Sixty-one, Digital Ghost
After lunch, Jin Duo returned to the moon with his new equipment.
Hawking went to the bathroom to wipe his face, and heard movement in the equipment room, but it was the guards who helped the big hammer assemble the "lightning", and Hawking took a hand without saying a word.
After the assembly and commissioning of the "Lightning" was completed, and after a journey of 3,000 kilometers, it was unscathed and let out a big sigh of relief. The three of them were busy sweating and tired.
Hawking said, "Go, bubbles go." ”
Hawking did not dare to go to the public bath, his shocking appearance was easy to frighten others, and they rented a four-person room, and three mermaids slipped into the steaming pool.
The bath is steaming hot, and the clouds are shrouded in mist, giving people the illusion of fluttering immortals; The air was filled with a pungent smell of sulfur. The three of them didn't work hard to sweat, and suddenly felt that their muscles were soothed and their bones were soft, their blood was smooth, and the fatigue of the 3,000-kilometer trip disappeared.
The guard approached Hawking and asked, "Second brother, I think the eldest brother means to fight a protracted war?" ”
Hawking said, "Yes." ”
Guard: "Second brother, why don't you use the 'hand of God', that's so happy." ”
Hawking wiped his face and said to the guard: "I asked the eldest brother this question, and the eldest brother has his own ideas, that is, if he comes, he will be safe, and everything will be listened to by the eldest brother." ”
Hawking asked Jin Duo about this question at lunch, and Jin Duo was vague. Hawking felt that Jin Duo's target was the entire gang, not Tang Yingjie alone.
In other words, Jin Duo now uses the "Hand of God" to get rid of Tang Yingjie like probing for things, and rescuing Yuzhu is just a click of the mouse. Maybe he didn't want to use it this way, maybe he had other ideas, and Hawking was also a question mark.
The guard listened to Hawking's words and shut his mouth in amusement. Da Bang slapped the guard's back and said, "Come here, I'll rub your back." ”
Big hammer guard, guard rub Hawking, Hawking rub big hammer, three-person cycle, one god rub.
The three of them soaked comfortably for more than an hour, and the big hammer felt a little stuffy, the oxygen content of the air here was too low, and they couldn't breathe, so the three of them got out of the pool and returned to the room.
Hawking said: "There is nothing to do today, rest, rest, rest!" ”
Because he had just soaked in the hot springs, Da Hammer and the guards were lazy, listening to Hawking's rest order, you look at me, I look at you, and my heart suddenly fell empty, like a traveler lost his way.
Usually accustomed to the tense life of eating, working, and not having a moment to spare, he suddenly has nothing to do, as if he has lost his sense of existence.
After dinner, Da Thong was bored and lay in bed watching videos; The guard couldn't stay idle, so he asked Hawking for a bionic sparrow, connected the control handle to his laptop, and practiced his control technique in the room.
This little elf is very funny, the shape and feathers imitate vividly, it can take off from the palm of a person's hand, it can take off from the table; It flies very steadily, forward, backward, ascending, descending, hovering, and will do a variety of flight maneuvers, whether it is the appearance or the appearance of the flight, it can definitely be fake.
The guards had a good time, the bionic sparrow took off for a while, landed for a while, and there were a few control errors, the bionic sparrow hit the curtain, fell down, and smashed next to the big hammer, so frightened that the big thump got up and went to the equipment room.
The guards are having fun and are having fun.
After breakfast the next day, Jin Duo and Qiu Wenhai came on time, and Hawking told Qiu Wenhai that there were four tables in the equipment room to place the equipment.
Qiu Wenhai immediately called the hotel manager, and after a while, the security guard sent four tables to help put them away before leaving.
Qiu Wenhai said: "We are big customers and have face. ”
Jin Duo shouted into Wen Hui's room: "Fourth sister, it's time to go, right?" ”
Wen Hui had been waiting for a long time, and at this time, she pushed the door out, smiling like a flower, carrying the gift prepared for Yuzhu, and walked a few steps ahead.
Jin Duo and Qiu Wenhai went to see off Wen Hui, Huo Duo took out a self-painted drawing, summoned the guard, and the two came to the Buick business class, and Hawking explained the design intent of the drawing to the guard in detail.
After a while, Qiu Wenhai came back, and the guards went with him to modify the car.
After breakfast, he entered the equipment room, wiped the "lightning" up and down spotlessly, and watched quietly for a while, as if admiring his bride, and seemed to be brewing passion, and then turned on the machine and started working.
Big Hammer has a daunting task, with three well-defended castles in front of him, and he must transform into a digital ghost, sneaking into the castle without knowing it, and doing whatever he likes.
The first castle is Tang Yingjie's own computer host and the group company's financial computer host; The second castle is the internal monitoring system of Phoenix Villa; The third castle is the "Sky Eye" surveillance system of Thuan An City.
These are three well-defended, thick-walled castles, and it is not easy to do this because Da Hammer wants to sneak in as a digital ghost and take out what he needs, without alarming anyone, leaving no traces, and not being tracked to the hot spring hotel.
"Sky Eye" is an abbreviation, which is a national-level face recognition and positioning system, which records the spatio-temporal position of each social individual at different times.
It has two means of positioning; One is mobile phone GPS positioning, which is easy to understand, and what is particularly weird is that the use of some specific technologies, even if the phone is turned off, it will not affect the positioning accuracy, unless the mobile phone battery or mobile phone card is withdrawn.
