I Have 48 Hours a Day

Chapter 392 CTOS

Many people equate geeks with hackers, but there is a difference between the two.

The word geek comes from the American slang term geek, which originally means a person who has a fanatical interest in one or several specific fields and devotes a lot of time to research. It is mostly used in the computer field, and it has a certain derogatory color at the beginning. In the PC revolution In the early days, it was also extended as a derogatory term for hackers.

But now, especially after the rise of a group of Silicon Valley leaders such as Jobs and Gates, the word geek has also been given a new meaning, and it has begun to be labeled as free, creative and unconventional.

Yes, geeks are such a group of people. They are adventurers on the Internet, hardware enthusiasts, hackers, communication enthusiasts, technology nerds, programmers, engineers...

"To put it simply, you can be anyone, as long as you are in line with our spirit, you can join the 01 Guerrillas," Philip said, "Of course, most of the people who join are related to computers, although we always hope that there will be Girls who are on the cheerleading squad or dancers join us."

"..."

"We have our own secret forum with self-made instant messaging software. We usually discuss some technical issues on it. You can also post your problems on it and wait for someone to answer them, or simply show off your skills. The above Everyone is nice."

"Is Edward one of you too?" Zhang Heng asked.

"No, Edward...he's not one of us." The man with the ponytail said.

Zhang Heng raised his eyebrows.

"About a year ago, Edward hacked into our forum, the website we built together." Waldo still looked surprised when he mentioned this matter.

"Is it difficult?"

"Well, it's not too difficult, it's still a little easier than hacking into the national defense system." Philip said, "The most important thing is that he did it quietly, if he didn't leave a note afterwards Give us the information, we had no idea he was there."

"what's the message?"

"In the beginning it was just a greeting, you know, the hackers are low-key, but in fact many of them are a group of guys who are eager for attention, especially the more difficult to achieve and bad Wherever you go in, you can’t help but keep something after you go in. For example, I know a guy who sneaked into the human resources system of the telecommunications giant SFR and sent a flower to every employee of SFR who was still working overtime that night. Little Red Flower."

"ha."

"That guy is the same, he left a pixel map of Pac-Man, but it is very small, in the lower right corner of the home page, if you don't look carefully, you can't see it. Anyway, that is the first time we met Edward , and then we redid the firewall and the encryption system, but the guy finally managed to get in."

"Are you angry?"

The ponytail man pushed his glasses, "Angry? No no no, this is like a fun game for us, we enjoy playing against that guy, so we redid the forum again, but you can probably guess So, he beat us again...but we all had a good time during the process, and from then on, we started to have further communication.

"We always thought that the other side was a group like us, but the fact surprised us. The guy said his name was Edward, and there was only one person. He said that he was hired by a very powerful organization and was doing a very cool project that could change the world. Once the project is successful, it will change everyone's way of life and travel, but the content and address must be kept secret.

"We actually didn't take this matter too seriously at the beginning, because you know, hackers, no one doesn't like to brag, they will always brag to you about how good they were in the past, but in fact most people don't even Not half of what they brag about, Edward is very powerful, I admit this, no, it is not an exaggeration to say that he is the most powerful guy I have ever seen, but it is a bit too exaggerated to subvert the world, but anyway we It’s like meeting a new friend.”

"In the following time, Edward would come to our forum from time to time, brag and fart with us, and occasionally reveal some recent things, but basically it was just what short skirt the executive wore today, how about lunch, he is a Very contractual guy who never discussed specific jobs until a month ago when we suddenly got a group message from him saying he didn’t know if he was doing the right thing.”

Philip said, "I asked him what happened, whether he was under a lot of work pressure recently, but he didn't reply. About another week later, he contacted me suddenly, saying that he had escaped and had important things in his hands. I asked him what it was, and he sent me a document, and from that document, I could see that something might really be wrong."

"What's wrong?"

Philip looked around and said in a low voice, "This is a project called CTOS. They plan to build a powerful central control system to connect all public facilities in the city to the network. It's like installing a brain for the city. Similarly, the hidden laws that cannot be discovered by the naked eye can be learned from massive data, so that it can overcome the problem that decision makers in the past can only do local optimal strategies because of limited information and cannot really find the global optimal solution. Through calculation, redistribute the common resources and avoid wastage.

"Let me make an analogy, if you connect the signal lights at all intersections to the network, you can re-plan and calculate the optimal time allocation for each signal light to save travel time. At the same time, if there is an accident on the road, the city brain will also send the alarm directly to the hospital. , let the ambulance arrive in the shortest possible time."

"Sounds good."

"Yes, Edward thought so at first, but later he discovered that there are other purposes hidden behind CTOS. Once this system is established, it will not only collect public facilities, but also actively collect data and information from all citizens, including your phone calls, text messages, Medical records, medical insurance numbers, criminal records, favorite websites, chat partners, browsing records, chat content, and every credit card consumption will be mastered by it.”

"This is a disaster." The ponytail man said.

"Yes, this means that from now on, our every move will be under the surveillance of others, and we will no longer have any privacy, even the room is full of cameras." Waldo also became serious rarely, "You don't know when they're going to deploy your pc or your phone or even your drone."

"And if things go on like this, things may get worse. This is only the first stage. In the second stage, CTOS will automatically analyze and mark everyone's dangerous tendencies. Of course, it is of course one thing to prevent crimes in advance." Good thing, but we don't know the way and algorithm it uses to calculate everyone's dangerous tendencies, without restrictions, each of us may be labeled as a dangerous element."

Chapter 399/1468
27.18%
I Have 48 Hours a DayCh.399/1468 [27.18%]