Chapter 545: Technology Beyond Technology
Some guests with a little bit of technical knowledge asked strangely after seeing those controlled power armors: "Isn't this not right?"
Some people who don't understand ask: "Electronic intrusion is nothing new. Is there anything strange about this?"
"It's not about electronic intrusion." The guest who spoke was probably someone who specialized in business related to power armor, so he knew a lot and was very in-depth. He opened his mouth with a bunch of professional terms. "It is said that the power armor uses Macallan anti-rewriting technology. Theoretically, it cannot be controlled by the enemy due to electronic intrusion, right? Besides, even if the Macallan system does not take effect, the mechanical self-discipline system should be activated. Ah! Could it be that they were damaged in the previous battle? But that shouldn’t be the case! Even if some are broken, it’s understandable that one or two are damaged, but if they are all broken, isn’t that wrong?”
"Eh... what kind of McLun technology are you talking about? And what kind of self-discipline system is that?" The young man next to him asked in embarrassment. He belongs to the type who is half-full of jealousy. He usually likes to use the little things he knows to ridicule other people's ignorance. Today, he discovered that the person next to him seemed to be a real insider.
The person next to him didn't notice the embarrassment of the person next to him. He just explained seriously: "McAllen's anti-rewriting technology is a silicon crystal encryption programming technology invented by a scientist named McAllen. It is a cross-platform encryption technology. The principle of multi-layer security encryption technology of hardware and software is actually very simple. It is to add mandatory rules to the initial guidance information of the address code at the software level. Before each pre-reading of data, the Gates Changshu of the lattice where the code is located will be checked. , if Gates Changshu encoding and address code..."
"Stop, stop." The person next to him quickly grabbed the guest who had entered the technology expert mode and said: "We are all amateurs. Some people can't even play with the functional software on our mobile phones. You can use a simpler method. Explain?"
The person next to him is obviously not a complete technical geek, he just knows better. He is not a rigid scientist who is unsophisticated. Of course, if he were that kind of person, he would not show up at such a gathering. He also reacted when he heard the words of the people around him. These were not his group of technical geeks, but some tycoons or family agents. Expecting them to understand those technical terms was basically equivalent to teaching orangutans to speak pigeon language. .
"A simpler explanation is that the operating software inside the power armor is not installed on the computer disk. Instead, it is directly recorded in the silicon crystal and exists in the form of physical imprinting. This kind of crystal storage medium is compared with the disk in civilian computers. , the advantages are: fast reading speed, strong earthquake resistance, small size, no mechanical parts, low failure rate, and low power consumption. And the most important thing is that the content cannot be easily modified."
"If you can't modify the data, does that mean you can't write information? What if the user needs to add some settings?"
"Information is just difficult to modify, not impossible to modify. Modifying this kind of information requires special encoding. Otherwise, the written information will be messed up and cannot be stored in the storage lattice. Because the key to write the information is not recorded In the equipment, it is remembered by the operator's brain before the task starts. Therefore, every time the information is modified, a password needs to be entered, otherwise the information will not be written into the recorder. And because of the principle of Macallan's anti-rewrite technology, this Writing restricted information is actually a semi-physical protection technology in the form of software, so no matter how skilled the hacker is, as long as there is no password, you will not be able to write the information anyway. Because this is a semi-physical level protection measure."
"What if the enemy gets the password through torture or other methods?" asked a guest.
"That's why there is a mechanical self-discipline system." The knowledgeable person in the industry explained: "In fact, this kind of thing is not only available in power armor, but also in robots. The so-called self-discipline system is a self-management system, used to restrain robots or automatic weapons. It is an automated device that has a high degree of self-control and the ability to harm people. The reason why this self-discipline system is called a mechanic self-discipline system is not because it is mechanical, but because it does not simulate human emotions like artificial intelligence. Something like this, this self-discipline system is very rigid, just like the robots in the first-generation science fiction movies, rigid as hell.
The main program of this kind of autonomous system and automation equipment uses completely independent chips and control circuits. All information from the main operating system will be transmitted to the autonomous system in one direction, and the autonomous system will not send any information to the main program. You can think of the main program as a government worker. This self-regulatory system is like a counterintelligence unit. This counterintelligence department will monitor the government personnel at all times, but the government personnel will not know the work of the counterintelligence department at all. The information between the two is one-way. As long as the basic working status of the government personnel does not change, then The counterintelligence department will never take the initiative to do anything against him. However, once this important government official is bribed by a foreign force, his behavior will definitely change, such as selling information, or doing things not in accordance with the instructions of his superiors or the original job requirements, but in accordance with the instructions given by the foreign force. Instructions work. Once this happens, it proves that the person has been bribed and no longer works for the country. Then at this time, the counterintelligence organization will take action to arrest the government personnel.
