Super-brain hacker

Chapter 231 This thing moves out of the world

"Hey, this is Thunderbird One, Mendax, have you seen that post?" Thunderbird No. 1 dialed the phone and asked.

"I see, I'm already using this software. It seems good." Mendax obviously expected that this post was not sent by Thunderbird One. "The other party is a master, but unfortunately, there is no open source code."

"Indeed, I checked the two servers and found no signs of being hacked. The other party did it very cleanly." Thunderbird One had to admit this.

Masters are always respected.

Thunderbird One has completely lost its initial anger at this moment, and the other party's technology is obviously more powerful than itself.

"If it's really like what this author said, then this software will definitely become popular in the industry quickly. I just hope it's not a trap." Mendax sighed, "If only I could contact the author of this software. His software may be able to realize my ideals."

"Mendax, are you really going to take that road?"

"I have decided. This software may be an opportunity. Wait a minute and see how others are using it.

Thunderbird One listened to the busy sound in the receiver and couldn't help sighing.

He hung up the phone, and by this time, his software download was also completed.

There are three versions of BitCerence, Microsoft's MS-DOS operating system, Apple's SystemSoftware operating system, and Unix operating system.

Thunderbird 1 downloaded the version under DOS, but he was not in a hurry to install the software, but logged in to BBS again and began to check other people's replies.

The first few posts were meaningless. They thought that Thunderbird One had released a new software, so they praised it by the way.

Next, some people began to really discuss the content of this post. Some people asked questions, and some people answered below.

"Isn't this just a simple instant messaging software? Did you say that you were so awesome?

"Look at the principle carefully on the third floor. This software is not simple!"

"Doesn't this still need a server? The directory server is also a server.

"The existence of a directory server is only an auxiliary. Judging from the principle of this post, it is okay without a directory server, but the data will be delayed."

......

"Have you downloaded the trial? Is it really that awesome? Is it true that the third party can't listen?

"I have installed it and it can run. The boss is really awesome!

My bit messenger ID is 1FtjfjCVNXd1Ld1zVCgFjWA4LNphbxhxSv, please ++++++"

"Ohshit! This ID is too long. Who can remember it?"

"Don't remember, just copy and send it to the other party."

......

"I have contacted the friend in front of me, and I can communicate. But after analysis, the message can be intercepted! So, the description of the post posted by the boss is a little inconsistent!"

"Did the brothers upstairs really analyze it seriously? Try to crack it and see if the information you intercepted is yours!

According to my analysis, it may be because there are too few people using this software now, so some information is intercepted, but please note that this is RSA algorithm encryption. I don't know if you can crack the key?

......

"It's awesome. Boss, can you publish the source code?

"Yes, it is strongly recommended that Thunderbird No. 1 publish the source code. Although I have confidence in the webmaster's character, I still hope to publish the source code. According to the principle described in the post, even if the government knows the source code, it cannot monitor the message..."

......

Thunderbird One saw that as everyone realized the power of this software, more and more people asked themselves to publish the source code, and even the free software declaration was put forward, saying that since he was a supporter of free software, he should publish the source code.

Many people, like him, doubt, verify, marvel, then be shocked, and finally love but be afraid.

That's how they want Thunderbird One to release the source code. They are worried that he will set up some backdoors in the software.

Once they find that the software really does not have a backdoor, the software will become their primary tool for secret contact.

This is the case on both BBS. No wonder the "elves" came to call him and said that everyone was going to make a mess.

Thunderbird I became depressed again. In my heart, so is this master. Why don't you just register a new account and publish it? Why do you steal your own account to publish it?

He had to post announcements on the Pacific Islands and ZEN, saying that his account had been stolen, and the software was not written by himself.

At the beginning, there were doubts about this, but when everyone learned that the same posts appeared in several other well-known hacker forums in Australia, the doubts suddenly disappeared.

At the beginning, Thunderbird One admitted that his server had been invaded and felt a little ashamed, but when he learned that the top ten BBS in the United States had also been invaded and posted a post, he immediately felt that it seemed to be an honor. The BBS was not heavy enough, and the other party still didn't like it.

In almost two hours, posts with the same content appeared on BBS within major hacker organizations around the world.

