Time Travel: 2014
Chapter 289 The use of “backward technology”
Network Time Protocol is one of the oldest network transmission protocols.
Its purpose is to transmit the time of precise timing devices such as atomic clocks to every networked device through the network, thereby providing the most accurate time synchronization capability.
Even the Network Time Protocol protocol itself has taken into account the possibility of tampering with time.
However, for a long time, network attacks using the Network Time Protocol as the entry point have been common.
It can be said that it is difficult to prevent malicious attacks on mobile devices using Network Time Protocol.
Even if it uses the patented technology that Lin Hui mentioned in his previous life, it will be difficult to prevent such malicious attacks.
Because this type of attack is mainly initiated deliberately by people.
The technology Lin Hui is now interested in is not very good at handling malicious attacks.
Since the previous technology of using mobile phone virus/virus library scanning to prevent mobile phone viruses/viruses cannot prevent malicious attacks.
But as long as the technology can deal with existing mobile phone viruses, it is enough for Lin Hui to highly recommend this technology.
Because you need to understand the difference between mobile phone viruses and malicious attacks.
Usually mobile phone viruses/viruses are scattered in all dark corners of the Internet. The distinctive feature of attacks presented by mobile phone viruses/viruses is "indiscriminate attacks."
From this perspective, general mobile phone virus/virus attacks are somewhat similar to stray bullets on the battlefield.
Malicious attacks are "fixed-point scalpel attacks."
A bit like the bullets fired by a sniper on the battlefield.
The helmets worn by soldiers can hardly withstand the bullets fired by snipers.
But that doesn't mean the helmet has no effect.
On the contrary, steel helmets are very effective.
Because the helmet can effectively avoid the losses caused to soldiers by stray bullets on the battlefield.
The technology that Lin Hui admired in his previous life was somewhat similar to the role of steel helmets on the battlefield.
Although this technology is not very useful for targeted scalpel-style malicious attacks.
But it is enough to deal with mobile phone viruses/viruses scattered in the dark corners of the Internet.
You know, ordinary users’ mobile devices almost never encounter targeted scalpel-style malicious attacks from hackers.
On the contrary, they are often harassed by indiscriminate attacks.
In this case, Lin Hui's transportation technology is naturally very useful.
In short, Lin Hui believed that the value of this technology from his previous life was high enough.
And because the people who developed this technology in the previous life basically did not encrypt all the technical data of this technology.
Lin Hui thought it would be easy to move it.
After all, there are a lot of ready-made application materials.
Despite this, Lin Hui did not act too hastily.
You know, it was not long ago that Lin Hui applied for some patents related to Nanfeng APP.
Now we are applying for some patents whose scope is almost completely different from the scope of the previously applied patents.
It is easy to cause unnecessary trouble.
In short, Lin Hui thinks it would be better to work on patents related to mobile phone security after a while.
…
Mention the aspect of mobile phone security.
Lin Hui remembered several security vulnerabilities he submitted to Apple's bug bounty program a few days ago.
It is also unknown whether the previously submitted vulnerabilities have been adopted.
With Lin Hui's current wealth, he didn't really care about the millions of dollars he received for submitting bugs.
What Lin Hui cares about is the B.T.C. that is worth the same amount as these US dollars.
After all, the former has little room for appreciation, while the latter is a huge profit.
Generally speaking, the ways to obtain B.T.C are the following:
——Buy, mine, earn.
Neither purchasing nor digging is suitable for forest ash.
Especially not suitable for Lin Hui, who is now worth billions.
You are already worth hundreds of millions, why are you still digging for it?
Maybe we can develop some rake algorithm to take a commission?
But there seems to be no need to dig it yourself, it’s shabby.
As for purchasing, the efficiency is too low.
And it’s easy to argue with the seller.
Anyway, Lin Hui thinks that the more suitable way for him to obtain coins is to earn them.
Submitting bugs is an excellent opportunity for Lin Hui to earn B.T.C.
…
Lin Hui couldn't wait to see the progress after the vulnerability was submitted not long ago.
Even though you can’t wait, you still need to take the necessary steps.
Lin Hui took a series of safety measures.
Including but not limited to using a new login device, connecting to a new proxy IP, changing the network environment, etc.
Although it's a bit troublesome, it's better to be careful.
This so-called vulnerability submission website is still very different from the regular official website.
This platform for security personnel to communicate with each other is very similar to a hacker forum.
It would be bad if you accidentally hit the road.
After all, Lin Hui is now carrying a shocking secret.
It's not that Lin Hui is making a fuss.
The fact is that even GitHub, a seemingly harmless website.
If you rashly download some open source code without knowing its specific purpose and then run it, it is easy to cause some security problems.
Technology has been a double-edged sword since its inception.
In short, it’s better to be careful.
Lin Hui first logged in to the account previously named "admin" that submitted the vulnerability.
Lin Hui discovered that the time regression vulnerability he submitted had been adopted.
This result was within Lin Hui's expectation.
Apple's security engineers are not idiots either.
Such a classic vulnerability caused by the bottom layer of Unix.
Lin Hui believed that Apple's security engineers would not be confused.
Now that you understand it, you can't just sit back and ignore it.
The value of this vulnerability for time regression vulnerabilities.
Staff from Apple’s bug bounty program offered Lin Hui $1.5 million.
According to Lin Huiyuan’s estimate:
If people at Apple measure it based on the complexity and severity of the development chain.
Then the value of the "time regression vulnerability" is at least US$700,000.
What Lin Hui submitted was a vulnerability corresponding to the iOS8 beta version.
So according to the rules, Lin Hui should receive an additional 50% premium.
If Apple has no tricks in the payment process.
The vulnerability submitted by Lin Hui was worth more than 1.05 million US dollars.
Offer now for $1.5 million.
It can be said that it is more in line with Lin Hui's expectations.
After all, according to the description of the previous bug bounty program:
“After security personnel submit a vulnerability to a bug bounty program.
Apple said it will measure the complexity and severity of these vulnerabilities based on the development chain.
Bounties of up to $1 million are available for each security vulnerability.
And if the vulnerability can be found in the Beta version (test version) software.
The maximum bounty can be awarded at one time is US$1.5 million. "
This $1.5 million is now almost the highest bounty that can be submitted to the bug bounty program.
The website doesn’t just give out quotes.
Lin Hui was also asked to provide corresponding settlement methods.
Settlement form for $1.5 million.
Lin Hui chose to settle in B.T.C.
Although it may not be that fast if you choose BitPay to pay.
Users need to make an appointment (submit the vulnerability) on any working day three months later as the payment date.
But Lin Hui was so happy.
You'll Also Like
-
Abnormal Food Article
Chapter 231 3 hours ago -
Peerless Tangmen: Dragon Bear Douluo
Chapter 153 5 hours ago -
Douluo: The Peerless Tang Sect dug out Yu Xiaogang
Chapter 212 5 hours ago -
Douluo started from being accepted by Bibi Dong as a disciple
Chapter 35 5 hours ago -
Douluo's super god level choice
Chapter 94 5 hours ago -
Douluo Continent on the tip of the tongue
Chapter 594 5 hours ago -
Douluo: My mother is the time traveler
Chapter 215 5 hours ago -
Douluo: Rebellious son of the Tang family
Chapter 668 5 hours ago -
Zhu Zhuqing of Douluo started to sign in
Chapter 149 5 hours ago -
Disabled Mr. Zhan is the Child’s Father, It Can’t Be Hidden Anymore!
Chapter 672 16 hours ago