"By the way, Ning Wei, in fact, I have never advised you to use public domain social media such as Weibo too much. It is unnecessary to do so in your current capacity. That is to say, you are too young. If you are discovered earlier , probably won’t let you register for Weibo.” Liu Wei said sincerely.

Obviously, he also paid attention to the controversy on the Internet yesterday, and his words were to advise Ning Wei not to be influenced by those remarks on the Internet.

"It's okay, Brother Liu, do you think I will care about the scolding on the Internet? You underestimate me too much. It is impossible for such a small thing to get my mentality. And I have already vented my anger. Now Not only is there no negative emotion at all, but she is even quite happy." Ning Wei replied with a smile on his face.

This sentence made Liu Wei vigilant, and she subconsciously touched the phone in her pocket, and the corners of her mouth couldn't help but began to twitch, showing a wry smile, and asked: "Ningwei, isn't it? You went to Weibo to follow me again. Are those people on the line?"

"Haha, brother Liu, you underestimate me too much. Let me make an inappropriate analogy. When a bear kid provokes me, why don't I go to trouble with the parents and beat the child up? No. , This analogy is too inappropriate, let’s put it this way, if a dog bites me on the road, I don’t want to trouble the dog’s owner, so why bother with the dog?” Ning Wei said with a big laugh.

"Eh?" Liu Wei was stunned, staring at Ning Wei, and asked, "So what did you do just now?"

"It's nothing, I just notified some of the more serious hardware, system, and software vulnerabilities discovered and sorted out in our laboratory in accordance with internationally accepted procedures, and then I packaged and provided these vulnerabilities in the name of the laboratory. It gave us a safe platform. Brother Liu, you understand me, we must handle everything in accordance with the law and regulations, even if you feel very uncomfortable, you must not go beyond the rules." Ning Wei explained seriously.

This is beautifully said, and there is nothing wrong with it!

Liu Wei stood in a daze for a moment, and asked seriously: "So how many product bugs, or loopholes, are involved?"

Ning Wei picked up the steamed stuffed bun, took a bite, and said vaguely: "Not much, I picked the products of several companies according to the order of the technology stocks on the US stock market, Intel, Microsoft, Google, Oracle, Facebook, Twitter, IBM... In addition to the turbulence algorithm, I asked Huawei to notify all foreign companies that they may not renew their contracts in the future and stop providing activation codes. In total, there are exactly [-] companies affected. It is said that they are not very I like the number and I use it."

"The vulnerability level is still weaker than the Java vulnerability you announced a few days ago?"

"This... is about the same? According to the general classification standard, they should all belong to the same level of loopholes. This kind of problem is inevitable.

Liu Wei nodded, and didn't continue to ask, but her expression was a little heavy, probably because she felt that the burden on her shoulders was getting heavier.

"Then have you ever thought about a possibility, such as some inexplicable mad dogs biting you around you, without owners? Or that the companies you're looking for have nothing to do with this matter?"

"Oh, I thought about it. But what does it matter to me? Brother Liu, let's not care about so many rules and regulations when doing things. Let me analyze it for you. Professor Friend passed away. I will discuss the future operating system with you online. Who first connected these two unrelated things? It’s on the Internet! So it’s definitely not an accidental injury. I can’t go over the wall and go to Facebook to find them just because of such a shit Is there laundry detergent? That would be really illegal."

Ning Wei explained seriously.

Perfect……

Liu Wei felt that there was nothing more to say.

In fact, Liu Wei has less communication with Lu Dongyi. If he communicates more, he will know that this kind of logic is a routine operation.But if you really want to delve into it from the perspective of logic, Ningwei is actually very reasonable and a standard reciprocal operation.

"Well, it's good, then you...Come on, I'll talk to Mr. Chen first."

"What are you talking about? Are you in such a hurry?"

"Mr. Chen seems to have forgotten to arrange an external spokesperson position for the research center. He might think that it is not necessary for the time being, but now it seems that it should still be needed. What do you think?" Liu Wei explained.

"Oh...Actually, I don't think it's necessary, just ignore anyone who has a question. But if you think it's necessary, just arrange one." Ning Wei nodded and replied.

"It's still necessary. The times are different. When something big happens these days, I have to give everyone an explanation. No matter what you think in your heart, the words should be nicer. I'll go first."

