Chapter 49: Fear

In this dark web world that is almost unknown to ordinary people, all kinds of illegal activities and espionage are secretly communicated, including bitcoin transactions, money laundering, human trafficking, arms markets, illegal propaganda, illegal gambling, intelligence transactions, etc., using this network, anyone can do something against the law and morality anonymously without worrying about too many dangers.

The reason why it is too much to say, rather than completely, is that governments of various countries are also monitoring the dark web, trying to grasp the core of the dark web and control the lifeblood of the entire dark web. And for the FBI and Cyber Operations Command of the United States, which have huge resources, the results achieved in recent years are not bad.

Underneath the dark web, however, there is a more stealthy network called the "black box".

The "black box" does not refer to a specific network address, but refers to the contact information that no third party knows except for the two parties to the transaction. The characteristics of the "black box" are more terrifying than those of the dark web, and the dark web at least has traces to follow, but the "black box" will use social engineering to transmit secret information in real life, and then through several physical contacts, and then decrypt the secret information according to the information to transmit information through the network.

For example, games are used to pass on each other's transaction information.

In Minecraft, the new type of intelligence trading in recent years is ten times more stealthy than the traditional communication of information, such as placing specific squares to disseminate information in Minecraft, and using character gestures to convey information in shooting games.

With Sonny's ability, it may be difficult to control the "black box", and it is just luck to accidentally detect an anomaly, but the dark web has no secrets for Sonny.

According to Lu Yuan's instructions, a large number of stolen credit card accounts, as well as money laundering, gambling, bitcoin transactions, and all kinds of bad debt loopholes, were all used by Sonny, and in just over a week, a large number of accounts were registered in dozens of banks in at least a dozen countries, and a large number of laundered funds were quietly transferred into them, totaling more than 500 million US dollars.

That's a lot of money, but in the online world where trillions of money flow every day, this batch of funds, which is divided into dozens of funds, can't attract anyone's attention at all.

Of course, there are still some obstacles to using this money in China, and then Lu Yuan registered some offshore companies in the British Virgin Islands. It is true that these offshore companies do not have legal certificates and corresponding documents, but as long as no one checks those paper certificates, just looking at the certificates on the Internet, these offshore companies are absolutely legal and reasonable formal business enterprises.

With these back-ups, when Lu Yuan opens the domestic company, the financial problem will not be a big problem.

To open a company in China, it is indispensable to run east and west, but there are many things in this world that cannot be done without money, and it is troublesome to delay time, Lu Yuan entrusts the agency to register the company to run errands, and he only needs to do a few things that cannot be done on his behalf.

But hands-on experience is still indispensable.

Lu Yuan was very troublesome, but compared to him, someone hundreds of kilometers away was almost soaked with cold sweat.

In fact, three minutes ago, Qiu Hong was a very confident person.

But after three minutes, he quickly went from a very confident person to a deeply unconfident and terrified guy.

The reason is simple, it's just a photo.

Photos, something that everyone has, with the mobile phone as a camera weapon, the number of photos generated every day is equal to more than the sum of the past few decades.

In this day and age, I'm afraid no one is afraid of a photo, let alone a selfie.

The premise is that the source of the selfie is normal.

Three minutes ago, he just quit the game, and after satisfying himself with the daily entertainment, he was about to open QQ to laugh and chat with his little sisters, at this time, the printer next to the computer suddenly worked.

Before quitting his job, Qiu Hong occasionally needed to print some documents, so Qiu Hong purchased a printer, which can not only print and copy documents, but also print color photos.

Now, he feels extremely regretful and regrets that he bought this printer.

The printer whined, a color five-inch photo was slowly printed out of the exit, and Qiu Hong, who was operating the computer and staring at the screen, turned his head over in confusion, and happened to see the front of the color photo.

It was a selfie, a selfie of him.

With dark circles under his eyes, unkempt hair, and a dry face that hasn't been washed, isn't he who he is?

Having a problem with your printer?

That was his first thought. And then the second thought was impossible!

No matter what the problem is, he has never taken a selfie on his computer or mobile phone, let alone printed a selfie, how can he make something out of nothing!

Then, when Qiu Hong picked up the photo with confusion, his eyes widened and he almost didn't jump out of his chair.

This selfie is not only familiar, but also has several lines of information on it, including his name, date of birth, work history, account balance, home address, and other information.

Is this a machine failure?

Qiu Hong, who is a hacker himself, immediately noticed the abnormality, and the angle of view of this photo came from the position where he put the camera?

Before he knew it, the camera was activated, and a picture of him was taken and sent to the printer to be printed......

Is this an accident of a machine failure?

Still is......

Cold sweat instantly soaked Qiu Hong's clothes, and after ten seconds of fear enveloping his heart, he reacted, and his first action was to tear off the plug of the camera.

It's shocking, as a hacker with decent technology, Qiu Hong understands how terrible this is. It's certainly fun to hack into someone else's computer and use a camera to spy on someone else, but if you change the subject to yourself, it's not a fun and endless thing, and just thinking about what you do and your every move is under the monitoring of others, he can't help but feel numb in his scalp.

I was no longer in the mood to video chat with my sisters, and after tearing off the camera, sitting on the chair and gasping for breath, Qiu Hong picked up the photo, and the shock in his heart still did not dissipate much.

Forget if the name, home address or something was leaked, he bought a lot of things on the Internet, and it is normal to leak this information, but why is he even so clear about his bank account balance?

There are a total of three savings cards, and the balance on each card is marked very clearly, which clearly makes Qiu Hong feel extremely stinging in his eyes just by looking at it.

How?

Has your bank information been leaked?

It's impossible, only he installs a Trojan horse on someone else's computer, how can someone quietly install a Trojan horse on his computer?

Calm, calm!

Forcing himself to calm down, Qiu Hong quickly used the tools he had written to search for suspicious clues on the computer.

Five minutes, ten minutes, until a full thirty minutes passed.

He had to admit one thing, either he didn't have a Trojan horse on his own computer, or the people who hacked him were much more technologically advanced than him.

Since he couldn't find clues, Qiu Hong felt more and more cold, feeling that the operations on the computer were within the scope of other people's surveillance, so he immediately turned off the computer, and then lowered down to tear off the power plug of the computer, which was barely relieved.

"Woo ......"

This breath was relieved for less than half a minute, Qiu Hong suddenly turned around, and watched in amazement as the printer quickly sprayed out the photos, one by one, as if enchanted, frantically spitting out, all of which were his personal selfies and hidden identity information.

"Ahhh......h

Qiu Hong stood up angrily and fearfully, ripped off the power plug of the printer, ran to the living room again, turned off the wireless router, and then walked back to the study sweating profusely, and sat down to gasp violently without speaking.

But then, something even more terrifying happened to him.