March 18, 1988, New York, USA, Raptor Fund Office.

Allen Costa, who was in charge, was watching a group of Chinese people install a computer system.

The United States is a global technological powerhouse, and computers were originally born in this country. It's somewhat ironic that the installation of a piece of software now requires Chinese people to do it.

However, Allen Costa had no such thoughts, because he was very much looking forward to the performance of this new system in the financial markets.

Wang Duoyu has developed a new quantitative trading system and handed it over to the engineering team at Want Want Group, asking them to travel to the United States to help install the software.

Once installed, Wang Duoyu can also use his Dawning supercomputer to access the software's backend and check relevant information in the basement of the villa on the island in the lake.

Wang Duoyu did not personally operate and complete the system software; instead, he had the traders at the Xunmenglong Fund complete it.

All that's needed is to train these traders and utilize the new software system and data models, then the Raptor Fund can simply sit back and make money.

This quantitative trading system is based on the underlying logic of strong solutions to the Navier-Stokes equations. It utilizes various fundamental models to solve complex mathematical problems with multiple uncertain variables, such as chaotic universes and global ocean currents, and is supplemented by high-order analytical solutions such as the hybrid finite element method, the unstructured finite volume method, and the dual time step finite volume method.

Once such a mathematical model is established, precise statistical calculations and market analysis can be performed to fully quantify the future market trend.

When applied to the financial field, all possible variables will be exposed within this quantitative trading system.

That's how you make money while lying down.

"The software has been installed and tested. Once your traders have completed their training, they can start using it."

After the Chinese engineer finished the installation, he said to Allen Costa.

"Thank you, thank you!"

Allen Costa was extremely grateful.

As the head of the Velociraptor Fund, he was naturally very clear about who was behind these engineers.

Moreover, before joining Velociraptor Technology, he had worked at Summit Global and had also visited the Want Want Group headquarters.

He wouldn't be at the Want Want Group's global headquarters unless he was someone who was highly trusted.

Having met Wang Duoyu, Allen Costa now understood why people like Li Efra were able to make so much money in such a short time.

Everything is because of Wang Duoyu.

Following Wang Duoyu, one can become a millionaire, or even a billionaire.

In this way, discrimination and the like will not exist at all.

After everyone left, Allen Costa couldn't wait to have the testing begin.

In just two days, with an investment of only $100,000, he earned more than $5,000, which amazed everyone.

So how exactly does this make money?

For example, they recently saw a stock report about Coca-Cola whose opening price was unusual compared to the previous day's closing price.

Whether the anomaly is high or low, Allen Costa and his team will use quantitative trading systems to operate in the opposite direction, profiting from the market's irrational reactions.

Another approach is to use advanced algorithmic models to identify price differences between different financial instruments for arbitrage trading.

This includes, but is not limited to, arbitrage opportunities across markets and asset classes, such as price differences between bonds of different maturities, where one can profit from the price difference by buying undervalued assets and selling overvalued assets.

This is what makes quantitative trading systems so powerful.

A variety of different trading strategies allow the Raptor Fund to earn high profits in a very short period of time.

"God, this is incredible!"

After the test was completed, Allen Costa immediately contacted his superiors to report on how much funding should be invested and how to conduct more reasonable arbitrage, all of which needed to be reported.

Wang Duoyu hired several mathematicians at high salaries to help with these tasks.

They don't need to be in New York; they can accomplish these things from Harbin.

Take Coca-Cola stock as an example. If you want to make money by using the market overreaction strategy, you need to compare today's opening price with the previous day's closing price to determine your next move.

There are models that can be used as a reference for these.

Mathematicians are there to provide support and guidance, while traders are the frontline employees who execute orders.

In addition to market overreaction strategies, arbitrage trading strategies, trend and momentum strategies, there are also high-frequency trading, market-neutral strategies, quantitative methods, and focusing on disequilibrium phenomena, among others.

With so many strategies at their disposal, making huge profits is no longer a big deal for the Raptor Fund.

