Arcane Lord
Chapter 3109 The benefits of online real-name system
"Charles!"
"Advisor!"
Upon hearing Sha Duo's appearance, Charles, who was persuading the researchers of the operation and maintenance team, immediately turned around and with a hint of surprise, reported the latest progress to Sha Duo again——
“The operation and maintenance team just received the data sent back by the specially-made gateway, and someone is really attacking the computing power pool!”
"Is it a very fragmented mass flow of information?"
"Yes, what the special gateway is currently monitoring is basically Yuan Siji's information flow, and it has been going on for nearly six minutes now."
"Well, let me take a look at the returned statistics first."
With that said, Xia Duo sat on an empty seat, and then put on his own hash pool connector while bringing up the visual interface in the hall for monitoring the status of the hash pool gateway.
The records in the gateway control hall show that the abnormal information flow did start six minutes ago and still exists, but the flow is decreasing.
This is also the main reason why some researchers from the operation and maintenance team wanted to try to track it just now. After all, if you don't track it, you may not even be able to catch the opponent's tail later.
If you miss that time point, you will only be able to obtain traffic records, but you will not be able to record specific information.
But the situation has not deteriorated to that point yet. Once we get started, it may slide into an even more embarrassing abyss.
Mr. Xia understood Qian Liangqing's behavior and let him leave, while I ended up trying to parse the meta-thinking-level information flow invested by the attacker in the computing power pool network.
That's how it was done. The supplier's subsidy is directly related to the actual access of the connector. Even if it is falsely reported, the access data on Mr. Xia's side will still be false.
The "offline" control of the gateway is with Mr. Xia, but the entity is controlled by each country. Only checks and balances between the two parties can ensure the privacy risks of users when using the computing power pool.
According to the computing power pool revenue distribution agreements signed between Linsi Network Research Center and various countries, as long as you access the computing power pool through a connector obtained from a domestic supplier, you are considered a user in your country.
The collaborative calculations of the computing power pool are all regressive in real time. Correspondingly, the meta-thinking-level information flow used by the attacker when attacking must also be regressed and parsed when the other party attacks.
Of course, that does not mean that there is no legal record under the technology, but that each country allows that kind of information to be recorded.
Therefore, Mr. Xia immediately issued an order, "Comanso, he immediately contacted the connector supplier on Charles' side and asked us for the shipping records that we did not have in the past, accurate to every piece!"
Of course, Mr. Xia's relationship with various countries is also relatively strong. First, it is said that various countries have formed an alliance and are Mr. Xia's immediate subordinates. In fact, if various countries want to truly ban the computing power pool, the computing power pool may be opened. Go up.
A small reason why the Gateway Magical Artifact must be controlled in the hands of various countries is that the Gateway Magical Instrument cannot actually be used as a recorder. The ectoplasm material used in it is not a natural storage of consciousness information.
Mr. Xia would rather the computing power pool be breached by the psychic mage than start that kind of thing.
That’s not to say——
Those are real benefits, and they are also an important reason for the rapid growth of computing power pool users.
Therefore, there will be some private agreements between connector suppliers in various countries and the country where we are located. For example, each country will give up part of its benefits to drive suppliers to develop domestic markets.
It must be said that the relationship between each country and the connector supplier of the computing power pool is not dependent on each other, but the relationship between the connector supplier and the Lingsi Network Research Center is even stronger.
After Mr. Xia sighed, Coman accepted the order and left. I needed to go to Charles in person. But after all, my attitude when contacting the supplier was the same as when facing Mr. Xia. It was the assistant's instinct to avoid Mr. Xia's contact. .
For suppliers, liquidated damages are only temporary fixed income. As a supplier, you cannot get long-term subsidies from Lingsi Network Research Center.
Checks and balances from all directions have contributed to the current slow development of the computing power pool. Generally speaking, Lingsi Network Research Center, as the actual operator and front-end developer of the computing power pool, has a slightly heavier say.
It can be seen that the benefits are quite attractive.
In the telecommunications network, any information will leave traces, but in the spiritual network, the information will only leave immediate information, and there is no way to save it, or to say, there is no way to save it temporarily.
That is also one of the fundamental differences between the psychic network and the telecommunications network——
At the same time, Shado also noticed that the gateway magic weapon where the incident occurred is located in the territory of Comanso. Although this does not mean that the attacker is also located in the territory of Comanso, the computing power pool connector used by the other party must have been removed from the territory through some means. Obtained from the territory of Cormanthor.
Of course, it is impossible to be in Jamdas in the south, or hidden next door to the Qianliang Network Research Center, and also at the alliance headquarters.
That also means that in order to increase the number of domestic users, countries will almost always impose substantial restrictions on the flow of connectors. We may have to force our own connector suppliers to desperately expand the domestic market.
The only regret is that in the future, there will be a way to roll back the real-name system, but it will be less convenient to check. You even need to go to the supplier to get the shipping records. You only need to directly check the corresponding records at the front desk of Mr. Xia. Identity information will do.
Regardless of which country's computing power pool the attacker is connected to, my location cannot be anywhere on the main plane, such as the Antarctic, the North Pole, or extremely low altitude.
The distance of the spiritual link is limited, of course, provided it is cross-dimensional.
There may be no computing power pools on the ground, but without the official endorsement of the alliance, who would dare to use something with a clear origin on key items involving the spiritual field.
The supplier is determined by Mr. Xia. Although the agreement has not yet been signed and there is no way to change it at will, the income from the computing power pool is so small that even if the company fails to change, it will incur liquidated damages.
Then the user base in our country will increase, and the share obtained from Lingsi Network Research Center will also increase. As for what other countries do, that is none of our business.
Therefore, it is impossible to locate the attacker just by relying on the branch network to which the connector belongs. There is no slight difference between the computing power pool and the telecommunications network on the earth. The most critical point is that the essence of the computing power pool is a spiritual link. network.
If you first boss around your suppliers and then face Mr. Xia with an attitude of trying to make things bigger, no matter who you are, you will feel embarrassed. The actual situation may be that extreme, but there is a difference after all.
But now, that convenient way of obtaining connectors has made it easier for attackers. Let alone in Charles, even Irfaran, who is dealing with Charles, can easily obtain the connectors of the Charles branch network.
The reason why Mr. Xia set such rules at the beginning was mainly to prevent countries from restricting their own people's access to connectors. According to the rules, if we restrict them like this, other countries will come to seize users.
Only if Mr. Xia colludes with the countries that control gateway entities can detailed usage records of computing power pool users be left.
You'll Also Like
-
Time Space: The Rough Man’s Sick Beauty Turned Wild
Chapter 1150 17 hours ago -
My cultivation increased my power ten thousand times, and I became the nightmare of all races!
Chapter 1099 1 days ago -
Unlimited additional gold items for each type of soldier, what's wrong with being invincible?
Chapter 127 1 days ago -
The villain's younger brother: Start by deceiving the sister-in-law
Chapter 164 1 days ago -
Naruto from the beginning six eyes to cultivate Lin
Chapter 212 1 days ago -
Fantasy, I suddenly realized the chaos body
Chapter 1440 1 days ago -
You are as rustic as the wind and as beautiful as the flowers
Chapter 304 1 days ago -
Ancestor, stop being stubborn, the universe is going to disappear.
Chapter 782 1 days ago -
The start was really bankrupt and I was kicked out of the family group
Chapter 197 1 days ago -
Slay demons and gain sixty years of skill at the beginning
Chapter 1059 1 days ago