Chapter 982 Onion Router
Qin Feng walked onto the stage.
All hackers gradually became quiet.
As for Q, although no one knows his name or what he has done in the past.
But just because they organized this hacker conference and made it so successful and gained them so much, they deserve their respect.
"Dear hacker friends, I believe you have been confused by two things in the past few years!" Qin Feng's voice changed.
Many hackers listened attentively.
"The first thing is that everyone is not safe enough. Whether it is chatting or ordinary technical exchanges, any platform is very unsafe. Your unintentional words may bring the FBI to your door at any time. So, Everyone is usually very careful and cautious. It even makes us live in fear!" Qin Feng said.
These words were echoed by all the hackers present.
This is their life, a miserable life. But this is also their choice. Perhaps they did break the law on some level. But in fact, in many cases, most people are motivated by a desire for technology and an exploration of technology.
They're not really trying to make a profit out of it.
Of course, it is not ruled out that some of them will use this to make profits. But in reality, most people won't make money from it. It is more about exposing some things out of righteousness and righteousness.
But it also caused trouble and made him extremely embarrassed.
The worst one among them was Philip Katz, who single-handedly brought down ARZ, a company owned by Cisco, and reduced its profits to zero, benefiting all Internet users.
But what about him? But he died of embarrassment. Of course, it's even possible that the death wasn't caused by drunkenness. You know, people who are really drunk every day rarely get drunk to death.
On the contrary, only people who are usually very controlling but occasionally get drunk are likely to die from drunkenness.
However, you don't have any evidence to prove that Philip Katz did not die of drunkenness, but died of homicide. There is no evidence.
You know, behind this incident, Cisco is involved. For anything related to IT hardware, some link software, and network protocols, you can't avoid Cisco.
Cisco is so powerful that ordinary people may not have heard of it. But for anyone who studies IT, it is like thunder.
Facing such a powerful company, they are nothing to this group of hackers.
"The second thing is that when we have any major results, we lack a platform to publish them. Especially when we obtain some secrets and want to publish them in a righteous and righteous way, we have no channel to publish them. Come out. Publish freely, just like Mr. Katz. Finally die!" Qin Feng said.
Everyone was in silence.
This is indeed the most helpless thing that all hackers face.
If you want to be a lone hero, you will end up alone on the road.
This world is cruel, very cruel. No one can help you. In the end, all you can rely on is yourself.
so what? QWhat to do?
"Here, I want to take this opportunity to resolve these two things!" Qin Feng said.
How to solve?
All the hackers looked curious.
At this moment, the FBI is on standby.
"Ready for action at any time!" the FBI ordered.
As long as this Q reveals something shocking, he will be captured.
After being captured, this group of hackers was leaderless.
They are not afraid of hackers, but they are afraid of hackers uniting. The harm caused would be too great.
That would be a disaster for everyone.
Those government departments and companies may suffer.
That would be a real nightmare.
Therefore, if Qin Feng really wants to do something, they will definitely arrest him and bring him to justice. Even if it causes trouble, they still need to know Q's identity.
However, the FBI did not know that the agents deployed by the FBI at the scene had long been known to Qin Feng.
They asked Tei Mupu for 5 places.
Originally, these five quotas were not known to Tui Mupu.
After all, they were also dressed in black, black pants, black shoes, and wore masks when entering the venue.
It's impossible to know.
But they didn't expect that Tui Mupu would arrange to stay with them for two nights. Naturally, FBI agents are unlikely to participate. That would easily expose the target, and it is not allowed by discipline.
What's more, it's impossible to do this with a monitor on your body.
This naturally allowed Temupu to find out his identity and lock his whereabouts.
Of course, Tei Mu Mu also hired relevant bodyguards to hinder these FBI.
Of course, there is no need for them to confront the FBI, they just need to be slightly hindered. Anyway, they were all wearing black clothes, black pants, black shoes, and big hoods. In this case, there is no fear of being discovered.
It can be said that at this moment, every FBI agent on the scene is flanked by two bodyguards hired out of luck to keep an eye on them. Whenever the FBI takes action, they take action.
Therefore, Qin Feng is very safe.
"The first thing is how to enable everyone to chat safely and exchange information. My suggestion is to create a network that outsiders cannot easily log in to. At the same time, if everyone logs in, they can also automatically hide each other's identities, addresses and information. , cannot be known by others." Qin Feng said.
Many hackers nodded. This is what they have always wanted to do, but there are technical problems.
At the same time, people also need to take the lead. Without someone to take the lead, this matter cannot be accomplished.
Now, with Q taking the lead, it couldn't be better.
But what about technology?
"As for the technical issues that everyone is worried about, I have solved them." Qin Fengxiao said.
During this time, Qin Feng was not only worried about the Czech Republic. At the same time, Qin Feng was also in the United States, using the convenience of its network to search for a technology.
This technology comes from the US military. It is a scientific research project of the US military. Its main purpose of research and development is to provide Internet users with services to hide their identities.
To this end, the U.S. military built a special router called the Onion Router, which can automatically hide the user's identity information.
The working principle of this router is very simple. After receiving the data from the switch, it will automatically analyze the MAC address contained in the data, that is, the physical address and IP address, and then search its own routing table to see if there is a match. the address of. If not, feedback will be sent to the upper level router.
This feedback goes on level by level until the address contained in the data is found. Then it is sent level by level, and finally reaches the target address.
Among them, the address is completely transparent and visible. However, the onion router can hide the real IP address and add it as a virtual fake address.
In the end, even if the data is intercepted, the real IP address and MAC address cannot be found.
This is what will become famous in later generations - the dark web.