HacKer

HK1589 The Helplessness of Bounty Hackers!

.

March 2nd, late in the morning, close to 3:30.

The three giants are sleeping in the secret underground base of the first-level branch of the Longteng Project, but the situation on the Internet is still quite lively!

In the Internet world of Lijian, after Thomson David's identity was exposed, it immediately aroused resistance from a large number of hackers in the hacker community.

Although there are indeed quite a few official network security experts lurking in the hacker community, at least their identities have not been exposed.

Official network security experts whose identities have not been revealed are lurking in the hacker community. It can be said that the hacker community and the officialdom know each other well. Once the hidden official network security experts are exposed, they will of course be ostracized by the hacker community.

Thomson David, who was sitting in front of the computer, had a very ugly face. He looked at the computer screen with a gloomy look. Finally, he sighed deeply and started typing quickly on the keyboard with his hands.

As Thomson David typed on the keyboard, messages appeared one after another on the computer screen.

'Clearing network cache area data...'

'Deleting information records of locally connected devices...'

'Supercomputer K is being cleaned up. The remaining record information and system log information in the system are being disconnected from supercomputer K...'

'Successfully disconnected from supercomputer K...'

As the lines of information appeared, Thomson David's eyes were filled with a complex expression of reluctance and anger, and finally turned into suppressed anger, which was suppressed.

Thomson David chose to evade the attack for the time being, withdrawing from the Internet in Lijian, and suspended the use of the 'Heavy Shield' vest. If there is a suitable opportunity in the future, Thomson David will also cultivate a new vest.

But this job will be difficult!

Because Heavy Shield is very famous in the hacker community. A considerable number of well-known hackers are familiar with the operation mode of heavy shield. Even if Thomson David does not use a heavy shield vest, the shadow of a heavy shield in his operation mode will be suspected by other hackers or security experts.

Not to mention Thomson David's depression, he is just a pebble on the road to rise. Not even qualified to stumble, so he was ignored.

Time flies by, and in a blink of an eye it is already March 2nd, Xia Kingdom time, at 11:40 noon.

Hackers from all over the world who had passed at least two tests gathered in the temporary voice communication channel established by Yizuer according to the notification message sent by Yizuer.

With a total of 612 people. Hackers who had passed at least two tests gathered in the temporarily established voice communication channel of Yizuer. Through logical operations, Yizuer set the temporary voice communication channel to a state where speech was prohibited.

Even through text chat. It also takes ten seconds to post another message.

These two restrictions only apply to the top-level channels of temporary voice communication channels. If hackers gather in the top-level channels, they need to communicate privately. They can apply to Yizuer to establish a secondary channel to communicate normally.

Ten core members of the Hacker Alliance. Gathered inside the temporary voice communication channel established by Yi Zuer, Black Knife asked Black Panther, "Third brother, bring all of us together. What does it mean?"

Although the voice communication channel temporarily established by Yizuer cannot conduct voice communication, the Hacker Alliance has their own encrypted voice communication channel.

The Black Panther was also considering this issue, "Boss, I don't know what you mean. Maybe the top brass will appear in the voice channel to welcome us!" Black Panther made a rare joke.

The other core members of the Hacker Alliance laughed.

But Heidao agreed: "That makes some sense!"

In the voice communication channel temporarily established by Yi Zuer, the Dark Lord applied to Yi Zuer and established an encrypted secondary channel.

When the encrypted secondary channel was established, the Dark Lord used a set of code words to inform the deceased and Batman to enter the secondary voice communication channel he established.

After waiting for less than a minute, the deceased and Batman entered the secondary channel at the same time.

"DD, Batman, what do you think about the organization?" The Dark Lord asked bluntly.

The Accuser is a world-class hacker, and he may reach the top of the world at any time. If the Accuser hadn't given him his full help before, the Dark Lord would never have been able to stop the angry Thomson David.

"Lord, are you sure it's safe for us to talk here?" The informer did not directly respond to the Dark Lord's question, but instead raised his own concerns.

Batman also expressed his worries, "The organization is very powerful. If we are in the voice communication channel established by the other party, we may be monitored by the other party, right?"