Of course, such a powerful financial tool must be kept secret and has proprietary models, and possess the ability to closely guard against trading algorithms and methods in order to have a competitive advantage in the market.

Allen Costa soon received instructions from his superiors: eight hundred million US dollars.

The Velociraptor Fund will not publicly raise funds for the time being, and will only use its own funds to generate profits.

For Wang Duoyu, testing the waters with 800 million US dollars is nothing.

Harbin, the ice city, Harbin Institute of Technology Weizigou Campus.

A few days ago, Shing-Tung Yau and his colleagues were gathered together for a brief meeting in the mathematics department building on the Weizigou campus.

That is about putting the Harbin Institute of Technology Mathematics Journal online, and sharing the proof paper about the Artin conjecture.

Both tasks were completed quickly.

Charles Feufman and others were not opposed to the internet.

Once Wang Duoyu's paper is approved, it will be published online as soon as possible.

As for how many people will watch it, that depends on each individual.

Yau Shing-Tung and his friends will definitely share this with their respective friends.

After all, the Harbin Institute of Technology Mathematics Journal is based in Harbin, while many mathematics professors are scattered all over the world. If the print version of the journal needs to be delivered to these people, it will take at least half a month.

On the other hand, there's the efficiency abroad, but let's not even go there.

Therefore, once the network is connected, everything becomes much simpler.

In fact, many people now use email for communication.

For example, many foreign companies in Harbin communicate with their global headquarters bosses via email.

After dealing with this matter, Wang Duoyu immediately completed the quantitative trading system and gave it to the Xunmenglong Fund.

The reason it's Velociraptor Fund, and not Summit Global or Maple Tree Capital, is that...

The reason is simple: he doesn't want to be the center of attention.

It was only a matter of time before the Velociraptors Fund attracted attention.

But if it can be delayed, that would naturally be better.

Because whether it's high-frequency trading, arbitrage trading, or other strategies, they are absolutely a game-changer for Wall Street today.

Even Renaissance Technologies, which is already on the verge of development, is still a junior compared to the Raptor Fund.

Once the Raptor Fund attracts attention, the company's future development will be affected to some extent.

On the other hand, Wall Street capital is extremely greedy, and they will definitely try every means to copy the money-making methods of the Raptor Fund.

Therefore, the entire Velociraptor Fund must be kept highly confidential.

Therefore, everyone in this company must be highly trustworthy to be able to join.

The non-compete agreements signed by all employees have penalty clauses of up to one billion US dollars for breach of contract. This is not because their salaries are hundreds of millions of dollars, but because the agreements are subject to absolute confidentiality.

In addition to the non-compete agreement, there was also a thick confidentiality agreement.

In short, any clauses that could potentially lead to the disclosure of confidential information, and that comply with relevant U.S. laws, will be included in this confidentiality agreement.

Eight hundred million US dollars is not a lot, but it's not a small amount either.

Wang Duoyu had high expectations for this Velociraptor Fund, but he would be satisfied as long as he could earn an annual interest rate of over 80%.

According to the quantitative trading system he provided, an annual return of 80% should not be a problem.

However, the international financial market in 1988 was relatively uneventful.

Most importantly, the New York Stock Exchange and the Chicago Mercantile Exchange will implement circuit breaker mechanisms in the second half of the year.

As a form of risk control, the circuit breaker mechanism is also called the automatic trading halt mechanism.

This refers to the trading halt measure taken by the exchange to control risk when the stock index fluctuation reaches the prescribed circuit breaker point.

Specifically, it is a mechanism that sets a circuit breaker price for a certain contract before it reaches its daily price limit, so that the contract's buy and sell quotes can only be traded within this price range for a certain period of time.

Last year's stock market crash terrified the whole world.

Many bigwigs in the US are also saying they can't stand it anymore.

Therefore, adopting such a circuit breaker mechanism can effectively control risks and prevent the stock market from losing a large amount of money in a short period of time, causing great damage.

Wang Duoyu knew all this, which is why he made these demands of the Rapid Dragon Fund.

He wasn't very confident that he could achieve an annual interest rate of 80%.

