digital storm

Chapter 129 Political Risk

Chapter 129 Political Risk
"Can you confirm it?" Han Cen asked: "If this conjecture is true, then the other party's program construction ability is amazing, and this may be a new program method. Can you find out how well this program runs?" Is it regular?"

Lin Wenfang thought about it carefully, then shook his head: "I'm afraid it will be difficult."

The theory of nanoprogram behavior, the theory of gathering sand to form a tower...no matter what it is called, they are all things that stand at the top of the entire computing field.The theory of nanoprogrammed behavior began as an increasingly hilarious attempt at a joke by a few college students.Six buddies in a dormitory are each doing a seemingly completely unrelated thing, but the connection can lead to quite interesting results.Then, more and more students join the game, and each time they try, the time required for brewing will become longer and longer, because the planners must start from the goal they want to achieve, and constantly use the means needed to achieve this goal. Split into seemingly completely unrelated behaviors, this kind of reverse reasoning poses a great challenge to the planner's logical thinking and imagination at the same time.Later, some mathematicians noticed this funny joke and were also inspired by these college students to establish a complex theoretical system called nanobehavior, and then this theory was borrowed by the programming community.However, there has been little interest in the practical exploration of this theory in the programming community.Overall, this is an interesting but inefficient way to structure programs.Since everyone has different ways to achieve the same goal, why bother to find the most troublesome one?

There are also programmers who have developed reverse-compiled software to continuously separate the target from the means, but this automatic split and program generation is only applicable to very simple and single targets.Later, gradually, the theory of nanoprogramming behavior gradually fell silent.In some computer program competitions for high school and college students, this theory is occasionally brought up as a question or something.But in the field of formal business procedures, no one will use this thing.

But if the bloodscarred organization really constructed such a set of programs based on the theory of nano-program behavior, it would indeed be impossible to monitor.Because there are countless small programs hidden in a huge system, each of which plays a role.Some programs may be hidden in the small cookies saved by the browser, and they can still play a role.The programs are not only small in size, but also have completely different forms. It is impossible to detect a consistent program form at all, unless you know what the signal rule that starts all programs is.However, they don't know now.The detected regularly recurring signal may not necessarily be the activation signal, and it is still a question of what form the detected signal is realized in.Lin Wenfang had already read the description of the electronic countermeasure equipment of the missile battalion before. The sensitivity is too high, 99% are noise, but God knows if there are any detailed things hidden in the noise.

Luo Fengmian said eagerly: "Which aspect is the difficulty? Now as long as possible, we'd better try. The situation is urgent."

Lin Wenfang smiled wryly and said, "Do you want to fully scan all the nodes and all the computers that may be related to the city where the incident happened? This is an impossible task... unless it is when the program behavior is triggered."

Han Cen asked: "This...Although I can mobilize a lot of resources, I definitely can't do this."

After thinking about it carefully, Lin Wenfang said: "I don't know if there were similar signals when accidents happened in other cities, and I don't know if it is the same signal. In theory, the other party may have already arranged all the nano programs. After that, use different signals to trigger and control. You can also store different responses to the signals on the program side. From my personal understanding, the former is easier."

Han Cen shook his head and said, "Yeah, just find any software with a considerable user base, crack the server side, and when the automatic update time comes, all of them will be implanted. This is the easiest way..."

Lin Wenfang also felt a little helpless.But judging from what can be monitored so far, this seems to be the closest inference to the truth.He sighed and said: "Supervisor Luo, since you have already speculated about the situation in Xiye City before, you should have a similar inference in the follow-up? If you can wait for the rabbit, maybe it is not impossible. Start the nano behavior program and play The effect is relatively slow, because different computers have different speeds, network response speeds, etc., and there is a relatively long synchronization and coordination process. If such a reaction is detected at that time, it may not be too late to stop the program before it takes effect. Of course, The other party will definitely find out about our actions. If Bloodstain is really such a powerful organization, it is hard to say what will happen.

Three helpless technical experts sat in the computer room, each asking if there was any other solution.

A vague idea appeared in Lin Wenfang's mind, but he couldn't figure out what was going on at once.Lin Wenfang thought of Huo Yu unconsciously. He was very anxious to go out this time, and he was also worried about exposing Huo Yu's existence, so he came here alone.If Huo Yu was here, he should have a solution.Thinking of Huo Yu, Lin Wenfang unconsciously remembered how she used her assistance to hack into the municipal system, and later entered Moya's TV network.This kind of invasion is clean and neat, but compared to the thing built by the Bloodscar Organization, the technical content is much lower.Sure enough, there are really many good people in this world.Some time ago, Lin Wenfang had the intention of killing the invincible hand in the world, but now he encountered bloodstains, which finally made him put away his madness, and started to think down-to-earth from the subtleties.

