There is no absolutely secure system

Alexys 2022-03-21 09:02:30

Suspense has always been my favorite. Today, let's talk about this hacker-themed suspense movie - "Who Am I". The movie unfolds in the way that the hero Benjamin recalls. In fact, this is the climax of the whole movie. Although it seems bland at first, the male protagonist is reminiscing about his unfortunate family, tragic experience, and failed life to the female police officer. The first ten minutes will even make people want to give up. The unfortunate family makes him feel inferior and cowardly, but he doesn't dare to express himself to those he likes, and then indulges in the Internet. In the real society, he is a complete loser. In fact, this is what the female police officer Hannah doesn't want to hear, but Hannah doesn't know that at this moment, she has already begun to be hacked by the loser in front of him, even as a hacker, there is no big threat. The title of the movie says there is no absolutely secure system. In the first few CLAY hacker attacks that Benjamin described, they finally succeeded because they first broke through people before they succeeded. For example, launching a phishing link is based on the undefense of the German intelligence center staff against friends, such as defrauding the cake from the pastry shop, which breaks through the peace of mind of the employees, for example, entering the European police office area breaks through the sympathy of security personnel, etc. Because there are many weaknesses in human beings, or this is the weakness of human nature. While it may seem inappropriate to call our trust in our friends and sympathy for human weaknesses, these are the things that hackers do with all their might. And in the process of Benjamin telling these irrelevant stories, he is actually breaking through the weakness of police officer Hannah. Hannah has been suspended, and he is eager to prove himself and seize the BOSS he has always identified - MRX, she That's what she cares about most at the moment, so she showed her weakness to Benjamin, a master of social engineering. After successfully breaking through Hannah's first weakness, Benjamin launched an offensive and continued to attack Hannah, taking advantage of Hannah's second weakness, that is, as a woman, as a woman of the same age as his mother, but The weakness of infertile women is the proliferation of motherhood. So Benjamin suddenly mentioned these in the process of telling. When I first saw it, I felt a little inexplicable. I don't know why the screenwriter added such a dialogue. It was not until the second time that I realized that it turned out that this was the second intrusion by hackers. At this time, Hannah was already attracted by this story. From the beginning, she didn't care much, and even interrupted Benjamin's memories to never interrupt again, but listened quietly until Benjamin told her what was on her mind, and her heart was on the defensive. Once again broken, Benjamin said he felt Hannah's Lonely. In fact, this is an easy conclusion to draw. Single, unmarried, childless, middle-aged, how can there be no sense of loneliness? Especially a woman. It can be said that when the film is here, it is basically connected with the beginning. That's what I said, the orgasm really came. Hackers breaking through the mainframe of the computer is not the end, it is just the beginning, and a program needs to be implanted into it. Hannah's ex-boyfriend thought Benjamin's words were so flawed they couldn't be trusted. In fact, Benjamin's description, it is true. There are many details that can be denied with a little verification. Some even get the correct answer without having to personally verify it. And why didn't Hannah make the right judgment and choice? Because, the Trojan horse program that Benjamin implants has already begun to run. It's like a hacked computer has started to fail. Hannah, who left the workplace, chose to track down "Really Want". And this tracing "really wanting" is precisely the key part of this Trojan. If there is no continued investigation, Benjamin's first few Trojan horses will all be planted in vain, because the Trojan horse is placed there, and if you don't touch it, it will have no effect. And top hackers like Benjamin naturally understand. Until Hannah found out what Benjamin said was the secret base that burned down, which was his grandma's house, it was false. After entering, I found that the so-called souvenirs taken away by others were lying in Benjamin's residence, which means that these things were done by others and were false. I found Benjamin's secret crush and got what he called a secret crush with the girl. All kinds of things are also false. When the doctor learned about his mother's multiple personalities, it was only natural that Benjamin was suffering from a genetic mental illness. And all of this is Benjamin's Trojan horse. What Benjamin wanted to achieve has been achieved. Because Hannah only saw what she wanted to see. This is a loophole discovered by Benjamin without the Trojan, and that is Hannah's conceit. There is a line at the end of the movie that I think is worth pondering. When they were discussing countermeasures, someone said: Don't let her feel manipulated. A chief cybercrime investigator with rich experience like Hannah has dealt with various hackers all the year round, and has a strong ability of investigation and anti-investigation. Once Benjamin's Trojan is too strong, it will be given to Hannah's antivirus software at once. exterminate. So this matter needs to be just right. According to Benjamin's scattered recollections, and according to her own "reconnaissance", at this time, Hannah felt that she had taken control of the situation - Benjamin was an unfortunate family of origin, which led to a personality defect, and inherited his mother's mental illness and split. personality. noodle For such a person, a child who should be about the same age as his own son, a loser in the lower ranks of society, a patient suffering from schizophrenia, Hannah's motherly love, sympathy exploded in an instant, this is also all Benjamin's Trojan horses work together moment, which is the climax of the film. So much talk and so much foreshadowing, in fact, are all for this moment, how Benjamin escaped and ascended to heaven in a dead end. Until Benjamin entered the European police system and implanted the witness protection program, which meant that she had finished escaping and ascending to heaven, Hannah did not realize that she had been completely broken. In the end, Benjamin's sentence: All tricks will be disappointed when they know the truth. The dreamer was completely awakened, but at this time Hannah had no choice but to watch this person slip away from her eyes. There are not many hacker-themed movies, but this one is still recommended for everyone to watch, mainly because the difference between this movie and the previous hacker-themed movies is that it is not just about taking out some Trojan programs that ordinary people think are awesome. The selling point is to pull the hacker, an event that exists in a virtual network, on a level with real life. What kind of system cannot break through? no. What is the hardest system to break into? In fact, it is not how advanced the firewall is, but the weakness of human nature, including our needs, desires, self-confidence, ego, and desire for manipulation, control, compassion, and even kindness. Think about it in reverse, if this is the case, what system cannot be broken through? Perhaps when we cheated on pizza in the middle of the movie, the unintentional lines gave us the answer: people's cheeks are thick enough, and the world is at your feet. What is different from the previous hacker-themed movies is that it not only uses some Trojan programs that ordinary people think are very awesome as a selling point, but also pulls the hacker, an event that exists in a virtual network, on a level with real life. What kind of system cannot break through? no. What is the hardest system to break into? In fact, it is not how advanced the firewall is, but the weakness of human nature, including our needs, desires, self-confidence, ego, and desire for manipulation, control, compassion, and even kindness. Think about it in reverse, if this is the case, what system cannot be broken through? Perhaps when we cheated on pizza in the middle of the movie, the unintentional lines gave us the answer: people's cheeks are thick enough, and the world is at your feet. What is different from the previous hacker-themed movies is that it not only uses some Trojan programs that ordinary people think are very awesome as a selling point, but also pulls the hacker, an event that exists in a virtual network, on a level with real life. What kind of system cannot break through? no. What is the hardest system to break into? In fact, it is not how advanced the firewall is, but the weakness of human nature, including our needs, desires, self-confidence, ego, and desire for manipulation, control, compassion, and even kindness. Think about it in reverse, if this is the case, what system cannot be broken through? Perhaps when we cheated on pizza in the middle of the movie, the unintentional lines gave us the answer: people's cheeks are thick enough, and the world is at your feet.

View more about Who Am I reviews

Extended Reading

Who Am I quotes

  • Benjamin: MRX has three rules: First: no system is safe. Second: Aim for the impossible. Third: Have fun in cyberspace and meat space.