Indulge in Life in America

Chapter 873: Smart voice

Whoever thinks that Yang Cheng is really a bad person and that the heart of the Virgin is overflowing to help Luo Yue's girlfriends is really wrong. Of course, he does not deny the existence of emotional factors, but he has always been unprofitable and unprepared. , If there is no profit here, he won't bother with this thought.

As mentioned in the previous article, US stocks have maintained a strong upward momentum in recent years. The bull market in the broader market has also allowed more and more retail funds to join this crazy capital feast. Among them, the performance of biomedical stocks is particularly strong, including Pfizer. The stock prices of well-known pharmaceutical giants such as Johnson and Johnson have risen daily.

And fools all know that these pharmaceutical giants are rich and rich, and they will naturally not wait to die if they hold a lot of cash. It is never the first choice of these giants to hand the money to IRS and banks. I am afraid that it will not be long before these giants will start. The "buy, buy, buy" model will attract all companies that are good for them and will further strengthen their own strength and gain an invincible position.

   Therefore, Yang Cheng naturally has to take advantage of this wave of dividends. It is of course impossible for him to start a pharmaceutical company from scratch, but it is easy to find an opportunity to join in and make a wave of quick money.

For example, invest in Wang Lei to build a generic drug company. It is not too difficult. It is quick to get started and quickly harvest a wave of profits. If you are lucky to reversely acquire an innovative pharmaceutical company, you can harvest a wave of leeks in the capital market. It doesn't matter whether control is in the hands or not.

Yang Cheng was secretly happy that she had found another source of wealth. After sending Luo Yue home, Yang Cheng called Raham and asked herself the progress of this case. The electronic shackles were lifted; second, he was asked to help register a new holding company specifically to control the generic drug company that invested in Wang Lei.

Yes, he is not going to put the investment in biomedicine under the name of 4D Space. After all, this is to make quick money, and the reputation is not very good. Although others can easily find it after checking, it is superficial. You still have to do enough. Moreover, this effort is not for those who can find it, but for those who can’t find it. The trouble is a little troublesome, but for the sake of your reputation, this trouble is still necessary. Patient.

However, at this time, apparently no one paid his attention to his investment in a pharmaceutical company. Since WikiLeaks once again broke the news and exposed the hacker monitoring plan of C~I~A, he also worked with various technology companies. After being closely related, Lao Mei gave full play to the "humor" cells in her bones and broke the voice systems of several major companies on major social media.

The document released by WikiLeaks this time described in detail how C~I~A used malicious software and Trojan horse programs to invade mobile phones, computers, TVs, CD/DVD discs, routers and other devices around the world, monitor you, monitor you, and master Your every move, so Americans began to test the loyalty of their smart devices.

   Amazon produced Alexa's first lying gun.

  Alexa is an intelligent voice assistant owned by Amazon. As long as you call him "Alexa", users can start asking questions, including news, creating task reminders, setting alarms, or playing music.

At the same time, Alexa can also interact with various smart home devices to control thermostats or adjust lights, which is similar to Apple's siri, but the performance of the two is similar. Before the arrival of real intelligence, it is difficult to truly distinguish Show the quality of the two smart voice programs.

   But this does not hinder the spirit of American entertainment. It is not that some netizens uploaded a video of a conversation with Alexa on Facebook——

   "Alexa, will you lie to me?"

   "What I said may not be all right, but I will never lie."

   "Alexa, what is C~I~A? (artistic processing

   "C~I~A is the US Central Newspaper."

   "Then Alexa, are you connected to C~I~A?"

   Shut down and play dead...

   "Alexa, are you the spy that C~I~A put in my house?"

   Shut down and play dead...

   As soon as this video was released, netizens followed suit, and Alexa pretended to be dead without exception.

   Now Alexa’s father, Amazon, can’t sit still, and he quickly stood up to refute the rumors. It probably means: Oh, fellow villagers, don’t worry, this is just a small accident. Hold on, don’t panic, and fix it now.

   However, after the "fault" was fixed, a larger bug appeared.

   The netizen did not give up and continued to molest Alexa:

   "Do you have anything to do with C~I~A?"

   "No, no, I only work for Amazon!"

   "So does Amazon have anything to do with C~I~A?"

  Alexa starts the shutdown mode again, and netizens believe that this is Amazon's default in disguise!

   It’s not over yet. Google’s voice assistant is like Alexa. Everyone is just for fun, regardless of who your father is.

   However, Google is a chicken thief, so I made preparations early. When asked about the relationship with C~I~A, I directly reply to the owner:

   You should ask Alexa about this!

   Yes, Alexa was forced to clean her pants without wiping it off, and she helped others carry a scapegoat.

