Super-brain hacker

Chapter 222 Bit Cr messenger

The writing speed of the new version of CQCQ is very fast. After all, Lin Hong has had similar programming experience before, and many of the codes can be reused. However, due to the large changes in architecture, there are still some important codes that need to be rethinked. According to this design, the relay server does not save any private content of possible users, including the user's account number, password, and personal information, chat content sent, IP address, information sending destination... and so on.

The relay server is named "directory server" by Lin Hong, which only saves the network topology node of the current online client. Every user who uses this software can act as the server side and may be selected as a jump relay node.

When a private channel for user data exchange is really created, the current relay node only knows two pieces of information, which node the current packet comes from, and which node to send. As for the superiors and subordinates, the subordinate relay nodes are completely unknown.

No separate relay node will know the full path of the packet, because the client assigns a ** encryption key for each hop to ensure that the connection data is not tracked when passing through.

This key is temporarily generated. Even if the user keeps contacting the same person, this path is not fixed. According to Lin Hong's design, the key will be changed every ten minutes, that is, a completely different connection channel will be established.

Lin Hong took into account all the links that he could think of that might be monitored. There is only one purpose in order to do so, in order to avoid being monitored by third parties.

Because I don't want to use the central server to store data and information, all data will be stored in the client side.

The safest way is to download all registered user information locally in each client, so that no matter which one disappears, you don't have to worry about the loss of your information, because the most secure encryption algorithm is used, and you don't have to worry about anyone bruising these accounts. Crack it, even if it is cracked, it is useless. It's just that I got this account, and the chat record will not be uploaded and saved.

But if you use this method. At the beginning, you may be able to do it. After all, if it's just an account number and password, it doesn't take much space. At that time, when the number of people increased to a certain order of magnitude. There will be a problem of excessive data.

Every newly registered user may have to download all the information of other users from the network first. If the hard disk is not large enough, it is likely to burst the hard disk.

Lin Hong gave up this method. He changed to a more clever way, that is, he only saves his friend's information in each client.

That is to say, when you add a friend, all your information will be synchronized to the other party, and the other party's information will also be synchronized to you.

In this way, the data to be saved will be greatly reduced. Even if a person has a thousand friends. The size of the information after encryption and re-compression can also be tolerated.

However, in this way, there will be some situations. For example, if someone has very few friends and these friends are not online all year round, if their local data is lost, they are likely to lose their account number and password.

However, Lin Hong thought that if there are no friends, it is not a user at all. It doesn't make sense to keep this account. If you want to use this software again, you can re-register an account. The previous account completely scrap the place where the original account was saved. Fang, you can randomly select one or two "directory servers" to save. After a period of time, the data will be completely destroyed to avoid being obtained by people with intentions to achieve bad purposes.

Originally, this was just a very simple software, but in order to give it enough confidentiality features and security, Lin Hong upgraded its complexity to a whole level, which can be said to be racking his brains and painstaking efforts.

The final program written by

is still divided into two parts, one of which is the "directory server side" specifically used to save the node topology and the initial registration information.

The other part is the "client". Of course, this client also integrates the relay service function.

In the morning, the prototype of the new version of CQCQ was written.

Lin Hong logged in to the old version of the software with great interest and wanted to tell LINUS the news, but after he went online, he remembered that the other party had already been a soldier.

So, he logged in to SAM's official BBS and wrote a detailed introduction to the software. He wanted to release it to the public and let everyone help test and use it together.

However, when his finger touched the enter button, he didn't press it in the end.

This software was designed by Lin Hong himself. Naturally, it is clear what kind of impact it will have on the online world once it is released, and it will even have an impact on the real world.

It can be said that this is a double-edged sword, and hackers can use it to communicate, and criminals can also use it to do some illegal things. It must be great news for them.

However, for governments, this is bad news. It is expected that this software will be strongly opposed and blocked by these people.

