Top of the Great Era

Chapter 3109 Security Protection

Chapter 3109 Security Protection

Private photos of female celebrities can be said to be the most talked-about news point.

  This must be used well!

The next morning, Zhou Buqi received the investigation results from Kurian, saying that it could be confirmed that the leaked cloud photo album did come from Apple's iCloud.

At this time, Zhou Buqi had not yet gotten up.

But the matter is important.

He was in a daze and hadn't yet crawled out of Zhang Zetian's arms when he let her contact Kurian.

"Is it true? Are you sure?"

Zhou Buqi was very concerned about this matter. It was a black spot on Apple that was hard to find, and it was global in scope, involving a large number of Hollywood female stars, with unprecedented influence.

If this kind of thing is used well, the hot sales momentum of iPhone 6 may be hindered.

Kurian said: "100% sure, it was leaked from Apple's photo album."

Zhou Buqi climbed up from the bed and sat on the edge of the bed. "Is Apple Cloud so bad?"

Kurian laughed and said, "It's just that bad. Not to mention compared with Ziwei Cloud, it's much worse than Amazon Cloud, Microsoft Cloud, Google Cloud, and IBM Cloud. It can be said to be the worst among cloud computing platforms. Many small cloud computing vendors provide better service quality than Apple Cloud. Apple Cloud is just a useless product that is backed by the iPhone and other Apple products."

Zhou Buqi still found it hard to understand. "Even if it's very bad, it shouldn't be hacked on such a large scale, right? Hackers who can use pornographic photos to blackmail people are all low-level hackers, right? Hackers with some skills usually target corporate database management when blackmailing people. This is the first time I've seen someone target celebrity pornographic photos."

Zhao Limuge also slept on this bed, whispering beside him: "There are many cases of blackmail with nude photos, and there are also many in China. When female celebrities encounter such things, they basically pay money to avoid disaster. We have many photos of domestic female celebrities in our hands."

Zhou Buqi turned his head to look at her and made a gesture of washing his face.

Zhao Limuge understood, put on his bathrobe, got up and went to the bathroom to fetch water for the boss to wash his face.

On the phone, Kurian explained: "It's not quite accurate to say that Apple's cloud was conquered. To a large extent, it's actually because users lack awareness of network security and do not protect themselves enough."

"How to say?"

"In fact, the so-called hackers are not hackers. They all used the dumbest method to crack the female stars' photo albums. They found the Apple IDs of these female stars through some channels, and then tried the passwords one by one. For example, they tried common passwords such as 1234567, 1111111, 9878654321, 9999999. There will always be someone who will be fooled. After being fooled, you can see the selfies uploaded by the female stars to the cloud."

"Ah?" Zhou Buqi was a little surprised. "That's it?"

Kurian laughed, "That's it. It's just a stupid method. They may have cracked dozens or hundreds of female celebrities' albums, but I estimate they may have tried tens of thousands. This gang is really persistent."

Zhou Buqi frowned slightly. "This won't work. Is it that simple? An account with a remote IP, just because the account and password are entered correctly, the system thinks it is the user who is logging in? This security system is too poor!"

Kurian said: "Indeed, we did a terrible job! In this regard, no one in the world does better than us!"

Zhou Buqi became happy and asked, "Ziweiyun is good?"

Kurian smiled and said, "Ziwei Cloud's security system is the strongest. Not to mention the poor Apple, even Microsoft Cloud and Google Cloud are far behind us."

Zhou Buqi said: "Ziweixing started out by relying on security products! Weidian Security Guard and Weidian Antivirus are both excellent products!"

"Uh..." Kurian actually looked down on these two free products. "If we only talk about security technology, Apple, Google, Microsoft, Amazon and so on are not bad at all. The reason why Ziwei Cloud has the best security protection is because we have a better security concept. Of course, this is not my credit, but Ziwei Cloud from Greater China led by Dr. Wang Jian. Americans don't know much about this, including me. Our minds are not open, or... we don't pay too much attention to it."

That's it!

Ziwei Cloud has such a powerful security system because of the contributions made by Ziwei Cloud in China.

This is indeed not a technical problem, but a problem of concept.

Just like this time Apple Photos was hacked.

No matter how poor the technical level of Apple Cloud is, it is not something that those low-level hackers can break into. The reason why they were able to get those nude photos of female stars is that these female stars are too naive and know nothing about network security. When setting passwords, they use the most common passwords.

That would be too simple.

There is no need to rely on any advanced technology to crack it.

Just try those commonly used passwords one by one.

But even so, the platform cannot be exempted from responsibility.

