Chapter 233 War Decryption
This time, the patent acquisition negotiation of the infrared transmission agreement has been discussed intermittently for more than a month. Because she has other things to do, and the acquisition party she faced this time is not simple, so she invited a professional agent to take charge of this matter this time.
In the continuous confrontation and compromise between the two sides, the preliminary acquisition intention agreement was finally signed.
The final price is 35.4 million US dollars.
It is impossible to do more. This is the highest price acceptable to the Infrared Data Association.
This time, the situation is also a little different from the last time.
Although other companies are also willing to participate in the acquisition, after seeing the Infrared Data Association, they have given up this idea one after another. After all, the members of this association are all giants in the electronic or computer fields. On the one hand, their strength is not comparable, and on the other hand, the purpose of their acquisition of this agreement is to Industry standards, there is no need to intervene again.
A few days later, Lin Hong went to New York alone to attend the signing ceremony.
This ceremony did not invite outsiders, which was very low-key.
This is Lin Hong's request, and irda is also very happy.
35.4 million US dollars arrived again, and Lin Hong became a billionaire in [China] country.
With his last experience, he seemed very calm and calm this time. He returned to Boston from New York that day. The only difference was that he bought Motorola's latest compact mobile phone this time, gray and black, which can be put directly in his pocket, which is very convenient.
This is because she had to go to the e-commerce mall to buy it at the strong request of Phylise. With a mobile phone, Phylized can contact Lin Hong at any time.
Since Lin Hong saw Kevin's demonstration of mobile phone functions, he has actually become interested in mobile phones.
He thinks that mobile phones are the most similar to the radio stations he has come into contact with before, but the electronic components have become smaller.
After buying the mobile phone, he conducted detailed research on the mobile phone. For this reason, he also called Motorola to ask for a detailed mobile phone technical manual, but he did not want to be rejected by them, saying that he would not provide such information to the public.
In desperation, Lin Hong decided to practice the social engineering knowledge he had learned.
So, he hacked into the employee database of Motorola, found a technical engineer with a little weight in Boston, and then spent some time studying the technical engineer's behavior habits and routine.
Finally, the technical engineer pretended to send an email to the technical department of the headquarters to apply for a detailed technical document for this mobile phone, asking the clerk in charge of these technical documents from the headquarters to mail them to the designated place.
For this reason, he also made a special phone call to the clerk.
The other party mailed the technical document to the Boston Post Office without any doubt, and then Lin Hong pretended to be a postal official inside the post office and got the technical document.
In the process, he encountered several situations where he almost went through several times, but in the end, he still took advantage of his extraordinary wisdom and calm personality to pass the test smoothly.
This time, he really used social engineering independently to achieve his goal.
Although he had thought about all the possible details before, he finally found that there were many emergencies that had not been dealt with well. Fortunately, this was not an important thing. Even if someone was puzzled, he did not delve into it.
He had to sigh in his heart that Kevin was really a genius in this regard. No matter how difficult the task was, it seemed to become easy in his hands in an instant. Lin Hong sighed that this kind of talent was not as good as his own.
After getting the technical documents of the mobile phone, Lin Hong carefully studied the basic hardware principles of this mobile phone. After simple modification, he realized the function of searching for the attached call content that Kevin showed him before.
That is to say, he converted the mobile phone into a telephone radio station.
After doing this, Lin Hong lost interest in this mobile phone. He usually put it on the shelf and only took it out when needed.
In the past few days, Bitcom has gradually slowed down the growth rate of users. During this period, those who began to surf the Internet and chat with others are basically people who know technology very well. Ordinary users use computers to print or play a few simple games at most.
So after the surge of users in the early stage, the growth of Bit messenger has almost stagnated.
After initial research and wait-and-see, many people found that no one had exposed the back door of the bit messenger, so they gradually began to feel at ease and began to use the bit messenger to do some more secret things.
It was at this time that Lin Hong released the v0.2 version of the bit messenger.
According to the original design, each client has an automatic upgrade function. After Lin Hong released the upgraded version on a relatively safe and inconspicuous server, in just a few minutes, almost all the Bitcom online at that time made users receive a conversation about whether to upgrade compared with the messenger. Box.