"Well, let's go, Brother Liu!"

Liu Wei is actually right, Ning Wei still thinks everything is too simple.

Think about it, an epic vulnerability in Java has turned the world upside down, and even many Java programmers are still working overtime day and night.More than 10 vulnerabilities of the same level were suddenly exposed, and directly covered almost all mainstream hardware devices and mass social software in the world. The extent of the impact is obvious. One thing is for sure, many people have to work overtime.

……

Ning Wei's phone was disconnected again.

The reason for using the word "you" is because many bigwigs from relevant technology companies have had the experience of being directly rejected when calling Ningwei.

After contacting, Ning Wei added it to the address book anyway, but just after receiving the horrible information that Ning Wei exposed in a fast tone, he wanted to call again, but found that he couldn't get through.

This is very confusing.

Because the bosses wanted to explain to Ning Wei that the rules he followed were obviously wrong.

According to the internationally accepted rules, security technicians or organizations should discover vulnerabilities or BUGs. It is not just a matter of notifying the developers, but should provide the details of the vulnerabilities or BUGs to the developers, so that the developers can immediately Test it, and figure out how to plug the holes.Instead of making a phone call and then providing these vulnerabilities to third parties!

But nothing, nothing.

Ning Wei just told them that his own product had a serious loophole, which might cause any accidents, and didn't even give them a chance to interject to ask a few more questions, so he hung up the phone directly, and the call would not work again.

Can you understand the emotions that the bosses want to blow themselves up at this time?

There are also bosses who opened their mailboxes for the first time, and even called to ask whether the public BUG collection mailboxes had received new 0DAY vulnerability reports, but there were none!

It is no exaggeration to say that at this moment, the idea of ​​a group of bigwigs wanting to kill Ning Wei is almost reaching its peak.

After all, if such a major BUG is exposed in advance and the company has no countermeasures, it will hurt the reputation.The most important thing is the possible loss.

Especially for Intel, it is really troublesome.

It is difficult to fix the hardware loopholes, let alone the latest CPU. If it really causes a global security incident, it will be an extremely troublesome thing.

Of course, it is also difficult for software companies such as Google, Facebook, and Twitter.

Can a software vulnerability allow people to directly view the private content set by the user?

What are you kidding?If the loopholes are exposed and they are unable to seal the loopholes, causing a large number of users to set private content that is only visible to themselves, all of which are publicly spread on the Internet, class action lawsuits may cost astronomical sums.

Especially for the bosses of Facebook and Twitter, after answering Ning Wei's phone call, they are all in a bad mood.

The products of these two companies are basically zero in the Huaxia market. After all, the content of these two companies is basically impossible to access through the normal network, so what the hell is Ningwei submitting his own vulnerabilities to the Huaxia Network Security and Vulnerability Information Center?To put it simply, it is not terrible to have loopholes and bugs in software or hardware. What is terrible is who owns these loopholes and bugs.

However, no one dared not to take Ning Wei's call seriously.

Not to mention the achievements that Ningwei has made, the impact of exposing Java vulnerabilities before has not completely dissipated, and if you understand the cause and effect, you will know that Ningwei’s exposure of Java’s epic vulnerabilities is just to vent his anger on his own students. , in Lenovo's laboratory, there is the world's strongest and currently the only strong artificial intelligence platform...

One can imagine how entangled these bigwigs are at this moment.

What's even more disturbing is that the timing is really good at this time, which happens to be shortly after get off work...

At this time, the bosses didn't know that they were not the only ones who received the call.

Of course, apart from these bigwigs who were suddenly informed that there were serious vulnerabilities in their products, network equipment providers represented by Cisco were also dumbfounded.

The urgent electronic official letter sent by Huawei suddenly made people dumbfounded?

The content of the official letter is fairly subtle, but in fact, the meaning of the expression is that Professor Ning Wei, the developer of the turbulence algorithm, was in a bad mood because of the slanderous remarks on the Internet, so he informed Huawei that after the expiration of the turbulence algorithm use right contract Do not authorize externally, stop providing activation codes externally...

Of course, you don’t have to worry too much, because during the contract period, Huawei will still act in accordance with the contract to ensure that the activation code will not be cut off during the contract period.

