Chapter 949: Boss, Are You Serious?
Yes.
Why believe?
If there is anything in the world that is most difficult to obtain, many people may answer that it is money, but in fact it is really difficult to obtain in this world.
It's trust!
All walks of life, no matter what kind of field, no matter what kind of person, as long as you can gain the trust of others, you can basically mix very comfortably.
The same goes for businesses and corporations.
There is one thing to say.
The vulnerability hunter platform that Gu Xiu has built is indeed very, very promising, whether it is using this platform to earn commissions, or using this platform to establish contact with the world's top companies and top hackers.
They are all places with a lot of room for future development.
But there's a problem.
Is this really possible?
After all, if you want to say that the most difficult people in the world are hackers, they have the ability that ordinary people do not have, and even in this era of electronic commerce, it is beginning to blow out.
Hackers are a species that everyone avoids like snakes and scorpions.
When it comes to hackers, everyone thinks of a crowd that hides in the shadows, has an evil smile, and can earn a lot of ill-gotten gains and wreak havoc by tapping on the keyboard.
In the past, these people were everyone's biggest headache.
Now you need these people to help you find out if there are loopholes in your program, and you even need them to help you solve the system vulnerabilities......
Is this possible?
After all.
If you want the other party to check for vulnerabilities and even fix bugs, you need to at least let the other party infiltrate your own system smoothly.
This is equivalent to:
Open the door to a huge vault, disarm all the guards, and let a thief in.
Who would dare to take that risk?
If the thief who came in really came to strengthen our doors and windows and block all the ways of stealing, it would be okay, it would be a happy situation for everyone to be happy.
But if that's if.
The thief who came in was a person with bad intentions, advocating that thieves do not go empty, and liked to take something by the hand?
Even.
What if the thief didn't take anything on the surface, but in fact he did something to the entire vault, and was ready to gather his accomplices to surprise you as soon as he got home?
After all, he had come in, and he knew everything about where the defenses were weak, where they could attack, and where they could retreat.
Who can guarantee that nothing will happen?
As long as such suspicions exist, it is doomed that the entire platform that Gu Xiu plans to build will definitely not succeed.
Moreover.
In addition to trust, it is actually very difficult to manage hackers.
Most of those who can be hackers and black hats like that kind of unfettered and uncontrolled life, and no one will be controlled and managed.
At times like these.
What does the platform have to limit hackers?
How do you make sure hackers don't mess around?
What is the extent of management and restrictions?
If you don't do it well, hackers are not willing to come to your platform at all, and they are not interested in taking orders for you.
If there are a few crazy points, the background of your platform will be hacked directly, and even your background data will be directly changed, which will directly impact all customers.
It was even more of a disaster.
Arguably.
This thing is a double-edged sword.
The benefits are obvious, but the disadvantages are equally obvious.
Even, although the benefits are obvious, it also takes a certain amount of ability to really obtain the benefits, but if you don't do it well, the impact is not ordinary.
The harm is even greater!
To put it bluntly, it's hard work and not easy to please.
"I've thought about it."
"I think the issue of trust should be put on the back burner, after all, the reason why customers don't trust, to put it bluntly, is because we don't have the strength and reputation to be trusted."
"But if we can make it clear to our customers that as long as it's commissioned on our site, hackers will be able to do it well, and there will be absolutely no problems."
"That's a different story, and I'm sure a lot of customers are willing to let their guard down."
Luo Xiang nodded.
What Gu Xiu said is indeed good, to put it bluntly, these two problems can be blamed as one problem.
As long as the platform can really restrict hackers and manage hackers well.
Then trust will naturally arise.
Can......
The actual problem still exists, that is, the relationship between the hackers of the platform, what kind of way to restrict hackers, and what kind of way to keep hackers from messing around?
Fortunately, this question did not wait for Luo Xiang to ask, Gu Xiu had already taken the lead in giving the answer:
"Real-name authentication."
"What ???"
There is an answer, there is an answer, but whether this answer is acceptable or not is another matter.
"Real-name authentication." Gu Xiu replied again, and gave an intimate explanation:
"We carry out a real-name authentication for all hackers who take orders, which can ensure that this person is found, so as to use the way of responsibility distribution to let hackers do things with peace of mind."
"After all, all hackers are afraid of being exposed to the sun, and once they have real-name authentication, they will never dare to mess around, because they know that they can't escape if they mess around."
"Natural."
"As a result, our customers will be more recognizable to us."
That's a pretty good explanation.
It's that Luo Xiang always feels that the boss said this as if he didn't say it, and even if this was not said by Gu Xiu, but by his own subordinates, Luo Xiang estimated that he would directly beat him over.
I'm here to have a serious discussion with you, why don't you sit here and play nonsense literature with me?
But.
This is the boss.
Can't hit!
"The owner...... Real-name authentication is definitely beneficial, but I'm afraid this path won't work at all......"
After thinking about it, Luo Xiang changed to a more euphemistic expression.
Real-name authentication?
You're thinking about fart!
Hackers like to hide behind computers one by one, how can they give you his real-name information?
How can there be such a hacker in the world?
I'm afraid that when these four words are spoken, everyone will immediately laugh at them to death, the kind that they don't even care.
"Normally, they wouldn't have been able to say yes." Gu Xiu nodded, he obviously understood that such worries were real, but he was not in a hurry at all:
"But if ......"
"The world's recognized top hackers have become our users, taking tasks on our platform?"
"Even, they have already done real-name authentication on our platform?"
What???
Luo Xiang looked strange, glanced at his boss again, and made sure that the boss didn't seem to be joking.
"Boss, are you serious?"
Seeing Gu Xiu nodded, Luo Xiang couldn't help but swallow his saliva:
"Careful analysis, if this is really the case, our platform may really succeed, and hackers who are willing to come to our platform will definitely agree to provide real-name authentication."
"After all, there is a herd effect, let alone a leader."
Luo Xiang carefully analyzed a wave, but then shook his head:
"But the premise is that these top hackers are really willing to agree to our conditions."
"But I'm afraid ......"
"It's very unlikely."
Is it minimal?
Gu Xiu just smiled.
Not necessarily.