Alien Paradise.

Chapter 126 Aftermath

Chapter 126 Aftermath
Two days after the twin-tower bridge crash, the broadcast volume of relevant news reached an unprecedented new peak.

Especially when the bridge deck is slowly rising, the video of a small car rushing to the top of the slope has become a hot search in various countries.Netizens have various discussions about it. Some think that the twin-tower bridge is flashy and more of a landscape than a practical one;In addition, the deceased was a rich man, which greatly increased the heat of the incident.

The official caliber of Britain is very clear.

The police declared that this was a premeditated vicious incident. After preliminary investigation, they have ruled out the possibility of lifting operator error and equipment failure.The gang who carried out the case not only remotely controlled the lifting system of the bridge, but also tampered with the driver's vehicle.They are already working to salvage the car and say they will never let the assailant go.

Who murdered the outstanding entrepreneur Jason Taylor has also become a topic that the media is most willing to guide.

However, another incident broke out at the same time, but its influence was far less than that of the Shuangta Bridge crash.

That's when all the documents for Project Sunflower were dumped online.

Since the Prism Gate, leaks caused by personal factors have emerged in an endless stream. Among them, there are real confidential information and false information forged to confuse the view. Everyone is familiar with it.

Therefore, only in some niche forums do people pay attention to this matter.

Alex is one of them.

As a hacker, his focus is not on the leaked document itself, but on the way the document was leaked.Whenever there is a new discovery, he will express his views in the "Wall of Silence", a hacker club used for private communication among small circles.

This time Alex directly used "shocking" as a topic label.

According to the creator of the Sunflower Project and the classification level, it should belong to the top secret of MI6.Everyone in the circle knows that MI6 has a completely isolated computer room to store these secret materials. In theory, it is impossible to be stolen by network intrusion. Therefore, the source of this batch of data most likely comes from an internal organization with a sense of justice. The employees stole the planning documents directly from the computer room.

Alex, however, offered a very different view.

He believes that if you want to steal the top secret of MI6 in reality, you must use a special reading device to connect to it, instead of simply inserting a USB flash drive or data cable to copy it away-this is also the reason why many MI[-]s have physical isolation. The method used by enterprises in the computer room, not to mention the intelligence agencies that live on secrets.

This kind of reading device can only read specific data, and after translation, it can be converted into graphics and texts that people can understand. It has no output port for civilian use, and it has to be copied manually if it wants to steal it, such as taking pictures, or Recorded by hand.

That's why the vast majority of leaks are in the form of photos.

However, the Sunflower Project that was posted on the Internet is different. It is more like packaging the source files. Alex can even read the original information such as the creation and modification dates from the file data during analysis.This is impossible in any case by normal stealing methods.

Therefore, he boldly speculated that someone had invaded the isolated computer room of MI6 through the network, and stole the information in a way that almost searched the hard disk.

Not long after the topic was posted, colleagues clicked in one after another.

"Bell": If I say that solar energy can be used without the sun, do you think I'm an idiot?So the question is, how do you hack into a device that is not connected to the Internet?
Cobra: Dude, consider microwave programming, which can remotely change the way a program works.

"Bell": Has anyone ever succeeded in reality?If the target device can convert specific microwaves into electrical signals, we call it a mobile phone. It's 2023, no one still doesn't have a mobile phone, right?

"Blackwater Emperor": In fact, there is another way to achieve the same effect, that is to physically enter the isolated computer room of MI6 and move the entire host out.I think this is much more feasible than Alex Ti's method.

"Fleur": Don't tell me, I just saw someone chatting. Two days ago, he saw an ambulance and a fire engine parked in front of the Waxel Cross building, and there was still black smoke coming out of the house.

Seeing that everyone is getting more and more off topic, Alex added dissatisfiedly: I hope everyone will talk about this topic from a technical point of view. Since you are a hacker, you should be curious about unknown things instead of stubbornly denying it.

"Fleur": When you say this, I really feel the same... Just a month ago, our leader actually said that he is... Hey, if you don't see it with your own eyes, some things beyond imagination are really hard to accept.

"Bell": Is it a rainbow?
Alex quickly typed on the keyboard: Please go to another topic room for private chat, thank you.

"Avalon": But have you noticed that the crash of the twin-tower bridge and the leak of this document seem to be on the same day.I happened to be near the bridge that night, and when I saw an accident on the bridge, I immediately dived into the camera system and found something interesting.Of course... I made the intrusion through the on-site connection port line, which has no technical content, and can't be compared with the genius who invaded MI6.

"Black Water Emperor": Wait, do you agree with Alex?Has anyone successfully harnessed solar power in a sunless world?

Seeing someone supporting him, Alex suddenly became interested: leave him alone.what did you findShare it with everyone.

Soon, a video was posted.

Alex turned on the video and immediately realized that it was a surveillance video on the Twin Towers Bridge.However, unlike the usual still shots, this time the footage was almost completely locked on the out-of-control car. From the appearance of the vehicle to its disappearance, the surveillance camera rotated almost 150 degrees.

Someone is manipulating the camera?

The video was only eight seconds long. Alex opened his own video analysis software, played back the video again, and enlarged the size to the maximum.

This time he saw clearly.

The person in the car seemed to be wrestling with the car... In just eight seconds, the person tried to cut the seat belt, retrieve objects from the glove box, and smash the window.At the last second, he seemed to have made a fatal mistake and let the screwdriver fly out of the window, but in the frame-by-frame playback, Alex was surprised to see that the window was one step faster than his movement, and the screwdriver fell out before the screwdriver hit it. The sudden drop, and then the rapid closure, completely killed the person by surprise!
"Blackwater Emperor": Good guy, the AI ​​has killed people!The question is... is there any connection between these two things?Also, do you sell this video?The price is easy to say.

"Bell": Don't be kidding, how can the car chip support a strong AI!Is this someone remotely controlling the car?
Alex continued excitedly: "Look, aren't the two things exactly the same in essence!The logic center of the car is all inside the car. It will receive radar information and road navigation, but the analysis and judgment are all done in the car. In a sense, it is also a physically isolated host device.

"Bell": It is not strict, because the outside world can send wrong navigation information to make the car make a misjudgment, and can also forge radar signals.

"Cobra": Can the outside world also remotely control the windows to rise and fall at high speed?That was obviously not the speed that the windows would have been closed normally.The program of the motor has been rewritten.

"Avalon": Right, so I don't understand, if someone is running this, how did he hack into the car and take control?There is no relevant network port on the car and machine, so it cannot be realized on a theoretical level.That's why I saw the topic brought up by Alex, and I didn't think it was impossible.

(End of this chapter)

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like