Super-brain hacker

Chapter 628 Plan to Grab the Net

"I didn't expect that the computing power curve had changed so much in such a short time. It seems that I missed a good show."

Lin Hong opened the control terminal of the super worm to himself, began to enter the filtering conditions in a targeted way, collect information in a targeted manner, and find answers.

The computing power of the main network has increased several times in a very short time, which is an extremely abnormal signal. Lin Hong must find out the cause of this situation and then make targeted improvements.

Although Bitcoin's computing power access network is completely anonymous, there is no 100% secret on the network. Unless it is not connected to the Internet, there will always be various ways for people to find clues.

Especially a super master like Lin Hong.

......

More than 20 minutes ago.

California Institute of Technology, United States.

It's late at night now, but the lights are still on in the computer room of the computer department of the California Institute of Technology. In the huge computer room, hundreds of computers have been turned on, but the whole computer room is empty and no one is seen.

At this time, a white young man with long brown hair suddenly came out of a table. He looked back at the door and seemed to be afraid that someone would come in.

His name is Warren, and he is a junior in the Department of Computer Science at the University of California.

In the evening, few people will come to the computer room, and today is another school holiday, and almost no one will come.

Warren has been preparing for today's action for several days, and has invaded the schedule of the school's computer room. He knows that no professor will have classes here today. In addition, he specially has a good relationship with the administrator of the computer room, so that he can let go here.

Warren usually looks careless and has mediocre grades, but no one knows that this is just an appearance. In fact, he is one of the members of Mask Island, the number one hacker organization in the United States, although he is only a peripheral member. But this is already very great. You should know that "Mask Island" usually does not easily attract members to join. It must be jointly recommended by two official members to obtain the membership qualification. After obtaining the qualification, it must also pass some tests to be recognized by the relevant people before it can eventually become a peripheral member.

Wallen has been very interested in computers since he was a child. At the age of eight, he aspired to be a great computer engineer. Although his ambition has changed slightly with age, it is almost the same, which is why he was admitted to the Department of Computer Science of California Institute of Technology.

In the display in front of Warren is a curve, which is exactly the same as the Bitcoin computing power curve that Lin Hong saw... Warren muttered, and then shook his head with some regret. Today, his experiment can't be completed.

He came to the school computer room so late in order to verify his own idea - a 51% attack on the Bitcoin network.

As a hacker, he learned about this magical virtual currency from his friends soon after the birth of Bitcoin. And after reading Bitcoin's Genesis Bible, he immediately became a loyal supporter of this currency.

Bitcoin is designed so perfectly and elegantly that Warren is shocked and extremely obsessed. Yes. In the eyes of him and several hacker friends, Bitcoin is more attractive than those beautiful women.

"Perfect" is an adjective most used by Bitcoin supporters. Bitcoin designers have taken into account almost all the disadvantages of virtual currency in the past, absolutely anonymity, security, no dependence on the central bank, trust... combine all these characteristics perfectly and organically, and excellent Yadi has come true.

Before, no one could have imagined that such an unbelievable thing would appear, which was beyond everyone's imagination.

She is so flawless that she can hardly find any flaws. Even the "deflation" characteristics that have been criticized by many people, the proportion of supporters and opponents is not much different. Now no one can know for sure whether "deflation" is good or not, and everything can only wait for the test of time.

However. Is Bitcoin really so perfect?

Warren doesn't think so now. After a period of painstaking research on Bitcoin, he finally made a major discovery.

This is indeed a great and exciting discovery, at least he himself thinks so, after all, no one has raised it so far. Warren believes that his discovery can shock hackers all over the world.

He did not publish the discovery directly on the forum, but chose to use practical actions to prove this to everyone, which will be more impressive.

In this way, people all over the world will know that in the history of Bitcoin, there was a person who successfully controlled the Bitcoin network. He is the "Blue Beard" of Mask Island.

Thinking about this, I feel that the cells all over my body are going to cheer and jump up, and my whole body trembles slightly.

