Top of the big era

Chapter 3109 Safety Protection

Private photos of female stars can be said to be the most topical news point.

This must be used well!

The next morning, Zhou Buqi received the investigation results from Kurian, saying that it can be confirmed that the leaked cloud photo album is indeed from Apple's iCloud.

At this time, Zhou Buqi has not yet gotten up.

But the matter is very important.

In a daze, he has not yet crawled out of Zhang Zetian's gentle hometown, and asked her to contact Kurian.

"Is it true? Can you confirm it?"

Zhou Buqi is very concerned about this matter. This is a black spot from Apple that has been found with great difficulty, and it is global, involving a large number of Hollywood female stars, and the influence is unprecedented.

If this kind of thing is used well, the hot sales momentum of iPhone6 ​​may be frustrated.

Kurian said: "100% sure, it was leaked from Apple's photo album."

Zhou Buqi climbed up from the bed and sat on the bedside, "Is Apple Cloud so bad?"

Kurian laughed and said: "It is so bad, not to mention compared with Ziwei Cloud, it is much worse than Amazon Cloud, Microsoft Cloud, Google Cloud, and IBM Cloud. It can be said to be the worst among cloud computing platforms. Many small cloud computing vendors provide better service quality than Apple Cloud. Apple Cloud is a useless product derived from the iPhone and other Apple products."

Zhou Buqi still found it difficult to understand, "Even if Very bad, it shouldn't be so large-scale, right? Hackers who can do such a thing as extortion with pornographic photos are all low-level hackers, right? Hackers with some skills also target corporate database management when extorting, and this is the first time I've seen them target pornographic photos of celebrities. "

Zhao Limuge also slept on this bed, whispering beside him: "There are many cases of extortion with pornographic photos, and there are also many in China. When female celebrities encounter such things, they basically pay money to avoid disaster. We have many photos of domestic female celebrities in our hands."

Zhou Buqi turned his head to look at her and made a gesture of washing his face.

Zhao Limuge understood, put on a bathrobe, got up and went to the bathroom to fetch water for the big boss to wash his face.

On the phone, Kurian explained: "It's not quite accurate to say that they have conquered Apple Cloud. To a large extent, it's actually because users lack awareness of network security and do not protect themselves enough."

"Why do you say that?"

"In fact, the so-called hackers can't be considered hackers. They all used the dumbest method to crack the albums of female celebrities. They found the Apple IDs of these female celebrities through some channels, and then tried the passwords one by one. For example, try common passwords such as 1234567, 1111111, 9878654321, 9999999. There will always be a hit. After being hit, you can see the selfies uploaded by female celebrities to the cloud."

"Ah?" Zhou Buqi was really surprised, "That's it?"

Kurian smiled and said, "That's it, it's such a dumb method. They may have cracked the albums of dozens or hundreds of female celebrities, but I estimate that they may have tried tens of thousands. Don't say, this gang is very perseverant."

Zhou Buqi frowned slightly, "This won't work, is it that simple? An account with a remote IP address, just because the account password If the input is correct, then the system thinks that this is the user himself logging in? This security system is too bad! "

Kurian said: "Indeed, it is too bad! In this regard, no one in the world does better than us!"

Zhou Buqi was happy, "Ziwei Cloud is good?"

Kurian smiled and said: "Ziwei Cloud's security system is the strongest. Let alone the very poor Apple, even Microsoft Cloud and Google Cloud are still far behind us."

Zhou Buqi said: "Ziweixing started with security products! Weidian Security Guard and Weidian Antivirus are both excellent products!"

"Uh..." Kurian actually looked down on these two free products, "If we only talk about security technology, Apple, Google, Microsoft, Amazon and so on are not bad at all. The reason why Ziwei Cloud has the best security protection is because we have a better security concept. Of course, this is not my credit, but from Ziwei Cloud in Greater China led by Dr. Wang Jian. Americans don't understand this very well, including me. Our thinking is not open, or... we don't pay too much attention to it. "

So that's it!

Ziwei Cloud has such a strong security system because of the contribution made by Ziwei Cloud in China.

This is indeed not a technical problem, but a problem of concept.

Just like the Apple photo album was hacked this time.

No matter how poor the technical level of Apple Cloud is, it is not something that those low-level hackers can break. The reason why they can get those nude photos of female stars is because these female stars are too naive and know nothing about network security. When setting passwords, they use the most common common passwords.

That's too simple.

There is no need to rely on any high-tech technology to crack it.

Just try those common passwords one by one.

But even so, the platform cannot be exempted from responsibility.

