Chapter 30 Disc Plate System

Russell's glance at the camera, in an instant, crossed the river of countless data and appeared in front of the delphinium on the other end.

A number of translucent windows appeared in front of her, and they were rapidly manipulating on them.

Her face was calm, and she reached out to make the window as large as possible. And drag a lot of small windows from all around, and put them around to start synchronous monitoring and operation.

The prosthetic interface of the delphinium is positioned similarly to that of the inferior, between the wrist of the two hands and the forearm.

At this moment, from the interface of each of her wrists, a data cable extended and plugged into her heavy tactical gloves.

She had a rectangular square in the palm of her glove. It is emitting heat that cannot be ignored, and if the delphinium presses its gloves on someone else at this moment, it may even burn the other person directly.

It is an ultra-portable computing device known as a "disc board system".

In this era, the chip embedded in the back of everyone's head has been able to meet most of the daily needs.

For example, time, positioning, payment and payment, and then watching live broadcasts, flipping through videos, and playing games...... It can almost be said that there is no room for "personal computers" anymore.

And of course, this small chip cannot have much computing power. Otherwise, once it is running, I am afraid that the brain will be burned, let alone playing games.

In fact, all of this data is downloaded directly from the cloud after processing it with an almost completely synchronized ultra-high download speed. Whether it's watching live broadcasts or videos, or water forums, watching news, or playing games, these are all directly downloaded to the final picture after the calculation, rather than processing the data locally.

In other words, the role that this chip actually plays in daily life...... It's like that cable from the graphics card connected to the monitor.

Even the data that is inconvenient for public calculations does not require chips at all - for example, in front of Russell, the data platform used by the bartender, this is the shared computer in this store. This is also the case with this large, integrated computing system...... It's also to make sure that no one takes the computer away or uses the company's computing resources to calculate something for themselves.

So there is no such thing as a "personal notebook" in this world. Of course, it is also because the group does not allow production.

So, how do those psionic hackers and cyber detectives manage to navigate the network?

Did each of them carry a huge desktop computer with them?

- That's certainly impossible.

Psionic hackers and cyber detectives can even directly roam the world of the "Matrix".

It's a virtual world full of sympathetic illusions, which looks like the real thing, but is not the same...... It is a shared world of a "psionic network" constructed of seven empty islands, and its principle is said to be related to the collective subconscious. The reason why people's download speed is so fast, even infinitely close to "simultaneous synchronization", is precisely because the essence of this network is not simply an electrical signal, but related to psionic energy.

That's not so much a download as an "empathy".

Conversely, skilled psionic hackers can burrow into this matrix world. By attacking "ICE", the network protection system, with psionic energy, it is even possible to paralyze the opponent's firewall at the data level.

The biggest difference between a psionic hacker and a cyber detective is "understanding". If they understand the matrix world as a "sea of the collective subconscious", they can use psionic energy in it, but it also means that things that originally only exist at the data level, such as firewalls and anti-virus software, will also be symbolically transformed into entities in the matrix. If you are killed by those things, or even just suddenly disconnected from the Internet, you will become a vegetative person in reality.

The latter, on the other hand, simply understands the matrix world as the data world, putting itself on a higher level of data. Therefore, it is possible to enter or leave the matrix world at any time.

The common weapon they need is the "disc board". A highly integrated auxiliary computing device - it can also be understood as "the prosthetic body of the prosthetic".

Because the disc is undoubtedly contraband at the same level as a firearm, it cannot pass through most security, so it is impossible to put it directly on the body as a prosthetic.

But it is a kind of "equipment" that can be linked to the prosthetic interface at any time...... It's much easier to carry.

There are only three types of people who can use a disc board - psionics, cyber detectives, and information security engineers. The relationship is probably like a bandit, a knight, and a dart master.

If you have a disk, you can hack into the surrounding network anytime and anywhere. Quickly control the surrounding cameras, display screens, ...... Even directly control the chip in the back of the other party's head, and then control the prosthetic body on the other party.

Of course, different levels of users have different levels of personal firewalls.

Before, on the empty ship, there must have been a psionic hacker among the bandits.

That's why he was able to release viruses precisely in the first-class cabin - the one developed by the Tower of Babel in the same network environment, and even the firewall of the elves' highest privileges.

Different types of plates are integrated with different types of functions.

In order to ensure portability, it is characterized by specialization rather than omnipotence...... By replacing the disc board, different kinds of information intrusion can be realized.

The plate that Delphinium is using is called the "Vision of God". Built-in "keys" that can quickly crack most camera security protocols.

Originally, it would take more than ten seconds to hack into a camera, with the technology of Delphinium. It is even possible to be discovered by information security engineers.

But with the help of the Vision, she can control the cameras of all the stores on a street in two or three seconds, and even disable one of them with precision.