This software attracted the attention of many organizations and individuals at the first time.

The top hacker organizations in the United States, "Mask Island", "Anonymous", "Mocking the World", the United States FBI Network Department, the United States Computer Emergency Response Team Coordination Center, German Security and Computer Emergency Response Team...

After trying out the software, they immediately realized the importance of the software and began to analyze and reverse engineer the software in the first place.

This day is destined to be recorded in the history of the hacker world.

Bit messenger, a communication software of less than 1M, has attracted great attention and sensation in the entire hacking world and the computer security community.

At the same time, many people are constantly looking for clues on these BBS servers, hoping to find the author of this software.

Of course, more people are keen to promote this software to their friends, because the author in the introduction paper clearly points out that the more people use the software, the safer the information you send, and the more difficult it is for others to listen to intercept the information.

As a result, this software spread within the hacker world in a very short practice.

Many hackers began to spontaneously run directory servers on servers around the world, contributing to the entire communication network.

The topology of the client on the directory server is like a spider web. From the point to the surface, it bursts out in an instant. In just two hours, a huge network of more than 2,000 nodes was quickly formed, and it is still growing at a very fast acceleration.

For a while, whether in various chat rooms or in the mailing list news group, the most common content is the series of hash hash values without any rules, because everyone is sending their bit messenger IDs to their friends and asking them to add themselves as friends.

The registration of Bit messengers is also increasing with the publicity of these people, and the growth curve is rising rapidly as if it is almost at a 90-degree angle.

Northeast of Melbourne, Australia.

After the end of the call with Thunderbird One, Mendax kept studying the bit messenger.

He found other people's messenger IDs from BBS and added them to his friend list.

He keeps chatting with others, and at the same time, he runs his own network packet capture software to grab packets in and out of the bit messenger, and then analyzes them.

Although others have claimed that they have analyzed the special messenger, even if the packet is intercepted, it is not easy to crack the information encrypted by the RSA encryption algorithm. Unless you have an extremely fast supercomputer, it is possible to crack the content in a relatively short time. Obviously, ordinary people don't have such conditions at all. THE TIME AND COST OF CRACKING FAR EXCEEDS THE INFORMATION ITSELF. MAYBE THE DATA PACKETS YOU INTERCEPT ARE JUST A SIMPLE HELLO STATEMENT.

However, Mendax still believes in himself. If he doesn't verify it himself, he can't rest assured at all.

The final result is that, as the software author explained in his post, this is an extremely safe software. Unless the information is intercepted at the entrance and exit, there is nothing the third party can do. And because of encryption, even if it is intercepted, it is a headache to crack it.

After Mendax proved this, he finally lit a cigarette.

The blue smoke curled up and hovered over the house for a long time.

"Bang."

Mendax pressed the cigarette butt behind the ashtray and turned on the lamp next to him.

The layout of his room is very simple. There are two closets, a bed, and a desk with a computer on it. In front of the desk, there is a window in front of the desk that can see the neighbor's backyard, which is closed at this moment.

On the long desk, there is also a PC magazine bound book, as well as several computer programming textbooks and VAX/VMS manuals. In addition, there are several science fiction books and a pocket Chinese dictionary for learning Mandarin.

Under the Chinese dictionary, I pressed a manuscript and wrote an article with scribbled notes. Most of the content of the article was blocked by the Chinese dictionary, revealing only the title of the article - "Human society has entered the era of information explosion!"

If Lin Hong was here, he would remember that he had seen this article on an Australian BBS, in which he predicted two trends.

First, there are huge business opportunities in the huge amount of information; second, the big news explosion means that we are getting closer and closer to the truth of the world.

And the author of that post is Mendax.

Maudax exits the debugger, then enters a hidden directory in the system, and keeps entering and re-entering. The depth of this directory has reached level six.

Finally, he entered the password, and after decompressing the final compressed file, a series of picture documents appeared.

He opened one of them.

A scanned picture of the file appeared in the display. In the upper left corner of the file is a prototype badge logo, and under the logo there is a line of small words "Federal_Bureau_of_Investigation", which is the full name of the FBI.

In the upper right corner of the file, there is a seal, and the text in the seal is --

"The top secret!"