Warren kept the secret tightly, and at the same time he immediately embarked on his own "capture the net" plan. He can find this "loophole", and others can certainly find it, especially the mysterious designer of Bitcoin. No one knows Bitcoin better than himself. When the other party reacts, he may be able to plug the loophole. He has to achieve his goal before everything changes.

Now Bitcoin is simply worthless. Warren's "grabbing the net" is not to get more Bitcoin, but to become famous in the industry, so that hackers all over the world can know him and prove his strength to them.

After a few days of hard work, he finally finished the administrator of the computer room. After finding a time when no one got on the computer, he came to the computer room of the school.

There are a total of 120 computers in the school's computer room, of which 80 are the latest machines. The configuration is very high, which is the mainstream top configuration now. Of course, the school is reluctant to spend so much money to buy such a well-configured computer. This batch of computers was given by an alumnus of a famous IT giant company Of.

The total computing power of the Bitcoin network is still very small at present. Warren believes that only need to use these 80 latest computers for mining, which can directly occupy more than half of the computing power and realize his "capture of the net" plan.

So, he turned on all 80 machines, and then installed his own customized mining software one by one.

This mining software was modified on the basis of the public source code. As long as his software is installed on the computer, the computing power in the computer can be contributed, and finally gathered on one of the mainframes to form a total computing power, and then calculated with this Computing power for mining.

This is actually a distributed computing solution, but the number of machines is relatively small.

As Warren continues to install customized mining software, the computing power of the Bitcoin main network has gradually begun to rise.

11 trillion...

12 trillion...

13 megabytes... After installing dozens of machines, Warren returned to the front of the mainframe and found that the climbing angle of the computing power curve was almost 75 degrees. He was greatly encouraged and motivated to continue to install the software.

15 trillion...

16 megabytes... Warren is getting more and more excited, and the smile on his face is getting stronger and stronger. He is waiting for the exciting moment. Once his computing power exceeds the sum of other people's computing power, his "grabbing the net" plan will be successful. At that time, he can publish it on the open source community. A post announcing that it has occupied the Bitcoin network.

He has even figured out the content of the post, and he will type his ID - Blue Beard at the end of the post.

Eighty machines were finally equipped with mining software. Although Warren was a little tired, he was very excited. He couldn't wait to quickly come to the host and check the current total network computing power.

However, when he saw the curve, he was stunned.

Things didn't go as smoothly as he thought.

He saw that when the total computing power reached 18 megabytes, the climbing speed suddenly made a new breakthrough, jumping directly to 20 megabytes without stopping, and then 22 megabytes, 25 megabytes...

Valentin was stunned and looked at the computational force curve, which was almost straight up, and muttered:

"What the hell is going on? The computing power I provide is not so great..."

Warren finally realized that there must be someone else who was also connected to the network at this time and provided a very large amount of computing power. I just don't know whether it's the natural growth of computing power, or someone like him who wants to take the net... Warren cursed weakly.

He was so angry that he almost vomited blood. Seeing that his "grabbing the net" plan was almost successful, he didn't want this to happen at the last minute.

Those bastards, if they don't connect early or late, they have to access at this time, which almost failed his plan.

" Fortunately, there are still 40 computers. I hope these 40 computers can contribute 51% of the computing power!"

Valen thought so and began a new round of software installation.

Although the remaining 40 computers in the computer room have been in the computer room for some years, and the computing speed of the CPU is relatively slow, after all, there are a total of 40 computers, which form a distributed network, which can finally exert a lot of computing power.

Every time Warren installs the software of several computers, he runs to the host to observe for a while, and then continues to install it.

After running like this five or six times, Warren finally didn't run anymore.

He saw that the graph in the display has grown so fast that it has now climbed to 37 megabytes, and there seems to be a growing trend.

After all, the remaining 40 computers are products from a long time ago. The computing power is too low. Even if the software is installed, the computing power that can finally provide cannot make the total computing power exceed more than half of the existing network.

Warren already knew that his plan to take the net ended in failure, and he had to choose to give up. ( To be continued. If you like this work, you are welcome to vote for recommendation and monthly ticket. Your support is my greatest motivation.) RQ