Chapter 4:Another Identity (1/2)
”Ahh .. Finally .. room sweet room,” said Carolina and immediately threw herself on the bed in her room. Being outside or in the crowd makes her body's energy ”absorbed” and now it is the time to ”replenish” her body's energy.
”Hello Yui, mom is here,” said Carolina when she rested for a few minutes.
Suddenly, her laptop which is in a stand-by mode right beside her bed lit up and showed the little elf girl with wings on her back.
”Welcome, mama. How was your day?” Yui replied, the girl who was on the laptop earlier.
”Okay baby, how is the progress of our work?” asked Carolina who finally got out of her bed and sat in front of the laptop screen.
”Our freelance work will soon be finished, and the other job, it's remaining the same, null, mama. The person doesn't seem to leave any responses” Yui replied.
”Alright, let me know when it's finished, okay!” said Carolina then went back to bed after checking her work on the laptop.
The little elf girl, chatting with Carolina on the laptop, was Yui, an artificial intelligence program that she created to help her.
At first, Carolina didn't really have much interest in developing an artificial intelligence program, but after watching a popular anime a few years ago that they were trapped in the game world, Carolina felt attracted when a character named ”Yui” appeared. The character is a program that becomes the ”child” of the main characters and often helps and provides information to them.
After 2 months of trial-error, she succeeded in creating ”Yui” for herself and to give credit as for the idea inspiration for her creation of ”Yui”, Carolina decided to name her ”child” with the same name.
”Mama ...” Carolina, who was about to fall asleep, was suddenly called by Yui.
”Hm, when it's finished, Mama will check, Mama will go to sleep first”
”Mama ... bad ... looks like they almost managed to catch Yui's trail,” Yui said with a little panic. Carolina, who was about to fall asleep, regained consciousness straightaway.
***
”No ... No ... Ah shit,” said a man who pounded the table in front of him. Even though soon, he will be able to get the location of that person.
Suddenly his computer screen flickered, indicating he had just gotten a message. His heart was beating fast, he directly opened the message.
”I didn't expect the government to use dirty tricks like this and I didn't expect you working with the government, BlackRose. You need to improve your game, you have that skills but not as good as me. That was fun. -FA ”
The man's eyes were bulging, he couldn't believe that his client had tricked him.
Initially, he accepted the job because his client said that their company had been frequently attacked by hackers recently, and asked him to trace the location of the hacker.
With a fairly high fee, the man immediately accepted it. After all, he was confident in his ability to trace the tracks left by other hackers.
But who would have thought the company was a government disguise to catch FA who seemed to fall into the same trap as him.
”Are you really FA?” he replied.
However, the message was not delivered. He tried to trace the traces of the message, but it was not like previously which even faint but there were traces. This time, there was no trace at all! Even though the traces were there, his abilities weren't enough to find them.
It reinforces the possibility that the person is FA!
Obviously, intractability wasn't enough to prove anything. After all, there are many hackers in the world who excel at wiping out their tracks. Are they all FA? Of course not.
FA is a well-known hacker recently who appeared out of nowhere less than two years ago. Nobody knows where the hacker comes from because the hacker communicates in many different languages. Whatever language the client uses, that person will be fluent in using it too.
He was interested when there was a well-known company that created a challenge that would pay a high price if the company's security system was hacked. Indeed, the challenge has attracted a lot of attention by other hackers so that many of them are trying to hack into the security system.
Hackers who managed to do the challenge are FA. This hacker is so meticulous finding the smallest error that most hackers ignore, and then after that he offers a sophisticated method on how to improve their system.
After completing the job, the company offered the hacker a permanent position but the person always refused, disappearing without a trace until that person accepted another job from another company.
After hearing this, some big companies tried to offer the same challenge. Of the several challenges that exist, that person only does the ones that pay dearly.
The amount of work the hacker received in these two years was so impressive, it was said that the hacker had received approximately fifty million USD within two years doing this job.
Hearing about that person's track record, more companies are trying to hire the hacker but they have no way of contacting him directly. All they can do is post the job online and hope it will be noticed by FA.
FA received more attention when there were rumors that several governments and state intelligence agencies from several countries were trying to recruit him. While there has been absolutely no evidence so far that the person accepted any of the offers made by them, there are some news that he accepted some of those offers when the pay was high enough. Nobody really knows whether this rumor is true or not. After all, most of the transactions conducted with the government were strictly confidential.
Despite that person's hugely lucrative work, the top hackers don't really think of FA, even though it has made tens of millions in a short period of time, nothing special or complicated has been done. For the top hackers, the security system is a child's play. Some of them even consider FA to be a White Hat Hacker, because FA are not brave enough to tinker on the ”dark” side.
However, they were wrong. A few months after that person debut as a hacker, FA started tinkering with the dark web, which made itself immediately taken seriously by other top hackers.
FA didn't even ”grope” it first when it first surfed the dark web. It immediately looked for the highest paying job and got it done well. Indeed, the work it has been done, is not murder, women, children and sexual exploitation or any other crime that could land it a death sentence. FA will accept any work as long as it doesn't break the code and of course the pay must be high!
Famous figures such as politicians, corporate heads, organized crime bosses, even religious leaders, and other important figures were destroyed by FA overnight. Companies and organizations instantly fell due to the detailed reports that FA provided. Some even changed their leadership because FA managed to uncover their dirty secret.
What really makes it seriously wanted by the government, FA would try to hack into various government intelligence agencies, not willingly to do troubles but only read secret files.