Font
Large
Medium
Small
Night
Prev Index    Favorite Next

307 Be smart, think far and near, you have to make a choice (4/5)

Mayberry didn't need to answer this question.

After all, it has nothing to do with him how to explain to the board of directors.

"Also, Mr. Mayberry, the Pentagon called me today and asked about our situation. How do you think I should answer? Why don't I just give you what you just said intact? What do you think?"

This question made it impossible for Mayberry to remain silent. After all, the other party was a major customer.

Mayberry replied cautiously: "No, actually I think the problem may not be that serious. Judging from the data analysis we have obtained so far, in departments where protection measures are in place, vulnerabilities are unlikely to be exploited wantonly."

Stephen nodded, and then continued: "Now I can tell you the third news I received today, Mr. Mayberry, Mr. Cook from Apple just told me that someone has mastered a method that can cause

A serious CPU vulnerability, which can even bypass our kernel security management mechanism and allow ordinary users to rewrite the CPU microcode at will, have you ever thought about how to deal with it?"

"Rewrite the microcode?" Mayberry was stunned.

Stephen nodded and said: "Yes! I then think about what will happen if the other party really launches a software that allows ordinary users to modify our microcode. Maybe consumers who make claims can line up from Intel's gate to my office.

Come on, what do you think? Mr. Mayberry."

The CEO was really angry.

Since when did Intel's CPUs become a shabby house with air leakage from all sides?

Shouldn’t it be the problem of Microsoft and Apple’s friends who are troubled by vulnerabilities?

Now Intel is actually troubled by hardware vulnerabilities every few days. Can this day last?

Mayberry did not care about the sarcasm in Stephen's tone, but followed his heart and asked seriously: "Which security company is the other party? If what they said is true, or we can indeed spend money to buy this vulnerability

.”

"Buy it? Okay, I decided to call him now, or you can convince the other party to buy the vulnerability. By the way, I forgot to introduce the other party to you. It is said that he was responsible for the development of the brain-computer chip. And his age

It is said that he is not much older than your son. Can you feel ashamed now, Mr. Mayberry?"



Under the cover of night, Wang Yufei is still burning the midnight oil in front of the computer - perfecting the program.

It was only two o'clock in the night, and he still had one hour to work, which was not much, but the efficiency was amazing.

For example, Wang Yufei's hands were dancing rapidly on the keyboard, and then lines of code were typed out.

If a serious programmer sees Wang Yufei's working status at this time, he will definitely think that if Wang Yufei is not in the water forum at this time, then there is a high probability that he is arguing with the product manager.

Who is serious about writing programs without thinking at all, as if writing an article?

You must know that no matter what kind of programming language, the meaning is much richer than natural language. When typing the code, you must think carefully before typing the code. When they can quickly type the code, they often use the shortcut keys of copy and paste.

After all, some people’s mother tongue is Chinese, some people’s mother tongue is English, and some people’s mother tongue is other messy languages, but no one’s mother tongue is programming language.

Not to mention that serious programmers still curse all kinds of things in their minds when typing code.

Stupid customers, do they understand the needs?

Stupid project manager, what kind of rubbish plan is this!

You idiot product manager, aren’t you tired of asking for rubbish?

Idiot test, if you don’t understand the serious test, you will be the first to cause trouble if nothing happens!

Stupid colleague, what kind of rubbish code did you write!

Stupid architecture, what kind of rubbish architecture is this?



But Wang Yufei doesn’t need to curse anymore.

After all, he basically covers everything from customers to project managers to product managers, architecture, and testing.

Occasionally, Lu Yuxin would help him with some things, but of course Wang Yufei would not complain about his own woman in his heart.

As for the thought process…

Although programming languages ​​are not his mother tongue, these programming languages ​​are even more familiar to Wang Yufei than his mother tongue.

Especially after immersing yourself in a state of focused work.

The code rushed out of his mind, and it felt like his hand speed couldn't even keep up with his brain speed, making him unable to stop at all.

However, at this time, the phone vibrated, which also woke Wang Yufei out of that mysterious and mysterious state.

But it doesn't matter, anyway, for Wang Yufei, it is very easy to enter this state.

I looked at the caller ID and saw it was an overseas number.

This is enough to show that the other party is impatient.

Otherwise, he should receive this call tomorrow to be considered normal.

I just don't know which one it is.

"Hello."

"Hello!"

Or because they are too unfamiliar, the other party did not speak directly after greeting them politely.

"I'm sorry, this time should be late at night in China?"

"Yes, but I haven't slept yet."

"Oh, excuse me, I'm Mike Mayberry, Intel's chief technology officer. Are you the king?"

"Yes, Mr. Mayberry."

"So I heard you have a fatal vulnerability targeting Intel CPUs?"

"Yes, I also designed a software based on this vulnerability. As I introduced to Mr. Cook, you can use this software to modify the microinstructions of the CPU. How can I put it, this is a very interesting vulnerability.

I have had a long discussion with my collaborators as to whether this vulnerability was intentionally left by your company."

Wang Yufei told the truth.

He actually discussed this issue with Lu Yuxin at that time.

But this truth once made Mayberry very embarrassed.

Regardless of whether this is a backdoor specially left by oneself, it is very embarrassing.

"Okay, is the purpose of you asking Mr. Cook to contact us to make a transaction with us?"

"Yes, I can provide this vulnerability to your company free of charge. In turn, I hope your company can reach a settlement memorandum with Huawei and agree and support the application of brain-computer chips on the PC side."

Mayberry and Stephen looked at each other.

After pondering for a moment, Mayberry said: "Based on this loophole, do you think we will agree to this request?"

"I think so, because if I release this software and give detailed software descriptions and operation guides, it will bring a lot of trouble to your company. And as far as I know, your company is facing a problem regarding CPU vulnerabilities.

Big trouble.”

"Frequent vulnerabilities, even at the level directly exposed to consumers, will have a huge impact on your company's goodwill. If the CPU vulnerability exposed last year was epic, then the one exposed this time

The vulnerability will be nuclear bomb-level! After all, the vulnerability exposed last year has been solved at the level of major Internet companies, and this time it will be exposed to hundreds of millions of customers!"
Chapter completed!
Prev Index    Favorite Next