"I want to build a network that can hide everyone''s identity information, so that all of us can log in freely without considering our identity disclosure! This network, I call it - Dark network! " Qin Feng said.
Dark net?
Many hackers'' eyes lit up when they heard the name.
It''s a good name. They like it very much. Dark net, no matter how you listen, you feel very consistent with their identity.
They are hackers. Black and dark are one.
Black net, obviously not good.
Dark net, that''s very artistic conception.
"Q, how can this technology be implemented?" Some hackers couldn''t help asking.
"I don''t know if anyone here has heard of Onion Router?" Qin Feng asked.
If you ask ordinary people outside, you must have never heard of it.
As we all know, the English name of router is router, which is responsible for connecting LAN and Internet. Basically, all families use it. Of course, in ordinary families, routers are used to connect computers or mobile phones directly.
In large companies, switches are usually used to connect.
The reason is also very simple. Routers are directly connected to computers. If the number is relatively small, it is OK. It''s not troublesome to manage like that. In this way, you can save money on a switch. And for ordinary users, it is also easier to operate.
On the contrary, if the company uses it, the router will be particularly troublesome to manage. Especially once a computer goes wrong, you can''t easily find it out. In particular, with the increase of the number of computers in the LAN, it is very easy to have an internal cyclic data redundancy storm.
You know, packet loss will occur when all data is sent out. This is very normal, especially when using some chat software, such as QQ, wechat, watching video, etc., UDP (User Datagram Protocol) is used for sending.
This is very easy to lose data. Direct router management, a large number of computers will lead to a large number of errors. Switches are easier to manage.
For so many hackers on the scene, it is too clear what routers and switches are. They steal the back door and find out the flaws by analyzing all the uplink downloaded data.
"I know!" A hacker raised his hand, "it is a technology developed by the Naval Research Laboratory (NRL) and the Defense Advanced Research Projects Agency (DARPA) a few years ago. But it seems that this technology has finally been shelved! "
"I know!"
Subsequently, hackers raised their hands to say they had heard of it.
Some hackers even said directly that he had invaded the Ministry of defense and downloaded this thing.
These remarks, heard by the FBI, are undoubtedly a group of criminals.
"Catch or not?" Asked by FBI agents at the scene.
"No hurry! wait! What is this Q for? Besides, he just said one thing! " FBI field director said calmly.
These people, in his eyes, are turtles in a jar.
It''s easy to catch them.
None of them can run away.
Now, it''s all their people outside. And mobilized the strength of Las Vegas police to reinforce at any time.
These damn hackers, now we have to go. But we''ll catch them all sooner or later.
"If only everyone knew. I will personally invest $1 million to build this dark network and build a security fortress for all our hackers. " Qin Feng said, "of course, you can''t rely on me alone. I need help. Therefore, if there are hackers who understand this aspect, they hope to register automatically. Of course, the registration method is the same as before. There is no need to sign up on site, but sign up afterwards. Then contact privately! "
Many hackers nodded.
Qin Feng had heard about the dark net before his rebirth. Actually, I haven''t logged in.
Because the login method could not be found. This is very hidden. Ordinary people hear it most, but they can''t find a login window at all.
But Qin Feng knew that the dark net was very dangerous and dangerous, hiding the most primitive evil of mankind.
Drug trafficking, arms trafficking, it''s all routine. Trafficking in human beings and organs are not uncommon.
In particular, the emergence of bitcoin makes dark network transactions extremely hidden.
Even Qin Feng once suspected that the research and development of bitcoin may be just a technical exploration. But is the popularity of bitcoin driven by some people hidden in the dark level of the world.
It just became out of control because it was hyped by financiers later.
Now Qin Feng made a dark net, in addition to an interest in exploration, he also wanted to control such a force. Not for anything else, just for self-protection.
Qin Feng knows very well how much trouble he will cause. It''s not that Qin Feng wants to make trouble, but that he doesn''t want to live.
In fact, Qin Feng knows very well that if he recognizes counseling, he will get very moist. Those people above will scramble to protect themselves and give themselves benefits.
But living in the world, we want to live in freedom.
Before rebirth, it was uncomfortable enough. Endless high house prices, high prices, strict classes and naked money trample on people''s lives.
It''s not easy to be reborn. Qin Feng naturally doesn''t want to be so oppressed again. Need to live by the breath of others. In particular, Qin Feng doesn''t want to live in the shadow of office all his life.
Although the surface scenery is infinite, it is limited by what others say and do.
Qin Feng doesn''t want this kind of life.
Therefore, Qin Feng hopes to get as many chips as possible to make his life a little more free.
People are born unfair. But you can fight for freedom.
"This is naturally a website that has caused a global sensation in later generations.
The founder is Julian Paul Assange, an Australian Internet activist. Of course, its creation of Wikileaks has triggered disputes from all walks of life. Supporters believe that WikiLeaks defends democracy and press freedom, while opponents believe that the disclosure of a large number of confidential documents threatens the national security of relevant countries and affects international diplomacy.
As for why it is called Wikileaks, it is because it is a website based on Wiki technology. All the information comes from the decoding of Wiki technology.