  A strange IP, strange device, strange mobile phone number, just enter the correct account and password, and then you can log in to the cloud album? This security level is too low! This is obviously a login method with security risks, how can it be allowed so easily?

Even if you log in, you will find that the "user" is downloading photos from the album in large quantities...

This counterintuitive operation is another challenge to product safety. Mature products will be forced to exit immediately.

The user is then asked to re-perform multi-factor authentication.

Today's cloud computing platforms are becoming more and more powerful, with technologies covering all aspects, and are fully capable of performing multiple verifications of user identities.

  How can a user's identity be confirmed with just an account and password?

If you log in with a common device and IP address, then you can just have the correct account and password. However, if something suspicious happens, you will need to do more verification, such as SMS verification code, email verification code, or even association verification with an old device.

This is not difficult to achieve technically.

The difficulty is what you have never imagined!

China has the largest number of computer engineers in the world, which means that China also has the largest number of hackers. With more hackers, there will be many different types of cyber attacks. This is actually an offensive and defensive battle, with both sides innovating and upgrading each other.

This has two advantages.

First, the technical strength of domestic hackers and red hackers is world-class. In IT technology, the technical level of domestic hackers, red hackers, and white hackers is far higher than the normal IT technical level in the international arena.

Second, the hacker level is high and the defense level is also high.

This means that domestic security products and cloud computing platforms have better defense capabilities. The main reason is that we have too much experience and have seen too many attacks of all kinds. The more we have experienced and dealt with, the more comprehensive our defense strategies will be.

Especially the password setting.

The products of major domestic manufacturers now have preset settings, and users are not allowed to set very simple universal passwords, which fundamentally cuts off this path.

Like this time when Apple’s cloud photo album was cracked by so-called “hackers”, it’s simply a joke.

Just enter the correct account number and password, and then log in successfully.

This situation is impossible on Ziwei Cloud, even on Alibaba Cloud, Penguin Cloud, Huawei Cloud, Baidu Cloud, Kingsoft Cloud, etc. However, Apple Cloud was so foolish that its defense was easily breached.

Kurian said: "As I said before, Apple Cloud is not a professional cloud computing platform, but just a subsidiary product that serves iPhone and iPad. The strategic level is not high enough and the importance is not high enough. This is a wake-up call for them. They will definitely strengthen the security management of Apple Cloud and improve their certification system. They may come to us to poach people again."

But this was not what Zhou Buqi was considering.

He was sitting on the edge of the bed, Zhao Limuge was helping him wash his hands and face, while Zhang Zetian was kneeling beside him, holding the phone to his ear.

"Can we assume that Apple has an unshirkable responsibility in this large-scale leak of nude photos?"

Zhou Buqi wants to do something against Apple.

Kurian said: "Of course, although the user's password setting is too simple, Apple, as the platform, should also have the responsibility to provide corresponding protection. Well... However, the current platform theory may not be supported by law."

Domestic platforms actually learned this from the United States.

It's almost the same.

For example, the most profitable promotion business on Google is law firm advertising, which can earn up to $50 or $60 per click. For truly well-known law firms, clients are endless and there is no need to advertise. Even if they do advertise, they are brand advertising, not conversion advertising.

Search ads have little brand value and are typical conversion ads. Those that run search ads are usually not-so-professional law firms, which actually have a strong deceptive nature.

As long as these law firms are approved by relevant US agencies, even if users are deceived by the law firms, it has nothing to do with the platform.

Apple Cloud is a platform.

Judging from the legal basis of past Internet platforms, privacy leaks have nothing to do with Apple Cloud.

Zhou Buqi snorted, "What era is this? The old rules are no longer applicable! The platform must take responsibility! As the leader of the global cloud computing industry, Ziwei Cloud has the responsibility to establish a new set of platform rules for the cloud computing platform. We cannot shirk our responsibilities! We must be responsible for our users wholeheartedly and actively deal with all platform losses of users!"

"Hmm?" Kurian understood what Boss Zhou meant. "Are you trying to become famous by stepping on apples?"

"Correct!"

"Isn't that necessary? Ziwei Cloud is already the best in the world, and Apple Cloud is not even in the same league. Even if it surpasses Apple Cloud and has a better reputation, it will actually be of limited use to Ziwei Cloud."

"This is an opportunity to establish industry rules." Zhou Buqi got up in the morning, sat on the edge of the bed with his bare butt, and decided on such a big plan. "Don't forget, behind Estar's cloud photo album is Ziwei Cloud. Behind Samsung's cloud photo album is Ziwei Cloud as well!"

(End of this chapter)

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like