typeface
large
in
Small
Turn off the lights
Previous bookshelf directory Bookmark Next

Chapter 486 Apple's Trouble

Apple's move was extremely powerful. Although Longteng Group stabilized the situation domestically, its efforts abroad in recent years were instantly wiped out.

Including Longteng Group, which attaches great importance to the Japanese market. Longteng Group has spent a lot of effort to open the Japanese market. Comics, Good Voice, and a lot of effort have been spent to open the Japanese market.

But now that Apple has taken action, it has brought Longteng Group back to its original shape. As the giant with the highest market value in the United States, Longteng Group’s influence is very terrifying. His actions can directly affect the US government and allow the US government to put pressure on Japan.

This kind of power is not comparable to that of Longteng Group. The strength of Longteng Group is not yet so strong. It is better at home, but it does not have this ability abroad.

Late at night, in Zhang Fan's villa, Zhang Fan was busy in front of the computer. Next to his computer was an Apple mobile phone, connected to the computer by a data cable.

"Hmph, it's true, Apple, let's see whose information is insecure."

After finding what he wanted, Zhang Fan laughed. The direction of this world and the other world are basically the same. The direction is the same, so some problems are basically the same.

What Apple did in another world was also done in this world. And it was done more covertly and ruthlessly.

The Apple of this world uses its own unique closed system to transmit user data back to Apple's servers through special channels.

This data is more terrifying than another world. Even the user's assimilated voice is transmitted back. The user's activity trajectory and the usage of some software are also transmitted back to the headquarters through the positioning system.

In other words, as long as you use your mobile phone, your entire person is basically being monitored by Apple. And this data is transmitted back to the US headquarters in a special way.

This transmission method was so clever that even Zhang Fan didn't find it at first. In the end, he exchanged his reputation for a bunch of experience books and pushed his hacker experience to the limit before discovering this transmission method.

This transmission method is to send back the password in different passwords, and then reorganize and translate the password. This encryption method is not enough for top hackers, and only top cryptography experts can discover it.

Apple went to great lengths to transmit data back in this way, and it obviously had other purposes. With such a covert method, Zhang Fan had reason to believe that Apple's data was inextricably linked to the U.S. intelligence system.

After the crack was completed, Zhang Fan did not sit idle. Instead, he quietly began to invade Apple's server. After invading the server, Zhang Fan saw a large amount of data information.

"Hey, how much data has Apple stolen over the years?"

Looking at the huge data, Zhang Fan swallowed. There was too much data. Not only the data of China, but also the United States, the European Union, etc. Apple has so many supporters around the world, and the data generated by these users every day

It's all a huge amount.

When these data were gathered together, the amount was too huge. Zhang Fan laughed when he saw these data. When these things were exposed, it was not just ordinary consumers who attacked Apple.

No country would be willing to have such a large-scale intelligence leak. Because this kind of data involves too many national secrets, many of which are top secret.

"This data cannot be wasted."

Zhang Fan squinted his eyes, so much data is a huge wealth for any company or country. In this era of big data, data is the most valuable thing.

Through various data analysis, very useful big data can be obtained. Through this kind of big data, works more suitable for consumers can be developed.

Zhang Fan continued to be busy, leaving different backdoors in the database and connecting to Longteng Group's supercomputer through the backdoors. Then Zhang Fan installed many special download tools.

These tools were all made by Zhang Fan himself, and Apple engineers could not discover these things at all.

A large amount of data began to be transmitted and stored in Longteng's super database through the super computer.

After setting up, Zhang Fan stood up. When things got to this point, there was no need to do it himself. Especially in China, the power of the country would never allow such a thing to exist.

Taking out his mobile phone, Zhang Fan dialed an internal number. As a special talent of the Network Security Department, Zhang Fan has great rights.

"Hey, I have something very important to report. It's like this..."

Zhang Fan directly submitted the problems he discovered. After joining this force for so long, Zhang Fan has not done much. Apart from helping the military strengthen network security, Zhang Fan has always been very free.

"What, are you sure?"

At a military base in Yanjing, a middle-aged man in military uniform looked shocked.

"I'll send you something right now."

Zhang Fan hung up the phone and sent something. Then at the National Cyber ​​Force Center, some people started to read what Zhang Fan sent.

After seeing these things, everyone took a breath of cold air. Network security, they have been working on network security. But no one expected that the biggest security risk turned out to be Apple.

They did this secretly through hardware and mobile phone systems. Thinking of the popularity of Apple products in China over the years, how much information has been leaked out over the years.

"Convene an emergency meeting immediately..."

The middle-aged soldier's face was livid, angry, extremely angry. He was definitely derelict in his duty for not discovering this hidden danger in this position.

If it weren't for Zhang Fan's discovery today, I'm afraid this huge loophole in domestic network security would not have been discovered by himself.

The message discovered by Zhang Fan was quickly submitted. When it was submitted, it immediately shocked the entire Chinese intelligence system. The network security department also began to take action and checked other mobile phones.

At the same time, Zhang Fan also received the task of checking all mobile phones, computers and other communication equipment to see if there are any other backdoors.

For such a task, Zhang Fan is obligated. He knows that the more he does, the more protection he and Longteng Group will receive in the country.

In addition to these, Zhang Fan also began to secretly plan how to make good use of these things to kill Apple with one blow and obtain the maximum benefit at the same time. Such a good card in his hand must not be destroyed. If it is destroyed,

How sorry I am for the card I have in my hand.

Either not finish it, or just try to kill it with one hit. When dealing with the enemy, you must give me a chance to kill it with one hit. Even if you can't kill it in one hit, you must still kill it, especially an opponent like Apple.


This chapter has been completed!
Previous Bookshelf directory Bookmark Next