Many people equate geeks with hackers, but there is a certain difference between the two.
The word geek comes from the American slang geek. It originally means a person who has a fanatical interest in one or several specific fields and devotes a lot of time to research. It is mostly used in the computer field. It had a certain derogatory connotation at the beginning. During the PC revolution In the early days, it also evolved into a derogatory term for hackers.
But now, especially after the rise of a group of Silicon Valley tycoons such as Jobs and Gates, the word geek has also been given a new meaning, and it has begun to be labeled more as free, creative and unconventional.
Yes, geeks are such a group of people. They are adventurers on the Internet, hardware enthusiasts, hackers, communication enthusiasts, technology nerds, programmers, engineers...
"To put it simply, you can be anyone, as long as you fit in with our spirit, you can join the 01 Guerrilla Force," Philip said. "Of course, the vast majority of people who join are related to computers, although we have always hoped that there will be Girls who are on the cheerleading team or dancers join us.”
"…………"
"We have our own secret forum with self-made instant messaging software. We usually discuss some technical issues on it. You can also put your problems on it and wait for others to answer it, or simply show off your skills. The above People are very nice.”
"Is Edward one of you?" Zhang Heng asked.
"No, Edward...is not one of ours," the ponytail man said.
Zhang Heng raised his eyebrows.
"About a year ago, Edward hacked into our forum and the website we built together." Waldo still looked surprised when he mentioned this.
"Is it difficult?"
"Well, it's not too difficult. It's a little easier than hacking into the national defense system." Philip said, "The most important thing is that he did it quietly. If he hadn't left a message afterwards, The information was given to us and we had no idea he had been here.”
"what's the message?"
"At the beginning, it was just a greeting. You know, hackers say they are low-key, but in fact many of them are a group of guys who are eager for attention, especially the more difficult to achieve goals and bad things. Wherever you go, you can't help but leave something behind. For example, I know a guy who sneaked into the human resources system of the telecommunications giant SFR and sent multiple employees of SFR who were working overtime that night. Little red flower.”
"ha."
"It's the same thing with that guy. He left a pixel image of Pac-Man, but it's very small. It's in the lower right corner of the homepage. You can't see it if you're not careful. In short, that was our first encounter with Edward. , we later redid the firewall and encryption system, but the guy finally managed to get in."
"Are you angry?"
The ponytail man pushed up his glasses, "Angry? No, no, no, this is like a fun game for us. We enjoy playing against that guy, so we redid the forum again, but you can probably guess Yes, he defeated us again...but we all had a lot of fun in the process, and from that time on, we began to have further communication.
"We always thought that the other side was a group like us, but the fact surprised us. The guy said his name was Edward, and there was only one person. He said that he was hired by a very powerful organization and was working on a very cool project that could subvert the world. The project, once successful, will change the way everyone lives and travels, but the content and address must be kept confidential.
"We actually didn't take this matter too seriously at first, because you know, hackers, everyone doesn't like to brag. They will always brag to you about how powerful they were in the past, but in fact, the vast majority of them can't even They didn't live up to half of what they boasted about. Edward is very powerful. I admit this. No, it's not an exaggeration to say that he is the most powerful guy I have ever seen. But it is still a bit too exaggerated to say that he is overturning the world. But no matter what, we It’s like making a new friend.”
"In the future, Edward would come to our forum from time to time to brag and fart with us. Occasionally he would also reveal some recent events, but basically it was just what short skirt the executive wore today and how was lunch. He is a A very contractual guy who never discussed specific work until a month ago, when we suddenly received a group message from him saying that he didn’t know if he was doing the right thing.”
Philip said, "I asked him what happened and whether he had been under a lot of pressure at work recently, but he didn't reply. About another week later, he suddenly contacted me and said that he had escaped and had something very important in his hands. I asked him what it was, and he sent me a document, and from that document I could see that something might really be wrong."
"What's wrong?"
Philip looked around and lowered his voice, "This is a project called CTOS. They plan to build a powerful central control system that will connect all public facilities in the city to the network. It is like installing a brain for the city. Similarly, we can gain insight into hidden patterns that cannot be discovered by the naked eye from massive amounts of data. In this way, we can overcome the problem that in the past, decision makers with limited information could only make local optimal strategies and were unable to truly find the global optimal solution. Through calculation, we can redistribute the public resources to avoid wastage.
"I would like to use an analogy. If you connect the traffic lights at all intersections to the network, you can re-plan and calculate the optimal time allocation of each traffic light, saving travel time. At the same time, once an accident occurs on the road, the city brain will also directly feed the alarm back to the hospital. , let the ambulance arrive in the shortest possible time.”
"Sounds like a good idea."
"Yes, Edward thought so at first, but later he discovered that there are other purposes hidden behind CTOS. Once this system is established, it will not only be those public facilities, it will also actively collect the data information of all citizens, your phone messages, Medical records, medical insurance numbers, criminal records, favorite websites, chat partners, browsing history, chat content, and every credit card purchase will be mastered by it.”
"This is a disaster." The pony-tailed man said.
"Yes, this means that from now on, our every move will be under the surveillance of others. We no longer have any privacy. Even the room is full of cameras." Waldo also became rarely serious, "You never know when they're going to turn to your PC or your phone, or even your drone."
"And if things continue like this, things may get worse. This is only the first stage. In the second stage, CTOS will automatically analyze and mark everyone's dangerous tendencies. Of course, it is certainly a good thing to be able to prevent crimes in advance. It's a good thing, but we don't know in what way and algorithm it calculates everyone's dangerous tendencies. Without restrictions, each of us may be labeled as a dangerous person."