Qin Feng came onto the stage.
All hackers gradually quieted down.
For Q, although we don''t know its name and what we have done in the past.
However, they deserve their respect for their success in organizing this hacker conference.
"Dear hackers, I believe you have been confused about two things in the past few years!" Qin Feng''s voice changed.
Many hackers are listening.
"The first thing is that everyone is not safe enough. No matter chat or ordinary technology exchange, any platform is very unsafe. At any time, the FBI may come to the door because of your unintentional words. Therefore, we are usually very careful and cautious. Even say, let our life also live in fear! " Qin Feng said.
These words were approved by all hackers on the scene.
This is their life, a miserable life. But this is also their choice. They may have violated the law on some level. But in fact, in many cases, most people are out of a desire for technology and exploration of technology.
They don''t really want to make a profit.
Of course, it does not rule out some of them making profits. But in fact, most people will not make a profit. More, it is out of righteousness and justice to expose some things.
But it also caused trouble and made me very embarrassed.
The worst of this is Philip Katz, who turned over Cisco''s arz company and reduced its profit to zero for the benefit of all Internet users.
But what about him? But died of embarrassment. Of course, it may not even be drunk. You know, people who are really drunk every day rarely really die of drunkenness.
On the contrary, people who usually have control but get drunk once in a while are likely to die of drunkenness.
However, you don''t have any evidence to prove that Philip Katz didn''t die of drunkenness, but died of homicide. There is no evidence.
You know, behind this incident, Cisco is involved. You can''t get around Cisco for anything related to it hardware, some link software, and network protocols.
The power of Cisco may be unheard of by ordinary people. But anyone who studies it is like thunder.
In the face of such a powerful company, they are nothing to a group of hackers.
"The second thing is that when we have any major achievements, we lack a publishing platform. In particular, when we get some secrets, in justice and justice, and want to publish them, we have no channel to publish them. Publish freely, just like Mr. Katz. Finally, he died! " Qin Feng said.
There was a moment of silence.
This is indeed the most helpless thing faced by all hackers.
If you want to be a lone hero, you''ll end up on your way alone.
The world is cruel, cruel. No one can help you. Finally, all you can rely on is yourself.
So? Q: what do you want to do?
"Here, I want to take this opportunity to solve these two things!" Qin Feng said.
How to solve it?
All hackers looked curious.
At the moment, the FBI is ready.
"Be ready to act!" FBI orders.
As long as this Q reveals something terrible, he will be arrested.
After the capture, the group of hackers became headless.
They are not afraid of hackers. What they are afraid of is the combination of hackers. That would do too much harm.
It was a disaster for everyone.
I''m afraid those government departments and companies will suffer.
It would be a real nightmare.
Therefore, if Qin Feng really wants to do something, they will arrest him. Even if it causes trouble, they should know the identity of Q.
However, the FBI did not know that the agents they installed at the scene had long been known by Qin Feng.
They asked for five places. Originally, these five places didn''t let te know.
After all, they are also in black clothes, black pants, black shoes and wearing masks.
It''s impossible for me to know.
But they didn''t expect that they arranged a two night stay here. Naturally, FBI agents can''t participate. It''s easy to expose the target, and discipline doesn''t allow it.
Moreover, it is impossible to do so with a monitor.
This naturally made tewupu check his identity and lock his whereabouts.
Naturally, temaopu also invited relevant bodyguards to hinder these FBI.
Of course, there is no need for them to have a hard connection with the FBI, just a little obstruction. Anyway, they are all black clothes, black pants, black shoes, plus a big head cover. In this case, we are not afraid to be found.
It can be said that at the moment, next to every FBI agent on the scene, there are two bodyguards invited by temaopu to watch. As long as the FBI takes action, they take action.
Therefore, Qin Feng is very safe.
"The first thing is how to make everyone chat safely and exchange information. My suggestion is to build a network that outsiders can''t log in easily. At the same time, if you log in, you can also automatically hide each other''s identity, address and information, which can not be known. " Qin Feng said.
Many hackers nodded. This is what they have always wanted to do, but there are technical problems.
At the same time, people need to take the lead. It can''t be done without someone taking the lead.
Now, it''s better to have Q to lead.
But what about technology?
"I have solved the technical problems you are worried about." Qin Feng said with a smile.
During this time, Qin Feng is not just worried about the Czech Republic. At the same time, Qin Feng is also in the United States, using the convenience of his network to search for a technology.
This technology comes from the US military. It is a scientific research project of the U.S. military. The main purpose of its research and development is to provide Internet users with services to hide their identity.
To this end, the U.S. military has created a special router called Onion Router, which can automatically hide the user''s identity information.
The working principle of the router is very simple. After receiving the data from the switch, it will automatically analyze the MAC address contained in the data, that is, the physical address and IP address, and then search its existing routing table to see if there is a matching address. If not, it will feed back to the upper router.
This feedback goes on level by level until the address contained in the data is found. Then send it one level at a time, and finally reach the destination address.
Among them, the address is completely transparent and visible. However, onion router can hide the real IP address and add it as a virtual false address.
In the end, even if the data is intercepted, the real IP address and MAC address cannot be found.
This is the famous dark net in later generations.