After all, eight hundred million US dollars is not eight million US dollars; the two represent completely different amounts of capital costs.

When funds reach tens of millions, hundreds of millions, or even close to one billion, the difficulty of achieving a certain annual interest rate increases exponentially.

For example, achieving a 10% annual interest rate on a billion US dollars is much more difficult than achieving a 20% annual interest rate on a hundred million US dollars.

After approving $800 million for the Velociraptors Fund, Wang Duoyu stopped paying attention to things in the United States.

His next focus will be on the Riemann Hypothesis.

The difficulty of this top-level math problem needs no further explanation.

This is mainly because it involves extremely complex mathematical theories and tools, including complex analysis, number theory, harmonic analysis, etc., and the proof process is extremely complex, requiring the resolution of many unknown problems.

To put it in a way that's easier for ordinary people to understand, proving the Riemann Hypothesis is like being a sage in the East or a God in the West.

omnipotent!

Wang Duoyu wants to be God, so he needs to deduce and solve the Riemann Hypothesis.

It wasn't just to complete a crucial piece of the Langlands program, but also to prove that at thirty-two, his mind was still at its peak.

Last year, Wang Duoyu also derived and proved the boundary problem of the zeros of the Riemann zeta function. Next, he needs to ensure that 1.5 billion non-trivial zeros all satisfy the real part of 1/2.

Proving the existence of 1.5 billion nontrivial zeros is no easy task, let alone the need for theoretical support.

Moreover, after proving 1.5 billion nontrivial zeros, it is still necessary to prove other zeros and related issues.

Therefore, Wang Duoyu knew that this was difficult and would take a long time, whether it would be a year or ten years, he did not know.

If he could creatively find a shortcut and then connect these 1.5 billion non-trivial zeros, everything would become much simpler.

As is widely known, the core problem in proving the Riemann Hypothesis is determining whether all the nontrivial zeros of the Riemann zeta function lie on the line with a real part of 1/2 in the complex plane.

Simply put, the core issue lies in the location of non-trivial zeros.

Except for trivial zeros, all nontrivial zeros lie on a line in the complex plane with a real part of 1/2.

Trivial zeros are those zeros located at negative even numbers, such as s = -2, -4, -6, etc., while non-trivial zeros are located in the critical band 0 < Re(s) < 1.

Wang Duoyu has some theories and ideas on how to derive and prove the Riemann Hypothesis, but it still requires a lot of time to prove.

Being God is not easy.

dong dong!

Just as he was busy thinking about the derivation and solution, there was a knock on the office door.

"Please come in!"

Wang Duoyu looked up at the large clock on the wall; it was already 12:10 PM.

The visitor was Yan Daowen, an unexpected guest, and there were two other people behind him.

"Professor Wang, I'm sorry to bother you, are you busy?"

Upon entering, Yan Daowen respectfully said:

"To make a long story short, the woman you noticed at the market helped the relevant departments successfully uncover several spies."

The spy was so well hidden, and the key point is that he was hidden for so many years, and no one discovered him.

Fortunately, Wang Duoyu had an unexpected encounter and managed to capture the spy, thus making a great contribution.

According to military regulations, he'll definitely receive a second-class merit award.

Yan Daowen came today to deliver these rewards to Wang Duoyu, since Wang Duoyu is also a member of the military and has always retained his soldier status.

However, he didn't serve in the military, so his rank was just a formality and didn't have any real effect.

"Thank you, you can just arrange for someone to deliver it. Why bother you, the leader, to deliver it personally?"

After listening to this, Wang Duoyu said with a smile.

After exchanging a few pleasantries, Yan Daowen handed the reward to Wang Duoyu and then said he wouldn't bother him any longer.

The main reason is that Yan Daowen and his group didn't have anything else to do; they just came to deliver this reward, nothing more.

However, Wang Duoyu still understood the other party's intentions.

If it were just about delivering these rewards, Yan Daowen wouldn't have needed to come in person.

As for the fact that they came over but didn't say anything, they were in a hurry to leave.

