Lazy God Possession

Vol 2 Chapter 1193: : What kind of technology tree has been ordered

Faced with Zhao Xiaofei's cry, reporters quickly took out the question prepared before: "So, this decryption tool was not developed by the Ministry of Public Security, but by a lazy god?"

Reporters are thinking about how to instigate public opinion later. Either the domestic police uncles are rushing for credit or the lazy gods are deliberate.

"To be precise, it was jointly developed by Laoshen Security and the Ministry of Public Security. Our Laoshen Security is a security equipment and technology supplier certified by the Ministry of Public Security." Zhao Xiaofei said with confidence. The cost is very high. As a public service agency, the Ministry of Public Security hopes that we can open it to domestic users, and we can only do so. How can we not charge a certain amount in overseas markets? "

The reporters are a bit aggressive. How do you spray this answer without leaking?

However, there are still a lot of journalists who say that you do n’t take foreign fathers into your eyes and dare to collect foreign fathers ’money. You have no big picture!

Many foreign netizens abroad have also said that we do n’t buy bills. Whoever you want to find bills for is billed. Just do n’t ask me for money, I will use a free decryption tool!

Many netizens call friends and friends and scold lazy gods on the Internet and scold a dog.

But the domestic netizens quit, and immediately organized a guard to defend the dignity of the lazy gods on the Internet!

These disturbances have nothing to do with the lazy gods. They have never been a company that makes money by word of mouth. Their object of word of mouth is only for their loyal users. They are kind to their loyal users. A, who are you?

What did you do early? Earn a few points for lazy gods and spend money?

Let me just say something bad. Are you poor and qualified to make me earn your money?

The poor people abroad felt tons of injuries.

The lazy gods are cold and cold. Don't pay attention to the various malicious attacks that are constantly being renovated on the Internet. But other people can't help but take this decryption tool released by the lazy gods. .

NSA, more than ten senior officials and technical staff gathered together, looking dignified.

They are going to test a tool released by Lazy.

In front of them, there is a laptop infected with the virus, and there are multiple devices that monitor the laptop's network uplink and downlink ports, hard disk data, and various data displayed on the big screen in real time.

A fast-eyed programmer came up with his hard-working skills and hit the little robber ten times in a row. Then a dialog box popped up.

The technicians paid very skillfully. In less than a second, the janitor began to beat the little robber, and at the same time, various data began to roll on the monitoring equipment next to him.

"Report the sir, the decryption tool uploaded an encrypted file to the server, and then the server returned a set of keys. All network communications are only these, and all remaining secrets are done on the local client. "The technician summed up the monitored data, said.

"Then, the local client, decrypted the encrypted files ... all of them? It's that simple?"

"Yes, the local client is essentially just a simple decryption tool, and ... animation player ..." The technician couldn't help laughing.

"That is to say, all the secrets are actually in the cloud? Can the cloud be hacked ..." Before the officer had finished speaking, he was watched by a group of people looking at the fools.

"Ahem ... I'm sorry ... I'm used to it ..." The chief bowed his head with a flushed face. What was he thinking about, and wanted to break into the server of the Lazy God? Is this death?

"How did they do it?" Another supervisor frowned, seemingly talking to himself, and seemed to ask the person in front of him.

"In fact, as long as there is a key, any decryption software can do this ... The key is the key." The technician continued to explain: "There are two possibilities to get the key. One is the lazy **** system. Reversely hacked all the hackers who spread the virus, got their keystore, matched the key used by a computer in the cloud, sent the key back, and the client decrypted it by itself ... "

Seeing a few senior officials who don't know much yet, he changed the way of explanation: "This time the ransomware is like a hacker locked your door with his own lock, and he took the key with him. . There are two ways to unlock, one is to find these hackers beaten up and grab the keys back, the other is to make the keys yourself ... "

"Oh? Which one might be bigger?" The senior officials asked quickly.

"It's impossible. As far as I know, many hackers will store such an important key in a mobile hard disk for offline storage ... even if the key has been destroyed, it is almost impossible to take it back ..."

"So they made the keys themselves?"

"To make such a key, it takes 50 years for the youngest lazy **** in the supercomputing list to calculate ..."

The senior officials were aggressive.

Which one is that?

"Either way, we can make God cry in a hurry ..." The technician said, "Although we don't know which method is used by the lazy **** system ... but we can verify it."

Want to verify is very simple, the technician took another notebook, used encryption tools, simulated virus encryption method to encrypt the files in the notebook, and then destroyed the key.

"Well, the file is encrypted and the key has been destroyed. Now no one in the world can decrypt the file on this computer. In order to rule out the lazy **** system, what can be found from the residual data on the hard disk? Key, we copy these encrypted files to a new removable hard drive, and then mount it on a new notebook ... "

"This is equivalent to locking the door and destroying the key, even God doesn't want to go in!" Another person explained, several senior officials nodded, like chickens pecking rice.

"Now, there is only one way for lazy gods to get in, and that is to make a key yourself, which is something that God can't do."

Next, the technician took a deep breath, networked the new laptop, and opened the decryption tool.

A random encrypted file was uploaded again, and then there was almost no lag. A key was sent back, and the janitor beat the little flying thief again.

The technician used a shaking hand ~ www.wuxiaspot.com ~ to open a file on the desktop, and the file opened smoothly, as if it were not encrypted at all.

The "click" technician shook his hand and hit the wireless mouse to the ground.

The sound seemed to open the door to the new world.

"Oh God! God! Father in heaven ..." The technician covered his mouth with both hands and could hardly believe what he saw.

Even if the kingdom of heaven opened to him now, he would not be more surprised.

In fact, the door to heaven has been opened.

"What's wrong? What's wrong? Did the lazy gods have any incredible technology tree?"

"Lazy gods ... They got God's dice ... they ..." The technician's voice was shaky.

Behind him, a technical director drew a cross on his chest: "They made ... the real quantum computer!"

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like