Chapter 982 Onion Router
Qin Feng walked onto the stage.
All hackers gradually quieted down.
Regarding q, although no one knows his name or what he has done in the past.
But just because they organized this hacker conference and made it so successful and gained them so much, they deserve their respect.
"Dear hacker friends, I believe that in the past few years, you have been confused by two things!" Qin Feng's voice changed.
Many hackers were listening attentively.
"The first thing is that everyone is not safe enough. Whether it is chatting or ordinary technical exchanges, any platform is very unsafe. Your unintentional words may bring the FBI to your door at any time. So,
Everyone is usually very careful and extremely cautious. We even live in fear!" Qin Feng said.
These words were agreed by all the hackers present.
This is their life, a miserable life. But this is also their choice. They may have indeed violated the law to some extent. But in fact, in many cases, most people do it out of a desire for technology.
, the exploration of technology.
They don't really want to make a profit out of this.
Of course, it is not ruled out that some people will use this to make profits. But in fact, most people will not use this to make profits. It is more out of justice and righteousness to expose some things.
But it also caused trouble and made him extremely embarrassed.
The most miserable person among them was Philip Katz, who single-handedly brought down Arz, a company owned by Cisco, and reduced its profits to zero, benefiting all Internet users.
But what about him? He died of embarrassment. Of course, it is even possible that he did not die of drunkenness. You know, people who are really drunk every day rarely die of drunkenness.
On the contrary, only people who are usually very controlling but occasionally get drunk are likely to die from drunkenness.
However, you don’t have any evidence to prove that Philip Katz did not die of drunkenness but of homicide. There is no evidence.
You know, behind this incident, Cisco is involved. As for anything related to IT hardware, some link software, and network protocols, you can't avoid Cisco.
The power of Cisco may not be heard by ordinary people. But for anyone who studies IT, it is very familiar to them.
Facing such a powerful company, they are nothing to this group of hackers.
"The second thing is that when we have any major results, we lack a platform to publish them. Especially when we obtain some secrets and want to publish them in a righteous and righteous way, we have no channel to publish them.
Come out and publish at will, just like Mr. Katz. In the end, you die!" Qin Feng said.
Everyone was in silence.
This is indeed the most helpless thing that all hackers face.
If you want to be a lone hero, you will end up alone.
This world is cruel and cruel. No one can help you. In the end, all you can rely on is yourself.
So? What is q going to do?
"Here, I want to take this opportunity to resolve these two things!" Qin Feng said.
How to solve?
All the hackers looked curious.
At this moment, the FBI is on standby.
"Ready for action at any time!" the FBI ordered.
As long as this Q reveals something shocking, he will be captured.
After being captured, this group of hackers was leaderless.
They are not afraid of hackers, but they are afraid of hackers uniting. The harm caused would be too great.
That would be a disaster for everyone.
Those government departments and companies may suffer.
That would be a real nightmare.
Therefore, if Qin Feng really wants to do something, they will definitely arrest him. Even if it causes trouble, they must know Q's identity.
However, the FBI did not know that the agents deployed by the FBI at the scene had been known to Qin Feng for a long time.
They asked Timaupu for 5 places. Originally, Tumupu didn't know about these 5 places.
After all, they were also wearing black clothes, black pants, black shoes, and wearing masks when entering the venue.
It's impossible to know.
But they didn't expect that Tui Mu Pu would arrange to stay with them for two nights. Naturally, it was impossible for FBI agents to participate. That would easily expose the target, and it was not allowed by discipline.
What's more, it's impossible to do this with a monitor on your body.
This naturally allowed Temupu to find out his identity and lock his whereabouts.
Naturally, Tai Mo has also hired relevant bodyguards to hinder these FBI.
Of course, there is no need for them to fight with the FBI, they just need to be slightly hindered. Anyway, they are all wearing black clothes, black pants, black shoes, and big hoods. In this case, there is no fear of being discovered.
It can be said that next to every FBI agent on the scene at this moment, there are two bodyguards hired by the unreasonable to keep track of them. As long as the FBI takes action, they will take action.
Therefore, Qin Feng is very safe.
"The first thing is how to enable everyone to chat safely and exchange information. My suggestion is to create a network that outsiders cannot easily log in to. At the same time, if everyone logs in, they can also automatically hide each other's identities, addresses and information.
, cannot be known by others." Qin Feng said.
Many hackers nodded. This is what they have always wanted to do, but there are technical problems.
At the same time, people also need to take the lead. Without someone to take the lead, this matter cannot be accomplished.
Now, with Q taking the lead, that would be great.
But what about technology?
"I have solved the technical issues that everyone is worried about," Qin Fengxiao said.
During this time, Qin Feng was not only worried about the Czech Republic. At the same time, Qin Feng was also in the United States, using the convenience of its network to search for a technology.
This technology comes from the U.S. military. It is a scientific research project of the U.S. military. Its main purpose of research and development is to provide Internet users with services to hide their identities.
To this end, the U.S. military built a special router called the Onion Router, which can automatically hide users' identity information.
The working principle of this router is very simple. After receiving the data from the switch, it will automatically analyze the mac address contained in the data, that is, the physical address and IP address, and then search its own routing table to see if there is a match.
The address. If not, feedback will be sent to the upper level router.
This feedback goes on level by level until the address contained in the data is found. Then it is sent level by level, and finally reaches the target address.
Among them, the address is completely transparent and visible. However, the onion router can hide the real IP address and add it as a virtual fake address.
In the end, even if the data is intercepted, the real IP address and Mac address cannot be found.
Chapter completed!