亚洲日本欧美偷拍卡通

Chapter 192 - 192 Shudder



Thank you readers!

That was because they were simple minded!

After this press conference, no one would have the right to choose.

The Divine Dragon System would become everyone’s only choice.

Li Chengqian continued, “In the Windows system, I found the 1996 code.”

!!

“In the Apple system, I also found a similar code…” Li Chengqian began to demonstrate again. After entering a line of code, the much idolized Apple system copied all the files onto his desktop.

Apple computers, Apple tablets, and Apple mobile phones were all the same as long as they were equipped with Apple systems!

It was exactly the same as the performance in the Windows system. As long as any file updates appeared, the updated files would be updated to Li Chengqian’s desktop at the same time.

Then, there was the Linux system! And all systems that used the Linux kernel, such as the Android system, such as the Red Hat system…

It was the same, a line of code could steal all the data!

Moreover, all equipment that used the Linux core could be controlled by this line of code. Phones, televisions, routers, game consoles at home…

There was an uproar. Everyone was dumbfounded as they watched Li Chengqian’s demonstration.

Apple system!

Linux system!

Windows system!

All systems had similar codes for monitoring users.

Security was non-existent!

Privacy was nonsense.

“F*ck, my computer is installed with anti-virus software that costs a few hundred yuan a year. It’s useless at all. We are defenseless in the face of the three companies.”

“Why? Why is Apple also doing stupid things like monitoring users?” It was the foreign reporter who was using Apple. He was an Apple fan. Previously, he was still smug and said that the Apple system was very safe and would not steal user data.

He was crestfallen. He no longer knew who to trust anymore.

Many people at the scene were using Apple phones. When they saw what Li Chengqian demonstrated on stage, their faces fell.

People pay more to use Apple phones because they were supposed to be safe and useful!

In particular, there were many girls who had all kinds of selfies on their phones.

After watching Li Chengqian’s demonstration, they were very nervous. Some people quickly turned off their phones, while others quickly deleted their private photos, afraid that the code Li Chengqian had released would cause the private information in their phones to be leaked.

Then how could they face anyone in the future?

“It’s too scary! The world is under the surveillance of these three companies! As long as you use a computer, your data will be leaked overseas.” Academician Lin Qu felt a chill down his spine.

“Fortunately, the country has long been suspicious of the security of the operating systems. Our secret unit’s network is isolated from the internet. Otherwise… the consequences would be unimaginable!” This was the only consolation that Academician Lin Qu had.

“This is too terrifying. He’s simply a spy and a robber!” Even Principal Wu’s eyes were filled with fear. If the three companies included the equipment of the Divine Dragon University in their surveillance range, any scientific and technological achievements obtained by the University would fall into their hands.

“F*ck you, even the free, open source, and safe Linux. You even have this line of code in the system core. It’s too sinister! No wonder our software can’t beat those overseas. They’ve been stealing our hard work…” He Hongyun almost cursed. He was also shocked by the effect of Li Chengqian’s demonstration and broke out in cold sweat!

He thought of a possibility. Baidu had worked hard to develop new technology and algorithms. They would be ahead of their competitors initially.

And yet…

Before Baidu Corporation released the technology, his competitor had already used this line of code to steal the technology that Baidu had spent a lot of money to develop.

And they began to use this new technology.

How could they compete?

What was the point of playing like this?

On the other side of the ocean, Cook’s face darkened. He felt dizzy and his vision darkened. Fear emerged in his heart.

Because he got too emotional, he kept his hand pressed hard against his chest. Then, he felt a sharp pain in his chest.

He opened his mouth weakly, and his breathing was labored.

“President!” The assistant quickly poured a life-saving pill into his mouth.

Cook took a long time to recover. Then, he began to scold angrily, “F*ck, F*ck! This wicked bastard… Not only did he steal our company’s source codes, but he also used the stolen data to attack us.”

Apple products are so expensive. Why did they have such a big market share?

Because Apple was synonymous with high-end. It was synonymous with safety and ease of use.

This was the secret to Apple’s success.

Now, Li Chengqian made known the monitoring port left behind by Apple.

The security, privacy, and sophistication of Apple instantly became a joke.

Beads of sweat appeared on Cook’s forehead. He knew that if this matter was not handled well, Apple would face a major crisis.

However, Cook did not despair.

Windows only provided users with operating systems, which users could switch at any time.

As for Apple, its system was built into its equipment. It was a closed-source system. Even if the users were not satisfied, there was no way to change it.

Apple products are known for their high prices.

Now, the cost of getting users to give up on using Apple products and change their phones, computers, and tablets was not low. It was not something that could be changed just like that.

As long as Apple sincerely admits its mistake and handles the issue promptly and properly, it still has hope of retaining its users.

However, this matter would definitely have a huge impact. If it was not handled well, it would become a fatal problem.

On the other side, GKH, the person in charge of the Linux Foundation, who thought that he would emerge the biggest winner, was stunned. The monitoring code in the core of Linux had always existed, running and activating with the system’s core program.

Embedded in the support code at the base of Linux, even if Linux is an open-source system and its source code is widely distributed on the network, no one has ever discovered the issues in the core code.

All along, people’s impression of the Linux system was that it was safe, free, open-source, and stable…

GHK felt that from today onwards, the word “safety” would disappear from the description of the Linux system.

“So what if you found the surveillance code of the Linux system? This world can abandon Windows, but it can’t leave the Linux system!” However, although GKH was very surprised, he was still fearless.

So what if everyone knew that they were being monitored? Other than Linux, was there any other choice?

No!

In the server field, in the embedded systems, there is no alternative operating system to Linux.

This was where GHK’s confidence lay. Even if you knew that there was something wrong with my products, you have no choice but to use mine.

Want to cancel the listening port?

That was impossible because the port was the basic component of Linux. Unless the kernel of the Linux system was rewritten, it could not be canceled.


Tip: You can use left, right, A and D keyboard keys to browse between chapters.