Xueba's computing system
Chapter 173 System, take action!
Chapter 173 System, take action!
Musk gave this mysterious person, whom he had never met, access to the user database for one minute.
The reason for only opening it for one minute is not because of concerns about leaks, but because it is a fun game.
For the strong, it’s all about the heartbeat.
So, even if Musk didn't know who sent him the email, he was still happy to cooperate, because such an action itself was full of excitement.
What kind of genius would think that Dragon Country’s traditional Feng Shui could be combined with AI?
For people who have reached that position, because they know and own too much about the world, those mysterious and unknown things can often greatly stimulate their desire to explore. And for a technology fanatic like Musk, that is even more so.
But people like Musk are not willing to be manipulated.
So, he is willing to cooperate, but he will impose restrictions.
You want my data? Ok, no problem. But I'll only give you one minute. Let's play this game of racing against time.
From Lin Yuan's perspective, he was very conflicted.
Because Musk only gave it one fucking minute. One minute is useless.
It’s not that there is not enough time to check the data of those accounts within a minute, but that there is not enough time to check the data of those accounts without being discovered within a minute.
X platform is a social platform for the whole world. Its users cover the whole world, so its user information database is naturally huge.
One minute is only enough to complete an exact search, and is not enough to complete a fuzzy search.
When it comes to precise searching, we must first make one thing clear - every user on a social platform has a unique ID, including WeChat.
After obtaining the user information database permission, you only need to use this unique user ID to do an accurate search to get all the data of the user. If you want to get the data of a group of users, you only need to use the ID of this group of users as the search condition.
This is the most efficient way to do it, just like finding someone by their ID number.
But the trouble is that people will know your purpose.
The act of searching itself will leave traces, why do you want to search these people?
If something happens to these people later, such as being arrested or getting killed, then you can suspect that they are related to you.
Therefore, Lin Yuan was thinking of using the fuzzy search method.
The so-called fuzzy search means that when you want to search for a certain person, you don’t use his ID number to search, but instead search for people in the entire area where he lives.
This way no one will know which specific people you want to check.
But the trouble with doing this is that it is not efficient enough and the query time will be very long.
Musk only gave Lin Yuan one minute, which was obviously an attempt to turn the tables.
Logically speaking, Lin Yuan would never choose to use precise search. He didn't want to leave any traces.
But it was impossible to complete the information search of those accounts in one minute, and Lin Yuan did not want to interrupt the investigation of OCR. After all, so much preliminary work had been done, and only this last step was left.
Finally, he set his sights on Musk’s promise—he swore on his mother’s behalf that he would never record any trace of the data search.
It’s like, brother, I’ll give you one minute, and during this minute I’ll close my eyes and you can do whatever you want.
But Lin Yuan had no way of knowing whether the other party's eyes were really closed or just slightly open. He didn't have the authority to check the other party's network security monitoring system.
But Musk did swear in his mother's name.
Lin Yuan believed that in any civilization, "mother" is a very noble word. In the spirit of gender equality, he sent another email to Musk.
[Can you bring your father and your children along with you? Swear in the name of your entire family.] In the context of Longguo, this is called: swearing in front of your own household registration book.
Musk quickly responded on the social platform using Martian codewords:
[My friend, to show my sincerity, I am willing to swear in the name of all my family members: my promise to you will not contain any lies. Oh, by the way, my father is a scumbag, sorry he cannot be included in the category of my family. But my Xavier, my dead Xavier, I will also use his name. ]
Xavier? Lin Yuan didn't know who this was at first.
After a rough check, he found out that it was a child of Lao Ma who was alive but actually dead.
That was his eldest son. Xavier's body is still alive, but to Lao Ma, his soul is gone.
[I have received your sincerity. I deeply sympathize and regret your experience.]
-
The second evening.
Lin Yuan turned off his cell phone an hour in advance.
In order to avoid sudden network problems, Lin Yuan did not plan to use his own code to retrieve user information. Instead, he used the computing power system.
