Top of the big era

Chapter 3121 Photo Album Security

Arrived in Los Angeles.

The first person I met was not someone from Hollywood, but a direct descendant from Silicon Valley—Jiang Fan.

Jiang Fan was sent from China and served as the vice president of Ziweiyun, responsible for Ziweiyun's e-commerce services. Zhou Buqi placed high hopes on him, and at the same time, he was appointed as the vice president of Ziweiyun, which to some extent played a role in supervising Kurian.

"Why are you here?"

Zhou Buqi was very happy to see him at the headquarters of Ziweixing Global and got along with him.

Jiang Fan smiled and said, "Kurian asked me to come."

"He?" Zhou Buqi was very surprised, "What can't you say on the phone?"

Jiang Fan said: "It's quite important."

"Go to the office."

Zhou Buqi did not avoid Jason Kilar, CEO of Ziweixing Global, and went to the office together.

"Hollywood's photo door, behind it is the Apple Cloud!"

Jiang Fan was very excited.

Zhou Buqi said with a smile: "Don't take pleasure in others' misfortune."

Jiang Fan said: "Apple Cloud is so bad! We have discussed it internally and found that the security level of Apple Cloud is too low. Compared with Ziwei Cloud, they don't even have access to it. It is said that this incident is a leak of the account password? But no matter what, the security mechanism of Apple’s cloud album is too backward. In my estimation, this is probably just the beginning. I estimate that more hackers will invade Apple’s cloud album.”

This is really accurate.

Private photos of Hollywood female stars are often the first choice for many unscrupulous hackers. Hollywood actresses often use iPhones, and their photos are stored in Apple's cloud photo album, which causes the cloud photo album to constantly withstand attacks from hackers around the world.

Things often happen.

This time is just the beginning.

Two years later, a new pornographic photo scandal came again, and in another year or two, a new wave came again...

The strategic level of Apple Cloud is very low and investment is very small. Compared with those more powerful and professional cloud computing platforms, Apple Cloud appears to be too weak and lacks the ability to respond to the changing market.

"It's not necessarily Apple Cloud's fault. Hollywood female stars are more valued by hackers and are attacked more frequently." Zhou Buqi thought of something and looked at Kilar next to him, "Three or four years ago, Hollywood... There was a huge photo leak?"

Kilar nodded, "Indeed, that time was not a cloud photo album leak, but a personal email leak. Scarlett Johansson, Mila Kunis and a number of other people were victims."

"Scarlett Johansson?"

Zhou Buqi twitched the corner of his mouth.

Depend on!

It was indeed her!

The real-life image of Marvel's "Black Widow" is almost the same as the "Black Widow" in the comics. Her private life is in chaos, and everything is related to her.

"The hacker's name seems to be Johnny. He was caught quickly and was tried for more than two years... It was confirmed last year and he seemed to have been sentenced to more than forty years. It was quite serious in nature and he hacked more than a dozen people many times. Female celebrities’ personal computers were used to steal personal information and then blackmail them.”

Kilar is no stranger to this.

Zhou Buqi asked: "What's the mailbox?"

Kilar said: "Many people like to use email to send their photos to friends. As long as a Trojan horse virus is implanted in the personal computer, the user's email account and password can be stolen, and the user can log in remotely to check All the information in the mailbox was detected. Google mailbox, Microsoft mailbox, Yahoo mailbox, and Firefox mailbox were all affected.”

After saying this, Zhou Buqi understood.

In his mailbox, he also receives many private photos every day, which are sent to him by many girls with dreams. Some simply left messages behind some of the pornographic photos, saying, "Mr. Zhou, I will sleep with you. Can you make me a star?" It was straightforward and innocent.

"It's different now." Jiang Fan deeply disapproved of the pornographic photos incident three or four years ago. "Relying on Trojan viruses to steal accounts and passwords was a hacker method in the past. This kind of routine can't be used in the cloud." It’s useless on the computing platform! At least it’s useless for Ziwei Cloud! The daily transaction volume of the cloud e-commerce service I manage exceeds 1 billion US dollars, and we are not afraid of at least thousands of cyber attacks every day. form of Trojan virus."

Zhou Buqi glanced at him, "If these female celebrities do not store their photos in Apple's cloud photo album, but in Ziweiyun's photo album product, can we guarantee that their photos are foolproof?"