A strange IP, strange device, strange mobile phone number, just enter the correct account and password, and then you can log in to the cloud photo album? This security defense level is too low! This is obviously a login method with security risks. How can it be released so easily?

Even if you log in, you find that the "user" is downloading photos in the album in large quantities...

This counter-intuitive operation is another challenge to product safety.

Mature products will be forced to exit immediately.

The user is then asked to re-enter multi-factor authentication.

Today's cloud computing platforms are becoming more and more powerful, and the technology covers all aspects, and can fully verify the user's identity in multiple ways.

How can the user's identity be confirmed with just an account number and password?

If you are logging in with a commonly used device or IP, then you only need to have the correct account and password. However, if something suspicious occurs, more verification must be done, such as mobile phone SMS verification code, email verification code, or even related verification of the old device.

This is technically not difficult to achieve.

The hard part is whether you have thought of it!

The country has the largest number of computer engineers in the world, which means that the country also has the largest number of hackers. With more hackers, there will also be more and more various network attacks. This is actually an offensive and defensive battle, with both sides innovating and upgrading each other.

This has two benefits.

First, the technical strength of domestic hackers and hackers are among the best in the world. In IT technology, the technical level of domestic hackers, hackers, and white hackers is far higher than the level of normal IT technology in the international arena.

Second, the level of hackers is high and the level of defense is also high.

This means that domestic security products and cloud computing platforms have better defense capabilities. The main reason is that I have too much experience and have seen too many attacks of all kinds. The more I have experienced and the more attacks I have dealt with, the more comprehensive the defense strategy will be.

Especially the password setting.

Nowadays, the products of major domestic manufacturers have been preset for a long time, and users are not allowed to set a very simple universal password at all, which fundamentally breaks this path.

It's like a joke that the Apple Cloud Photo Album was cracked by a so-called "hacker" this time.

I only entered the correct account number and password, and then logged in successfully.

This situation is simply impossible on Ziwei Cloud, even domestic Alibaba Cloud, Penguin Cloud, Huawei Cloud, Baidu Cloud, Kingsoft Cloud and the like. But Apple Cloud was so dumbfounded that it easily broke through its defenses.

Kurian said: "Again, Apple Cloud is not a professional cloud computing platform, it is just a subsidiary product that serves iPhone and iPad. The strategic level is not enough and the attention is not enough. This time can be regarded as a wake-up call for them. They Next, we will definitely strengthen the security management of Apple Cloud and improve their certification system. Maybe they will come to us again. ”

That's not what Zhou Buqi was thinking about.

He was sitting by the bed, Zhao Li Muge was helping him wash his hands and face, while Zhang Zetian was kneeling beside him, holding a mobile phone in his hand and putting it to his ear.

"Can we think that Apple has an unshirkable responsibility in this large-scale leak of nude photos?"

Zhou Buqi wants to do something against Apple.

Kurian said: "Of course, although the user's password setting is too simple, Apple, as the platform, should also have the responsibility to provide corresponding protection. Hmm... However, the current platform theory may not be legally supported."

Domestic platforms are actually learning from the United States.

Pretty much the same.

For example, one of the most profitable promotion businesses on Google is law firm advertising, and one click can cost up to 50 or 60 US dollars. A truly well-known law firm has an endless stream of clients and does not need to advertise at all. Even if you advertise, it is brand advertising, not conversion advertising.

Search ads have little brand value and are just typical conversion ads. The search ads are mostly from less "professional" law firms, which actually have strong deceptive properties.

As long as these law firms are approved by relevant US agencies, even if users are deceived by the law firms, it has nothing to do with the platform.

Apple Cloud is a platform.

Judging from the legal basis of past Internet platforms, privacy leaks have nothing to do with Apple Cloud.

Zhou Buqi hummed: "What age is this? The old rules are no longer applicable! The platform must take responsibility! Ziweiyun, as the leader of the global cloud computing industry, we have the responsibility to establish a cloud computing platform A new set of platform rules, we must not shirk responsibility! We must be responsible for users wholeheartedly, and we must actively treat all platform losses caused by users!”

"Huh?" Kurian tasted what Boss Zhou meant, "Do you want to become famous by stepping on apples?"

"right!"

"Isn't it necessary? Ziweiyun is already the best in the world, and Apple Cloud is not at the top at all. Even if he steps on Apple Cloud and gets a better reputation, it will actually be very limited for Ziweiyun."

"This is an opportunity to establish industry rules." Zhou Buqi got up in the morning and sat naked on the edge of the bed before getting dressed, and decided on such a big plan, "Don't forget, Aisda's cloud Behind the photo album is Zi Weiyun. Samsung’s cloud photo album is also behind Zi Weiyun!”

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like