Interstellar: Start as a cleaner.

Chapter 1285 Creating a Hacker Persona

Chapter 1285 Creating a Hacker Persona

Of course, you must register with your real name to take on this kind of task.

This is what a white hat hacker is all about, and Yang Bo quickly registered a white hat hacker account!

Because Yang Bo intended to use these events to make his identity more famous and his influence greater!
In the league, although celebrities appear to be subject to many restrictions, they actually enjoy a great deal of privilege.

A simple example: when ordinary people and celebrities encounter the same things, the difference in the compensation they receive for emotional distress can be enormous!

As for the exorbitant compensations some ordinary people received in the history of the league.

One aspect is mass incidents!
In other words, the more victims there are, the higher the total compensation will be.

Another reason is that lawyers earn more!

Generally, lawsuits involving such exorbitant compensation amounts tend to take a long time.

Moreover, this is usually a risk contract signed with a lawyer.

In other words, you can only receive the basic compensation stipulated in the contract you signed.

Because the compensation amount is less than that, the lawyer will not charge a penny.

If the amount exceeds your expectations, then the rest is the lawyer's profit!
This is a risky contract!

Therefore, even with many exorbitant compensation claims, ordinary people don't actually receive much more than that!
On the contrary, lawyers often don't even charge fees when representing celebrities, because these celebrities crave attention.

White hat hackers typically perform penetration testing.

Another task is to test software vulnerabilities for companies.

Both penetration testing and vulnerability testing offer different bounties based on the severity of the vulnerabilities discovered by white-hat hackers.

Of course, this is also related to the size of the software.

Yang Bo has no intention of taking advantage of those private companies.

Because some private companies simply can't afford to play this game!
Moreover, once vulnerabilities are discovered in the software of private companies, it can easily cause stock price fluctuations or even public distrust!

This would result in huge losses for these private enterprises. If the losses exceed their psychological threshold, these individuals might take some extreme actions!

Because every private company has competitors.

Yang Bo couldn't guarantee that after he discovered and reported the software vulnerabilities of these private companies to them, the people inside those companies wouldn't leak them.

Because nobody knows which side the person in charge of these people in this company belongs to; they could be from a rival company.

Of course, Yang Bo wouldn't challenge the most difficult security system right away!

The alliance has many departments, and Yang Bo directly chose the official website of the Ministry of Finance.

Then I started to wander around.

The official website of the Union Treasury is also very complex, with many departments and each department having a subsystem!

Yang Bo wandered around for a while.

Of course, in the world of virtual projection, Yang Bo felt as if he had actually come to the Ministry of Finance!

After taking a stroll around, Yang Bo quickly discovered some problems.

These are just some minor issues, including a small vulnerability in the budget department's software.

This small vulnerability doesn't have a significant impact on overall security, but it can have a considerable impact on subsystems.

Yang Bo took advantage of this small vulnerability and, using his white-hat hacker identity, sent an email directly to the Ministry of Finance!
The Ministry of Finance's system is also an intelligent system!

Some people ask, can't intelligent systems discover their own vulnerabilities?
All systems have vulnerabilities, including intelligent systems themselves.

Before vulnerabilities are discovered, intelligent systems cannot detect their own vulnerabilities!

If intelligent systems can autonomously find their own vulnerabilities and then continuously optimize them!

Therefore, this intelligent system is a scalable intelligent system.

Research on scalable intelligent systems is prohibited in all three countries!

Because there have been some major issues with training intelligent systems in the past!
The training of intelligent systems is determined by the training data.

In the early days, some people used this to create intelligent systems for committing crimes.

The criminal intelligence system does not recognize his actions as criminal!

Because this intelligent system doesn't know that he's committing a crime.

Because the data he received for training was criminal data!
Moreover, robots with growth intelligence systems, what if they developed human personalities?

So if one day he gets tired of his job or has a conflict with his employer, will he take revenge on his employer?

Because there have been instances where robots with advanced intelligent systems refused to provide service!

The system manager of the Union's finance department received a notification from the intelligent system!
System optimization and updates both require secondary confirmation from personnel.

We cannot allow intelligent systems to optimize and update themselves.

The person in charge first reviewed the vulnerability and then verified it!