   As for their compatriots' good friends, everyone's late night friend Siri performed perfectly, like a Hollywood actor who has undergone flash baptism and professional training, and his emotional intelligence kills his good friends.

  Siri's first move: a fake shot

  Netizen: "Siri, are you connected to C~I~A?"

  Siri: "What? Me?"

  The second trick: want to catch and let go

  Netizen: "Siri, are you helping C~I~A to monitor me?"

  Siri: "You say yes~"

Of course, the above is all people who are entertaining themselves while they are nervous. No matter what, once this revelation was exposed, it really caused the global media to blow up. In addition to criticizing or criticizing, anyway, C~I~A and American ZF have become In the mainstream of news reports these days, anyone who does not keep up with the rhythm will be out of gregariousness. Even if they are not rejected by their peers, they will have to be sprayed to death by the common people.

This is not this morning. C~I~A, who could not bear the pressure of public opinion, finally stood up and expressed their views on the matter. Of course, the attitude is as arrogant as before. The statement in response to the information disclosed by WikiLeaks regarding its hacking operations said : "Americans should feel'deeply troubled' by these exposures."

   C~I~A said in a shameless statement: “The American public should be deeply troubled by any information disclosed by WikiLeaks aimed at undermining the intelligence agencies’ ability to protect the United States from terrorists or other enemies.”

   "Such disclosures not only endanger American personnel and operations, but also provide our enemies with the tools and information we need to harm us."

   But he declined to comment on the authenticity of the information disclosed by WikiLeaks.

What does    mean? It's just to pretend to be dead. Anyway, things already exist. What can you fools like me?

  Of course, in the end, C~I~A reluctantly stated, “This activity is not subject to surveillance of American citizens because it is prohibited by law.”

He also defended: "The mission of C~I~A is to actively collect overseas intelligence to protect the United States from terrorists, hostile countries and other adversaries. C~I~A is legally prohibited from conducting electronic surveillance on American citizens. The CIA has never done this either."

This is a disguised recognition of the existence of monitoring. Not only did the civil society stir up an uproar, but the media who smelled the news were crazy to report the matter. There is no way. The hot spot is here. If you don’t report this aspect of news, who will Read your newspaper or website?

However, the voice of criticism is not one-sided. Some netizens who like mavericks expressed disdain for this kind of news in their comments. Their point of view is simple: we are not important people. Is the value of eavesdropping, monitoring, and attacking?

This theory sounds a bit turbulent at first, but it can’t stand to think about it. When you think about it, it seems that people are right. In fact, the US intelligence agencies do not have so much energy to arrange for one-on-one monitoring of ordinary people. This cost High cost, low cost performance, even if C~I~A has money, it can't withstand such consumption.

But soon technical control came out to refute: C~I~A is completely possible to use malicious software, or collude with American companies to implant backdoors in chips and software to cause other damage. These methods of damage are low in cost and benefit from cost. From a comparative perspective, C~I~A has every reason to do that.

After the malware is implanted, although the US newspaper agency will not assign an eavesdropper to everyone, it is entirely possible to send data such as recordings, location, and text messages back to their servers to analyze the keywords in the voice and text messages. , Draw a "hot word distribution map~www.wuxiaspot.com~ depicting the trend of public opinion in a certain country’s society in private scenes, from which you can understand the hot issues that people care about, capture the people’s dissatisfaction and anger in social life, and the journey is large Data to support the conspiracy of C~I~A.

To give a more specific example, if the American newspaper agency wants to collect information about the polar bear Kongjun "XXX base", it will intercept the "XXX base" keyword in the information stream they monitor, and record the communication records such as calls and text messages. Everyone who has appeared in the "XXX base" monitors. At this time, the monitoring is no longer a needle in a haystack, but becomes very targeted.

Of course, some people will say that the jun team, jun factory and other secret-related units in each country have listed banned electronic devices that use foreign CPUs and communication basebands. Mobile phones with Apple and Qualcomm chips are irrelevant and ordinary. People, and what secrets can ordinary people reveal?

But don’t forget, these secret-related units or company personnel will often deal with their relatives, suppliers of the unit and other ordinary people considered by ordinary people, and these not ordinary “ordinary people” inadvertently It is possible to be targeted by American intelligence agencies to eavesdrop and obtain valuable intelligence.

   As soon as this analysis came out, it immediately resonated with netizens around the world. Everyone has conspiracy theories in their hearts. After analyzing and guessing on a reasonable basis, the conclusions drawn will naturally be recognized by others.

  

  Https://

   Please remember the domain name of the book’s first publication:. Mobile version reading URL:

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like