Chapter 374 ECASH
As a technician, PonyMa still has a strong sense of pride in his software, and after internal testing and continuous improvement, he is quite satisfied with the OICQ software.
Because HELLC itself is a master and has written similar software, PonyMa did not send him the test version as soon as possible, but emailed him after some improvements.
PonyMa is an aristocratic figure in the domestic Huiduo network circle. On the one hand, because his family is in a good situation, he can do it when others can't set up a server on the Lado line. On the other hand, his own technology is also very good, and he set up a website named after his English name very early. From this point of view, he is still very confident in himself, even a little narcissistic.
Sending the software to Lin Hong for testing is actually more about showing his own results.
Before that, he and Lin Hong had previous technical exchanges. Most of the time, he was asking Lin Hong's technical questions, and Lin Hong was responsible for answering them.
Invisibly, the status of the two of them is a little tilted.
At least, in front of HELC, PonyMa has a feeling that he is short. There is nothing he can do. HELLC's technology is really awesome. Among these difficult problems he raised, he has never defeated the other party.
Now, he has finally written OICQ, and added a lot of his own understanding and improvements. He and his partners feel very good, and they think that the level of foreign countries is the same. After all, their software is more convenient to use than ICQ.
Therefore, PonyMa sent the software to Lin Hong, actually trying to get some positive and praise feedback from him.
Countless praise from ordinary users who don't know the technology. It's not as good as the words of an afloger, which is a very subtle psychology.
Open the mail. I saw the text in the first line, "I have tried the software. When it felt good, PonyMa's mood suddenly flew up.
This feeling is like being rewarded by a teacher for a little red huā when I was in kindergarten.
He continued to watch. His face suddenly experienced a wonderful change, from joy. To a little surprise, then shocked, shocked, surprised...
See the back. There was a thin layer of cold sweat on his forehead.
"There are not so many loopholes, right?"
PonyMa looked at the long list. And it's also marked. I doubt whether I have eyes or not.
Even if there are some loopholes in this software, it's not so ridiculous, is it?
PonyMa checked the time, and the time between the other party's reply to this email and the time he sent it was just over two hours.
How could the other party find so many loopholes in such a short time?
According to what he described. There are several loopholes or even fatal levels, if found. You can even enter their data server at will, get the maximum permissions, and add or delete all kinds of data at will.
Most of the loopholes proposed byHELLC can be understood by PonyMa, which is why his forehead sweats.
He thinks it is a very good software, but in the eyes of others, it is like a leaking sieve, which can go in and out at will. Can this not make him ashamed and shocked?
This software is developed for the bidding of a project of telecommunications. If so, how can it win the bid? As long as any of these loopholes are known to their competitors, it will be a fatal blow to them.
And there are also many loopholes. PonyMa doesn't understand it very well and thinks it shouldn't be a loophole.
He found one of them and tried according to the ideas proposed in the email. As a result, he was surprised to find that this seemingly inconspicuous bug is actually the same level as those high-risk vulnerabilities, which can also break through the permission blockade and endanger the security of the server.
With this time, he even felt a little sweat on his back.
He immediately picked up the phone on the table and called his classmate and partner Liu Zhidong.
"Pony, what happened?"
Liu Zhidong felt a little strange. He and Pony separated half an hour ago, and now the other party has called him again. There must be something important.
"Tony, do you have time now? Let's talk about OICQ online.
" OK, I'll be online right away."
The English names of the two of them, one is Pony and the other is Tony. Since OICQ was made, the two of them have been the first users to use this software. Ma Huateng's OICQ number is 1000" and Liu Zhidong's number is 10002.
After Liu Zhidong went online, Ma Huateng copied the content of Lin Hong's email and sent it directly to him through OICQ.
Liu Zhidong is also one of the developers of OICQ. In terms of security, he is better than Ma Huateng.
So, when Ma Huateng sent him the content, he was immediately shocked.
[Tony: Who discovered these loopholes?]
He knew that it was definitely not discovered by Ma Huateng himself. After all, the two of them have been working together and keeping in touch with each other at any time.
After the software began to start public testing, the feedback received gradually increased, and various strange problems were also exposed.
And the two of them often fix these problems overnight and then upload them to FTP for update.
