Time Travel: 2014

Chapter 184 There is no pure black and white

In fact, the solution adopted by Apple phones in previous generations to deal with this vulnerability only made it impossible for users to adjust the time to January 1, 1970.

It can be said that this is a very wise approach.

This vulnerability is powerful though.

But when faced with submission.

Lin Hui was a little hesitant.

Wouldn't it be a bit of a loss to exchange such an awesome loophole for money?

Maybe it could be of greater use.

But Lin Hui soon gave up this idea.

What Lin Hui lacks most now is Apple's loopholes.

There are many Apple vulnerabilities that are much more serious than this time regression vulnerability.

The reason why Lin Hui immediately thought of the time regression vulnerability was not because it was the most serious vulnerability.

It's because this vulnerability is relatively classic.

If Lin Hui really wants to use the loophole to cause trouble in the future, he can use other loopholes to arrange a wave.

In the case of lack of money at this time, it is still necessary to submit the vulnerability.

During the actual vulnerability submission process, Lin Hui used a new computer he bought some time ago.

The connection is to the proxy IP.

Although it's a bit troublesome, it's better to be careful.

To put it bluntly, this so-called vulnerability submission website looks like a hacker forum.

It would be bad if you accidentally get caught.

Lin Hui got stuck at the first step of the bug incentive program.

What ID should I choose?

This made the naming of Feilin Hui really confusing.

After struggling for a while, Lin Hui simply named it "admin".

Registering a security account for submitting vulnerabilities involves choosing a remuneration settlement method.

Lin Hui discovered that in addition to conventional payment methods such as Visa settlement and PayPal settlement, he could choose.

You can also choose to pay with BitPay.

This was really a settlement method that surprised Lin Hui a little bit.

BitPay is an American B.T.C payment service provider.

BitPay was founded in May 2011.

This payment service provider can provide B.T.C and B.T.C cash payment processing services to users.

After being reborn, anyone knows that engaging in B.T.C has a high rate of return.

Almost everyone knows about the so-called B.T.C.

However, Lin Hui feels that the real value of B.T.C is its derived value.

And not just B.T.C itself.

B.T.C is a combination of four important components.

First of all, B.T.C is a scarce digital asset.

Secondly, B.T.C is a peer-to-peer network with a large number of full nodes.

Again, mining B.T.C requires finding a valid proof-of-work number.

This makes fraud very costly and ensures arbitrariness and scarcity.

Finally B.T.C involves a fully publicly auditable blockchain.

These four technologies are closely combined to create B.T.C.

When a part is removed, it is less useful.

Involves the derivative concept of B.T.C.

Lin Hui feels that B.T.C itself is more valuable.

Take blockchain as an example. This technology is very important.

Research involving blockchain has a long history.

Cryptozoologist David Chaum first proposed a blockchain-like protocol in his 1982 paper "Computer Systems Built, Maintained, and Trusted by Mutually Suspicious Groups."

Stuart Haber and W. Scott Stornetta described further work on cryptographically secure blockchains in 1991.

In 1992, Haber, Stornetta, and Dave Bayer added Merkle trees to the design.

Improve its efficiency by allowing multiple file certificates to be collected in one block.

But the actual first decentralized blockchain was conceived in 2008 by a person (or group of people) known as Satoshi Nakamoto.

Satoshi improved the design in an important way, using a hash-like method to timestamp blocks.

What exactly is blockchain.

A block can be understood as a growing list of records.

These blocks are connected together using cryptography to form a blockchain.

When it comes to the blockchain itself, each block contains the cryptographic hash, timestamp, and transaction data of the previous block.

(Transaction data is generally represented as a Merkle tree, which is the Merkle tree mentioned earlier)

Since each block contains information about the blocks before it, they form a chain.

Each additional block strengthens the block before it.

Therefore, blockchain is resistant to modification of its data.

Because once recorded, the data in any particular block cannot be retroactively changed without changing all subsequent blocks.

Blockchain is typically managed by a peer-to-peer network and serves as a public distributed ledger.

Or you can think of the blockchain as a database, a very secure database.

The significance of blockchain is to provide reliable shared data and establish trust between parties.

At the same time, blockchain can eliminate data islands.

In addition, blockchain gives data a high degree of security and reduces the need for third-party intermediaries.

With blockchain it is possible to create real-time, tamper-proof records that can be shared among all parties involved.

With the help of blockchain, participants can ensure the authenticity and integrity of products in commercial flows and seamlessly track and trace goods and services throughout the supply chain.

Blockchain has broad prospects in the financial field, the Internet of Things and logistics, public services, digital copyright, insurance, and public welfare.

Ordinary people may not have much idea about this stuff.

But this thing is really important.

After all, it was ___ who personally emphasized it.

Generally speaking, ___ rarely express opinions on specific technologies.

But two technologies are exceptions.

One is artificial intelligence.

The other one is blockchain.

Digital Ren/RMB is a digital currency issued using blockchain technology.

In short, the importance of this thing is self-evident.

Although blockchain is very important, its importance can even be compared with artificial intelligence.

But the embarrassing thing is:

Lin Hui is not particularly good at things involving blockchain.

But it’s not a big problem. If it’s a big deal, let the professionals take care of it.

Specifically to B.T.C itself.

Now generally speaking, the ways to obtain B.T.C are nothing more than the following.

Buy, mine, earn.

Lin Hui wanted to dig it out before.

But no action was taken due to various reasons.

After that, the matter was simply shelved.

Unexpectedly, by accident, I discovered such a way to earn large-scale coins.

As for the iOS Apple Bug Bounty Program, it supports B.T.C payment.

Although this situation is unexpected, it is actually reasonable.

This vulnerability submission website is not a very formal official Apple-related website.

It is somewhat similar to a platform for hackers to exchange technology for a fee.

This is also the reason why Lin Hui took a series of security measures before logging into this website.

After all, there is no pure black and white in this world.

Many security technicians on this website who make a living by submitting vulnerabilities are already operating in a gray area.

B.T.C as a decentralized currency.

Its security and privacy have always been favored by those who wander in the gray area all year round.

It is normal for B.T.C to appear as a payment method on such a platform.

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like