People live for that vanity

Rebeca 2022-04-23 07:03:11

summary

This movie tells the story of Benjamin, a master hacker, who was an obscure little transparent tech nerd from the beginning, and his fate changed after he met another protagonist, Marx.

Max is a potential revolutionist who longs for "the hacker world", he noticed Benjamin's amazing talent in networking, so Max, Benjamin and prodigy Stephen and Paul privately formed the hacker group CLAY ( clawn laghing at you) , and hacked for justice International security system.

Then, in order to prove their abilities to the world's number one hacker MRX, they got his attention, they hacked into the German intelligence service system, which was said to be impossible to be hacked at the time. Then, in order to stay behind and prove his ability, Benjamin extracted a document from the middle, and this document directly caused their team to fall into a great danger. He later turned himself in in order to seek national asylum and a witness protection program. They cooperated with the state and then caught the world's number one hacker.

end

The 15-minute continuous reversal after the movie is the most exciting part of the movie, because the whole movie tells the whole thing in the tone of Benjamin, so the movies we see are actually "fake". It's very similar to the movie "Unparalleled". Anna thought she had found all the loopholes in Benjamin's story, but in fact these loopholes were deliberately released by Benjamin, using Anna's rigor to make the other party think that he was a schizophrenic person, and let the other party think that everything that happened was his responsibility It was imagined that he was the only one in the entire team, so it could not be protected by the system of people.

Then, using the sympathy of the other party, let him enter the system, and then added protection to himself and the whole team (I guess).

About "Insecure Systems"

In fact, what this movie said, no system is safe, this system is mainly the human system, and human beings are the biggest security loophole . In fact, many of their hacking activities are actually directly entering the computer room of the corresponding company and institution, and then being able to access the physical equipment, thereby successfully hacking.

Because as long as this system is managed by humans, there are bound to be loopholes. Because man is an animal with many "defects", not a fully rational machine. People have emotions and desires, all of which may lead people to do some "wrong" things, and it is impossible for people to maintain a perfect mental state 24 hours a day, so mistakes will inevitably occur.

What this movie wants to express is that in addition to technology, hackers also need to return to the most traditional way, and they must be able to deceive people, after all

The most effective and greatest fantasy art of all hacks - social engineering

About vanity

In fact, we discovered from the very beginning that the original intention of their team to do these things is not for money (especially Marx), they are all for the recognition of others (especially important people, such as MRX), which is vanity to blame. This shows from the side that vanity is actually very, very important to everyone, and may even be more important than money or power (in fact, money and power are often just to satisfy our vanity in disguise). So can it be said that being recognized is actually the highest pursuit of human beings, in fact, this is also in line with Maslow's demand model:

1. Hierarchy: Physiological needs. 2. Level: Security needs. 3. Hierarchy: The need for emotion and belonging. 4. Hierarchy: The need for respect. 5. Levels: Self-actualization needs

The higher the level, the less the pursuit of material things, but the spiritual satisfaction.

Doing one thing counts as a success or not depends on the number of likes in the voting circle. I believe this has become the standard of living for the vast majority of people.

Nowadays, many startups are recruiting people who like to draw big cakes, which should also be because of people's needs for self-realization. "Follow me, don't pay attention to the petty profits in front of you, and change the world with me." Such words are very tempting to many people. After all, who doesn't want to be the next Ali Eighteen Arhats and the next Tencent Five Tigers?

movie question

I think the final key of the movie here is what did he finally enter into that system to modify, and why did he make up these stories to convince the other party that he was a schizophrenic. Wouldn't it be bad to go straight into the Protector Program? Why are you still doing these things around the corner?

I think it should be to modify some very important information, such as their identity information or something. Does it mean that if he turns himself in, only he can enter the protector plan, and he has no way to protect his team? These are questions.

extract

No system is safe. A person can't always hide behind his computer. The biggest security hole is not in any program or server. Humans are the biggest security hole." The most effective and greatest fantasy of all hacking methods Art - Social Engineering You have to be thick-skinned and the world will be at your feet Humans are inherently timid and gullible People only see what they want to see

View more about Who Am I reviews

Extended Reading

Who Am I quotes

  • Benjamin: MRX has three rules: First: no system is safe. Second: Aim for the impossible. Third: Have fun in cyberspace and meat space.