Musk has already posted a link that shows the X platform user data exposed on the Internet. This link is similar to a URL.
In today's vast global Internet, the number of accessible resources is like the water in the Pacific Ocean. Even if the computing system needs to obtain data, it must first be given a clear resource path. Lin Yuan stared at the time on his phone.
three minutes,
two minutes,
One minute,
10,
9,
.
.
0
[System, take action! ]
The system is very cooperative with this type of pure data retrieval and collection work. It will only be proud of Lin Yuan when it comes to data analysis.
The system probably thinks that this data is collected for AI training.
Therefore, a dumber system also has its advantages.
【Oracle database detected.】
【Login to the database successfully with the existing account and password. 】
[Perform an exact user ID group match lookup.]
. . .
【Successfully obtained data. 】
【The operation is completed.】
35 seconds, Lin Yuan completed the acquisition of user information of those accounts within a minute.
He immediately went to look at the system panel.
[User ID: twid_kv21skk82332, Nickname: ..., Common login location: NY.US, MAC: XXX]
[User ID: twid_jk21jsq298k2k, Nickname: ..., Common login address: TYO.JP, MAC: XXX]
[User ID: twid_p2i8swk021k9, Nickname: ..., Common login location: HK.CN, MAC: XXX]
【用户ID:twid_9s21u982ju8j2,昵称:。。。,常用登录地:SH.CN,MAC: 87-E2-D1-A6-32-CA】
When Lin Yuan saw this information, his first reaction was: Damn, you 50 people, you would never have thought that the foreign social platforms even collected your common login locations and MAC physical addresses.
However, VPN is a transit strategy that can be used to access the Internet from within China.
However, Lin Yuan guessed that these people overlooked one point when using the X platform - whether accessed through a client or a browser, the X platform can collect your personal information. The only difference is that the client can collect more information.
The browser also has an IP positioning function. Although it cannot accurately locate the visitor's location, it is still possible to locate it at the city level.
The client has more permissions and can easily obtain the MAC address of the device.
This MAC address is a globally unique ID card for network-connected devices, such as personal PCs and laptops.
So, what is the point of VPN? This is not how VPN is used.
But Lin Yuan thought about it and realized that this group of people were not professional. Because the X platform was from the United States, who would have thought that Musk, a madman, would open it to a stranger for one minute just for the sake of seeking excitement?
Lin Yuan looked at the collected MAC addresses and could hardly suppress his smile.
With this "device ID card" and the commonly used login location, there is only one step left to find the target.
However, Lin Yuan is not without risks.
When the members of this user group are arrested later, if OCR investigates the reasons for their arrest, they will probably suspect that their social account information has been leaked, and they will probably ask X platform to assist in the investigation.
Then, once Musk gets the user ID of the arrested person, he only needs to do a simple comparison and he will find out: Isn’t this the ID in the user group that the mysterious person has precisely searched?
That's the trouble with exact retrieval—the operation itself leaves a trace.
Now Lin Yuan can only hope that Musk will not joke about his own household registration book.
Of course, there is another possibility: maybe the arrest of these minions would not be enough to alert the X platform to assist in the investigation, so Musk would not be aware of this.
(End of this chapter)
You'll Also Like
-
Hogwarts: This Dark Lord is so evil.
Chapter 258 2 hours ago -
Fatal Strike: Paladins Mercenary Road
Chapter 740 2 hours ago -
The End of the Extreme Dao: I Planted a Sacred Tree and Gained Immortality
Chapter 253 2 hours ago -
Foolish Brother Odin
Chapter 317 2 hours ago -
Night World Players
Chapter 148 2 hours ago -
Master Craftsman of the Elven World
Chapter 224 2 hours ago -
Xueba's computing system
Chapter 279 2 hours ago -
What group are you guys?
Chapter 565 2 hours ago -
Young Again
Chapter 251 2 hours ago -
Chat group: My Fist of the North Star will never lose!
Chapter 269 2 hours ago