Font
Large
Medium
Small
Night
PrevPage Index    Favorite Next

Chapter 583 Bounty on the Internet(2/2)

Speaking of which, I was planning to take a good rest, but why did I feel like a lot of things suddenly happened...

Domoto Mumu's motive for committing the crime is still unclear, and the Akutsu Saburo incident has not yet been resolved.

In addition, Masami Hirota had previously reported that the floppy disk containing drug information was later suspected to have been tampered with by someone from the organization.

Why do I feel like so much has happened these days?

And next, there is the "Sherlock Holmes Fan Tour"...

There seems to be a steady stream of cases, but most of them are investigations with no income, and finally a patent is sold. I thought that if Dr. Ari was fully responsible for the operation, I would have less to worry about, but it turned out that because of the code encryption issue

Make it difficult for yourself—

After all, I also have quite a few difficulties.

If the encryption of this code is made public and carefully studied, some of the algorithmic logic will be found to be similar to the methods used in the three orders I received on the dark web...

You can hide your traces on the dark web, but if someone tracks you down with a patent, it will be in trouble...

Therefore, although the other party quoted a price of 10 million, I could not do something that might expose my traces just because of this small amount of money.

With this thought in mind, after Gao Yuan returned home, out of some consideration, he went to the basement alone, and using the main computer in the basement, he began to proactively post a message in some technical forums——

In fact, for Gao Yuan himself, the encrypted code itself that the company that purchased the patent for smart nursing beds wanted was actually the research result of a key laboratory on campus before he traveled through time, which itself was based on artificial intelligence.

The extremely simplified version of the algorithm logic can run independently on a microcomputer and can basically realize the function of machine autonomous learning without relying on a large amount of computing power.

As a member of the main network security laboratory in the school, Gao Yuan was involved in the encryption of the source code at that time, so Gao Yuan had completely read the source code, but because he had signed a confidentiality agreement, he could not in principle

Disclose or use relevant code externally.

However, the world I am in now is not the original one!

Therefore, this code was written by Gao Yuan in this world without any scruples, and used for his own use. At the same time, as he trained and learned, this code also made a great contribution to hiding his traces on the Internet.

contribute.

Because of this, Gao Yuan actually has a rough estimate of the value of this code.

Now, based on the facts mentioned by Dr. Ali, the price that the company is willing to pay for that piece of code is higher than the buyout fee for the smart nursing bed patent itself. It can be seen that the other party probably relies on this encrypted

I realized the value of the functions displayed by the code, so I wanted to get the source code.

In this case, it is estimated that the other party may not give up because of his rejection, so he may simply play bigger!

Therefore, Gao Yuan chose to publish the same post on some of the world's major technology forums——

"Reward! Request the encryption method to decipher this code!"

After writing the title in this way, Gao Yuan posted the encrypted code itself that was wanted by the company that purchased the smart nursing bed to the forum, and used technical means to forcibly modify the posting time of the post.

, making it look like a bounty post posted on the forum as early as a year ago, and making it look like it has only recently been noticed, so that it reaches the front page of the forum——

That's right, at the moment, Gao Yuan plans to take the initiative to spread this code.

Such a method will make people think that this code was posted on the Internet a year ago, and that the code will be used in my patent for the smart nursing bed, but in fact it was just misappropriated from the forum.

.

In this way, even if someone later finds Dr. Ali based on the patent, and then indirectly finds him, he will have a reason to evade——

Anyway, I have carefully studied the computer technology in this world. Although I have unexpected virtual reality technology, in terms of network security...

Even the security protection of "NAZU" is not insurmountable in front of me...

My own network security technology theory is roughly ten years ahead of the world.

Therefore, as long as you act carefully and do not expose too many new technical methods on the Internet, no one should be able to trace you from forum posts in recent years.

In this way, I can always shirk the source of this code to the non-existent poster on the Internet!

Secondly, Gao Yuan’s purpose for doing this is another plan——

This code is essentially artificial intelligence that can learn independently. As long as there is enough computing power and data, in theory it should be able to grow slowly...

Although I don’t know if it can grow to be like the original “Noah’s Ark”, but as long as it can grow further, it will be more convenient for my future actions on the Internet——

And I took the initiative to spread the encrypted code because I wanted to use the computer computing power of those who downloaded this code to help the further growth of this program!
Chapter completed!
PrevPage Index    Favorite Next