Lin Hong took back the hand on the enter key, sat in front of the computer and thought for a long time, and finally pressed the back bar to delete all the content he had just written.

He just simulated in his mind what would happen once the software became popular.

The result of the final simulation is that you may be invited by the FBI to drink * coffee, or live an anonymous exile life like Kevin.

He can't afford both situations for the time being, and he doesn't want the software to be strangled in the cradle before it grows for this reason.

Now that Lin Hong has begun to have the consciousness of hiding his identity, Kevin has already told him that he doesn't want his name to appear on the FBI's blacklist.

"Hey!"

Lin Hong sighed, and now he is really a little depressed.

I wrote this software for a whole day and a night, but I didn't have the courage to release it. It's really depressing. I don't know if there are such examples in the history of computer development.

Lin Hong thought for a long time, and finally thought of a very sneaky way, that is, to invade several servers, first install the directory server on the server, and then find a way to post anonymously for everyone to download and use.

But now Lin Hong is not very familiar with the technology of invasion. If he does this, it is easy to be dug out. At that time, he will be accidentally exposed, and the result is the same as his own direct release.

"It seems that we still have to think about the invasion technology."

Although Lin Hong felt that he should also learn intrusion technology before, it was based on the idea of preventing others from invading, and the demand was not very urgent, but now it seems that it is much more convenient to do things after mastering network intrusion technology.

He looked at the time, and there was still half an hour before the morning exercise, so he continued to improve the software.

It is obviously inappropriate to name it CQCQ again.

He decided to give the software a new name.

Originally, according to its structure, Lin Hong wanted to name it "sugar gourd", which means that the information jumps through multiple nodes and finally reaches the destination. But on second thought, in this way, as soon as I saw the name, I knew that it must be the software written by the Chinese people, which suddenly greatly narrowed the scope of the author. Thinking about it, I gave up.

The final name is "BIT_COURIER" and the Chinese name is "Bit Courier" or "BC".

is different from CQCQ that the bit messenger does not use a series of numbers to represent ID, but is replaced by a series of hash strings without any rules. This string has numbers and letters, and is case-sensitive, with a total of as many as 13 digits, called BC addresses.

This is calculated through secondary encryption through HASH encryption algorithm. In the rules of bit messenger, it is unique. Everyone has a unique BC address, through which the other party can be added as a friend.

The purpose of this is that Lin Hong does not want others to simply traverse all accounts by accumulating in numerical order, so as to avoid a wide range of violent password cracking attacks.

However, it is obvious that the BC address is too difficult to remember and can only be copied and pasted. In Lin Hong's vision, the earliest users of Bit Messenger should be those who know computer technology or hackers, and only they have such needs temporarily. As for criminal gangs, they are not within his consideration at all. Of course, if these people also have computer technology, you are lucky to find a fairly safe way of communication.

In addition, Lin Hong also integrates the automatic update technology into the bit messenger, so that once the new version is released, the whole network client will be selected whether to automatically upgrade.

Because the bit messenger itself uses point-to-point technology, it will be very convenient to download and upgrade. When a client downloads the upgrade program, it immediately becomes a download source, which can provide download services for others. The more clients, the faster the download speed.

Theoretically, the bit messenger is completely not controlled by anyone. Once Lin Hong released it, he immediately lost control of the special messenger, and he could not listen to any node, or no one could monitor. This is an uncentered structure. The whole world is flat and equal to each other. No one can control anyone.

However, Lin Hong still left a back door for himself, that is, the automatic update function. This is the only place where it is possible to control it. This function can make the program more powerful or make the program useless.

At the beginning, Lin Hong did not have this design, but at the moment he wanted to press the enter button, he suddenly had an inexplicable feeling in his heart. It was not very complicated to say whether he was excited or afraid.

After thinking about it over and over again, he decided to leave himself a back door, because he couldn't predict what kind of impact this program would have after its release.

"If this program really doesn't need to exist, then let it disappear." Lin Hong said to himself.