The reason was simple: Yan Daowen had glanced at Wang Duoyu's desk a few more times.

The desk was located more than ten meters away from the reception area, and it was covered with a dense stack of papers.

Yan Daowen's own desk also had many books, but it wasn't covered with papers like Wang Duoyu's.

Yan Daowen, who wasn't very familiar with Wang Duoyu's desk, had heard that it was usually very clean, only when Wang Duoyu was busy solving math problems.

At his most extreme, Wang Duoyu could cover the entire office with paper.

"Leader Yan, please sit down and have a cup of tea. I'm sure you came here for more than just these things, right? Is there something else?"

Wang Duoyu took the initiative to ask, getting straight to the point.

There's no need for formalities, since we don't usually talk much.

Five or six years ago, Yan Daowen's position was Lin Dehong.

However, the latter angered Wang Duoyu, and as a result, Lin Dehong has not appeared in front of Wang Duoyu for the past few years.

Even though Lin Dehong had been trying to win him over for several years, Wang Duoyu never had the time to pay him any attention.

"Yes, Professor Wang, you may not know this, but over the past few years, a lot of our classified information has been leaked."

Upon hearing this, Yan Daowen immediately spoke seriously.

He was one of the heads of the Mach 5 fighter jet project, in charge of security and protection.

The secrets surrounding the Mach 5 fighter jet project are known to no outsiders.

Of course, perhaps some information has already been leaked, but it hasn't been discovered yet.

After all, the Mach 5 fighter jet project was established in May 1982, and it has been six years since then.

If there really was a leak, it wouldn't be incomprehensible.

Of course, if such a thing were to actually be discovered, Yan Daowen would probably go crazy.

The leaks he mentioned concerned engineering projects that did not have the same level of secrecy as the Mach 5 fighter jet project.

For example, the troops stationed by Yan Daowen himself, and the Yuanchang large wind tunnel laboratory, etc.

"All these leaked projects are truly shocking."

"Professor Wang, I sincerely want to ask you how to do a good job of keeping secrets and how to find those hidden spies?"

Yan Daowen believed that the example of Wang Duoyu discovering that the lady had used US dollars to catch a spy when he went to the market to buy loach was just a coincidence and could not be considered a common occurrence.

However, Wang Duoyu has always had many ideas and is very smart.

Therefore, if we could take a little of Wang Duoyu's time to offer some guidance, we might be able to salvage a lot of the losses.

Besides, Wang Duoyu was originally the technical head of the Mach 5 fighter jet project, and he was also a soldier.

So it's perfectly reasonable to ask him for advice on this kind of thing.

"Please explain this word? That's too much for me, I don't deserve it," Wang Duoyu said with a laugh.

For him, a brief chat with someone is just right.

Besides, it was already past noon, and he should have lunch by then. So he kept it brief and chatted with the other person for a short while.

"We all know that spies can hide very well. If it weren't for a chance encounter, it would be very difficult for us to discover their existence, and we might even mistake them for our comrades."

"Times are changing. It has been almost ten years since the reform and opening up. In the past few years, our economy has developed rapidly, but at the same time we have also been severely impacted in terms of ideology and culture. Some of our former comrades have quietly become our enemies."

Upon hearing Wang Duoyu's words, Yan Daowen frowned, appearing quite uneasy.

The world today is actually very volatile.

The current world order appears very stable and calm, but danger has already quietly arrived.

In the eastern part of continental Europe.

Among the many islands of Japan.

Inside the white palace on the North American continent.

Whether it's espionage in the business world or intelligence work in other areas, good and bad people are mixed together.

This also proves the saying that the difference between genius and madness is often just a matter of a single thought.

But no matter what the current international context is like, or how it changes, doing your own thing well is the most important thing.

I won't go into details about methods such as strengthening ideological management.

After a pause, Wang Duoyu continued:

"As for how to find those spies hiding among them, that requires us to discover them. Let me give you a few simple examples."

There are many high-tech technologies available today, and drones are one example.

Some people remotely control drones to fly in the sky and take photos that seem pointless but actually reveal secrets.

