Chapter 46: Aoi Lily (Thank you to the alliance leader who fed Tianzelu~)
This is not unwarranted self-confidence.
Russell even had several solutions to this problem......
His psionic energy, the "Immortal Vessel", can directly pass over the surface of the Iron Mask, penetrate deep into it, and cut off the designated line; He could also cut off a small piece of the child's skin that was attached to the Iron Mask.
Russell also uses the disc - he can use the disc to hack into data in its traditional form, and he also has the technology of a psionic hacker who can drill into it in his imaginary form.
…… Compared with investigating "demons" and nightclubs, bomb defusal and invasion are what Russell is best at.
It's better to say that after he joined the company, he cut down several people, and finally saw the first problem in his professional field.
-- The problem of mismatch in the professional work of modern college students needs to be solved urgently.
Since there are still more than ten minutes left, let's start with the most flexible way to do it.
The model of Russell's left hand prosthesis is called "Aoi Lily". This is the name Russell gave him...... This flower has another name, the "astrologer lily".
It was an intrusive prosthetic with sixteen interfaces - usually psionic hackers only used models ranging from six to eight. The special feature is that there are two more disc board interfaces, and some have two more general interfaces.
And without the need for engineering prostheses for combat and camouflage, the number of interfaces is necessarily less than four.
A universal interface that can be used to physically link to others or insert chips, which is necessary for all prostheses, and sometimes there are two or one of them as a backup.
Plus calibration links for most ranged weapons...... Some firearms in this era no longer need to use crosshairs and scopes to aim, especially automatic weapons, can be directly physically linked to the weapon interface, use the chip behind the head to collect information about other targets to capture prosthetics, process and proofread, and display the aiming interface in front of the eyes for real-time calibration.
The image in their eyes is like a shooter - it even prompts the "crosshair size" and the distance to the target, and the more advanced software also comes with perspective and self-aiming if the arm has a prosthetic.
When you move a firearm, it's like using a gyroscope to turn the handle.
Another essential interface is used when plugging in some special plug-in interfaces. For example, if you don't have a prosthetic eye, you can attach a sight. For example, when the empty boat was on the empty boat, those men in black bodyguards...... The red light that shoots above their heads is a secondary aiming plug-in called the Cyclops. Similar add-ons also include adaptive gas masks, as well as "gear" such as jetpacks and magnetic boots.
Using a switch to start is too slow.
It's like the combat gacha that Russell complained about before - this device must be connected to the prosthetic interface in advance, and then start directly when you need it.
Everyone in this world has a prosthetic body, not for aesthetics, not for any disability, or to optimize physical performance.
The purpose is very simple, that is, at least to provide a data interface for the chip.
Otherwise, you can't even add friends, and you can't do any important data that must be transmitted offline.
Although the chip itself does not need to be charged, if it is equipped with a prosthetic with more complex functions, it also needs to be charged occasionally. This connector itself can also be connected to a charger.
Sixteen interfaces are the maximum number of interfaces that a prosthetic can theoretically hold. Prior to this year, this "theoretical maximum" was twelve.
Although in normal use, in most cases, only one or two interfaces will be connected at the same time, and at most more than four interfaces will be connected simultaneously...... However, in terms of design, it is absolutely not allowed to "once you access too much, the data will be streamed, stuck, and overheated".
Once there are more than eight interfaces, special protocols are required to keep them running.
"Aoi Lily" is so named because it is one of the first new engineering prosthetics to fit the "Astrologer Protocol".
Although it is positioned as an intrusion, it is equipped with a rare interface with a special protocol, a computing hub that can even be directly linked to a large workstation, or a giant engineering robot - even the "annealing nerve center", which must be accessed with special equipment, Russell can directly hack into it.
Not to mention a small iron mask.
This small metal device is most likely to be the data written with a magnetic connector.
So Russell raised his left arm, and as soon as he thought about it, a magnetic connector and a data cable suddenly popped out of the prosthetic leg of his left arm.
"Are you okay?"
The inferior frowned, still a little uneasy: "You can also go in first and take a look and collect information." Then come out and tell me that I'll talk to the delphinium on the road first......"
"When you see me carrying this unpopular access cable with me, you should know it's fine."
Russell replied without hesitation.
Unlike his cautious tone before, Russell's words were full of professional confidence at this moment.
"Oh yes, what TPT is going to be used for this intrusion protocol......"
The inferior hurriedly added.
"I understand."
Russell replied casually.
He turned his head to look at the inferior, and the corners of his mouth rose slightly: "You know what?
"The company that is best at cyber security and artificial intelligence technology is Sogo Technology Group; The core talent training base under the Sogo Group is Sogo University; The core faculty of Sogo University is the School of Information Security and Intelligence Control...... And I was the head of our grade from college to graduate school.
"Although the experience may be less, the technical ...... I don't think I'm much worse than Delphinium. ”
He didn't have to use a normal protocol at all.