The only good news is that the previously signed contract will expire in about half a year.But if this matter is not resolved, what will happen in half a year?Now in the global network equipment market, it is the most basic configuration to load the turbulence algorithm security chip. In the past, those devices that did not load the turbulence algorithm chip were sold to the third world at a low price by clearing the inventory. In other words, this official letter If it is really implemented, it will directly disrupt the new equipment research and development plans of these companies...

Nor can it be said that these network equipment companies are not working hard enough.

In fact, over the past year, many engineers have been working hard to analyze the source code of the turbulence algorithm, trying to communicate various means to reverse restore the original version, or to develop products with similar functions.It's just that no one has succeeded yet, so at this time, they suddenly announced that they would not renew the contract. Isn't it killing people?

What's more annoying is that Ning Wei is in a bad mood, why should he take them under his knife?How can there be such a reason?Well, who doesn't have eyes?Who is not good to provoke, this big boss who is the least afraid of causing trouble?Is this distaste for living too well?

A group of people's brains are "buzzing"...

At this time, it's not just these foreign bigwigs who are "buzzing" in their heads, the technicians of the Huaxia Network Security Threat Information Sharing Platform are also quite confused at this time.

……

Guo Xianming was in extremely complicated mood at this moment.

As a technician working in the national security technology department, he has been in the industry for 12 years. This is the first time he has seen a unit submitting vulnerabilities in a packaged form. What is even more frightening is that the vulnerabilities are not on the same platform. There are hardware, there are operating systems, there are application software...

And behind these hardware and software also represent the world's top [-] technology companies.

What's even more frightening is that you only need to glance at the descriptions of these vulnerabilities, and you will find that any one of these vulnerabilities is exposed at the level of a king bomb, and if they are exposed together, it is enough for the Internet to be "nuclearized" by those hackers for a while. it's time...

From a professional point of view, where is this a vulnerability kit?This is a dynamite bag!

From another perspective, it can also be said that this is a vulnerability package or a dollar package.

Guo Xianming is well aware of the value of these vulnerabilities. Even if these vulnerabilities are provided to developers through completely formal channels to earn rewards, these vulnerabilities can add up to at least millions of dollars.If you follow the path of illegal production, you can probably earn ten times or even a hundred times the profit by selling these loopholes through some illegal trading platforms.

Although you can earn a lot of money through underground channels, it still depends on whether you have the strength to spend it. It is better to use regular platforms to make you feel at ease.

So here comes the problem. Although the Huaxia Network Security Threat Information Sharing Platform is an official platform, it is still a third-party security vulnerability sharing platform from a global perspective.As far as Guo Xianming knows, generally speaking, if you want to make money from these security vulnerabilities through formal channels, the developer will require the vulnerability provider to not disclose to the third-party platform until the official update patch package is provided to solve these vulnerabilities. Details of these security breaches.

Who is this, who gave up millions of dollars when they said they would give up?

I glanced at the submitting unit, Huaxia Frontier Intelligent Technology Research and Development Laboratory, and the submitter - Ning Wei.

Oh, no problem then.

For a billionaire who spends hundreds of millions in various bonuses at every turn, a few million dollars is probably a drop in the bucket.

Of course, the moment Guo Xianming saw the unit and its name, he also knew that this vulnerability kit was probably not a joke.

So the first thing to do is of course... Hurry up and throw this explosive bag out... Although this is the Lifetime series, but seeing so many loopholes at once, Guo Xianming really dare not follow the previous steps to eliminate these loopholes. All are distributed to shared cooperative units...

What if it gets leaked?

Just as he was about to report to the higher authorities, the phone rang first.

"Hey, Xiao Guo, are you on duty? Did Professor Ning upload a vulnerability package to the platform today? Well, okay, don't take the routine test, there will be special experts to verify it. Experts almost there."

------------

348 Faith

Without any feeling of reluctance, Guo Xianming heaved a sigh of relief when he heard that a team of experts would take over the rest of the work.

In an era when almost all information needs to be archived electronically, the significance of the security vulnerability information sharing platform is to ensure that the Internet is not attacked by systemic risks to the greatest extent.In particular, some important data will not be subject to the risk of leakage due to some security holes.

