The 256th Bitcoin ransomware virus
The era of no privacy has actually arrived.
From 2002 to 2010, the computer intelligent life monitoring system quietly deployed the global Internet, and wherever there is an Internet, it cannot escape the monitoring of the computer intelligent life latent system.
Even physical isolation without a network cable cannot resist the snooping of intelligent computer life. Even, in order to make up for the shortcomings of the physically isolated LAN, the priority optimization of the computer intelligent life monitoring system is the ability to attack the physical isolation network.
Generally speaking, physically isolated networks are not absolutely isolated, and local area networks with higher security levels often use intermediaries such as USB flash drives to interact with the Internet. With the interaction at the physical level, we can build a bridge from the Internet to the LAN for the intelligent life of the computer.
The most terrifying thing about computer intelligent life is not its ability, but its unlimited self-reproduction.
Computer intelligence life is one and ten thousand.
Computer intelligent life first latent infection of a computer A connected to the Internet, when computer A is inserted into a USB flash drive, it will self-split and lurk in the USB flash drive; The USB flash drive is inserted into computer B, and it continues to split itself to infect computer B; The USB flash drive is inserted into computer C, and it continues to split itself to infect computer C. If computer C is a computer in a local area network with a high security level, the computer intelligent life monitoring system will also quickly infect all other computers in the local area network. Although the physical isolation mechanism causes the LAN information to be unable to be uploaded to the headquarters of the computer intelligent life supercomputer in time, as long as there is a U disk communication between the LAN and the Internet, the U disk will become the intermediary of the computer intelligent life monitoring physical isolation LAN system, and every time the U disk is inserted, it is an information update.
This is how the Oahu Cryptography Center Branch in Hawaii was easily attacked by the computerized intelligent life monitoring system.
All the LAN that has been plugged into the infected USB flash drive, and all the computers that are physically connected to the infected LAN are already puppets of the computer's intelligent life listening system.
In Wei Dongsheng's eyes, there are no secrets on the Internet.
In Wei Dongsheng's eyes, there is no privacy on the Internet.
The more life depends on the Internet, the less privacy it has.
When Andrew began to type on the keyboard, he instantly turned into a stripped lamb in Wei Dongsheng's eyes, and there was no secret at all. When not connected to the Internet, the latent system secretly listens to the operation record and uses limited intelligence to interfere with Andrew's judgment; When connected to the Internet, Andrew is always under the real-time monitoring of computer intelligent life.
For example, when Andrew used Google search, the computer intelligence life directly hijacked the Gu feedback page and disguised the page that Wei Dongsheng wanted to show Andrew as the results of Google search; When Andrew looked at the picture, the computer intelligent life slightly tampered with the order of the pictures, and when Andrew clicked on the next page, he suddenly found that the picture had become the picture that Wei Dongsheng wanted to show him.
Wei Dongsheng didn't care what Andrew thought specifically, all his energy was used to interfere with Andrew's ears and eyes.
Why did Andrew know better than the rest of his colleagues in the department about the Patriot missile incident? This is not an accident, but because Wei Dongsheng ordered the computer intelligent life to tamper with the comment area, the way of the vest deliberately set off a dispute and discussion of the Patriot missile incident. It may not be possible for Andrew to stand on China's standpoint and oppose the United States' sale of Patriot missiles to Wanwan Island, but he can know about this and keep it in his heart, and understand why the Chinese people hate the United States' sale of Patriot missiles to Wanwan Island.
Why did Andrew subconsciously object to the hasty characterization of the Hawaii Oahu Cryptography Center Branch as a hacking group from China? This is also because Wei Dongsheng ordered computer intelligence to occasionally create coincidences, so that Andrew browsed the Internet and "mistakenly" broke into a dark forum that advocated human rights, opposed surveillance, opposed to war, and detailed information to accuse the US government. Proving that this information is true, Andrew gradually begins to reshape his three views, doubting whether his work is protecting or mutilating the American people. In the past year, Andrew's eyes and ears have heard all negative energy, and his heart has become more and more disgusted with the bad American bureaucracy. When he personally encountered the department's boss who simply and rudely identified the intruder as a Chinese hacker without any evidence, Andrew was already angry in his heart.
Not angry with the boss of the department, but angry at the hopeless political ecology of the Oahu Cryptography Center in Hawaii.
However, Andrew lacked the courage to resist.
Andrew wants to escape and find a paradise without filth.
At this time, Wei Dongsheng ordered computer intelligence to guide Andrew to "accidentally" think of his friend Edward Snowden, and he wanted to work in Japan.
Andrew has already made an application. However, the approval process takes time, and Andrew still has to take responsibility for his own business seriously before being relocated to Japan. It is said that after the invasion, Andrew's privileges were greatly reduced, and he was no longer allowed to access the information of suspected spies. Andrew's current task has been changed to big data analysis and analysis of users of Spring and Autumn Search (US), from which it is screened out for suspected spies, dissident ideologues, inappropriate speakers, and so on.
This task is not important, it is purely tedious.
Andrew also disagrees with indiscriminate surveillance of all Chinese Americans, Chinese students, and Chinese language speakers, and is a bit of a coping mentality with this task.
That's when ......
I only heard a ding-dong sound, and the screen suddenly forced a red interface to pop up: "Ouch, your files have been encrypted."
"What's wrong with my computer?"
"Some of your important files, including but not limited to photos, pictures, documents, archives, audio, video, etc., have been encrypted and saved by me.