The other party's intrusion is different from Huo Yu's program contact... Hey, Lin Wenfang understood it all at once.

He stared at Han Cen with wide eyes, and said slowly, "Maybe... maybe I have a solution."

"Speak quickly." Han Cen and Luo Fengmian were equally eager.

"Judging from the continuous release of the signal program by the other party, it is obvious that the other party has to wait for these nano-programs to continue to function to achieve their goals. That is to say, these programs are not activated once and take effect, but can be controlled. But This kind of control and feedback should be able to be monitored. This is also a very large-scale monitoring... I need to implant a program on a large number of computers in a short period of time, a very small program. It may be smaller than the other party's program, It is even less noticeable. If, at this time, we simulate the signal of the other party and broadcast it to the entire network, what will be the result? Those nano-programs will enter an active state for a short time because of the signal, and make a judgment: yes or no .If these signals conform to their pre-stored signal characteristics, then they will be activated and start to play a role. If not, they will be dormant again... If my program can monitor this process of judging whether or not, then it can be mastered Some traces of the other party. But... first, I have to find even one nano-program of the other party for me to analyze. Otherwise, this kind of monitoring of whether to judge or not will be out of the question. What do you think?"

Lin Wenfang's words made both of them fall into deep thought. Han Cen and Luo Fengmian are the people who stand at the top of the information security of the military and police systems respectively, but what they have to consider is not only the technology itself.The two looked at each other, Luo Fengmian hesitated, and said: "I will arrange people to start random sampling and checking of computers and other systems in Xiye City and Lingzhou City, and conduct the most detailed system analysis... The public security department has done a lot, and we can find out even the small number of bytes, it should take 6 to 8 hours."

"The server resources are fine. Before I came to the meeting, I was authorized to use any supercomputer within Hanking's range at any time. No matter what research institution or school, it must cooperate unconditionally. This is the military requisition regulation." Han Cen shook his head , said: "Your method seems to be more feasible, but large-scale distribution of resident programs, this...is not something we can decide."

"Political risk?" Lin Wenfang immediately agreed.This kind of behavior of implanting programs into other people's computers on a large scale, regardless of its original intention, is deeply opposed by everyone.Once it is known to the outside world, I am afraid that no politician can withstand it. At that time, a few people will have to be blamed.The few of them are not afraid of this, because this decision cannot be made from their level anyway, and it involves a lot of coordination work.A small program with unknown function, if it causes any anti-virus software to alarm, it may scare the snake away.

Both Han Cen and Luo Fengmian knew that all anti-virus software had backdoors, especially those developed by federal companies.These backdoors are in the hands of more authoritative departments, and through these backdoors, they can send small programs into other people's computers without knowing it.If they want to implant programs on a large scale, they must open up this joint and execute it through this channel.So, in the end, is there enough determination to control this matter?
Lin Wenfang sighed, and said, "I can't control this anymore. I have to go back to class first. Then... I'll come here next afternoon?"

For the time being it has to be like this.The place they are using now is not simple. It is the research institute of a company that produces network hardware in Hanking. Since this company frequently conducts large-capacity data testing, this research institute is the place with the largest fixed physical bandwidth in the entire Hanjing.After preparing the pass for Lin Wenfang, Han Cen sent a car to take Lin Wenfang home.

Han Cen sighed, this matter is getting more and more troublesome.He has great confidence in Lin Wenfang. At least logically, the solution proposed by Lin Wenfang is the most reliable solution he has heard so far.But, can you really get the license smoothly?Even if Luo Fengmian analyzes the presence of the opponent's program, can he successfully decipher the judgment mechanism?Finally, can they really do these things without attracting countermeasures from each other?Since this bloodstain is such a powerful technical group, they will definitely not sit back and watch the huge plan they carefully set up be cracked.

Who would have imagined that it was not Moya, who was weak in technology, but the Moon Sea Federation, which led the world in the digital field, who encountered such a big crisis.If such a thing really happened, it would be a huge blow to the credibility of the entire federal electronics industry.

(End of this chapter)

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like