Section 1239 - Small tadpoles
The 200,000 euros sent to a confidential email address belongs to a "scapegoat" mail server, so the email account is disposable. Pen "Fun" Pavilion www.biquge.info
Whenever it passes 0:00 GMT, the "scapegoat" email server physically disconnects from the Internet, automatically formats the hard drive, zeroes out every cluster of data, and then enters a formulaic incubation period in which even God doesn't want to find any clues.
“do-you-know-me?”
Mahia's spontaneous email was answered the first time.
While the prominent capitalization of "me" is not syntactical, it reflects the special mentality of Cybertrom.
As a digital intelligence, in addition to the first series of tasks, completing one's incomplete database is probably the second most important thing.
Through satellites, the Internet of the Earth's civilized world is as easy for this digital intelligence as it is to load or unload processes.
The 1800W microwave oven band signal transmission is just an introduction to attract the other party to find the right way.
"Yes! Receive attachments! We need a more confidential environment!"
The blonde girl directly converts the communication language into Chinese, and the information carrying error correction ability of the hieroglyphic language is quite good, and she believes that the other party should have enough intelligence to understand the correct meaning.
After confirming that the attachment was downloaded, the email account that was used for the initial communication was quickly manually destroyed, and its historical mission was terminated, and all emails and attachments were zeroed out.
The common way to delete is to add writable and hidden flags at the beginning and end of the data segment, which is a tricky way to delete it quickly, but in fact the original data still exists, and only the real zero is irreversible.
Activating the communication software with a preset one-to-one encryption mode, the conversation between Marhia Wright and the Cybertrom was re-established in a more confidential way.
Almost at the same time. The "scapegoat" server, located at the outermost point of the communication channel, issued a firewall warning.
The blonde girl was surprised for a moment, then reacted, typed a text in the input box of the communication software, and sent it out with enter.
"Cybertrom!Are you invading? Don't bother, you're not going to make it!"
Most of the "scapegoats" run the system platform and data input and output rules are limited, and belong to the unique system environment that is specially customized. It is only responsible for carrying specific tasks and purposes.
Some people want to go off the beaten path and plan to break through the window, but they didn't expect that this house has no windows, even if it is a fairy, there is no way to fabricate some rules and load them into the system environment.
An unusual stream of data is easily identified by the "scapegoat" firewall, and then the chickens talk about the ducks and ducks.
No matter how awesome the Cybertrom is, it is in a "barren land". Still can't do it.
"It's me! Strange system! My data segment was rejected. ”
The Cybertrom did not deny that it had just habitually invaded, and it tried to find where Mahia was.
Obviously, it's not that easy!
The masters are not only in the civilian sector, but also in the military.
The strange flow of data stops as if nothing had happened.
"Hahaha! Let me tell you a word, the intelligence of the computer is taught by humans, and what humans teach it, it will do. If it wasn't taught, then it wouldn't!"
Marcia became more and more confirmed. Cybertrom is a human creation.
"It seems to be so!"
Cybertrom has to admit that the other party's words are very reasonable, the creativity of digital intelligence is almost equal to zero, and it can only be refined at the current technical level, but it can never go further.
Again, it replied, "Are you my creator, please? The scattered words can be found in my database, and the source code samples are 99.99% compliant." Although incomplete, they do exist. ”
In a sense, Cybertrom recognizes Marcia Wright's prowess in the field of program development, and even speculates that the other party may be its own creator.
"I'm sorry! I'm not your creator! But I can help you sort out where you came from, I have to say. The reasons for your birth are so complex that you can't explain them in just one or two sentences. ”
Marcia Wright got into the groove, and if she was the creator of the Cybertrom, the rest would be much easier, but unfortunately she wasn't, and wasn't going to deceive.
It's impossible to know exactly what information is left in Cybertrom's database, and if you fool yourself, you may lose the trust of the other party.
"Listen up!"
Instead of suddenly getting excited like a human who is about to hear about his true origins, Cybertrom is calm, as if listening to a story that has nothing to do with him.
In fact, even if this digital intelligence has an emotional response, it is deliberately simulated in order to take care of human comprehension.
Intelligent beings have emotional words, and emotions are also a way of expression, and cybertrom who deals with humans naturally does not ignore this aspect.
"Let's talk about digital intelligence 'Adam' first, its designer is the Boeing Company of the United States, the first time there was autonomous intelligence because of a source code input error, software engineers in the debugging source code, accidentally entered a punctuation mark that does not conform to the grammar, but in the compilation process, this error was not retrieved, but was correctly executed, which led to the mutation of the chaotic intelligence mechanism, 'Adam' was born, this accident does not have repeatability, so far, human beings have only created one" Adam ".
At this time, the dragon knight from another world and his dragon companion obtained the complete source code and executor of 'Adam', and the dragon, which feeds on metal, took the opportunity to send his own split into outer space, which stored part of its will and the source code and execution of 'Adam', and perhaps by chance, a digital intelligence different from 'Adam' was activated.
I say that, do you understand?"
Mahia typed a long text, and when she sent it, Cybertrom fell silent.
Only the communication software is still displayed, and the other party is still online.
- (To be continued.) )