What I fear most are those people with ulterior motives who will take photos, pretend to be photographers, and then go to the vicinity of military bases to "take pictures".

This is blatantly causing trouble.

There are also satellites in outer space, which can also take very clear pictures of buildings on the ground.

Therefore, it is necessary to keep certain key protected buildings and similar projects confidential and not disclose them casually.

"Furthermore, suspects could be found within a two-kilometer or even ten-kilometer radius of military bases."

"These people disguise their cameras as rocks, bird nests, or even birds, and then fix them in one place. Through such lenses, they can accurately capture relevant information about our military base."

"So these are the most basic investigation tasks. We need to conduct regular thorough cleanings every week or month, and carry out a carpet search of the surrounding area to take down all these high-tech products that are in the open!"

As Wang Duoyu recounted these examples, Yan Daowen's eyelids twitched violently.

After all, Wang Duoyu is a researcher, and Harbin Institute of Technology has developed many high-tech products. This year, Harbin Institute of Technology will also launch a civilian version of the drone.

Therefore, it will become increasingly difficult to maintain secrecy.

By 12:26, ​​Wang Duoyu had finished his presentation.

Yan Daowen was deeply moved. He thanked Wang Duoyu twice and then got up to leave.

Wang Duoyu tried to politely persuade the other party to stay, but to no avail, and the other party left quickly.

After watching the other person leave, Wang Duoyu went back next door to have lunch.

Lunch is a bit late today.

When they entered the living room, Wang Junhong and the others had already started eating.

While Wang Duoyu was having lunch, on the other side of the world, in a villa in the suburbs of Casper, Wyoming, an eighteen-year-old named Layton Lambert was frantically typing on a keyboard.

"Almost there, Fuck, almost there, I'm about to find you."

Leiden Lambert was originally a college student at the University of Wyoming, but his idol was Bill Gates, so he followed suit and dropped out.

But Bill Gates comes from a family with a strong academic background, and he dropped out of school because he wanted to start his own business.

Leighton Lambert did such crazy things purely because he idolized his idol.

Initially, after Leighton Lambert dropped out of school, he did indeed live in poverty for a period of time.

However, he soon discovered that he had great talent, mainly in programming and other areas.

This kid studied like crazy for half a year and has mastered incredibly awesome programming skills. Then he started to dominate the internet.

He then quickly met two other hackers, one nicknamed Ghost and the other named Church.

Leiden Lambert, on the other hand, gave himself the nickname "Light," which he thought was very cool.

Today is March 20th. He, Ghost, and Church have agreed to attack Facebook's website together because they have received an order to crash Facebook for a week.

The offer is one million US dollars.

This price is not low; in fact, it can be described as very high.

He had never seen so much money before, and agreed without hesitation.

He, Ghost, and the Church split the million dollars equally.

In reality, given their hacker status, acquiring money wouldn't be that difficult for them.

The most legitimate option is to find a programming engineer job at a tech company like Apple, Microsoft, or IBM, where you can easily earn a monthly salary of two thousand dollars.

Otherwise, given their destructive nature, they could stir up trouble all over the internet, or even directly breach bank website systems and cause some problems.

Who knows, you might be able to make a lot of money.

Similar to now, they are able to receive relevant orders, and after completing the task, they can receive the remaining balance.

Inside Facebook's U.S. headquarters office, a group of engineers are busy searching for the locations of Layton Lambert, Ghost, and Church.

"An address has been identified in Kasper, Wyoming."

"The second address has also been confirmed; it's in Carson City, Nevada."

"However, we still can't pinpoint the third address, which is the location of the ghost. The other party is quite elusive; their skills are truly remarkable."

The engineers were somewhat helpless, and then suggested that they apply for support from China.
If they apply for support from China, it would mean that all of these engineers are idiots.

If they can't even catch a hacker like that, their skills must be really bad.

"Don't rush to apply. Let's borrow Azure's supercomputers. They have more than ten Nebula supercomputers and two Dawning supercomputers, which is more than enough."

One of the most technically skilled engineers in the department offered this advice.

