In fact, I never want to say that I am a hacker. If I have to get involved, it is also a software hacker. If I hadn’t been fortunate enough to self-taught relevant things, I would probably be as afraid of technology as most of the audience today. What segment am I in now? If people can call themselves "hackers" with other people's tools and swipe a few broilers, I'm the one who can write about those tools.
I recall when I was 15 years old when I was surfing the Internet one day, someone gave me an indescribable selfie video, told me not to pass it on to others, and threatened me that if QQ was passed to others, the surveillance code in the video would make the computer explode. , I was really startled at the time, and it took me several days to figure out that it was impossible
A lot of comments are looking for bugs for movies, and it's common for movies to exaggerate mythological hacks, so a lot of the technical logic isn't a slap in the face, but there are two logic bugs that are also hard for the average audience to be…
1. The male protagonist registers for a bitcoin account, and the password is clearly displayed on the computer under surveillance, and he threatens the villain with this (this is not about the villain deliberately playing with them, it is from the male protagonist's point of view, as a A developer, a person who understands computers very well, shouldn't make this kind of mistake, think about whether you will enter the password in plain text in front of others and threaten others?)
2.ps change the face of the screenshot and frame it... my dear, the source file is a video
I am a civil servant who learned to design and can use at least three languages to write windows drivers, bypass 360 and get the initiative of ring0 through self-study. It is only a part of the technology in the gold plug-in. It can write a virtual machine (copy from the avm2 virtual machine of reverse flash), what js php is in my eyes, and my native language is delphi. The language with the most plug-ins is the language of Panda Burning Incense. I even dug Bitcoin in 2010, but I thought it was a pyramid scheme at that time, and there was no GPU mining at that time, and the graphics card was still hd4830 gtx260+. Just forget about it. I don't eat technology, but I love technology in my bones. Not only do I need to understand all high-tech, but I also need to find information and dig a little bit of knowledge. Unfortunately, I understand everything... and I'm stubbornly loyal to windows, if I hadn't recently researched routers, nas, and even I don't know anything about linux, and I missed the mobile development wave.
After the pretense is over, I just want to explain that it’s good to watch the movie, hackers are not that bad, and worrying about the behavior of hackers in the movie is worse than worrying about perverted private detectives, human flesh searches, and social engineering. The only thing that our generation can live and worry about is big data. At most, smart wearable devices may become the upper-level risk control tool.
The other is the mechanical police. Friends who have watched similar movies should remember how unselfish and ruthless these robot police officers are when they enforce the law? Now ZF is developing similar programs, but not for law enforcement. Many of them are used for information disclosure and legal counsel work. It is still far away from manufacturing mechanical police, but these big data will be used to that step sooner or later. , imagine, in the future, if you are lucky enough to run a traffic light at an intersection without a vehicle, you will also be directly caught by the Tin Man for education, and the wearable device will directly download fragmented information in your brain, and most of it will be news broadcasts. In the future, life will be very difficult. Disaster. To fight against these, we need to rely on the blockchain, which is the kind of next-generation Internet that the male protagonists in the American TV series Silicon Valley want to develop.
Supplement: Now we, because personal information has been big data, just need to guard against telecommunication and email fraud.
Let me tell you an example where I was almost fooled: One day my Alipay received a one-cent transfer. The avatar and nickname are both in my friend's WeChat. Because there is a transfer record, this person is in my recent contact list. (This is the key purpose of the scammer's transfer, and I will give priority to him when I transfer). It was about the same month that we had tea outside one day. This friend asked me to transfer some money to him. Fortunately, we were in person. It was better to show him the phone before I transferred the money, and asked if it was this number? He said no, his Alipay avatar nickname is not this, I just realized something was wrong.
I analyzed it, and it is estimated that my friend authorized the address book for a third-party application that is logged in on WeChat. My WeChat disabled the address book but Alipay did not. The scammer used the mobile phone number to simulate the friend's avatar ID and transferred the money to me.
There is also a wifi hotspot without a password to be cautiously connected, it is really possible to be hacked, it is not difficult technically, intercepting data packets, forging, and then forwarding, I used to do this often
There is also the current big data. Sometimes I see someone post something in the QQ group, and I haven't even entered any characters, but when I see these words in the QQ group, my girlfriend goes home and connects to WiFi and swipes. You can push relevant advertisements for music or anything. This is already an advanced version of what you have searched on your computer and pushes relevant advertisements. Two devices with completely different behaviors and habits push relevant advertisements. I guess it is not a problem with the router or broadband operation. The business has a problem.
View more about Unfriended: Dark Web reviews