The Black Hat Conference has always been recognized as the top event in the field of information security. Its authority is unique in its ability to predict and describe the future information security situation. In order to ensure that the conference can focus on reality and be able to propose the fastest and best
plans, problem solving methods and operational skills, and the meeting environment remains neutral and objective.
The Chinese delegation that Yao Xiaojing belongs to is the team with the smallest number of participating countries, but one of the only five speaking opportunities at the conference was obtained by Yao Xiaojing. This is a very high honor, which is limited to making great contributions in the field of information security.
A senior expert. Yao Xiaojing also received a special invitation from the organizing committee the day after arriving in New York to participate in the hacker conference that was held immediately.
The two major hacker events "Black Hat" conference and "Hacker Conference", the former is called Black Hat and the latter is called Defcon, were founded by veteran hacker Jeff Moss in 1992 and 1997 respectively. Development of Black Hat Conference
It has become a platform for professionals to exchange research results related to hacker attacks, while the hacker conference is more like a competition event where hackers from all walks of life show off their "stunt skills". The two conferences stand at opposite ends, more like what the Chinese people call official
Jiahe Wulin. In the chaotic and complicated arena of the world's hacker world, there are all kinds of characters who have performed all kinds of staggering myths and miracles.
Yao Xiaojing was invited to be a judge for the Hacker Conference competition. Her qualification caused dissatisfaction from the participating countries. They felt that the organizing committee was too rash and should not have handed over such an important task to an unknown Chinese woman.
In the hands of representatives. Regarding this, the chairman of the organizing committee stood up at the right time. He used the scientific research achievements that Yao Xiaojing proposed during his studies at MIT to attack laptops and smartphones with a computer cable.
came from the mouths of a group of exclusive hacker experts, because none of them have reached that level until now.
All of this happened without Yao Xiaojing's knowledge. Later, Yao Xiaojing's appointment as a judge for the hacker conference competition was published in the newspaper by a New York Times reporter who was authorized to interview, which immediately caused an uproar. Therefore, she will be
The speech in the conference hall on the last day of the Black Hat Conference has also become the focus of media and hacker circles.
Before her, no Asian had successfully stood on the podium at the Black Hat Conference.
On the eve of preparing to play, Qin Zhelang blessed Yao Xiaojing with a smile and pride: "Come on, Xiaojing!"
The beautiful Chinese girl in a navy blue suit with her hair tied up showed him the most beautiful smile.
"Bring glory to the country! It is our duty to do so!" she promised.
When the host led her to the serious and formal podium under the spotlight, the audience did not give her the same warm applause as the previous speakers. Many people looked at it with surprise, questions, and even mocking eyes.
The beautiful oriental girl on the stage. Many people are wondering why she stands on the highest podium that represents the honor of the hacker community.
"Bah... bang bang..." A few sparse applause came mostly from the host's microphone.
The atmosphere became tense and tense for a while.
Yao Xiaojing stood tall on the stage, looking around at the experts of all races and nationalities in the audience. Faced with their unfriendliness, she always maintained a faint smile.
She opened in pure English: "Dear guests, teachers and seniors, hello everyone, I am Yao Xiaojing, the Chinese representative attending this conference." She raised her arm, pointed to the door next to the conference hall, and asked the experts present: "I
I would like to ask everyone to answer a question first, what is behind that gate?"
The people in the audience were stunned, and someone answered loudly: "It's a branch venue of our conference. You don't even know this, right?" Many people showed disdain on their faces.
A senior expert who is not even known in the branch meeting, her level may be just like her appearance, which is all showy.
Yao Xiaojing smiled lightly and thanked the person who just answered the question.
"Yes, this is a branch venue for this conference. But it is a branch venue specially set up by the organizing committee to showcase solutions to hacker attacks. If the previous black hat conferences and hacker conferences were mainly about showing off technology
, then this year you have seen that all governments, organizations, and enterprises, including the event founded by Jeff Moss, have also begun to pay attention to solutions to hacker technology. What does this mean? It fully illustrates the hacker culture and business,
It’s a compromise, or a balance, between governments. And hackers themselves are constantly evolving in a certain direction.”
The humming noise in the audience disappeared, and many people had thoughtful expressions on their faces.
She paused for a moment, looked around the audience, and spoke calmly: "Hackers, like any other profession in the world, undergo a process of continuous evolution. There are only three ways for the future of hackers: stick to it, leave, or recruit.
Persistent hackers are generally unknown. They are die-hard supporters of the original hackers. They seem to be the ghosts of this network, wandering between almost all servers, looking for information they are interested in. At the same time, they are disgusted with the commercialization trend of hackers.
Hackers who leave follow the trend and engage in offensive and defensive battles for information of huge commercial value. Of course, many turn to other fields. And the hackers who are recruited generally choose large Internet companies or governments. Just like the hacker conference organization
Moss, who also joined the U.S. Homeland Security Advisory Council last year. Kevin Mitnick, who was previously prohibited from touching keyboards and mobile phones, has also been officially asked to leave."
"At different starting points and eras of technology, hackers face different temptations. The earliest hackers whistled to steal phone calls, later hackers used bank loopholes to directly transfer money, and today's hackers steal confidential documents of immeasurable value. In 2009,
Among the companies surveyed by Symantec, 43% lost patent information due to hackers."
She looked around the audience and said with emphasis: "When a hacker uses the technology at his hand to cross the moral bottom line to seek illegitimate gains, he himself is already betraying the spirit of the hacker."
"As a hacker, it is worth everyone sitting down and thinking carefully about which path to choose."