The next second, the department head adopted the suggestion and began to take action.

The three hackers who attacked Facebook's website, one of whom, known as Ghost, was indeed very skilled.

This guy's skills are amazing, and he even used several supercomputers in the United States as botnets, which meant that every time Facebook's technical engineers tried to track him down, he managed to escape.

However, as the number of supercomputers abandoned by the other side increases, their last traces will be nowhere to be found.

However, what needs attention now is that once the other party physically disconnects from the internet, it will be very difficult for them to track them down.

Therefore, not only is a swift victory necessary, but it is also crucial to create the illusion that the enemy is no longer able to catch up and is about to escape.

Hackers are the craziest group of people because there is no such thing as order, law, or rules on the internet.

You could even say that the hackers' own behavior is the rule.

In such a wild and untamed place, they could act with complete impunity.

Even years ago, a hacker named Kevin was imprisoned for hacking into the North American Air Defense System.

But a few years later, Kevin was released from prison, and he is currently on the run. Nobody knows where that bastard is now.

Anyway, the world is so vast, no one knows exactly where he went.

With such predecessors, hackers like Ghost, Church, and Layton Lambert would naturally follow in their footsteps.

However, Layton Lambert is unaware of Kevin's existence yet, since he has only been in the hacking business for a short time.
"Fuck, how are they so good?"

The ghost was somewhat panicked.

He had just abandoned that supercomputer at the San Diego Supercomputing Center. Only he knew how difficult it would be to open a backdoor on such a botnet.

Many laboratories across the United States have supercomputers, but not every supercomputer is connected to a network.

So it's not like he can just get in whenever he wants.

However, Ghost has created backdoors on both publicly available supercomputers and those that are not publicly available but are connected to the Internet.

Some of them are completely unusable, while others are botnets belonging to other players.

In the United States alone, there are more than 380 supercomputers of all sizes connected to the internet.

However, Ghost only acquired eight supercomputers as its botnets.

And he was absolutely certain that only he had this backdoor, and no other hacker had such a backdoor.

In order to compromise Facebook's website, he was forced to discard four supercomputers. If he continues like this, he is likely to be discovered.

Therefore, the best solution now is to physically disconnect from the internet and then escape quickly.

The place he lives in now is a house he rented using someone else's ID card, so he doesn't need to worry about being discovered at all.

But he couldn't escape being quickly located and captured.

With a predecessor like Kevin around, Ghost didn't want to go to prison.

What others may not know is that Ghost checked out the prison situation via the internet after Kevin entered the prison.

In short, it was a complete disaster.

In this situation, if he didn't want to lose his freedom, he had to hide.

"Run away!"

After the fifth supercomputer was compromised, Ghost could no longer withstand the attack and decisively disconnected it from the network, then deleted all traces of the computer.

He then took out his external hard drive, tidied up his luggage briefly, made sure he hadn't left any trace, poured some gasoline, and lit a cigarette.

The cigarettes were on the table, and the gasoline was on the other side.

In addition, to ensure the gasoline inside the house could burn, he lit another incense stick.

After taking these measures, he calmly closed the door and quickly left.

After arriving downstairs, he put his luggage in the car, stepped on the gas, and quickly drove away.

Even if Facebook sends people here, it won't help.

He had to do it out of caution.

As for the one million dollar task, let whoever wants to do it do it.

Ghost never expected that Facebook would be so powerful. He was outmatched and had to admit defeat.

Just as the ghost left, Facebook quickly received the news.

Since no ghost personally intervened, Facebook engineers quickly located the ghost's IP address, thus pinpointing its location.

In this way, Facebook also realized that the ghost must have physically disconnected from the internet and had definitely left that place.

"Chase them! Send men over there immediately; it might still be in time."

Facebook doesn't have many branches across the US, but the person in charge, Tong Zhigang, can contact Zheng Baoyin and others to help dispatch security personnel from the local branch.

Two hours later, the results came back: the ghost had long since disappeared, and the building had caught fire and turned to ashes, making it impossible to find any trace of him.