Of course, this is a metaphor. The autonomous systems in powered armor and armed robots are like the counter-espionage department. Once the program of powered armor or armed robots is hacked, its behavior will inevitably be different from the previous settings. There are original operating system settings inside the autonomous system, so the autonomous system can understand the working conditions of the main system at any time. Once the abnormal behavior of the main system exceeds the fault tolerance range of the autonomous system, it means that it has been invaded or rewritten. At this time The self-regulatory system will start to intervene. It will format the entire operating system, and then copy its internal backup system to the main program location to replace the original operating system and start working again.
Because this autonomous system is a completely independent system, it is difficult to manipulate the autonomous system unless you can capture the power armor or armed robot, then disassemble it, take out the autonomous system, and slowly delete it. Although this method cannot guarantee that powered armor and armed robots will never be controlled by the enemy, at least on the battlefield the enemy will never have the time and equipment to control one's own powered armor and armed robots, and this has achieved the goal of an autonomous system. aim of design. "
The guests who had previously thought it was normal for us to control those powered armors became confused after hearing this man's explanation. "No! Then if this self-discipline system can prevent information from being tampered with, then how are those power armors controlled?"
The very professional and technical guest frowned and said, "I can't figure it out before I ask a question! As long as I still suspect that the autonomous system has been damaged, it's okay even if the autonomous system of one or two powered armors is damaged. I understand, but so many powered armors are all caused by the broken autonomous system, which is obviously impossible. In other words, the opponent has a way to invade the autonomous system in a short period of time and paralyze the autonomous system and the main system together. "
Although what this person said was very clear and in-depth, there was a big gap between his guess and what we did. It is estimated that he knows how we bypassed the self-discipline system and Macallan anti-rewrite technology to replace the operating system. He would probably faint immediately.
In fact, in his opinion, the Macallan anti-replication technology, which is easy to solve through price comparison, is more troublesome for us. As for the self-discipline system, which in his opinion is almost unsolvable, it is not a trouble at all. .
This self-discipline system is actually like using an independent computer to build an automatic recovery software. Once the independent computer determines that there is a problem with the monitored computer, it will automatically fully format the computer and then run Restore software to restore data originally recorded on this machine to that computer. In this way, it will be useless whether it is infected by a virus or hacked. Because the inside of that computer has been thoroughly cleaned. As for directly invading this computer with an automatic restore system... I'm sorry, that kind of thing is too difficult. If you have the time, it would be easier to think of other methods.
Because of this setting, most people find it very difficult to bypass this mechanical self-discipline system, and further believe that it is completely impossible to bypass it and rewrite the main system's information. but. These people think in terms of software, but we use hardware.
In fact, we didn't touch the software content of this automatic restoration system at all. What we did was to unplug the network cable.
Yes, the method we use is very simple. Directly cut the data cable connecting the autonomous system and the main system. No matter how awesome the autonomous system is, it will ultimately eliminate the possibility of powered armor or armed robots being controlled by the enemy by rewriting the main system information. But what if there is no physical connection between this autonomous system and the main system? If the information cannot be transmitted, how do you restore it?
Of course, there is also a countermeasure to our method of cutting network cables, which is to set up a device. As long as the connection between the main system and the autonomous system is broken, the main system will restore itself or simply explode. However, although this method can prevent the device from being controlled and exploited by the enemy, it undoubtedly reduces the survivability of the device itself. Because all equipment with autonomous systems is military equipment, which means the environment is very dangerous, especially powered armor and armed robots. It's not surprising to be injured anywhere in the hail of bullets. If there is such a self-destruction or self-formatting setting inside the device, then the machine will be too dangerous. Precisely because this setting is superfluous, although automatic equipment production units know that this defect exists, they rarely actually set up such a protective measure. Because it's too stupid.
However, what I said about cutting the network cable is actually just a metaphor, and it is not that simple to actually do it. The arms company is not an idiot. Of course, it is impossible to actually build two computing cores and then connect a data cable between them. In terms of time, the autonomous system and the main system are basically packaged together. They share a circuit board and a processor chip. The only difference is that the circuits used by the two and the computing units in the chip are independent. Although they They are packaged on a circuit board and sealed in the same chip, but they each have their own electrical circuit. Except for a few nodes for data monitoring and restoration and rewriting, the two are basically connected together. system. Therefore, it is not that simple to cut these two separate parts.
However, it may not be that simple for others, but it is different for us.
