SC004 Provisional Agreement
Nanlin Guiyi's acquisition of Butler was a pure accident!
At that time, Nanlin Guiyi was on the run, living a life of exile, and he accidentally picked up a USB flash drive, and in the USB flash drive, Butler was saved. Pen & Fun & Pavilion www.biquge.info
As for the origin of the USB flash drive, Nanlin Guiyi doesn't know!
Although Nanlin Guiyi has also tracked down, he has never received any confirmed news. And, as the search continues, more and more evidence shows that the origin of the USB flash drive is extraordinary.
Perhaps, Butler's USB flash drive is preserved, from... Another world?
Because the information provided by Butler and the information verified by Nanlin Guiyi are basically impossible to match.
But it seems logical to say that Butler came from another world, for example, the head of the Tokyo Metropolitan Police Department, who was not a backup for Butler.
As another key piece of information, Butler provided the names of several companies, including Dream Entertainment, Fantasy Technology, Painting Immortals, and Marvel Technology. According to Butler, Dream Entertainment is a world-renowned company that has developed 'virtual reality games'.
If Dream Entertainment really developed the kind of virtual reality game that swept the world, why couldn't Nanlin Guiyi find it?
Butler provides a timeline of the founding of Dream Entertainment on January 7, 2007, and is now April 8, 2011. If Dream Entertainment really exists, according to its development momentum, it has now become a global game entertainment giant, right?
But!
Nanlin Guiyi didn't know about Dream Entertainment Company at all, no matter how Nanlin Guiyi inquired, he couldn't find any traces of the existence of Dream Entertainment Company, as if Dream Entertainment Company didn't exist.
If Dream Entertainment Company is a top-level hacker organization and can't find out the information of Dream Entertainment Company, it won't be strange at all. However, according to the information provided by Butler, Dream Entertainment is a game entertainment company.
A game entertainment company that has developed a game is impossible not to sell to the public, right?
Since it is going to be sold to the outside world, and the corresponding information cannot be queried, it can only mean one thing, Dream Entertainment Company does not exist. After all, even if Dream Entertainment goes out of business, there should be traces of existence, not historical records.
"After the core system review history is completed, T.A has submitted a total of 29 audit materials, and according to the logic of the core system, the highest authenticity is 99 percent, and the lowest authenticity is 90 percent."
"Based on T.A.'s proven track record, the core system automatically builds temporary authorization agreements. Under the Temporary License Agreement, T.A may temporarily obtain restricted super administrative privileges; The core system will open the read-only permission of the underlying source code to allow T.A to review and view, and based on the temporary license agreement, the core system will allow T.A to build a protocol condition on the core underlying source code. Butler's deep voice echoed Nanlin Guiyi.
Nanlin Guiyi was slightly surprised, how high is Butler's intelligence? Is it possible to construct a protocol based on historical records and after independent analysis?
In order to verify Butler's intelligence, Nanlin Guiyi thought about it for a while and asked, "What protocol conditions are allowed for the core system?" ”
Butler's deep voice rang out again.
"The core system allows T.A to create an additional source code in the underlying source code and add T.A as a super administrator. However, T.A needs to provide an Internet environment to facilitate the verification of the information provided by T.A. by the core system. Once the core system verifies the correctness of T.A's data, the source code added by T.A will be officially accepted. If the verification result is negative, the core system will remove the super administrator privileges added by T.A. Butler responded.
Nanlin Guiyi thought about it for a moment and asked, "How much time does it take to verify the work?" ”
"Can't be sure." Butler gave an inaccurate answer.
"How many bytes of data do I need to use?" Nanlin Guiyi asked again.
Bytes are the storage capacity units of a computer, KB kilobytes, MB megabytes, and GB gigabytes, etc., all of which are extended capacity units.
In the face of the provisional agreement proposed by Butler, Nanlin Guiyi was very moved. However, in order to avoid any conspiracy on the part of Butler, Nanlin Guiyi also has his own plans.
Guiyi Nanlin is a world-class master with a deep understanding of computer technology, and he has also analyzed Butler's main programs and core systems. However, Butler uses a very special encryption scheme that Nanlin Guiyi cannot unravel.
It's just that even if you can't unlock Butler's program encryption, Nanlin Guiyi also knows that Butler's capacity exceeds 100GB, and it is difficult to transfer it through the network.
"According to the analysis of historical data provided by T.A., about 200MB to 300MB of data is required." Butler's response was swift.
With a data capacity of 200MB to 300MB, it is impossible to transfer Butler, not even Butler's core programs. The more advanced the AI system, the more massive the volume, and it is impossible for Butler to transfer the core system with a data volume of 200-300MB.
"Accept the temporary agreement and unlock the read-only access to the underlying source code!" Nanlin Guiyi chose to accept the agreement, and Butler quickly unblocked the underlying source code of the core system.
There are too many of Butler's core source codes, even if Nanlin Guiyi has world-class strength, it is still impossible to read it in one day, and it took several days for Nanlin Guiyi to complete the review of Butler's core underlying source code.
After completing the review work, Nanlin Guiyi established a rule, as Butler proposed, if Butler connects to the Internet and passes the review of historical materials, the rules built by Nanlin Guiyi will be integrated into Butler's underlying source code, and officially become Butler's super administrator.
Nanlin Guiyi promised Butler access to the Internet, and the network environment he prepared had a very high degree of controllability. Because, Nanlin Guiyi has set up a wireless network with limited bandwidth.
The maximum transfer speed is only 200KB/s, and it is basically a fool's dream to rely on it to transfer data!
In addition, Nanlin Guiyi has also prepared a killer feature, which can physically isolate the Internet when necessary, and there is no worry about Butler making any trouble.
As the saying goes, software drives hardware, and hardware limits software.
When the hardware is forcibly restricted, even if Butler is superb, it is impossible to directly modify the hardware, right?
That's not scientific!
――――
New book upload, thanks for all support!
Pay attention to the official account: Qms5120 to learn more about the behind-the-scenes footage of the works and authors, as well as the occasional popularization of computer knowledge.