Yizuer is indeed monitoring the temporarily established voice communication channels, whether they are top-level channels or secondary channels. Their voice communication records will be collected, sorted, analyzed and archived by Yizuer.

The Dark Lord smiled and said: "We are just objectively evaluating the organization. Doesn't the organization allow other people's evaluation? Besides, I have scanned the secondary channels of voice communication and found no traces of being monitored."

The informant scanned it worriedly. Just like the answer given by the Dark Lord, there was no trace of monitoring on the secondary channel.

It's a pity that their technology can't detect Yizuer's monitoring yet!

"My lord, to be honest, I don't know any information about the organization. However, if I really want to, I will be provided with a fixed bonus of 100,000 US dollars every month, a clean bonus, and I wouldn't mind joining the organization. No matter if you are a formal member or a peripheral member!" The informant said in a more relaxed and relaxed manner.

Obviously, the deceased is working hard to earn an income of US$100,000 per month!

Batman asked in surprise, "Tell me, are you kidding me? It's just a hundred thousand dollars, what on earth are you doing?"

The Dark Lord also expressed his shock, but the Dark Lord had a good relationship with the accuser. He asked directly: "DD, what happened?"

The Dark Lord and the Teller have known each other for more than five years, and the relationship between the two is indeed very good. DD is the abbreviation of the Dark Lord to the Teller, and the full name is, which is equivalent to a nickname between friends.

The informant smiled bitterly, "The situation is more complicated! Batman, you are in France now, right? My lord, you are in Great Britain, right?"

Without waiting for the two's answers, the complainant continued, "Because the Wasang Kingdom has been attacked by cyber hackers one after another, which has caused extremely heavy losses. Therefore, the Lijian Kingdom has strengthened the supervision of network security in the country. Especially Lijian Country will no longer let us have any mercy on our bounty hackers. Unless we return to the official position of Shunjian Country, it will be difficult for us to survive in Lijian Country. So, you know, Lord!"

The Dark Lord fell silent. He knew that there was a reason to sue the deceased for money. Although he didn't know what it was specifically, it cost as little as fifty or sixty thousand dollars and as much as one hundred thousand dollars every month. It is also for this reason that the whistleblower chose to become a bounty hacker.

Otherwise, according to the technical strength of the reporter, it will not be too difficult to get a bright future by doing any network technology work or working in a network security company.

Batman was silent for a while and then said: "The situation in Lijian is too perverted! Especially the annoying NSA National Security Agency. As long as we go out of our way a little bit, they will step in to stop us. It's simply too much."

In fact, it is not easy for powerful bounty hackers to obtain ultra-high profits. In addition to the official government supervision being too strict, there is also the reason why the workload is too small.

Hiring bounty hackers in the online world is not a game that anyone can play. The quality of bounty hackers varies, and some greedy bounty hackers will even hack their employers to gain more benefits. Therefore, bounty hacking is equivalent to a double-edged sword, and you can cut yourself if you are not careful. This situation has discredited the entire bounty hacking industry and greatly restricted the development of bounty hacking.

There is another important reason for the poor living conditions of bounty hackers, and that is the gradual strength of network security companies. Network security companies no longer only target enterprise-level users, but now also target ordinary individual users, providing individual users with a series of considerate services.

Bounty hackers appear to have few advantages over cybersecurity companies. Therefore, the living environment of bounty hackers is getting worse and worse, and the lives of bounty hackers are getting harder and harder.

Perhaps there is still a question. Since the competition between bounty hackers and network security companies is at a disadvantage, why don’t bounty hackers set up a network security company?

Especially in the case of the Teller, Dark Lord and Batman, the three have a good relationship and strong technical strength. If they set up a network security company and took off their hats as bounty hackers, then their competitiveness will naturally be More powerful.

The deceased is a world-class hacker, even halfway to the top of the world; the Dark Lord and Batman are both quasi-world-class masters. If the three of them jointly establish a network security company, it will at least be better than joining and becoming a member of a peripheral organization. ?

But why didn't they choose this way?

.(To be continued ~^~)

Chapter 1610/1926
83.59%
HacKerCh.1610/1926 [83.59%]