Chapter 1058 (1/2)
”I want to build a network that can hide everyone's identity information, so that all of us can log in freely without considering our identity disclosure! This network, I call it - Dark network! ” Qin Feng said.
Dark net?
Many hackers' eyes lit up when they heard the name.
It's a good name. They like it very much. Dark net, no matter how you listen, you feel very consistent with their identity.
They are hackers. Black and dark are one.
Black net, obviously not good.
Dark net, that's very artistic conception.
”Q, how can this technology be implemented?” Some hackers couldn't help asking.
”I don't know if anyone here has heard of Onion Router?” Qin Feng asked.
If you ask ordinary people outside, you must have never heard of it.
As we all know, the English name of router is router, which is responsible for connecting LAN and Internet. Basically, all families use it. Of course, in ordinary families, routers are used to connect computers or mobile phones directly.
In large companies, switches are usually used to connect.
The reason is also very simple. Routers are directly connected to computers. If the number is relatively small, it is OK. It's not troublesome to manage like that. In this way, you can save money on a switch. And for ordinary users, it is also easier to operate.
On the contrary, if the company uses it, the router will be particularly troublesome to manage. Especially once a computer goes wrong, you can't easily find it out. In particular, with the increase of the number of computers in the LAN, it is very easy to have an internal cyclic data redundancy storm.
You know, packet loss will occur when all data is sent out. This is very normal, especially when using some chat software, such as QQ, wechat, watching video, etc., UDP (User Datagram Protocol) is used for sending.
This is very easy to lose data. Direct router management, a large number of computers will lead to a large number of errors. Switches are easier to manage.
For so many hackers on the scene, it is too clear what routers and switches are. They steal the back door and find out the flaws by analyzing all the uplink downloaded data.
”I know!” A hacker raised his hand, ”it is a technology developed by the Naval Research Laboratory (NRL) and the Defense Advanced Research Projects Agency (DARPA) a few years ago. But it seems that this technology has finally been shelved! ”
”I know!”
Subsequently, hackers raised their hands to say they had heard of it.
Some hackers even said directly that he had invaded the Ministry of defense and downloaded this thing.
These remarks, heard by the FBI, are undoubtedly a group of criminals.
”Catch or not?” Asked by FBI agents at the scene.
”No hurry! wait! What is this Q for? Besides, he just said one thing! ” FBI field director said calmly.
These people, in his eyes, are turtles in a jar.
It's easy to catch them.