typeface
large
in
Small
Turn off the lights
Previous bookshelf directory Bookmark Next

Chapter 1086

When peace gradually replaces war and becomes the theme of the times, you may think that brutal killings, human trafficking, and chaotic black market transactions are always far away from you, but in fact, these dark and terrifying things are only a computer screen away from us.

Many people can clearly feel that in the Internet era, where electronic technology dominates world development and trends, there is no privacy at all.

Everyone, either actively or passively, becomes a transparent person wearing a vest on the Internet.

Some people make up lies and release bad information to incite the public in the online world. Some people spread negative energy without any limit on the Internet in order to gain traffic. Some people just say something that is not rigorous enough on the Internet and can be doxxed...

While we feel the convenience brought by the Internet, we are also flooded with malicious attacks on the Internet.

This is beneficial to human development, but it also has disadvantages.

When everyone no longer has any respect for the Internet and is unscrupulous, when there is no personal privacy in this world, then is everything we do under the control of others? Have we become real people in the eyes of others?

game?

Can our reputation, property, and life safety be protected?

In particular, the Internet is not a flat world. Behind the glamor and peace you can see, there are also dark evil hands waiting for opportunities.

The forums, Tieba, bib and other social platforms that ordinary people usually come into contact with are all the first layer of surface network. To enter this layer of network, you don’t need special tools and special algorithms. Ordinary browsers can meet the needs of search engines.

Many people may not understand, so let’s put it another way.

If the Internet is an iceberg, then the surface network seen by ordinary people is just the tip of the iceberg, accounting for less than 4% of the entire online world.

The remaining 96% are web pages that are not searched by regular search engines.

This type of network is hidden in the deep sea. It is necessary to use specific tools and search these pages to dynamically generate it. It is difficult for ordinary people to access it.

This is the so-called Deep Web. As another dimension of the Internet, the data scale of the Deep Web is more than 400 times that of the surface network.

Everything you can't find in the surface network, you can find almost everything in the deep network.

The Deep Web relies on ultra-covert transmission protocols and extremely complex encryption methods to conceal users' Internet addresses.

It will be destroyed after reading. Your appearance, status, geographical location, contact information... are all anonymous here.

Precisely because of the ephemeral nature of the Deep Web, which gives it extreme freedom, it has become a breeding ground for evil.

Therefore, a branch of the deep web-the dark web was born.

The dark web is like a dark version of a shopping website.

Here, you can conduct drug trafficking, arms trading, forge identities and sell passports, steal credit cards...

Buy database information from banks, schools, hospitals, companies, etc. as well as private information...

You can even hire a murderer to kill someone and live broadcast the entire killing process for everyone on the dark web to see. You can also freely choose the killing weapon and killing method.

Pornography and human trafficking are the main businesses of the dark web.

Here, there is no morality or law, only freedom.

Desires under freedom are not subject to any restrictions, and all justice is swallowed up. Only you can't think of it, but they can't do it.

What you can see here is the trampling and destruction of human nature and dignity. However, this is the most real but ugly and twisted side of human beings.

The mission in the plane where Gu Mo is currently located is related to the dark web.

This is a plane composed of a desktop movie. The male protagonist Xu Lin is an ordinary employee of an IT company.

Many people only know the horror of the dark web, but they do not know what kind of horror they will face if they are unfortunate enough to be targeted by the dark web.

But Xu Lin knew.

On his way home from get off work one day, he picked up a large-capacity USB flash drive. When he decided to format the USB flash drive and use it to store work files in the future, he found that many files in the USB flash drive were encrypted, except for one document. .

And inside that unencrypted file was a crime novel that told the story of the male protagonist's crime and murder history.

The methods of each crime are very unique, making people feel numb and applauding at the same time.

Xu Lin was attracted by the plot of the novel and unknowingly finished reading the novel. However, she found that the novel had no ending. This made Xu Lin a little unfinished, so she went online to search for the ending.

But there is no information about this novel online.

In other words, the owner of the USB flash drive is a writer, and he has not published this novel yet.

By some strange coincidence, Xu Lin registered a pen name and published the novel online in her own name.

Because of its novel subject matter and fascinating plot, this novel became popular and brought many benefits to Xu Lin. Xu Lin, who had tasted the benefits, couldn't stop and wanted to continue to make money by writing novels.

It's a pity that he himself has no talent in this area, and he can't even write an ending that satisfies readers.

So Xu Ran thought, could the other encrypted files in the USB drive also be unpublished novels? Could the ending of the crime novel be in those encrypted files?

When Xu Lin tried to decipher the encrypted file, his girlfriend, the original person, learned about the origin of the USB flash drive and also learned that the popular novel was not written by Xu Lin at all.

She advised Xu Yan not to do such things again, otherwise it would bring endless trouble to herself.

Xu Yan was very unhappy. He felt that he had picked up the USB flash drive and not stolen it.

There happened to be another unpublished novel on the USB flash drive, which showed that there was some divine will in the dark, and it was God who was helping him.

The temptation of money and the flattery of outsiders made Xu Lin unable to listen to the original person's words and continued to decipher the encrypted files.

Finally he deciphered the encrypted file No. 1.

In the encrypted file No. 1, there is only one video - a murder video.

The method and process of killing are exactly the same as the description of the male protagonist's first murder in the novel.

Xu Yan was horrified to see it, but she didn't think it was true.

Maybe it was just the material the USB disk owner was looking for to write this novel.

But what Xu Yan didn't expect was that the next day, the murder video was posted to an IT industry exchange website, and was certified by professionals. It was not content in any movie, but a real murder video.

Due to the popularity of Xu Lin's novel, many people on the website discovered the similarities between this video and the novel. Therefore, many people began to suspect that programmer Xu Lin actually committed a crime in order to write this novel.

Xu Yan began to panic. If this video was spread from the IT website to other websites, would everyone think that the person in the video was killed by him?

This chapter has been completed!
Previous Bookshelf directory Bookmark Next