"Can!"

Jiang Fan vowed to do so.

Zhou Buqi shook his head and said with a smile: "The tone is too loud."

Jiang Fan also has his own reasons, "The biggest weakness of Apple Cloud is the matching of Apple Cloud and iOS system."

"Huh? Weak?"

Zhou Buqi thought this statement was very fresh.

Apple Cloud Photo Album assumes that it is in the iOS system and is a product of the same company, so it can be a natural fit. This should be an advantage.

Jiang Fan smiled and said: "The hackers who steal the photos of female celebrities are all low-level hackers. The top hackers are all studying system-level vulnerabilities. Every update and upgrade of the iOS system actually has patches for vulnerabilities. . Some of these vulnerabilities were discovered by Apple proactively, some were purchased from hackers, and some were discovered passively after being attacked. Each vulnerability in this system can be worth tens of millions of dollars, which is comparable to relying on women. Extortion of celebrities’ nude photos can earn a lot of money.”

"Then what?"

"Some of the top hackers do not do it for the purpose of making money, but for the purpose of causing damage to Apple."

"Um."

Zhou Buqi nodded.

It is inconvenient to say more about this matter. Business competition often involves unscrupulous means. Ziweixing is not clean in this regard. It also has a security team that specializes in "checking for leaks and filling gaps" in major systems.

Jiang Fan continued: "Many times, top hackers discover iOS system vulnerabilities. They don't bother to sell them to Apple to make money, but directly disclose them on the Internet, or in a small circle of hackers. At this time, there will be Some third- and fourth-rate hackers took advantage of these vulnerabilities to cause trouble in Apple’s devices.”

Zhou Buqi understood what he meant, "Are you saying that you can directly enter Apple's cloud photo album through the backdoor through some loopholes in the iOS system?"

Jiang Fan said: "Yes, that's what it means! Now the information transmission on the Internet is in the cloud, especially Apple, which relies heavily on cloud services to provide stable Internet services. This leads to a high degree of integration between the iOS system and Apple Cloud. Many System vulnerabilities are all related to cloud services, which will further reduce the difficulty for hackers to attack Apple Cloud Photo Album."

Zhou Buqi asked: "Our products don't have such difficulties?"

Jiang Fan smiled and said: "If Ziweiyun develops a cloud photo album product, because it is a third-party product, it is not well integrated with the iOS system. Vulnerabilities in the iOS system can threaten Apple Cloud, but they cannot threaten Ziweiyun. These are two completely different working environments. Hackers can use iOS system vulnerabilities to invade Apple Cloud Photo Album, but they cannot invade our Cloud Photo Album product.”

"Can it be guaranteed?"

Zhou Buqi narrowed his eyes and realized the strategic value of this matter.

Jiang Fan hesitated for a moment and said slowly: "Asida and Samsung's mobile photo albums use Ziweiyun's cloud photo album service by default. Because Ziweiyun and Android are not the same operating system, Ziweiyun's system Vulnerabilities cannot bypass Android, and Android system vulnerabilities cannot bypass Ziweiyun. This cooperation model is much more secure. Although the number of vulnerabilities in the Android system is dozens of times that of the iOS system, our cloud photo album service. It will indeed be more secure than Apple’s cloud photo album.”

Zhou Buqi said: "If I call on female celebrities to use Ziweiyun's photo album service, if the photos are leaked, we will pay compensation. The platform must actively take responsibility. Is this feasible? ?”

Jiang Fan said: "It is feasible, but it needs to be weighed. The higher the security performance, the higher the cost. If it is a strategic competitive method, we can open a special cloud album in a private cloud for important people to protect Data privacy. But too high a level of security protection will increase costs and make it difficult for the product to be profitable.”

This was also the purpose of his special trip.

Hollywood can bring huge buzz, especially if the big bosses intend to make things big, which can bring more attention from society. There have been too many leaks of female celebrities’ private photos in the past two decades, starting from the birth of the Internet, from the PC Internet era to the mobile Internet era.

If Ziweiyun can launch a product to ensure the security of user data.

Then it will be a huge improvement to Ziweiyun's brand and external image.

It is a rare opportunity to step on the apple and rise to the top.

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like