"Investigate! Find out the truth for me!"

Upon learning of this, Tong Zhigang immediately issued an order, instructing Facebook's senior executives in the United States:

"Whether it's Ghost or any other hacker, you must find them as soon as possible. We can't let these people get away with it. Expose all the hackers who have attacked Facebook."

"The United States may not have perfect laws regarding cybercrime yet, but that's okay. We can expose these hackers, leaving them nowhere to hide. We can make their appearances, ages, home addresses, and everything else public!"

"To avoid legal issues such as portrait rights, Facebook could bypass these by creating a separate website, establishing a hacker ranking system, and making this information public."

"Then our Facebook website can repost and report this news, thus preventing similar situations from happening again."

Upon hearing this, a Facebook US executive posed a counter-question: "What if these hackers launch a full-scale attack on our website?"

"Are we really incapable of maintaining this website?"

Tong Zhigang's rhetorical question immediately left the executive speechless.

Often, people's thinking is fixed.

These kinds of incidents are actually quite simple.

As an internet company with a huge team of software engineers, how could Facebook not even be able to protect a single website?

Furthermore, establishing a robust security mechanism to protect the normal operation of the website is what Facebook should be doing next, and it's something the company itself should be doing.

"Now that we've caught these two hackers, Layton Lambert and Quint Van Buren, what should we do?"

"See if we can recruit them. If not, then hand them over to the FBI."

The next day, Wang Duoyu also received the message.

He was somewhat surprised to learn that Facebook had been hacked.

Especially the hacker Ghost, who actually escaped, leaving Wang Duoyu speechless and helpless.

"With so many of you, you still can't catch each other? Are you all really that pathetic?"

Tong Zhigang was speechless after being rebuked by Wang Duoyu's words.

First, the domestic system and the overseas system are two different systems.

Domestically, programming is done in Chinese, which is more concise.

But programming abroad is done in English, which is not only more difficult but also more challenging.

On the other hand, the United States has many supercomputers, and the hackers used these supercomputers as botnets, which is why they were able to escape so quickly.

"But you did a good job with the hacker ranking list you mentioned; they should be exposed like this."

Changing the subject, Wang Duoyu praised:

"You need to create this hacker ranking list as soon as possible, and assign someone to collect information on this topic. You must expose them."

"However, we need to protect our people, especially regarding secrecy; we can't afford to give anyone any leverage against us."

"It would be best to set up a separate company specifically for this kind of work, separating Facebook from the company itself."

Upon hearing this, Tong Zhigang nodded repeatedly.

The call lasted for nearly eight minutes, much longer than usual.

After hanging up the phone, Tong Zhigang's face darkened; being criticized by Wang Duoyu was not a good thing.

He hadn't expected Wang Duoyu to take this matter so seriously, which showed that the destructive power of hackers far exceeded his imagination.

On second thought, Tong Zhigang understood.

Facebook survives entirely on traffic. Even though it hasn't added ads yet, Silicon Valley investment firms like Sequoia Capital have been sending Facebook inquiries about Series A funding.

It's clear that everyone sees Facebook's potential on the internet.

Even though Facebook is not profitable at all and has very little revenue, it doesn't stop people from being optimistic about it.

On the other hand, several internet companies similar to Facebook have also emerged in Silicon Valley, Los Angeles.

A thorough investigation would reveal that the investment firms behind these internet companies are none other than Sequoia Capital and others.

In other words, Facebook is very important, and its market potential is far greater than what companies like Sequoia Capital are currently seeing.

Therefore, if Facebook were to be hacked and something were to happen, Facebook's reputation among ordinary internet users would be greatly diminished.

It's even possible that the reason Facebook was hacked this time was because someone was behind it all.

Why? Because Facebook is currently the only internet company in the United States with more than 100,000 daily active users.

"Could it be that Sequoia Capital and others are making underhanded moves because Facebook didn't accept the Series A funding from the US?"

Thinking of this, Tong Zhigang's eyes grew even colder.

Therefore, we really need to be extremely cautious going forward. (End of Chapter)

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like