Great Power Technology

Chapter 382 It’s time for us to act hooligans

Ye Zhou's vacation in Xiata can be said to be uneventful, but thousands of kilometers away from him, a big wave caused by the successful implementation of RSA decryption technology has begun to brew secretly.

In the imperial capital, in a small conference room, several people, including Chen Hao, were having a crucial discussion.

"...So, the Chou Country has actually confirmed our RSA hegemony. Is this correct?"

The person who spoke was Chen Hao, who looked at the middle-aged man opposite.

"Yes, that's why they made the compromise recently. But, on the other hand, we don't think their compromise will last too long."

"Their technological accumulation is still very strong, especially in cutting-edge fields such as quantum computing. According to our technical judgment, even if they cannot create a topological quantum computer in one step like us, relying on their previous technological accumulation, they can manufacture It’s not difficult to develop a low-temperature superconducting computer.”

"Especially when they are already under a major threat, they are likely to mobilize the strength of the country and organize research and development at any cost. This is something we cannot stop with our information advantage."

"In fact, the balance between us is fragile. After they made a series of compromises, the profit margins that quantum computers have won for us have begun to decline. If we disrupt their development without restrictions, in the end it will be very difficult. It may trigger a desperate rebellion on their part."

Hearing the middle-aged man's words, Chen Hao frowned slightly and continued:

"So according to you, even after possessing RSA decryption technology, we still cannot achieve complete dominance?"

"Of course not. When the ugly country is the only country in the world with nuclear deterrence capabilities, they have not yet completed their global domination."

"In fact, what we need to do now is not to use RSA to blackmail the other party with confidence, but to truly apply RSA technology."

"Apply it? What do you mean?"

"That's the literal meaning. However, if it is not applied in core sensitive areas, such as tampering with financial data, tampering with military instructions, etc., we will definitely not be able to do it for the time being. However, even if we do not do these, we can use this Quantum computers can still do a lot of things."

As he spoke, the middle-aged man projected the materials on his computer onto the screen in the middle of the conference room, and then continued:

"I have proposed several directions, which I can show you first. If they can be passed, then the RSA decryption technology we have in our hands is likely to have a more profound impact on our current development environment. …”

….

Two hours later, Shatta.

Ye Zhou received the conclusion of the meeting from his personal terminal. After reading it, he was almost shocked by the extent of Chen Hao's gang.

Yes, this is not a final result report that will be approved and implemented immediately, but the possible future application directions of RSA decryption technology listed above really make Ye Zhou unable to refuse.

Unlike what he thought, these directions did not focus on some grand and high-level perspectives, but were broken down into specific things one by one. But these things, if they can all be done, will have a great impact on the current situation. Circumstances can also play an extremely subtle role.

It will not disturb the already extremely fragile and sensitive balance between the two countries, but will also remove the obstacles to China's development to the greatest extent. Those who can put forward these suggestions have an understanding of the international macro situation that can be said to have reached the level of knowing the subtleties and making the most of the big changes. .

Among them, the first suggestion on the application of RSA decryption technology directly hit the core pain point of a large commercial company in Chou Country.

Interference and interception of Starlink system control instructions.

This is an extremely clever strategy. Elon Musk’s Starlink plan occupies an important position in the country’s space strategy, but at the same time, this is a strategy disguised as a business practice.

More importantly, looking around the world, not even the Ugly allies themselves are complaining about this plan.

Therefore, choosing to use RSA decryption technology to attack Starlink has inherent advantages in terms of logic, morality, and maintaining the balance between the two countries.

Ugly officials may be able to guess that it was us, but they cannot interfere directly, let alone fall out because of this, because we only need a simple reason to remove this suspicion:

You said we interfered with your control system. What evidence do you have? There are so many rays and high-energy particles unknown to humans in the universe, so why don’t you blame the cosmic microwave background radiation?

Furthermore, the Starlink system itself is an extremely complex control system. Isn’t it normal for poor control? If that doesn't work, we'll help you!

This truly grasps the opponent's weakness - especially now that the hard power of both parties has begun to reverse, it is even less likely that they will actively damage their international image.

Thinking of this, Ye Zhou smiled slightly and continued to look at the second suggestion.

The second recommendation is related to electronic signatures and electronic money. The expert group recommends reading the transaction data of several well-known international neutral banks and extracting from the database those that overlap with domestic sensitive lists, especially members of certain NGO organizations. Transaction data can be used to identify certain illegal forces active internationally and domestically from the capital chain and carry out precise attacks on them.

Among them, especially for transactions of electronic currencies similar to Bitcoin that use elliptic curve encryption and hash algorithm encryption, after the implementation of RSA decryption technology, their so-called anonymity will no longer exist.

In this way, some people who clearly know that they are suspected but cannot get any concrete evidence can no longer get away with it.

Unless you are really passionate and want to lead the enemy, otherwise, as long as you are paid to do things, you will be able to find out your details.

Ye Zhou actually still has reservations about this suggestion, because it may involve privacy protection in some civilian fields, and there are disputes on ethics and policy boundaries. But at the same time, he also agrees with a point of view:

Overcorrection must be excessive, otherwise it is better not to correct at all.

As for how to control the so-called "border", it needs to be carefully considered by the upper management.

However, to take a step back, it is impossible for most serious people to use banks that are so-called "neutral" but are actually "money laundering". This strategy has little impact on the domestic people.

In addition to these two strategies, the remaining strategies are basically operations of exchanging information hegemony for benefits, including but not limited to exchanges in education, scientific research, food, currency, culture, etc., which even include "future Frequency of Chinese cultural elements appearing in Hollywood movies."

This made Ye Zhou feel a little emotional. Just as Chou Country did to China before, China itself is now starting to exert its soft power.

After reading the entire report, Ye Zhou thought for a moment, and then called Chen Hao directly to explain his opinions.

"So, in general, I have no objection to your strategies, whether in terms of execution or accuracy of strikes."

"However, I still have to remind you: RSA is not a technology that can completely bury ugly countries. As of now, they are still the world's most powerful country."

"If they were attacking before and we were fighting back, RSA decryption technology just made the situation between us both offensive and defensive."

"The centipede insects are dead but not stiff. To bury them completely, we still need more development time."

"As the instructor said in his speech, when we kill a beast, we can throw its body out directly into the snow, but we cannot throw out the body of the ugly country."

"It's going to stay in the house to rot, stink, pollute our air, and it's still going to cause us huge trouble - and we haven't even killed them out yet."

"So we must be fully prepared."

“First, we must not stop improving technology, and all key projects must continue at the current pace and efficiency.”

"Second, the exploration of the 'No. 1 Incident' must allocate corresponding resources, because this incident is likely to have a major impact on the future."

"Third, we must still remain alert to the enemy and pay attention to their movements at all times."

After hearing Ye Zhou's words, Chen Hao hummed on the other end of the phone, and then said:

"Regarding item three, are you saying we still have to adopt a more conservative strategy?"

"No."

Ye Zhou paused for a few seconds and then continued:

"I'm talking about caution, not conservatism."

"In the past, we have been wronged too much, and now we have weapons in our hands, I think."

"It's time for us to play hooligans, right?"

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like