Font
Large
Medium
Small
Night
Prev Index    Favorite Next

Chapter 164 Phishing Software

Cybersecurity companies serve as auxiliary to the police, and this is an open secret in the industry.

But who did what the police did, which is the secret. Liu Cheng had done this before, so of course he knew the weight of it.

He signed the confidentiality agreement in his hand without much resistance. Then he picked up the documents and read them clearly one by one.

During this period, Director Peng had finished drinking tea, but he sat upright and did not disturb Liu Cheng's reading of the documents.

"Is there any technical difficulty in realizing it?" Director Peng asked with some expectations when he saw that Liu Cheng had finally finished reading it.

Liu Cheng nodded and said, "Technically speaking, it can be achieved, and there is no problem with this aspect. However, is it inappropriate for us to set up the server and filter the data?"

During the Trojan War, the Greek coalition forces attacked the city of Troy, which could not be captured for ten years, and were finally captured by a huge Trojan horse.

As a corruption method, black and gray industry is a means of corruption, cashing out, risk transfer, and debt transfer, and black and gray industry is also deeply rooted. How to completely control the trends of black industry?

The purpose of this simple and easy-to-use anonymous chat software that Liu Cheng wants to develop is to grasp the trends of black and gray products.

What it highlights is "security", but in fact, their data will be uploaded to the server in an orderly manner and then filtered.

"We do the data analysis, and the server maintenance still has to be carried out by Kuway. We don't have enough manpower." Director Peng said with a smile: "It's still a lot of trouble for Mr. Liu to do this kind of pilot."

"In fact, the director has a better partner, such as Hetian, who are much better than us in this regard." Liu Cheng raised his confusion.

Logically speaking, it will be more at ease to leave such things to your own people.

Liu Cheng’s Kuway Information is entirely his personal private company, which brings some uncontrollability.

Director Peng still said with a smile on his face: "Encouraging and guiding private investment into the field of cybersecurity is also strengthening services, guiding and standardizing management for private investment."

"Promoting economies of various ownerships, equality, fairness, competition and common development will help improve the social market economic system, be the basis for stable and sustainable development, and can truly promote long-term stable and rapid economic development."

"The growing cybercrime has attracted great attention from relevant departments. We should adhere to the idea of ​​expanding the team and strive for more people to join the team to prevent and control cybercrime in order to achieve long-term stability."

Liu Cheng carefully savored Director Peng's words, and nodded in agreement and said, "This software is very simple. Within one month, I will send it to the laboratory for review."

He understood, maybe it was because he was not equipped with enough manpower.

After all, the major national network security teams have their own fields and need to be busy. This new pilot business is most suitable for handing over to private companies in all aspects.

Director Peng was stunned and said in surprise: "Oh? I thought it would take a long time...then thank you Mr. Liu."

"Just call me Xiao Liu." Liu Cheng said sincerely.

Director Peng stood up and shook hands with Liu Cheng again, walked out of the reception room, and left the office.

"Goodbye Director Peng." Liu Cheng sent Director Peng away, holding the project book in his hand, and fell into deep thought.

Of course it is not the difficulty of design. The core of anonymous chat is the so-called point-to-point service. He is still very familiar with this. Liu Cheng believes that the back door he left behind will not be caught.

Moreover, in the project book, Kuway Information is also responsible for maintaining the update software, and the backdoor can also be maintained.

Liu Cheng has no psychological pressure to assist the police. The promotion methods of this kind of software are all Internet fission promotion.

Whether it is downloading or registering, an invitation code is required, and the acquisition of invitation code can only be passed on through word of mouth.

Based in the United States, serving criminals all over the world; users first and user needs as the core is the core competitiveness of this software.

Moreover, only those engaged in black and gray industries have this kind of needs: anonymity, encryption, voice change, digital wallets, and video recording.

From software development, to server architecture, to software maintenance, Kuway is responsible for everything, but they are responsible for data analysis.

Liu Cheng was unwilling to touch sensitive information. It would be useless to master so much black and gray data.

The Cyberspace Administration of Information Technology, which came out this time, was obviously very rich, had a very generous move, and even had a "commission".

After Liu Cheng operates the software, he will receive a revenue of 5 million yuan, and then, every effective message, Kuway Information will receive a reward of 30,000 to 500,000 yuan.

Fishing projects, volunteers take the bait.

Customers engaged in black and gray industry have a great demand for anonymous chat and point-to-point services, especially the data can be communicated between mobile and web pages, which will be very suitable for those engaged in black and gray industry careers.

And Liu Cheng thought of a successful case.

That is Sky Global. Sky Global is an encrypted telephone software. After being blasted by the FBI, a programmer of the company chose to cooperate with the FBI to continue to maintain and develop the software.

The programmer successfully created a phishing software that is extremely similar to the project book in Liu Cheng's hands.

At its largest scale, more than three million users registered and successfully cracked thousands of international bulk crime cases.

Finally, if it weren't for the stinky chess frivolous FBI, it would continue to operate stably, this phishing software that has been operating for three years.

"User first, user needs are the primary productivity." Liu Cheng stretched out his hand, wrote the basic framework and requirements of the software into the project book, and handed it over to R&D one.

Liu Yinuo walked in worriedly, and she asked anxiously: "What the hell is going on? What mistakes have you made? Why did the people from the Internet Information Office come over?"

"What mistake did I make? People come to discuss cooperation. The GO1 system has given us some reputation." Liu Cheng handed the project book to Liu Yinuo.

Of course, Liu Cheng will not disclose the specific confidential content to the public.

"This kind of point-to-point service is not allowed in China." Liu Yinuo immediately grasped the key points.

"The legal gap in this regard, but in China, the so-called point-to-point service, based on the national conditions of China's large intranet, is all pseudo-point service." Liu Cheng tentatively explained the architecture of China's Internet.

But Liu Yinuo was confused.

Liu Cheng said helplessly: "Because the decreasing IPv4 address resources are being used, most households and individual users will connect to ISP routers and use network address translation to connect to external networks. Due to the limitations of network address translation protocol, point-to-point services in China almost do not exist."

"I'll give an example..."

Liu Yinuo was a little overwhelmed when she heard this. She said with great confidence: "Good brother, stop thinking about it, just don't violate the law."
Chapter completed!
Prev Index    Favorite Next