Because of our electromagnetic control capabilities, we used our electromagnetic control capabilities to burn the silicon crystal data gateway between the autonomous system and the main system during the intrusion. This thing is like a customs house inside an electronic device, except it checks data instead of goods. This level only allows one-way transmission of data, and the effect is to prevent outsiders from invading the self-discipline system. Because there is no feedback signal in the one-way transmission of information, hackers or other intrusion information cannot invade such a system. Of course, this method can only be used by the self-discipline system. Because the main system needs to communicate with the outside world, such as joining the battlefield data link, it cannot set up such a physical filtering device.
but. This device now becomes the network cable on this circuit board. When we burned this small chip, which was no bigger than a human's fingernail, the main system and the autonomous system were completely disconnected.
Because the self-discipline system is offline, we can make any changes we want. Anyway, there is no way to restore the rostrum. As for the anti-rewrite technology... in fact, although this thing is troublesome, it is not unsolvable.
The key to this Macallan anti-rewrite technology is that the lattice type of the memory chip is defined when it is produced. Use a metaphor in a way that ordinary people can understand. You can imagine data as individual physical substances. The code 0 is square, and the code 1 is triangular. The usual memory crystal space is a larger space. Whether it is a square or a triangle, you can put it in, so you can record any information in this memory crystal. However, the memory crystal lattice produced using Macallan's anti-copy technology is very small and has a pre-set shape. Either a triangle or a square, that is to say, what kind of information the lattice looks like during production can only be recorded. If your information 0 and 1 codes are different from the shape of the lattice. Then it cannot be inserted, which will cause the writing to fail. This is why this technology makes memory crystals difficult to overwrite. Because you don't know the order, you can't insert the data of the corresponding shape into the corresponding lattice.
Each memory crystal in Macallan's anti-rewrite technology has a password. This password is actually the arrangement rule of the crystal lattice, so after adding the password, data can be written and read according to this rule. Otherwise, the data will not be completely written into the crystal lattice, and the data will be garbled when read. As for the problem of worrying about the enemy knowing the lattice password... it's actually easy to solve. The military will order a large number of memory chips, and their passwords are almost all different. Although like the manufacturers of lock cylinders, occasionally the keys of two locks can be interchanged, but in fact this probability is very low. The memory crystals issued by military units are all scrambled, so each memory chip has its own code. It takes time for spies to obtain this code, and each device has its own code, which increases the number of The difficulty of obtaining the information required. Moreover, the army has a regular exchange system for this kind of crystal, which means that the crystal that cannot be used by the army will change its position after a while. Even if you get the password, it will become invalid in a few days at most, and you know the crystal with the password. I don’t know where it will be transferred, and there is no way to effectively use the obtained password.
This method can greatly increase the difficulty of information theft, thereby reducing the harm of spies.
The above are the key reasons why this technology is difficult to break, because the cost of trying to crack a memory crystal is too high, and only targeting one crystal at a time, the cost-effectiveness ratio is completely unacceptable, so no one will be stupid enough to crack this. kind of password.
However, we have another way.
Our method still comes from our electromagnetic control capabilities, and the method we use is actually very simple-reconstructing the crystal lattice.
Generally speaking, the lattice is finalized when it leaves the factory, but the lattice arrangement within the crystal is not unchangeable. As long as the appropriate voltage and electric field are used, the lattice structure within the crystal can be modified. However, this kind of modification can only change a small one into a big one, but it cannot change a big one into a small one. In other words, it is originally a triangular hole, and if you have a block that cannot fit in, I can just dig the small triangular hole larger and then stuff the block in. However, if the lattice is too large, shrinking it will not work. Of course, whether it is a square that is transformed into a triangle or a triangle that is transformed into a square, it can be achieved by enlarging it, so there is basically no need to reduce the lattice.
However, this method will cause the lattice of the memory crystal to become larger, thus causing changes in the physical structure of the crystal. The final direct consequence is that the lifespan of the reset crystal will be reduced, and it can only be modified once, and will be scrapped next time.
However, these are not problems for us, because we only use this method to control the enemy's equipment to do our work for a while. Do we still expect that thing to last for a hundred years? Therefore, for us, this defect is not actually a defect.
Using this method, we can easily turn the memory chip with Macallan anti-rewrite technology into an ordinary memory card, and then directly rewrite the operating system. Because the self-discipline system has also been cut off, the new operating system is completely unsupervised. We can't change the internal information however we want? So, what the guests see now is that all the powered armors that have not been completely broken got up, and then turned into zombie troops, and began to follow us to counterattack their own people. (To be continued ~^~)