The "Astrologer Protocol" has a variety of general protocols built directly into it...... This is the "Grand Unification Protocol" that Sally Ruth has been planning in recent years, which is compatible with more than 200 protocols on the market, so that the public interface can be directly connected to external devices with rare interfaces only through adapter cables, without the use of engineering prostheses.
Russell's mentor, Sally Ruth, had a penchant for designing prosthetics, but her true expertise was her ability as a cybersecurity engineer.
Nowadays, almost every company and every director is equipped with "A· ICE", the scientific name of the "offensive wall", is an anti-intrusion electronic technology that was invented by Sally Ruth.
If there is no A· ICE is the underlying technology, so that today's psionic hackers can get into almost anywhere they want to enter and manipulate almost anyone's prosthesis.
But now, if their imaginary body tries to break into the invisible A· ICE, it will be infected by a large amount of spam information in an instant.
It can even overheat their chips and in turn blow up their brains...... At the very least, it can also leave "frostbite marks" for reverse tracking. The more advanced models can also be used to counter-track at the first time, or temporarily block the opponent from entering the matrix world.
Sally Ruth has successively invented a total of seven types of walls, including Type A, Type B, Type D, and Type T, and has continuously changed and maintained their technology, and these technologies are completely open source.
The biggest difference between a wall and a firewall is that it is designed to fight against psionic hackers who can directly damage the underlying data, rather than viruses or other types of intrusions.
Today's commercial firewalls and commercial walls, whether they are "black ice", "honeypots" or "deep sea", are all extensions of the underlying technology of Sallyruth. And the icebreakers that can break through this level of ICE are only found in a few of the largest psionic hacking organizations. Only after the ice has been broken can an Illusion be used to invade - and if it is not entered by an Illusion itself, that is, without the exclusive means of psionic hacking, it must use the "puppet" built into the disk.
The puppet is similar to the Trojan virus of the old days.
But unlike Trojans, puppets behave highly automatically...... As long as you release it, you can complete the task on your own and then self-destruct, just like a puppet that acts autonomously.
These puppets are integrated into those plates.
However, the puppets built into these disks must be assisted by the cloud servers of these hackers - the most critical "icebreaker" technology is not integrated into the puppets at all. Otherwise, the calculations that can be performed by such a small piece of metal will not be able to penetrate the various walls of this era.
Yes, the highest-level psionic hacker groups almost no longer engage in hacking.
Instead, they sell "starter kits" and "upgrade packages" that are necessary to carry out hacking operations for profit. The discs they sell at low prices are all age-old, and if they don't renew them after expiration, they will simply become invalid, or they will become very slow to download ice breakers.
However, if you renew the subscription, you will also bundle and recommend some "optimization packages" that you don't need at all.
For example, the "Vision" used by Delphinium can only hack into the public cameras of the ordinary six models with basic functions. If you want to hack into pocket cameras, private cameras, and prosthetic eyes, you'll have to add layers of extra money; If you want to hack the speaker, you have to add another money, and you have to add another money to hack the screen.
It can be said that they dismantled the function of the disc board so loosely in order to look "more luxurious" when packing.
All open-source firewall and wall protection technologies developed by Sally Ruth have fixed vulnerabilities. This is also the reason why no matter how the enterprise updates the protection system, the disc board is fast and effective.
And this is actually the back door that Sally Ruth left for himself when he invaded.
- After all, the people who build the firewall can't keep themselves out.
Inside Aoi Lily, more than 60 kinds of attack programs are integrated. Sally Ruth even categorized Russell, allowing him to call the corresponding crack program with one click in front of any wall.
From this alone, it can also be seen that Sally Ruth attaches great importance and trust to Russell.
and a strong willingness to take care of them.
"Don't be afraid, kid."
Looking at the child who was still trembling slightly, Russell held his head with both hands and comforted him softly: "Remember...... Don't sit down, don't squat, you can jump lightly if your feet are sore. Don't rip off your brother's thread...... Hold on for another ten minutes and you will be saved.
"Come on, okay? I'll be with you. ”
This is appropriate, reasonable comfort.
Prevent the "patient" from tearing off the thread directly because of excessive tension - although there are inferior people who help Russell keep an eye on it, Russell still habitually instructs first.
Seeing the boy nod slowly, Russell smiled with satisfaction.
"That's good."
Russell whispered.
He sat on his knees and closed his eyes.
【Please select an access mode】
- Intrusion mode.
When Russell gently clicked the button, a shrill warning sounded in his ears.
[The accessing party sets the connection rule to -intrusion mode]
[Warning, this physical link will forcibly unlock data exchange permissions!] 】
[Warning, this physical connection will forcibly unlock the administrator permissions!] 】
[Confirmed that there is no permission, and it is judged to be malicious invading]
[Warning——]
After that, Russell couldn't hear it.
Because he has turned into an imaginary body of data, it has flowed into the small iron mask along the physical link.