About 70% of users choose that these users basically simply regard the bit messenger as a substitute for irc chat software. In their opinion, no matter how much confidentiality is, there is no difference between them. They only care about whether there are many people using this software, which is inconvenient.
And the remaining 30% are wary of this.
They must confirm that there is no bad impact after the upgrade.
After all, they don't know what functions have been added to the new version. Let's wait and see what other people's feedback.
Everyone's feedback has been released in the "Bite messenger home" one after another.
The new version of Bit messenger, referring to Mendax's post, turns the "complaint account" into "complaint cancellation". Another prominent function is the friend backup function. You can choose to import and export to your friends, so that even if your account is stolen or lost, it can be very convenient. Import your previous friends into the new account.
In addition, the latest version of BitCer has added a function that makes everyone very excited, that is, the proxy service.
Not only can the messages sent be blocked from third-party monitoring as much as possible, but it can also be used to use other network services, such as browsing bbs, connecting to the login server, sending and receiving emails... and so on.
All traffic can be forwarded through the proxy function of the bit messenger and finally reach the destination.
After the appearance of this function, many hackers were ecstatic, because they finally had a software that could easily hide their tracks. Before that, if they want to hide their network behavior, they must make every effort to set up proxy servers on the chicken, and then jump on these proxy servers.
Even so, highly skilled people can still know their whereabouts and source through reverse tracking, which is why many hackers are arrested.
After the function of bit messenger appears, they can directly use the proxy function of bit messenger to jump in anonymous nodes and easily hide sources and destinations.
Few people know that this function actually appeared in the first version, but Lin Hong did not open it.
In addition, on version v0.2, Lin Hong also issued a brief announcement, hoping that everyone will continue to help test the software. Once the technology of the whole software is mature, he will fully publish the source code, and you can choose to compile the client by yourself.
As soon as the new version was released, it immediately attracted great attention again.
This version is relatively more important than the previous one.
The significance of the first version lies in the decentralized design structure of the bit messenger and the principle of anonymous messaging.
For chat software, the vast majority of people usually do not feel the need for special encryption in this regard.
But network agents have a very large market for hackers.
Old birds often warn rookies that they must take safety precautions, otherwise it is easy to be approached by the other party along the way. I don't know how many beginners want to have a try. The specific difficulty of how to be an agent is not ordinary. They are novices. Where did they get the broilers in their hands? Isn't this a paradox?
Now, the ready-made proxy server has come out, and the security has been demonstrated by many masters. As the software author said, it can basically eliminate the risk of being tracked and monitored.
This is simply a hacker's artifact!
Everyone poured into the "Bite messenger house" to discuss this topic.
So much so that the previous improved functions for chat tools have been ignored.
Two hours after the release of BitCervenger v0.2, a post with a very obvious political orientation suddenly appeared in the "Bitter's House".
The title is "Decryption: The scandal of the abuse of Iraqi prisoners by the U.S. and British coalition forces!"
In this post, the author released a lot of very detailed data, proving that the multinational alliance led by the United States had abused most Iraqi prisoners in the Gulf War against Iraq at the beginning of this year. These acts include beating prisoners, electric shocks, **, nose cutting, and even killing and strong j...
What's more outrageous is that two Pakistani diplomats were secretly detained by the U.S. military in Abu Ghrib prison for a year! According to international law, diplomats enjoy immunity in the country of residence. Article 22 of Article 1 of the Vienna Convention on Diplomatic Relations clearly stipulates that "the embassy shall not be infringed"; Article 29 also stipulates that "the person of diplomatic representatives shall not be infringed".
Moreover, the U.S. military had investigated these things, but in the end, it was over, and the prisoners were not punished.
The author is not groundless. In this post, he attached a large number of ftp addresses, in which there are audio-visual scanned pictures of FBI internal investigation documents in the United States, as well as some abusive prisoners.
After this post was published, it immediately aroused everyone's shock and attention, and spread to the outside world at a very fast speed.