There is usually something wrong with programming. If you don't solve it immediately if you don't solve it immediately, you will probably not be able to sleep at night. There is always a pimple in your heart, and it's very uncomfortable not to get rid of it.
So, this list may only be what Pony just got.
[Pony: It's HELLC, the boss of the three-color fire technology company. I sent him the latest version of the software, and in less than two hours, the other party sent back such a list.]
[Tony: He is so strong! It's worthy of HELLC!
HELLC also knows him, after all, the other party is a master. In a short time, he became a celebrity on Huiduo.com.
This circle is not big or small.
If you don't have the ability, no matter how much you jump in it, few people will pay attention to you. And if you really have the ability. If you are highly skilled, you don't need to advertise it. Everyone will track your movements. When I chat, I often talk about you.
When HELC first appeared, it appeared as a LINUX master, after questioning. Through his own technology, he has gradually won everyone's recognition.
This is a typical process of becoming famous by a technical expert. However, his process is much shorter than others.
This is not surprising. The main reason is that his technology itself is very powerful. Reach the point where others can only look up.
No matter what field, the strong are respected, and everyone admires, worships and envies the strong. If you want to become famous, you don't have to be a master in all fields, you just need to be a leader in a certain field. Even if you can only drink, if you can drink the first place in the country. Then others will remember you, as long as you talk about drinking. I will think of you.
The reason why HELLC quickly became famous in the circle is that it is proficient in LINUX. In this regard, no one can compare with him.
Later, he wrote software, founded a company, recruited technicians, etc. With such a series of combinations, he has become quite famous in the whole technical circle in China, which can be compared with the old webmasters such as PonyMa.
Ma Huateng and Liu Zhidong chatted for a while, and then tested these vulnerabilities proposed by Lin Hong respectively.
It was found that none of these loopholes were open-minded, and all of them were true, which made both Ma Huateng and Liu Zhidong sigh very much.
[Tony: In such a short time, he has found so many high-risk loopholes. Judging from the content in the email, I think he must have a lot to come up.]
[Pony: That's what I think. HELLC, the technology is really unspeakable. I FOUND THAT HE WAS STILL UNDERESTULT BEFORE. HE IS NOT ONLY PROFICIENT IN LINUX, BUT ALSO VERY ADECIENT IN THE FIELD OF NETWORK SECURITY. Tony, I'm going to visit him in Lingnan in person.
[Tony: That's good. It would be great if we could bring him over and start a business with us. Unfortunately, he has founded a company by himself, which seems to be a little unrealistic.
This incident made these two arrogant young people completely convinced of Lin Hong, and they both had an unattainable feeling for Lin Hong.
Tonight is another sleepless night. These two young people are busy fixing loopholes for their software. These loopholes are so big that a lot of code has to be rewritten.
~~~~~~~~~~~~~~~~~
After Lin Hong replied to PonyMa, he continued to check the other email he received.
This email is an internal secret mailing list of the password punk organization.
The mailing list is a discussion group based on the email system. As long as you subscribe to the service of this mailing list, any member of the group can receive the email sent by any member of the group to this address. It's a bit like a radio station. If you send an email to it, the radio station will forward the content.
Lin Hong has subscribed to the organization's secret mailing list since the last time he attended a meeting of the cryptopunk organization in New York.
In this mailing list, there are often some interesting latest discussions about password technology.
For example, an interesting discussion recently is that someone proposed to establish an electronic currency that can only be used in software, named ECASH.
The concept of electronic money has actually emerged very early. All kinds of recharge cards and credit cards can actually be regarded as an attempt in this regard. Its advantage is that they are easy to carry and can be paid in small amounts.
However, the electronic currency proposed by cryptopunk has gone a step further. The reason for this idea is actually to be able to keep it confidential.
Neither top-up cards nor credit cards can realize anonymous transactions.
Every consumption of customers is recorded in the bank records. Whether it is recharge or consumption, at what time, where, and which merchant, this information is extremely detailed.
And password punks think this is anti-human, taking money to buy things, which is a very private thing. Why do they leave a backup in the bank? What if these records are used by people with intentions?
So, they began to use their brains and felt the need to achieve an electronic currency that could be anonymous.