Cyber Heroes
Chapter 370 Internet Guerrillas
2030, Chiang Mai, Thailand.
Zhu Xinyu leaned on the hotel chair. There is a computer in front of her. This computer is connected to the hotel's wireless network. The hotel uses a common router and server. Zhu Xinyu found the backdoor of this system easily. These are all vulnerabilities that have been announced, but not every user has updated the patches in time.
On the screen is an unfamiliar interface. That was the analysis software written by Zhu Xinyu himself. The interface is quite primitive.
Zhu Xinyu looked at the ceiling.
Her grades were "average excellent." She maintained this impression. At the same time, in the eyes of her "guardians", she also became more and more rebellious, often running out to play alone. In the eyes of her father and the woman, this was a sign of a girl's rebellion. They still don't know how many corporate secrets their daughter has stolen.
They just think that this girl likes traveling very much and will go abroad if they don't agree with her.
Zhu Xinyu had a reason for doing this.
Every time she wants to steal technical secrets from large companies, she will find an excuse to travel.
It is best to go abroad.
This is very helpful in concealing one's real IP, and even has a certain interference effect on social engineering methods - although it is not strong, it is better than nothing.
Zhu Xinyu’s favorite place to rely on is Southeast Asian countries. It is adjacent to the developed areas of East Asia and has good network conditions, but it does not have a strong police force. The second is the Russian Federation. The xenophobic power of this decadent big country can be borrowed by it to cover itself.
Of course, in theory, the best places are those war quagmires that the United Nations has no control over - such as Iran, Yemen, and Somalia. Even if someone accidentally touches it, there won't be much danger.
However, entering these places is inherently dangerous. Zhu Xinyu's pocket money is certainly not enough to hire mercenaries. And she wouldn't hire a mercenary even if she had the money, because the act of "hiring a mercenary" would leave a record and could easily be targeted through social engineering.
The reason why Zhu Xinyu is so careful is because she is trying to dig into the roots of big capital.
After parting ways with her master "Huode Xingjun", Zhu Xinyu started the hero ring on her own.
She is already stronger than Master. Therefore, she can obtain the honorary name of "Vulcan God" by herself.
"Zhu Rong", a cyber guerrilla who specializes in stealing corporate technology secrets and making them public, was born in the world of the World Wide Web.
Zhu Xinyu's first target was his father's company.
It was a well-known security company, and it had also acquired and operated an online medical mutual aid APP. This company even contracted the provincial government’s cybersecurity affairs.
Zhu Xinyu disclosed the source code of all the company's security products and put them online.
but……
What Zhu Xinyu was looking forward to did not happen. Her father was not bankrupt, and the family was not even slightly poorer.
First, an LLC debt does not inherently implicate the owners.
Secondly, most security companies do not actually win with technology.
Except for the core products of one or two network security companies that really master the technology, the products of most network security companies are rebranded works.
Source code leakage is also a "no big deal" problem.
If Zhu Xinyu's father's company was a listed company, might the stock price plummet?
But Zhu Xinyu’s father’s company was not listed.
So, apart from my father getting scolded at the board meeting, the impact was minimal.
It can even continue to contract network security services for local companies and governments.
For enterprise users, network security companies can also play the role of security consultants and technical support. These things will not depreciate just because the source code is disclosed.
Zhu Xinyu's father was depressed for a while. He felt insulted by the security software system he had created.
Zhu Xinyu was very disappointed with this result.
But she was also aware of the problem.
Many companies actually do not have core "technology". They survive by selling low-tech "services."
If you want to change the world, perhaps you should start from a more central place.
Bigger businesses. Companies that control technology and use intellectual property to block human progress.
Those larger capitals are the core of the "evil". They are the core power components in the machine that plunders humans.
Zhu Xinyu began to carry out activities against these guys.
Of course, it's difficult.
Zhu Xinyu is just an individual. She had found some like-minded people a few days ago - the extreme online guerrillas of the open access movement, but they were only a minority. It would be difficult for her to use social engineering to steal technical information.
With pure computer technology, there are always some physically isolated information that cannot be stolen.
Of course, Zhu Xinyu also had a way.
No technology comes out of thin air. It must have been studied by scholars. And it is impossible for companies to keep every step of scholars’ research in a physically isolated place. There is always some data taken away.
Zhu Xinyu will look at the list of corporate partners, then look for those corporate scholars, and target these scholars and even other partners of these scholars to extract as much information as possible from all aspects.
Not just a result. Trial and error data, discarded ideas, she wants it all.
And occasionally, she was able to obtain "things that are still a few steps away from the results" and "information whose confidentiality level has been slightly reduced due to the passage of time."
As time went by, she also learned to write "viruses that can identify files that may be technical information and automatically package and send them."
This is Zhu Xinyu’s proud work. As long as the virus inadvertently invades a place that is originally inaccessible, "packaging" may be completed automatically without anyone noticing. Afterwards, the packaged data can also be hidden in other people's computers, waiting for the next transmission.
