This star is from the earth

Chapter 536: Shooting of the New Work Begins

Humans can camouflage and hide when they face humans, but they don't when they face computers.

What pictures have been saved, what websites have been browsed, what words have been typed, what videos have been watched, what music have been listened to, what software have been downloaded... Although a computer is a dead thing, it is more honest than a human being. If someone can get into your computer, then this person can also know the real you.

What a person's computer looks like, that person will be like.

However, the Internet is not a place outside the law, and people's reality on the Internet is limited. If there is an anonymous and completely free environment, then people can see the truest self together with the darkness in their hearts.

This place is real.

...

"If you compare the Internet to an iceberg, the part on the surface of the water is the clear net, the part below the water is the deep net, and the lower end of the deep net is the dark net..."

"Because most people seldom see the dark web and think it is hidden, mysterious and obscure, so now the dark web generally refers to all kinds of scary, weird, uncomfortable, and controversial dark corners of the Internet, where imaginary criminals and The domain of bullies of all kinds..."

"It's actually not that mysterious. It's just an underground world that is inseparable from the Internet we are in contact with every day. It's just completely free, anonymous, unregulated, and unrestricted by social norms..."

"It's not black and white, and not all people on the dark web are criminals or would-be criminals. Technology is a choice, and it has two sides..."

In the conference room, a man in a sweater was talking freely. The confidence on his face makes his thin physique burst out with a powerful aura that cannot be ignored.

Sitting around the man were senior executives of the company such as Han Jue, Jarrence, and Xia Yuan, and the main creative team of the "Dark Web" movie such as Gu Yu. Even Director Sun, who was in the later stage of "Network Lost Tracking", came to join in the fun.

After all, the guy in front of him is a legendary hacker, where can he usually see it, of course he can't miss it.

This hacker has not been a hacker for a long time. He was recruited by Penguin a year ago. He is a good citizen, so he was borrowed by the general manager Wang Zhi to serve as a consultant for Han Jue's new movie "Dark Net" and participate in the screen design , provide guidance. At this time, he is explaining the real dark web to everyone.

"So, the media, film and television works, and some novels have demonized the dark web," the hacker paused, "for example, the movie we are going to make next..."

"What's in the dark?" Jalens interrupted the other party. .

They are all things that can be put on the front page of the news if you take them out and put them on Mingwang.

After listening for a long time, Jalens asked, "Is there something like this in our movie?"

"I haven't seen it anyway. I only saw the assassination market, where the bonus pool is used to accumulate rewards." The hacker replied.

Jalen suddenly lost interest.

Taking the opportunity of getting up to get the juice, Gu Yu quietly moved a few seats away from Jalens, sat down, and asked, "So our computer won't be monitored by hackers?"

"The information of ordinary netizens is of little value. Hackers came in and found nothing valuable," the hacker said here, glanced at Han Jue, pushed his glasses, and said, "Your computer has a bounty on the dark web, be careful." , Now even physical isolation is not safe. Of course, if you hire me as an information security consultant, I can guarantee the safety of your works. Now for activities, I will give you a 92% discount..."

Han Jue: "..."

After the consultant was introduced, the consultant also finished the class, and then there was the script reading session.

It has been more than half a month since everyone got the script, and they are all prepared for their roles. Although in this movie, except for the leading actor, other characters are not important as supporting roles, but they still put in all their efforts to prepare for the roles, without any perfunctory, without any discount.

Because this is Han Jue's second work.

Some of them may not know to what extent the film to be made will have an impact on traditional film forms, but after hearing how the story will be presented, they know that this is a work worth going all out for.

In fact, they have no reason not to go all out.

Everyone in the crew is not a big shot.

The heroine was decided by Xia Yuan through an exchange of benefits with another company. Her name was Mi Li. She had acted in two movies before, and the two movies were too good to beat. Vaguely labeled as [Box Office Poison], about to strike out. Han Jue's film is the last effort of the team behind her.

The leading actor is Gu Yu, who disappeared for two years after the car accident and has no experience on the big screen. Han Jue's movie is considered a comeback.

The other supporting roles are either newcomers who overcome all difficulties to win the role, or artists who put down the burden of idols and look forward to transformation, or American actors who have very little living space in the Chinese film and television industry.

Although this is a commercial film with little consideration for acting skills, all actors have different expectations for this work and have made serious preparations.

The heroine Millie plays a deaf-mute girl. Not only has she memorized the strings of sign language required in the script, but she also goes to a mutual aid center to learn how to deal with inconveniences in life from a deaf-mute girl.

As a technical geek, I went to learn programming and computer knowledge.

The host who played the role really opened a channel on [Station C], and chatted about something every day and uploaded it.

Now it's the script reading session, and everyone's carefully prepared things are revealed, which makes the director Han Jue quite satisfied.

Before the meeting adjourned, Xia Yuan wanted to say something.

"Although the cost of the movie is not high, and the filming period is only one month, it doesn't mean we don't pay attention to this movie. Everyone has signed an agreement. I hope that before the movie is released, everyone will not disclose any details of the movie," Xia Yuan watched. Gathered around the crowd and said, "Last year Zhao Wenfeng broke the contract, I won't say what happened to him, everyone should have heard about it."

The eyes of those who were seen froze.

The story of Zhao Wenfeng abandoning the director has long been used as a behind-the-scenes joke of the success of "Time and Space Traveler". Everyone thinks that Zhao Wenfeng is stupid, and he gave up such a script out of his temper, which is so stupid. Others were dissatisfied, saying that even if Zhao Wenfeng didn't give up the opportunity, it was rumored that he was going to change the script, and the one he changed was the wedding in the rain. In short, it is stupid, how stupid.

Zhao Wenfeng violated the contract, and was sued by the lawyer of [Dream Realization Group], and was fined. He suddenly had no money to repay the debt he owed due to gambling, so he had to sell the house. Now no one in the circle dares to approach him. Let alone work for him, for fear of causing trouble.

"This movie is going to be sent to the Shanghai Film Festival. As for whether it can be shortlisted, it depends on everyone. I hope everyone can walk the red carpet together."

Xia Yuan stood up.

"Above. Start the machine in three days."

The boss has been on a business trip for the past few days, and my work has increased all of a sudden, so I can only try my best to keep updating, and it will be fine after these two days.

Seeing that some friends have doubts about the security of [physical isolation], I posted some information found on the Internet, but I don’t know if it’s true——1. Israeli researchers disclosed this new type of technology called BitWhisper in March 2015. Computer attack method, by using the temperature sensor in the computer to obtain computer data in the physically isolated network. 2. At the Black Hat Conference in August 2015, researchers from RedBalloon introduced this Funtenna hacking technology, which can use sound and radio waves to steal data from a computer, even if the computer cannot be accessed through the network. 3. Eavesdrop on the sound of computer fans. After infecting the computer, it will control the fan speed, causing it to work at two different speeds, corresponding to binary "1" and "0". 4. By measuring the electromagnetic waves emanating from the attack target, the decryption key of the computer in the adjacent room can be stolen within a few seconds. (source:)

——

Thank you for your popular science. It turns out that the implementation of the above methods requires extremely strict preconditions, and the efficiency is also very low... It is really far less convenient than directly stealing Han Jue’s computer.

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like