Then it was decided to fix the vulnerability!

Yang Bo also sent over a solution to fix the vulnerability.

It was only then that the person in charge discovered Yang Bo's white-hat hacker identity.

This surprised the person in charge, because Yang Bo was on the league's list of young richest people!

Moreover, Yang Bo has become very famous recently!

I never imagined that such a famous person would also have such high hacking skills!
The person in charge sent Yang Bo an email, first thanking him for discovering the vulnerability, and then stating that Yang Bo would be given a bonus according to relevant regulations.

Yang Bo quickly replied to the email, saying that he had also discovered some minor vulnerabilities and would send over the solutions for fixing them as soon as possible.

The person in charge was a little shocked!

The Union Treasury is unlikely to be short of money, so while its system may not be perfect, it is unlikely to have that many loopholes.

The person in charge could only thank Yang Bo in the reply email.

The person in charge then reported the matter to the alliance's security department!

Because security departments absolutely need to have knowledge of hacker techniques like Yang Bo's!

Just one day later, the head of the Ministry of Finance received an email from Yang Bo!

Then they discovered more than a dozen vulnerabilities, distributed across various subsystems. To the person in charge's relief, none of them were security vulnerabilities!
If an intelligent system has security vulnerabilities, then the entire intelligent system is in great danger.

The alliance's security department took notice of this matter, but Yang Bo is a white-hat hacker, so he will not be summoned for questioning or anything like that!

However, the alliance's security department still invited Yang Bo to join the department's peripheral organization.

This peripheral organization is actually an official white-hat hacker organization.

However, Yang Bo rejected him!

Joining this peripheral organization offers numerous missions with high pay and various benefits, but you must obey the Alliance's security department.

Yang Bo certainly didn't want to take orders from others!

Yang Bo wants to be a free and independent white-hat hacker.

Yang Bo certainly won't discover any major flaws at the beginning; he needs to make people realize that he is constantly growing.

Over the next two weeks, Yang Bo circulated among the alliance's tax, finance, health, and education departments, submitting a series of minor reports on loopholes!

Yang Bo is not yet in a position to frequent websites of the Department of Defense, the Department of Homeland Security, the National Intelligence Agency, etc.

As for Yang Bo's company, it's acting as if nothing's wrong.

Liu Jingxiang and Zhou Kexin are currently receiving salaries for nothing and doing absolutely nothing!

In the past two weeks, although Yang Bo was building his hacker identity in March Star, he didn't neglect his other identities at all!
Including characters in the game!
Yang Bo arrived aboard Lee John's warship!
This time, Yang Bo brought out three Class C warships.

The reason I didn't bring a Class B battleship is because Class B battleships are too conspicuous!
The main systems of the other three warships that Yang Bo seized have been updated!
Forty percent of the subsystems have not yet been updated.

Because the subsystem has more hardware!

There are also so many drones, drone armor and the like, that require robots to constantly update their hardware!
The software will update automatically after the hardware update is complete.

However, Yang Bo was not in a hurry, because there was plenty of time, and the three warships were now heading towards the rendezvous point.

It will take the two B-class warships of the alliance about a year and a half to reach their designated target locations.

That main warship will probably take about two years to build.

This is because after leaving the star system with space jumps, these three warships need to travel through ordinary routes to the nearest space jump points!
That's how long it takes.

It can be said that the development of human society to this point is entirely due to the existence of spatial jump points!

Yang Bo's target this time is the pirate fleet.

The Seventh Pirate Crew, one of the four pirate crews that cooperated with John Lee, formed a temporary team with two other pirate crews from the Pirate Alliance to rob a transport caravan in the Central Region.

The Seventh Pirate Crew did not reveal their full strength to their companions.

The Seventh Pirate Crew continued to feign weakness, deploying only one D-class and three E-class ships.

The other two pirate groups have two C-class warships, four D-class warships, and eight E-class warships!
Moreover, the intelligence obtained by the three pirate crews this time was provided by the Pirate Alliance!

This is the inherent weakness of pirate groups. Although the pirate alliance has caused heavy losses to the pirate groups in several instances, these pirate groups have no choice but to leave the pirate alliance!

Because these pirate groups lacked the capacity to maintain a robust intelligence system, they were unable to obtain relevant information.

