong went online, Ma Huateng copied the content of Lin Hong's email and sent it to him directly through OICQ.
Liu Zhidong is also one of the developers of OICQ, and he is better at security than Ma Huateng.
So, when Ma Huateng sent him the content, he was immediately surprised.
Tony: Who discovered these vulnerabilities?
He knew that it must not have been discovered by Ma Huateng himself, after all, the two of them had always worked together and kept in touch with each other.
After the software began to be tested publicly, the feedback received gradually increased, and all kinds of strange problems were exposed.
And the two of them often fix these problems overnight, and then upload them to FTP for updating.
If there is a problem with your own things and you don't solve it immediately, you are likely to be unable to sleep at night, and there is always a pimple in your heart, which is very uncomfortable if you don't get rid of it.
So, this list can only be that Pony just got his hands on it.
Pony: It's hellc, the CEO of Tricolor Fire Technology, I sent him the latest version of the software, and in less than two hours, the other party sent back such a list.
Tony: He's too strong! It's hellc!
He also knows hellc, after all, the other party is a master. In a short period of time. became a celebrity in the Huiduo network.
This circle is not big, but it is not small.
If you don't have the ability, no matter how much you bounce inside, few people will pay attention to you. And if you really have the ability. If the technology is high, there is no need to deliberately publicize it, everyone will track your dynamics, and they will often talk about you when chatting.
When HELLC first appeared, it appeared as a Linux proficient, and after experiencing doubts, through its own technology. Gradually, it has been recognized by everyone.
This is a typical process of becoming famous as a technical master, but his process is much shorter than others.
This is not surprising. The main thing is that his technique itself is very powerful, to the point that others can only look up to.
No matter what field it is, it is respected by the strong, and everyone admires, worships and envies the strong. If you want to be famous, you don't have to be a master in all areas. You just need to be a leader in a certain field. Even if you are only very good at drinking, if you can drink the first in the country, then others will remember you, as long as you talk about drinking. will think of you.
The reason why HELLC quickly became famous in circles was because of its mastery of Linux, in this regard. No one can compare to him.
Later, he wrote software and founded a company. Recruitment of technical personnel, etc., such a series of combination punches, he has become quite famous in the entire domestic technical circle, and he can be compared with Ponyma and other veteran stationmasters.
Ma Huateng and Liu Zhidong chatted for a while, and then tested the vulnerabilities proposed by Lin Hong.
It turned out that none of these loopholes were true, and all of them were true, which made Ma Huateng and Liu Zhidong both sigh very much.
Tony: In such a short period of time, he has found so many high-risk vulnerabilities, and judging from the content of the email, I think there must be a lot of them that he hasn't raised.
Pony: That's what I thought too. HELLC is a person, and I really don't have to say anything about technology. I found that I still underestimated him before, not only is he proficient in Linux, but also very accomplished in the field of network security. Tony, I'm going to visit him in Lingnan in person.
Tony: That's fine. It would be nice if we could bring him along and start a business with us. It's a pity that he has already started a company himself, which seems a bit unrealistic.
This incident made these two arrogant young people completely convinced of Lin Hong, and they both had an unattainable feeling for Lin Hong.
Tonight is another sleepless night, these two young people, busy fixing vulnerabilities in their software, these vulnerabilities are so big that a lot of code has to be torn down and rewritten.
After Lin Hong replied to Ponyma's email, he continued to check the other email he received.
This email is an internal secret mailing list of cypherpunk organizations.
A mailing list is a discussion group based on the e-mail system, and as long as you subscribe to the service of this mailing list, any member of the group can receive emails sent by any member of the group to this address. It's kind of like a radio station, you send an email to it, and the radio station will forward the content.
Lin Hong has subscribed to the group's secret mailing list since he last attended a meeting of the cypherpunk group in New York.
On this mailing list, there are often some interesting new discussions about cryptography.
For example, in a recent interesting discussion, there was a proposal to create an electronic currency that could only be used in software, called ecash.
The concept of electronic money has actually emerged from a very early stage. A variety of recharge cards, credit cards, in fact, can also be regarded as an attempt in this regard, its advantage is that it is easy to carry and can be used for small payments.
However, the electronic money proposed by cypherpunks has taken a step forward, and the reason for this idea is actually to be able to keep it secret.
Anonymous transactions are not possible, whether they are top-up cards or credit cards.
Every consumption of the customer is recorded in the bank records, whether it is recharge or consumption, at what time, where, which merchant, this information is extremely detailed.
And the cypherpunks think it's anti-human, taking money to buy things, this kind of thing is a very personal thing, why do you have to keep a backup in the bank somewhere? What if these records are used by someone with a heart?
So, they began to use their brains and felt the need to implement an electronic currency that could be anonymous. To be continued.