For example, at the level of criminal law, there is a special crime of destroying computer systems.

Obtaining so many loopholes with wide-ranging effects at one time is simply a hot potato in Guo Xianming's view.This is also the reason why he did not share these vulnerabilities with the cooperating members in the first place. In case something goes wrong in any link and it is leaked in advance, the responsibility is too great, and Guo Xianming consciously cannot bear it.

Now that I can throw this explosive bag out, I feel much more relaxed.

"Brother Liu, I haven't had time to report it yet, how did you already know about receiving this bug package?"

"How do you know? Heh, several companies took the initiative to contact the superior in the early morning. It is said that the superior was confused by the question. Just now Zhang Chu called and asked me about this. It happened that I was on a business trip and it was inconvenient to log in. Say hello to you. Have you read it? The vulnerability submitted by Professor Ning is very problematic?"

"I haven't tested it yet, but if you follow the description of the vulnerability, the problem is really big. None of the vulnerabilities is less impactful than the Java vulnerability shared by Professor Ning last time. There are seven such vulnerabilities. It covers the 12th generation of Intel Core. CPU, Microsoft win10 system, internal loopholes in Google’s architecture, protocol loopholes in several versions of Facebook and Twitter, and Oracle’s OracleDesigner. What’s more frightening is the FTMHVP management system that IBM is using. All of which have not been exposed before Vulnerabilities, let’s put it this way, if these loopholes are exposed in advance, it will really be a big deal.”

"Huh...Professor Ning, this is... Forget it, I won't ask. You wait for the experts to come and throw the vulnerability package to the experts for testing. It's best not to spread this matter for the time being."

"Okay, it's a good thing you made this call immediately, I almost sent an alarm to my partners directly."

"By the way, the details of the vulnerability must never be leaked, you understand?"

"Isn't this nonsense... Well, well, Brother Liu, of course I know that the details cannot be leaked, what do you mean..."

"It's not interesting, I'm just thinking about it. Since those companies have taken the initiative to come to the door, it means that they still attach great importance to this matter, so the details of these loopholes must not be leaked. Zhang Chu also specifically emphasized this issue just now. You, understand?"

"Ahem...Understood, Brother Liu."

"Well, then I'll hang up first."

"Well, goodbye Brother Liu."

After hanging up the phone, Guo Xianming picked up the phone, opened WeChat, thought for a moment, and started looking for someone in the address book...

"Ji Gong, are you busy recently?"

"Huh? Guo Juju, you are free today, we are okay, the neighbor is still working overtime, haha!"

"Don't panic, Ji Gong, you're going to be busy soon, overtime is for sure, it just depends on how long it's going to be!"

"I'm timid, don't scare me, it's almost National Day now, what's wrong?"

"hey-hey……"

"Guo Daxia, don't be a fool, what's going on?"

"It has to be kept secret, you can't tell it!"

"Guo Juju, Guo Daxia, you can't be so unkind. In this way, I invite you to Donglaishun to eat hot pot this weekend!"

"Okay, but Lao Ji, it's only because our relationship is strong enough that I will tell you in advance. You must keep it a secret, and you must not spread it outside, you know?"

"Don't worry, my surname is Ji, don't you know Guo Daxia? My mouth is the tightest part of my body!"

"Let me tell you, that Professor Ning from Yanbei University has made another big move. As soon as I went to work today, I directly saw the vulnerability package sent by this big guy, including Intel's hardware vulnerabilities, win10 system vulnerabilities, and IBM, Oracle, Google, Facebook, Twitter...all of them have been hit! And every vulnerability is comparable to the Javalog4J2 vulnerability level he just exposed, and even higher, any one of them can cause systemic security risks! !!"

"Fuck...Guo Daxia, are you sure you're not joking?"

"Do you think I'll joke with you when I'm free early in the morning?"

"Professor Ning... Forget it, I'm convinced! I'm completely convinced! If you want me to say that a mathematician should study mathematics well, you can't just cross the border if you have nothing to do!"

"Who says it's not! Remember, keep it secret!"

"Don't worry! Then, can the exploit kit be delivered?"

"I want to eat farts! Such a big matter must be fully evaluated by experts before it will be issued to the cooperative unit. Just wait and be mentally prepared first!"

"Row!"

……

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like