As it turned out, the pirate alliance's intelligence was quite accurate.

Three pirate groups successfully robbed the Federal Central Corporation, a small transport fleet!
This small transport team is transporting some strategic materials from the Empire!
The fleet of Madhya Pradesh is now too afraid to be deployed.

Because of the huge losses last time, the other main fleets are now also afraid of those pirate groups hiding in the shadows.

Although the main fleet of Madhya Pradesh now turns on its active radar every time it goes on a mission.

However, they will still be attacked by pirate groups!
Because in the complex starry sky, radar can sometimes be interfered with by certain strong batteries or strong energy sources.

For example, some extremely strong solar winds or energy rays.

Moreover, sometimes several rays of sunlight converge in a certain area!

On the seventh day, the pirate gang, along with two other pirates, not only robbed the entire transport team but also captured several hundred people.

Most of these hundreds of people are crew members from the transport team and the mech pilots providing escort!
This made the three pirate crews very happy, because a pirate crew still needs someone at its core!

The Seventh Pirate Crew is currently short of manpower because they have acquired a number of warships after cooperating with John Lee!
After the three pirate crews succeeded, they split up!

The pirate crew on the seventh day didn't want the goods; they wanted the people instead!
After the Seventh Pirate Crew separated from the other two pirate crews, they quickly left!

Because John Lee and his warships were lying in ambush where the other two pirate groups had left!
This is also a common tactic used by pirate crews: agree on a meeting point when they set out together!
After the matter was accomplished, they immediately parted ways to avoid being caught by the armies of the three countries.

Running them separately is safer!
To put it simply, if they run separately, then if someone is tracking them, they will most likely only chase one of them!
The other two pirate crews are called the Black Rose Pirate Crew and the Bald Head Pirate Crew!
These two pirate crews are considered to be among the more powerful large pirate crews in the pirate alliance!
The two pirate crews each have at least two Class C warships.

This time, the first captains of the two pirate crews led their men to rob them.

The looted goods were mainly used for the manufacture of drones, mechs, and weapons!
These are strategic military weapon components!

These people are also supplies that the pirates desperately need!
Because these supplies can be converted into military products.

"warn!"

"Warning!" These two pirate groups had only recently separated from the Chuqi Pirate Group.

Because the two pirate crews parted ways while sailing in silence.

The warships of both pirate groups were hit simultaneously, emitting a piercing warning sound!
The first vice-captains on the two C-class warships of the two pirate crews were somewhat bewildered!
Does this mean we encountered high-energy cosmic rays?
However, a voice soon came through the public channel:
“I am John Lee, the Governor General of the Union State of Calaya.”

"You have ten minutes to leave my Class C warship."

The first vice-captains of the two pirate crews were completely dumbfounded when they heard this voice on the public communication channel.

What is John Lee doing here?

Why the hell is this guy here?
At that time, the Pirate Alliance found John Lee quite troublesome!
Because the pirate crew and the pirate alliance had targeted Lee John several times, they had suffered heavy losses.

The two first deputy regimental commanders quickly contacted the regimental commander.

The two captains quickly contacted the pirate alliance.

The pirate alliance was also somewhat confused. Wasn't John Lee in Calaya?
You should know that the Pirate Alliance is now on high alert towards Lee John!
They kept a close watch on the Karaya fleet at all times.

The pirate alliance quickly had their intelligence agents in Karaya confirm John Lee's location!
Unfortunately, although John Lee had a large fleet in Kalaya, very few people actually had contact with him!
Therefore, it is very difficult for these people to accurately determine John Lee's location!
Meanwhile, the first captains of the two pirate crews at the scene watched as their other warships were destroyed!

How frustrated you must feel.

Because there's a saying circulating within the pirate alliance: "That damned John Lee is more like a pirate than any pirate!"
The two men also knew that the reason Lee John had not stopped and continued to attack the warships of the two fleets was to put pressure on them!

"Three Class C warships!" At this moment, the first vice-captains of the two pirate groups finally determined Lee John's true strength through active radar!

After Yang Bo shouted, he wasn't sure if the other side would do as he wanted, so he started to eliminate the warships he didn't want to put pressure on them!
(End of this chapter)

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like