Using hacking technology, even if the phone is turned off, not only can it be accurately located through the mobile phone, but the mobile phone can still transmit audio information like a bugging, this hacking technology has long been widely used by the intelligence services of various countries, and it is no secret or high-tech.
Another type of positioning is facial recognition.
Through the cameras all over the streets and alleys of urban and rural areas, the activity trajectory information of each social individual is recorded at any time and automatically uploaded to the cloud storage.
Cloud computing, cloud data, so-and-so cloud...... "cloud" is changing and influencing everything about humanity. The cloud is a big data system, and when information is called up, it can depict the spatiotemporal trajectory of a specific individual over a period of time.
One day, an elderly man suffering from Alzheimer's disease in a community in Shenzhen ran away from home and did not return after the deadline, and his family searched everywhere to no avail, and he was at a loss in the face of the vast sea of people.
The family had nothing to do, so they had to report to the police, the police turned on the "Sky Eye" system, swiped the mouse, and the machine compared the face at lightning speed in the background, and quickly locked the activity trajectory of the old man in the torrent of people and cars, and more than ten minutes later, the family went to a mahjong parlor to find the lost old man.
This is the power of big data, and cloud computing is changing everything in the world. The use of the "Sky Eye" system to track burglary, hit-and-run, etc., has been tried and tested, which has greatly deterred such crimes and contributed to social security.
At present, many families install camera surveillance in their homes either to prevent theft, or to monitor and grasp the situation of children or the elderly at home in a timely manner.
An apartment in Shanghai. On this day, the hostess and the young daughter are at home, the hostess is cleaning up the room, and the young daughter is watching TV.
Suddenly, there was a loud, hey-hey-hey laugh in the air, and again and again, and again, and again, and the hostess was terrified, and looked at all the rooms, and there was no human figure, and the laughter came?
In Wuhan, a man reported to the police that a video of her and his wife banging in their bed was posted on the Internet, and his house did not install video surveillance, suspecting that someone had done something to his house and asked the police for help.
Both cases are very weird, the police found after technical reconnaissance that the laughter of the little girl's house was because his family's monitoring system was hacked, and the hacker peeped at the little girl dancing at the TV, clumsy movements, constantly falling and getting up, very cute, and couldn't help laughing.
The private video of the man in Wuhan went online because her computer desk was facing the bed, and although the computer was turned off, hackers could still use the computer video head to spy on everything that happened on the bed.
It's a digital ghost suffering from voyeurism.
Voyeurism is a mental disorder in medical psychology, that is, a type of mental illness.
In the era of big data and the information society, no one has privacy at all, and the tentacles of science are pervasive and omnipotent.
The first job of the big hammer is to search for the target, locate the target, this process is a bit like touching the fish in the river, knowing that the fish is in the river, but the water is deep and long, it is not easy to fish the fish out of the water, you must have the will of the fool to move the mountain, the persistence of the ants to gnaw the bones, and the tenacity of perseverance in the wedge to succeed.
Fortunately, the "Lightning" is powerful and amazingly efficient, which is equivalent to 81 people groping in sections; Coupled with the skills and experience accumulated by Da Hammer over the years of digging holes and credential stuffing, this will greatly increase the probability of success.
Even if you "touch the fish", you only determine the location of an ancient tomb, how to enter the inside of the ancient tomb, where the treasure is placed? That's all that matters, so the next step is to "dig a hole", but this "digging a hole" is not the same as digging an ancient tomb, which can put a shovel down at any point around the ancient tomb, but it doesn't work in the online world. "Digging holes" in the online world is actually looking for holes and loopholes in programs. And it is only possible to enter the "tomb" through the loopholes of the program.
Luckily found a "loophole" to enter the ancient tomb, and there were stone doors blocking it.
The more high-standard, high-value ancient tombs, the more stone doors set up in the tomb road, the more ingenious the mechanism, how to pass through the stone gate, into the tomb full of treasures, the hacker professional term is called "credential stuffing", the essence is to decipher the password, the word "collision" is very wonderful, there is a sense of mistake, and this is exactly the case, the vast majority of success is by mistake.
The entry code is generally composed of 9 numbers and 26 English letters, and its permutations and combinations are astronomical numbers, and it takes tens of thousands of years to deal with a combination of combinations, which is theoretically an impossible task.
In fact, there are certain rules for ordinary people's password settings, according to personal habits, in order to memorize passwords, password combinations are common such as: pinyin abbreviation of name, birthday, ID number, phone number, mobile phone number, special anniversary, etc. This narrows down the scope considerably, and experienced hackers have a high success rate.
"Credential stuffing" is successful, followed by "library washing", and "library washing" is to enter the tomb and take away valuable things "copies", or nests.
After entering the tomb, junior hackers will get carried away, will be reckless, will leave traces, are often tracked, and are punished by laws and regulations; Advanced hackers will use "circumventions", "proxy servers", "dark web" and other specialized techniques to block tracking, and all this is done, and a successful hack is completed.
According to Hawking's requirements, Da Hammer must first hack into Tang Yingjie and his company's computer host to steal his privacy, and it would be better if there was "black material"; After that, there is the monitoring system of Phoenix Villa, which screens useful information; Finally, there is the "Sky Eye" system, which can trace a person's whereabouts and tracks, so that more secrets can be uncovered and support for taking action. To accomplish these tasks, the road to the big hammer is long.
Big Hammer has a tendency to be a workaholic, and once he gets into the state, he forgets to sleep and eat, day and night. Hawking and the guards went in and out next to him, installing equipment, dropping bionic elves, and he turned a blind eye and was not affected in the slightest.