Zhu Xinyu "patronizes" various high-tech companies most often, especially those in electronic information technology.
She has always wanted to try to capture some pharmaceutical companies. But pharmaceutical companies have to sell products after all. Compared with "mastering technology", they prefer "mastering patents". Therefore, even if Zhu Xinyu stole some technological processes, he would not be able to let others use them.
At this moment, "Zhu Rong" has experienced hundreds of battles.
but……
——Has the world changed because of this...
Zhu Xinyu looked at the ceiling of the room.
Maybe it’s because it’s rainy season in Thailand now. The continuous rain made Zhu Xinyu feel gloomy for no reason.
She started thinking about the past.
If you do this, will you change the world?
Is creating "prestige" like Master a feasible path?
Thinking of this, Zhu Xinyu shook his head and tried to get rid of this thought.
——Master’s teachings actually don’t make sense. I have to find my own way out...
——I will definitely be more...
At this time, a chat software sounded a prompt tone.
This is a chat software written by Zhu Xinyu himself, with only the most rudimentary functions. It has no other advantages, namely "concealment" and "confidentiality".
Zhu Xinyu only passed on the client of this software to a few people.
Those people are all online "guerrillas" of the extreme wing of the "open access movement". Some of them are hackers, while others are scholars and intellectuals who make various appeals on the Internet. Some of these people have connections with real-life social activists.
They are Zhu Xinyu's "friendly troops".
However, Zhu Xinyu has always carried out activities in the form of a "hacker". She connects with only a handful of people.
Zhu Xinyu remembered that this person was also a scholar.
Ichigo: [Zhu Rong, where did you get this data? It's amazing. It's really amazing. 】
Zhu Xinyu thought for a while. The data automatically sent back by her previous batch of viruses did contain biological information. Judging from the content, it should be molecular biology or biochemistry. Although Zhu Xinyu has stolen a lot of things, in non-professional fields, she is not much better than the average high school student.
Zhu Rong: [Judging from the number, it should be obtained from that translation software company. 】
Ichigo: [Are you kidding me? 】
Zhu Rong: [? 】
Ichigo: [This may involve proteomics, it may involve genetics, it may involve...gosh, I can't describe it, but it doesn't involve cognitive science. There's no way it's on a translation software company's server. 】
Zhu Rong: [Really? That might be accidental injury. 】
Using cooperative scholars as a springboard, the virus was secretly transmitted to other scholars, and then sent back information that was not the original target.
Many academics have interdisciplinary projects. A virus that jumps from scholar A to scholar B in a different major may only need to go through one or two transits.
Zhu Xinyu's virus has strict self-destruction conditions. The virus she wrote will destroy itself after one attack. At the same time, the virus released in a batch, as well as its replicas, will delete themselves after the system time reaches a predetermined point - regardless of whether there is an attack or not.
Although there are many accidental injuries, they are not many and are rarely discovered.
At this time, Zhu Xinyu was faced with two choices.
If the scholar who was "accidentally injured" is also a lackey of the capitalists and will contribute to the intellectual property rights of the capitalists, then Zhu Xinyu will disclose this data without hesitation.
But if not, then Zhu Xinyu will consider it as appropriate.
At this time, she needs a professional appraisal.
This guy with the ID of Ichigo is her assistant.
Zhu Rong: [Just tell me the result directly. What kind of research is this by what kind of scholar? Is it necessary to disclose it? 】
Ichigo: [I don’t know...it’s hard for me to say. This is so rare. I searched all publicly available papers. do you know? There's only one person on Earth working on this right now. She can definitely win the Nobel Prize. 】
Ichigo: [Oh my God, this is amazing. 】
Zhu Xinyu frowned.
Zhu Rong: [So what is this? 】
Ichigo: [Study on the enzyme system of Hydrothermal Archaea. Only Ms. Nyaguti Ndebile is working on it. 】
[Do you know Ms. Ndebele? 】
You'll Also Like
-
Pirates: Sign In From The Undersea Prison
Chapter 98 9 hours ago -
Pirate: I, The Immortal Sea King, Just Want To Make Them Happy
Chapter 155 9 hours ago -
Gao Wu: Are You Being Asked To Join The Army And Become A Five-Star General?
Chapter 111 9 hours ago -
Yu Xingyue Hunts the Evil Me
Chapter 423 11 hours ago -
Shape Moon, The Road to the Magician
Chapter 169 11 hours ago -
People are in reality
Chapter 177 11 hours ago -
Gravity makes me stronger?
Chapter 176 11 hours ago -
Dog agent, please stop now and stop torturing me.
Chapter 51 11 hours ago -
Kaleidoscope at the beginning, leaving Konoha with Madara
Chapter 60 11 hours ago -
He counted with his fingers: No, that’s your sister!
Chapter 64 11 hours ago