Rebirth of Fortune Soars
Chapter 1638: Wise decision
"It's mysterious!" Lisa glanced at Qin Feng suspiciously. "Don't mess around. America is a society under the rule of law. If you mess around, you will be targeted by the police!"
Obviously, Lisa had some doubts.
"It's okay, don't you worry about me! Peace! I'm so smart, how can I do illegal things!" Qin Feng smiled and dismissed Lisa.
Your own computer must be handled properly.
Can't just leave it here. In case of being targeted by the FBI, I will be in trouble.
For example, the FBI suspected tax evasion, or some messy reasons, after all, he had been spotted by the FBI before helping domestic purchase of machining beds. They have no evidence.
Later, they also suspected that they were the hacker Q, and there was no evidence.
But in case one day, they directly apply for a search warrant and come to search, if this computer is searched out, it will be troublesome. I'm afraid the FBI will laugh out loud in dreams.
But how to deal with it?
All information is washed out, this is the easiest. But you can't clean up the core client. If this has to be cleaned up, it will be troublesome.
It seems that encryption is still necessary.
Software encryption technology.
As far as Qin Feng knows, Truecrypt, the best open source encryption technology, of course, was later revealed by Google to have major vulnerabilities. But before the leak was exposed, the FBI failed to decipher the encrypted files of Brazilian bankers accused of financial crimes by Brazilian law enforcement agencies after a year of attempts. A Brazilian Portuguese newspaper reported that during the Satyagraha operation launched in July 2008, the Brazilian Federal Police confiscated five hard drives from the banker DanielDantas’ apartment in Rio de Janeiro. The article mentioned that the hard disk uses two encryption programs, one is TrueCrypt, and the other is unknown 256-bit AES encryption software. After the experts failed to crack the code, the Brazilian government asked the US for help in early 2009, but the US Federal Police returned the hard drive after a year of unsuccessful attempts. Brazil’s existing laws do not require Dantas to hand over the password.
Therefore, it is extremely safe before its loopholes are exposed.
Of course, Qin Feng will not use this software. Not now.
As for its follow-up version: Verycrypt, Qin Feng does not intend to use it.
Because it is asymmetric encryption technology used. And Qin Feng wants to use a software that can use symmetric encryption technology and asymmetric encryption technology at the same time.
That is, the later GnuPG software.
Qin Feng is now majoring in IT, so his knowledge in this area is relatively extensive and relatively large.
It seems that some people are developing such encryption software now.
As long as it is developed, as long as there is no pairing key, it cannot be cracked.
In particular, this is encrypted according to the partition. After your hard disk partition is encrypted, no matter what method is used, it cannot be cracked.
Unless you can break Riemann's conjecture.
Once the Riemann conjecture can be broken, the mathematical formulas applied therein can crack these encryption software. Not only can it crack, but at the same time, it can crack the root of the entire banking industry and even the financial industry.
Because you can use those mathematical formulas to withdraw cash and tamper with data at will in the financial industry.
However, Riemann's conjecture has not been cracked since its birth in 1859.
Countless mathematicians have tried, but no one has ever cracked it.
Afterwards, Qin Feng logged in again and released a reward for developing new encryption software on the dark web.
And this reward naturally won the fans of many hackers.
Quite simply, what hackers fear most is that the computer is acquired by the FBI. Sometimes, even if you delete it, you may not be able to completely delete all the data. There will always be some clues left.
In this case, once caught, it will be over.
Because his identity has been exposed, once exposed, he will not want to engage in this industry in the future.
Now, if a brand new encryption software is developed, it will be perfect.
Naturally, the entire press on the Internet, a voice of praise to Qin Feng.
"Q is Q, leading us forward. If it is developed, we will not be afraid of the FBI in the future!" Some hackers cheered.
"Well, as long as we have encryption software, we can develop it. That way, we don't have to hide like a mouse!" Some hacker sighed.
Before this, no one had thought about it. However, it takes money to develop such a large-scale software.
No money, how do you develop! Do you develop it alone? Isn't that nonsense?
Develop it by yourself, you don’t know how much energy and youthful years it will take.
I don't know how long it will take before it can be done. It can never even be done.
A large piece of software can never be done by one person.
This requires someone to stand up. Can call on everyone to do it together.
But before this, no one had such a charisma.
Maybe there are some hackers who are very influential and their technology is respected by other hackers.
However, its appeal is not strong.
But Q is different.
The first hacker conference was held last time, bringing all hackers together, which demonstrated its appeal.
Of course, the most important point is that Q is very rich.
This rich hacker is really appealing.
What is most lacking in hackers? It's money. Because the hacker itself is a job without money, which is basically a hobby.
If someone provides money, it can gather many hackers.
Of course, just having money is not enough, you have to convince many hackers. After all, there are more rich people, how old are you?
Why listen to you. Most of those who can be hackers are rebellious. Moreover, he is willing to endure poverty. Anyway, I'm used to it, and I don't care much about eating and drinking.
In this case, if you just have money, you cannot get these hackers to work.
Only Q has such appealing power.
This time, Qin Feng offered a reward of 1 million U.S. dollars.
To develop a powerful ~www.wuxiaspot.com~ encryption software that cannot be cracked, $1 million, in fact, is far from enough.
However, in the dark web, with the efforts of many hackers, it will not be a problem.
After all, everyone's demand for funds itself is not high, unlike the company that pays programmers such a high salary. Hackers, no need. You only need to give a little money. And there is no need to pay taxes.
In addition, there is one more point, that is, this is what many hackers need.
Now, I can benefit myself, and at the same time, I can make some money, which is already very happy.
However, this also involves a transaction issue.
That is, digital currency must be developed as soon as possible.
That is Bitcoin! Qin Feng curled his lips. This is really one thing after another. Fortunately, you don't have to let yourself do everything. This is a wise decision to establish the dark web.
txt download address:
phone-reading:
You'll Also Like
-
From Spring to Death
Chapter 106 4 hours ago -
Doomsday Rebirth: I have a 100-fold space replication system
Chapter 249 4 hours ago -
Pirates: I am an undercover agent in the Beasts Pirates
Chapter 147 4 hours ago -
Naruto: There is a big problem with my love life options
Chapter 179 4 hours ago -
The Three Kingdoms were fighting for supremacy, but I was busy with GDPThe Three Kingdoms were fight
Chapter 654 4 hours ago -
Beast Energy Transformation: Invincible with an SSS-level wife
Chapter 331 4 hours ago -
Naruto the Genius Naruto starts by learning Flying Thunder God
Chapter 98 4 hours ago -
Pokémon: Ash's Journey to Mastery
Chapter 193 4 hours ago -
Online Game: Unrivaled
Chapter 737 4 hours ago -
American comics: Opening the game with Wolf
Chapter 430 4 hours ago