Section 255 Freedom to be manipulated
There are a total of 75 group members in the special chat group, of which 52 group members are online.
There are small groups in large groups, which are probably similar to the temporary session function of QQ groups. In order to prevent the rapid flow of information in the main group from affecting the actual communication, we set up special temporary conversation groups around different topics. The large group is very lively, and the small group is also very lively, all talking about the NSA toolkit incident that broke out at 12 o'clock today, some focusing on the macro impact, some focusing on specific technologies, and some online cooperation to analyze a hacking tool in a targeted manner.
Read the chat, this special chat group is full of white hat hackers.
Compared to black hats, who desperately hide their whereabouts, white hats pay less attention to privacy, and many white hat hackers are comfortable using their real names to communicate with the outside world. Moreover, often the higher the level of technology, the more accustomed white hat hackers are to act in the open, because they have long since become well-known industry elites; Because they claim not to do evil, they are not afraid of legal sanctions and public opinion pressure.
The 75 members of the white hat hacker group have uneven skills from each other, the high ones are very high, and the low ones are very low.
However, no matter how low the technical level is, the 75 group members have also escaped the notoriety of script kids.
The so-called script kid refers to some beginners who do not have the ability to develop tools and can only use existing scripts or tools for tools. For example, if a person's computer knowledge is not enough to develop hacking tools on his own, and after downloading the 72 hacking tools announced by Wei Dongsheng, he can read and understand how to operate them, and then use them to hack or scan for vulnerabilities, he is an entry-level script kid.
Swimming into the white hat hacker group, the group members with the worst skills also have certain code audit capabilities and certain security concepts, rather than ignorant of using other people's tools. The vast majority of the group members at this level are all kinds of "apprentices" who are real white-hat hackers, and they were pulled into the group leader by the master.
The most mainstream group members are all at the master level. They are able to develop tools and drill down into vulnerabilities on their own, and even come up with novel security ideas. In the event of an NSA outflow of hacking tools, they can also try to come up with a complete security solution in a short period of time. Seven or eight of the white-hat hackers, like Yu Jinliang, were regulars at the Internet Security Conference.
The white hat hacker group that swam into Liangliang is certainly not too high in terms of quality, and some people are stronger than them; It's low but it's definitely not low, and it's hard to find fifty white-hat hacker exchange groups of similar quality across the country.
In other words, the Internet industrial revolution is still in the early stage of development.
The early stages of the technological revolution were very rough, and the genius of the 1% was far better than the step-by-step efforts of the 99% of the public. The Internet industry also follows this law of development, which is very primitive and very rough. For example, ten years ago, a single programmer could single-handedly come up with a great product with a flash of inspiration; With the improvement of the technological revolution, there are fewer and fewer excellent individual works, and Internet thinking has been transformed into small teamwork, that is, with a good idea, three or five or more than ten people can form an entrepreneurial team, and if you are lucky, you can come up with an innovation that shocks the world at that time. This kind of entrepreneurial efficiency is extremely rare to see in non-high-tech industries.
The Internet industry revolution has just transitioned from the era of individuals to the era of small teams.
Compared with large projects such as rockets, satellites, and nuclear weapons, the Internet industry obviously relies more on individual talent.
Including cybersecurity.
Adhering to this concept, the Spring and Autumn Security Butler deliberately organized the Internet Security Conference, based on the myths and legends of Nuwa to make up for the sky, and prepared to build the Nuwa Loophole Platform, and the wisdom of freelancers who hated rules and regulations, such as pan-alliance whale swallowing and swimming.
Wei Dongsheng was embarrassed to find that the white-hat hacker group that swam into Liang actually had the tentacles of the Spring and Autumn Security Butler. Swimming into the white hat hacker group, there are employees of the Spring and Autumn Security Butler security team who claim to be private but are actually official behaviors. In order to avoid unnecessary conflicts, the employees of these Spring and Autumn Security Stewards usually do not participate in non-technical discussions in the group, and their work content is to do their best to guide private white hat hackers to be used by Spring and Autumn Group, and if necessary, they will also improve the jobs of some white hat hackers who are currently unemployed but want to stabilize.
In this way, Wei Dongsheng's previous idea of doing something for Youjin Liang was no longer necessary.
Wei Dongsheng simply used the authority of the Spring and Autumn Security Butler, named himself ITM, and dived in the white hat hacker group as a new employee.
Wei Dongsheng did not speak in the group, nor did he contact You Jinliang in a private chat, and temporarily silently withdrew from the white hat hacker group.
On January 14 and January 15, the Internet security community was discussing the NSA leak hacking tool. Whether it is a private black hat hacker, a white hat hacker, or an official team of international enterprises, the effectiveness of 72 hacking tools has been confirmed. Security firms, such as Russia's Kaspersky, are also trying to decipher the connection between these hacking tools and the NSA. In short, it has been confirmed that 72 hacking tools are real hacking tools, but it is not 100% certain whether its old owner is the NSA.
However, with the exception of some public intellectuals who have defended the United States, public opinion has preferred to believe that the 72 hacking tools are the work of the National Security Agency, and while criticizing the behavior, it calls for a national response.
However, the impact of the safety circle is limited.
The astronomical phenomenon of a total solar eclipse on January 15 and the 67th Golden Globe Awards ceremony in the United States on January 17 easily diverted the focus of netizens. At the end of the day, netizens are only curious about the hacker attack and defense battles that have been deified by movies and TV series, and lack interest in the boring world of code in reality, and are too lazy to figure out the difference between network protocol attacks and collecting specific traffic.
Wei Dongsheng did not allow the matter to be diluted.
On January 19, 2010, Wei Dongsheng decisively threw out a new incident in the name of the Avengers Organization avengers_group in view of the news that Internet public opinion gradually abandoned the NSA hacking kit, announcing the auction of 36 more powerful hacking tools at a reserve price of 10,000 bitcoins.
On January 25, 2010, the Avengers announced their failure and released 36 hacking tools for free