Alien paradise

Chapter 126 Aftermath

Two days after the Twin Towers Bridge crash incident, the number of related news broadcasts reached an unprecedented new peak.

In particular, the video of a car speeding towards the top of the slope as the bridge deck was slowly rising has been trending in various countries. Netizens have various discussions on it. Some think that the Twin Towers Bridge is flashy and more scenic than practical; some think that autonomous driving should be banned; and some think that the L city government should take full responsibility. In addition, the deceased was a rich man, which greatly increased the intensity of the incident.

The British official statement is very clear.

The police stated that this was a premeditated and vicious incident. After preliminary investigation, they have ruled out the possibility of operator error and equipment failure. The gang that carried out this case not only remotely controlled the bridge's lifting system, but also tampered with the driver's vehicle. They are already working to salvage the car and say they will never let the perpetrator go.

Who murdered the outstanding entrepreneur Jason Taylor has become the most popular topic in the media.

However, another incident broke out at the same time, but its impact was far less significant than the Twin Towers Bridge crash.

That's when all the documents from Project Sunflower were dumped online.

Since the Prism Gate, leaks caused by personal factors have emerged one after another. There are both real confidential information and false information fabricated to confuse people's vision. Basically, everyone is not surprised.

Therefore, only in some niche forums, people pay attention to this matter.

Alex is one of them.

As a hacker, his focus is not on leaking files themselves, but on how they are leaked. Whenever he makes a new discovery, he will express his opinions in the "Wall of Silence", a hacker club used for private communication in a small circle.

This time Alex directly used "appalling" as a topic label.

According to the founder and confidentiality level of the Sunflower Project, it should be MI6's top secret. Everyone in the industry knows that MI6 has a completely isolated computer room to store these secret information. In theory, it is impossible to be stolen by network intrusion. Therefore, the source of this batch of information most likely comes from an internal organization with a sense of justice. Employees stole the planning documents directly from the computer room.

But Alex offered a completely different view.

He believes that if you want to steal the top secrets of MI6 in reality, you must use a special reading device to connect to it, instead of just plugging in a USB flash drive or data cable to copy it away - this is also the case with many physical isolation devices. This is a method that will be used by all companies in the computer room, not to mention intelligence agencies that rely on confidentiality for a living.

This kind of reading device can only read specific data, and then translate it into pictures and texts that people can understand. It has no output port for civilian use. If you want to steal it, you have to rely on manual reproduction, such as taking pictures, and other examples. Hand typed records.

This is why most leaks come out in the form of photos.

However, the Sunflower Project that was leaked to the Internet is different. It is more like packaging all the source files. Alex can even read original information such as creation and modification dates from the file data during analysis. This is impossible to do with normal stealing methods.

Therefore, he boldly speculated that someone had invaded the isolated computer room of MI6 through the Internet and stole the information in a way that was similar to searching the hard drive.

Not long after the topic was posted, colleagues started clicking in one after another.

"Bell": If I said that solar energy can be used even when there is no sun, would you think I am an idiot? So the question is, how do you hack into a device that is not connected to the network?

Cobra: Man, consider microwave programming, which can remotely change the way a program runs.

"Bell": Has anyone succeeded in reality? If the target device can convert specific microwaves into electrical signals, we call it a mobile phone. It’s 2023. Is there anyone who doesn’t have a mobile phone yet?

"Emperor of Black Water": In fact, there is another way to achieve the same effect, which is to physically enter the isolation computer room of MI6 and move the entire host out. I think this is much more feasible than Alexti's method.

"Frey": Don't tell me, I just saw someone chatting. Two days ago, he saw an ambulance and a fire truck parked in front of the Wuxor Cross Building, and there was black smoke coming out of the house.

Seeing that everyone was getting more and more off-topic, Alex added dissatisfiedly: I hope everyone talks about this topic from a technical perspective. Since you are hackers, you should be curious about unknown things instead of stubbornly denying it.

"Fule": You said this, I feel the same way... Just a month ago, our leader actually said that he was... Hey, if you don't see it with your own eyes, it is really hard to accept some things that are beyond imagination.

"Bell": Is it a rainbow?

Alex quickly typed on the keyboard: Please go to another topic room for private chat, thank you.

"Avalon": But have you noticed that the crash of the Twin Towers Bridge and the leak of this document seem to be on the same day. I happened to be near the bridge that night, and when I noticed an incident on the bridge, I immediately snuck into the camera system and discovered something interesting. Of course... I conducted the intrusion through the on-site connection port line. I have no technical content and cannot be compared with the genius who invaded MI6.

"Emperor of Blackwater": Wait, do you agree with Alex? Has anyone successfully harnessed solar energy in a sunless world?

Seeing someone supporting him, Alex suddenly became interested: ignore him. What did you find? Share it with everyone.

Soon, a video was posted.

Alex opened the video and immediately realized that it was a surveillance footage from the Twin Towers Bridge. However, unlike the usual still shooting, this time the picture almost completely locked onto the out-of-control car. From the appearance of the vehicle to its disappearance, the surveillance camera rotated almost 150 degrees.

Someone is controlling the camera?

The video was only eight seconds long. Alex opened his video analysis software, played back the video again, and enlarged the size to the maximum.

This time he saw clearly.

The person in the car seemed to be fighting with the car... In just eight seconds, the person tried to cut the seat belt, retrieve items from the glove box and smash the window. At the last second, he seemed to have made a fatal mistake and let the screwdriver fly out of the window. However, under the frame-by-frame playback, Alex was surprised to see that the window moved one step faster than his movement, and the screwdriver flew out of the window before it hit him. It suddenly dropped and then quickly closed, completely catching this person off guard!

"Emperor of Black Water": Good guy, AI killed someone! The question is...are these two things related? Also, will your video be sold? The price is easy to say.

"Bell": Don't be kidding, how can a car chip support a strong AI! Is someone controlling this car remotely?

Alex added excitedly: Look, aren’t the two things essentially the same! The logic center of the car is all in the car. It will receive radar information and road navigation, but the analysis and judgment are all completed in the car. In a sense, it is also a physically isolated host device.

"Bell": Not strict, because the outside world can send wrong navigation information to make the car make misjudgments, or it can fake radar signals.

"Cobra": Can the outside world still remotely control windows to raise and lower them at high speed? That is obviously not the speed that the window would normally close at. The motor's program was rewritten.

"Avalon": Yes, so I can't understand, if someone is really controlling all this, how did he invade the car and seize control? The car does not have any relevant network ports at all, so it is theoretically impossible to implement. So when I saw the topic raised by Alex, I felt that it was not impossible.

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like