As a liberal arts student, movies about deep-dive hacking should not be an exception for movie fans. In the hacker-themed movies, everything is so fresh and exciting, realizing the adventures that we migrant workers who can only code words can't achieve. What Yu Meng recommends to you today is a suspenseful inference film about hacking. It is a cool film. The plot is reversed and reversed. Don't blink, the ending will surprise you. Don't miss this movie just because the title of the movie doesn't seem to be that tall.
The whole film revolves around a hacker genius Benjamin's self-report of the police. Although he is a super-intelligent hacker, there will also be shadows of you in his little ninety-nine miles. Without further ado, start enjoying this video!
Benjamin is one of those people: IQ 165, but in the real world he's a failure and often mourns not being able to exist. He doesn't have a girlfriend, and the girl he likes is a classmate, but because of his quirky personality, he sits in the back of the classroom all the year round, so the girl doesn't know him.
But at the age of twenty-five, he is a computer hacker with an incredible talent for multiple programming languages such as C/C++ and IP tracking of hacker deaths. He can track any information about anyone. The other protagonist in the film, Max, is a potential revolutionist who longs for the "hacker world", and he notices Benjamin's godlike ability to manipulate the network organization.
They formed the hacker organization CLAY (clawnlaghingatyou means the joke of the clown), and successively invaded the international security system, the international financial system, the international financial assessment system, the German Security Service, and the German Intelligence Service. During this period, he met the girl he first liked and started dating.
With their superb hacking skills, they have attracted the attention of the German special police organization and the European special police organization, and a hacker leader with an IQ of 170 code-named "MRX" regards them as a threat, and the ultimate leader of the Russian "blood" network gangster wants to to remove them.
Benjamin thus felt that he was facing a life-or-death test, and that their goals didn't seem worth the cost to him.
The four hacker protagonists in the film are all unhappy people in real life. Some of them have super-high IQs, but they are always hidden in corners and have no sense of existence in anyone's eyes; some have high charisma and understand the weaknesses of human nature; some are programming masters who like Anything exciting; some are hardware freaks, give him a paperclip and a motherboard and he'll give you everything. Such a combination is put together, and the common point is to hope to be recognized by the master hacker MRX.
Why are so many people so eager to be a hacker?
Any programmer who loves technology aspires to be a great hacker himself.
The image of hackers is quite cool at first. In many Hollywood blockbusters, hackers are often the protagonists or key figures of the movies and gain great focus, such as Neo in "The Matrix".
Second, a hacker is a symbol of the highest level of technology. To become a hacker, you need to master core algorithms, system programming, architecture design and many other difficult technical capabilities. Anyone has a certain level of competitiveness, and being a great hacker as a programmer shows that you are technically better than others.
Third, hackers are symbols of freedom and power. Hackers can crack all kinds of information systems, so they can unlock a door in the information world, and then enter the room, get it, and see any information he wants. This kind of "arbitrary" power, even the emperor in the real world may not be able to do it.
Fourth, the price of hackers is high. The big Internet companies have a strong demand for technology giants, and they always offer high prices to invite them. Being a powerful hacker can make a lot of money.
The CLAY organization in the film was established inadvertently, and opened the door to the Internet world one after another, from the mischief in the initial speech to the subsequent involvement of human lives. Their world seems to have a pair of invisible hands pushing them forward. They hope to be worshipped by everyone, but they are like a family in front of their idols, without any value. They are not confident, but sometimes hover in front of conceit and inferiority, which is one of the reasons why they are getting deeper and deeper.
Unsurprisingly, their cases got bigger and bigger, and they got more famous, and they got what they always wanted. They have always adhered to the principle of "dare to do and win". Benjamin took advantage of this principle to the extreme. Although the title of the film is that there is no absolutely secure system, it does not only refer to the Internet, but also refers to the human beings in the real world. There is no perfect person, and only one person will have his loopholes. This is also the biggest charm of the film. In addition to leading us to wander the hacker tribe in the Internet, it also takes us to a deep dissection of human nature. When a hacker wants to break a person's defenses, he will only let you see what you want to see.
The interesting thing about the film is that it combines "Fight Club" and "First Degree Fear", playing the trick of split personality and disguise, giving the audience a great shock in the last fifteen minutes, the ending of reversal and reversal, the director. Really hacked the audience, and once again pointed out that the person cannot always hide behind his computer. The biggest security loophole is not in any program or server, but human beings are the biggest security loophole.
Although the film has references from two classic films, the integration of the plot still has its own characteristics, and to some extent it also captures the audience's bridge reserve system, which is why it is popular.
The cost of this independent production is not high. It depicts the hacker world as another martial arts world. It also uses the real world and the virtual world to distinguish the two-dimensional world of hackers in reality and the network. Hackers use the network with higher and higher levels of security. The system is used to distinguish the status of rivers and lakes, but the most challenging system is the human heart, and there is no security system that is more difficult than the human heart.
All in all, this is an incredible film. The film plays a big reversal of suspense and reasoning, and I haven't found any logical bugs in the development of suspense.
View more about Who Am I reviews