As for the kind of display screens such as food ordering, billboards, and billboards, they are basically not protected by security protocols. She doesn't need a disc to assist, and she can easily control it.

Now there are dozens of windows in front of the delphinium.

These windows are semi-arc-shaped, enclosing her inside. It's like a shield of light unfolding in front of you.

In order to concentrate on using the "disc board" to the greatest extent, unfolding the window and analyzing the data, she is much more productive in the office than when she goes out.

Although the delphinium is not a psychic hacker, it is still possible to leave a little tail due to distraction if it is distracted too much.

In order to prevent fatigue caused by the impact of too much information...... At the same time, it is also to avoid directly attacking the firewall of the hive nightclub. She uses Russell as her springboard for invasion - when the inferior reports to her that Russell has entered the Hive nightclub, she immediately unfolds the disc and indiscriminately loots all the probes around her.

Because the moment Russell's chip entered the "Hive Nightclub", he had already connected to the LAN of the Hive Nightclub.

Delphinium immediately took control of sixteen cameras in the lobby of the Hive Nightclub, and turned off seven of the windows that could not track Russell's location.

As Russell approached the front desk, relying on the listening device at the front desk, Delphinium eavesdropped on the conversation between Russell and the bartender.

So she ran the disc system at full capacity again, quickly collected the cameras in all the rooms of the entire nightclub, and found Xiao Liuli's room in just five or six seconds by opening and closing it very quickly.

Behind the Hive Nightclub is a director of the Tianen Group. It is very cumbersome to hack into its database of personal user information.

But if you just look up today's opening records, it's much easier.

Delphinium relied on the room number she had already known, looked up today's consumption records, and quickly located the customer's identity information.

It was only then that she learned about the pseudonym used by Xiao Liuli - and rightfully so.

Since they all came in wearing masks, it was of course impossible to give their real names. Otherwise, wouldn't wearing a mask be the same as not wearing one?

Before Russell's conversation with the bartender ended, Delphinium quickly wrote the information on the nearest screen Russell could see.

Looking at the monitor, Russell took a bracelet from the bartender and registered his pseudonym.

The delphinium breathed a sigh of relief.

"So that's the ...... here"

She muttered softly, apparently curious about the inside of the "Hive Nightclub".

Although when Russell was accosted by the high school girl, Delphinium felt a little worried...... But in order to complete the control of the field as soon as possible, she still chose to hijack the camera first.

Fortunately, Russell still got rid of them and was not dragged away, otherwise the delphinium would have urgently shaken the inferior over to save the scene.

After that, she was not idle either.

Just took a sip of water, took off her gloves, and changed a set of plates, and she began to invade all the prostheses in the room in batches based on the room where Xiao Liuli was.

Delphinium had seen it with the "Vision of God" before, and there was no monitor in Xiao Liuli's room.

But maybe someone will use a hearing-enhancing prosthesis - after all, you can't get information directly from your head, and the chip won't record what you hear or see. Even if it is a screenshot or video, the cache file is not local, but on the Cyber Order's servers.

Her judgment was clearly correct.

The camera shows that in Xiao Liuli's room, apart from her, there are only two girls wearing smiley masks.

However, the disc plate of "Tail Spike-C" told her that in the corner of this room, there were four prosthetic transformers quietly hidden.

“…… What's the situation? This is more than half of the transformation.

The flying fingers of the delphinium stopped, and he frowned a little puzzled and muttered in a low voice: "The bodyguards hired by the Tian'en Daily are too ...... Professional, right?

"It's actually equipped with a personal firewall per capita, so rich!

"But why...... Is it the 'deep sea' type? ”

[Deep Sea] is a typical passive firewall, which is a kind of customized firewall, and the personal version of the genuine system costs seven or eight thousand a year.

It is not as aggressive as the Honeypot, and can anti-track intruders; It's not like Black Ice uses lazy data to make itself indestructible. The biggest feature of the "deep-sea" firewall is that it can greatly extend the invasion time of the enemy, and is generally used in the enterprise information database and with the alarm system as the internal wall protection.

Nothing else, but here is a must in "hard drag". It's like a stone wall with no arrow tower.

And this kind of thing really doesn't mean much for personal protection.

If you really want to invade, the delphinium will only need about twenty minutes to get in.

In terms of personal protection, it is far less secure than "honeypots" and "black ice".

The former can make psionic hackers jealous, afraid to enter, worried that they will not be able to get out; The latter is simply that the security level is too high, and it cannot be opened from the inside without social workers.

I always felt that something was wrong. But after thinking about it, the delphinium still didn't get any inspiration.

So she went ahead and invaded.

Because of the firewall, she can't directly take over the other party's prosthetic rights, but she can make a crawler and find a way to bypass information protection to steal information.

It took about half a minute, until Russell swiped his card to enter the door, and Delphinium managed to climb the listening data of one of the bodyguards' hearing prosthesis.