typeface
large
in
Small
Turn off the lights
Previous bookshelf directory Bookmark Next

Chapter 1086: Those Years I Across the Internet 1

When peace gradually replaces war and becomes the theme of the times, you may think that brutal killings, human trafficking, and chaotic black market transactions are always far away from you, but in fact, these dark and terrifying things are only a computer screen away from us.

Many people can clearly feel that in the Internet era, where electronic technology dominates world development and trends, there is no privacy at all.

Everyone, either actively or passively, becomes a transparent person wearing a vest on the Internet.

Some people make up lies and release bad information to incite the public in the online world. Some people spread negative energy without any limit on the Internet in order to gain traffic. Some people just say something that is not rigorous enough on the Internet and can be doxxed...

While we feel the convenience brought by the Internet, we are also flooded with malicious attacks on the Internet.

This is beneficial to human development, but it also has disadvantages.

When everyone no longer has awe and unscrupulousness towards the Internet, and when there is no personal privacy in this world, then is everything we do under the control of others? Have we become a real-life game in the eyes of others?

?

Can our reputation, property, and life safety be protected?

In particular, the Internet is not a flat world. Behind the glamor and peace you can see, there are also dark evil hands waiting for opportunities.

The forums, Tieba, bib and other social platforms that ordinary people usually come into contact with are all the first layer of surface network. To enter this layer of network, you don’t need special tools and special algorithms. Ordinary browsers can meet the needs of search engines.

Many people may not understand, so let’s put it another way.

If the Internet is an iceberg, then the surface network seen by ordinary people is just the tip of the iceberg, accounting for less than 4% of the entire online world.

The remaining 96% are web pages that are not searched by regular search engines.

This type of network is hidden in the deep sea. It is necessary to use specific tools and search these pages to dynamically generate it. It is difficult for ordinary people to access it.

This is the so-called Deep Web. As another dimension of the Internet, the data scale of the Deep Web is more than 400 times that of the surface network.

Everything you can't find in the surface network, you can find almost everything in the deep network.

The Deep Web relies on ultra-covert transmission protocols and extremely complex encryption methods to conceal users' Internet addresses.

It will be destroyed after reading. Your appearance, status, geographical location, contact information... are all anonymous here.

Precisely because of the ephemeral nature of the Deep Web, which gives it extreme freedom, it has become a breeding ground for evil.

Therefore, a branch of the deep web-the dark web was born.

The dark web is like a dark version of a shopping website.

Here, you can conduct drug trafficking, arms trading, forge identities and sell passports, steal credit cards...

Buy database information from banks, schools, hospitals, companies, etc. as well as private information...

You can even hire a murderer to kill someone and live broadcast the entire killing process for everyone on the dark web to see. You can also freely choose the killing weapon and killing method.

Pornography and human trafficking are the main businesses of the dark web.

Here, there is no morality or law, only freedom.

Desires under freedom are not subject to any restrictions, and all justice is swallowed up. Only you can't think of it, but they can't do it.

What you can see here is the trampling and destruction of human nature and dignity. However, this is the most authentic but ugly and distorted side of human beings.

Gu Mo's current plane task is related to the dark network.

This is a plane composed of a desktop movie. Xu Yan, the male lead of the plane, is an ordinary employee of a certain company.

Many people only know the horror of the dark web, but if they are unfortunately become a person who has been stared at by the dark network, what kind of horror will face.

But Xu Yan knew.

One day when he returned home from get off work, he picked up a large -capacity U disk. When he decided to format the U disk, when he was used to store works parts, he found that many pieces in the U disk were encrypted. Only one file did not have no files. Then, then

And that uncomfortable piece is a criminal novel, telling the history of the male lead's crime killing.

And each crime is very special, so that people can't help but be numb, and they can't help but make a case.

Xu Yan was attracted by the plot of the novel. I unknowingly read the novel, but found that the novel did not end in the end. This made Xu Yan a little overwhelmed, so he ran to the Internet and wanted to search for an ending.

But there is no information about this novel on the Internet.

In other words, the owner of the U disk is a writer, and he has not published this novel.

The ghosts are so bad, Xu Yan registered a pen name to publish this novel to the Internet in his own name.

Because the subject matter is novel and the plot is fascinating, this novel has also brought a lot of benefits to Xu Yan, which made Xu Yan, who tasted the sweetness, couldn't stop, and wanted to continue to make money by writing novels.

Unfortunately, he has no talent in this area. He can't even write a reader who satisfies readers.

So Xu Yan thought that other encrypted parts in the U disk would be an unpubical novel? Will the ending of the criminal novel, just in those encryption parts?

When Xu Yan tried to decipher the secrets, his girlfriend, that is, the original body knew the origin of the U disk, and knew that the novel of the fire was not written by Xu Yan at all.

She advised Xu Yan not to do such a thing anymore, otherwise it would bring endless trouble for herself.

Xu Yan was very upset. He felt that the U disk was picked up and did not steal it.

It happened that there was an unpubical novel in the U disk, which shows that the God has the will, it is God to help him.

The temptation of money, the touting of outsiders, so that Xu Yan could not listen to the original body, and continued to decipher the secret.

In the end, he decippped No. 1 and Cryston.

In the No. 1 encryption, there is only one video -a murderer video.

The technique and process of killing is exactly the same as the first killing description of the male lead in the novel.

Xu Yan watched the creepy, but did not think it was true.

Maybe it's just the material that the owner of the U disk finds to write this novel.

But what Xu Yan didn't expect was that the next day, this murderer video was passed on to an IT industry exchange website, and it was identified by professionals. It was not the content of any movie, but the real killing video.

Because of the fire of Xu Yan's novels, many people in the website found the similarities between the video and the novel. Therefore, many people began to doubt that the program ape Xu Yan really performed criminal acts in order to write this novel.

Xu Yan began to panic. If this video spread from IT website to other websites, would everyone think that the people in the video were killed by him?


This chapter has been completed!
Previous Bookshelf directory Bookmark Next