48 Hours a Day

Chapter 392 CTOS

A lot of people equate hackers with hackers, but there's still a difference between them.

Originally derived from the American slang geek, the term "geek" is intended to refer to people who are passionately interested in one or more specific areas and devote a lot of time to research, mostly in the computer field, with a certain derogatory colour at the outset, and also in the early days of the PC revolution as a derogatory to hackers.

But by now, especially after the rise of a group of Silicon Valley bosses such as Jobs and Gates, the word Extreme Guest has also been given a new meaning and has begun to be labeled more free, creative and breaking stereotypes.

Yes, Extreme Guests are a bunch of people who are adventurers on the Internet, hardware fever friends, hackers, communication enthusiasts, technology houses, programmers, engineers...

“Simply put, you can be anybody who fits our spirit and can join the 01 guerrillas," Philip said, “of course, the vast majority of people who join are still computer-related, although we've always wanted girls who are cheerleaders or dancers to join us. ”

“ ………… ”

“We have our own secret forum, homemade instant messaging software, which usually discusses some technical issues, and you can put the problems you encounter up there and wait for someone to answer them, or simply show off, and the people above are good. ”

“Is Edward one of you?” Zhang Heng asked.

“No, Edward he... is not one of us.” Horsetail Men's Way.

Zhang Hengyang raised his eyebrows.

“About a year ago, Edward hacked into our forum, and we set up a website together.” Waldo still looks amazed when he brings this up.

“Is it difficult? ”

“Well, it's not that hard, it's a little easier than hacking into the defense system.” Philip said, “The most important thing is that he did it quietly, and if he hadn't left us a message afterwards, we had no idea he was here. ”

“What message? ”

“It was just a greeting at first, you know, hackers said low-key, but actually a lot of them were a bunch of guys who wanted attention, especially the harder it was to achieve and the harder it was to get in, and always had to leave something behind, like I knew there was a guy who snuck into the telecom giant SFR's human resources system and sent a little saffron to every employee of SFR who was still working overtime that night. ”

“Ha.”

“The same thing happened to that guy, who left a pixel diagram of a bean-eater, but it was very small, in the lower right corner of the homepage, and you can't see it without looking at it. Anyway, that was the first time we met Edward, and then we rebuilt the firewall and the encryption system, but the guy finally broke in. ”

“Do you feel angry? ”

The ponytail man pushed his glasses, "Angry? No, no, no, this is like an interesting game for us, we enjoyed playing against that guy, so we reworked the forum again, and you can probably guess, he beat us again... but we all had a great time in the process, and since then, we've started having more conversations.

“We always thought the opposite side was a group like us, but the fact surprised us was that the guy said his name was Edward, there was only one guy, and he said he was hired by a very good agency to do a very cool, world-changing project that would change the way everyone lives and travels, but the content and address had to be kept secret.

“We didn't actually take it too seriously at first, because, you know, hackers, no one likes to brag about how good they used to be, but the vast majority of people didn't even have half of what they bragged about, and Edward was terrific, and I admit that, no, he's the most powerful guy I've ever met, but it's a little exaggerated to subvert the world or something, but anyway, we kind of met a new friend. ”

“In the time that followed, Edward came to our forum from time to time, bragged about us, and occasionally revealed something that had happened recently, but it was basically just what the administration was wearing today, how about lunch, he was a very contractual guy, never discussing specific work until a month ago, when we suddenly got a message from him saying he didn't know he was doing the right thing. ”

"I asked him what had happened, if he had been under a lot of pressure lately, but he hadn't responded, about another week later, and he suddenly contacted me and said that he had escaped, that he had something important in his hand, and I asked him what it was, and he sent me a document, and I could see from that document that things might be really bad. ”

“Why not? ”

Philip looked around and lowered his voice channel, "This is a project called CTOS, and they're planning to build a powerful central control system that connects all the public amenities in the city to the Internet, just like installing a brain for the city, and insight into hidden patterns that the naked eye can't detect from massive amounts of data, so that it can overcome the problem of not really finding the best solution in the world because limited information decision-makers can only do local optimal strategies, by calculating, redistributing public resources, and avoiding waste.

“For example, if I connect the signal lights at all intersections to the network, you can reprogram and calculate the optimal time allocation for each signal light, saving travel time, and in the event of an accident on the road, the city brain will alert the hospital with direct feedback, allowing the ambulance to arrive in the shortest possible time. ”

“Sounds good. ”

“Yes, Edward initially felt the same way, but later he discovered that there was something else hidden behind CTOS. Once the system was in place, not just in the public facilities, it would also proactively collect data on all citizens, and your phone messages, medical records, health insurance numbers, criminal records, favorite websites, chat audiences, browsing records, chat content, every credit card spend would be under its control. ”

“It was a disaster.” Horsetail Men's Way.

“Yes, that means that every move we make from now on will be watched by others, we don't have any privacy anymore, even the room is full of cameras.” Waldo gets very serious too, "you don't know when they're going to move your PC or phone, even your drone. ”

“And if it goes on like this, things could get worse, and it's only the first stage, and by the second stage CTOS will automatically analyze the hazard tendencies that label everyone, and, of course, it's certainly a good thing to stop crime early, but we don't know how and algorithms it calculates the hazard tendencies of everyone, and without constraints, each of us could be labeled as a hazard molecule. ”