Chapter 179
Hearing the discussions around him, many people were saying that they should choose the safe and free Linux system and the safe Fruit system in the future. When only a few people mentioned that they should choose the Shenlong system, Li Chengqian sneered in his heart.
Because, they think too simply!
After this press conference, no one has the right to choose.
The Shenlong system will become the only choice for everyone.
Li Chengqian continued, "In the window system, I found the 1996 code."
"I also found similar codes in the Fruit System..." Li Chengqian began to demonstrate again. After entering a line of code, all the files in the Fruit System, which was deified by the user, were placed on his desktop.
This is true for Fruit Computer, Fruit Tablet, Fruit Phone, as long as the device with Fruit system installed!
The behavior is exactly the same as in the window system. As long as any file is updated, the updated file will be synchronized to Li Chengqian's desktop.
Then, there is the Linux system! And all systems using the Linux kernel, such as Android systems, such as Red Hat systems...
It’s still one line of code that stole all the data!
Moreover, all devices using the Linux kernel can be controlled by this line of code, including mobile phones, TVs, routers, game consoles at home...
The scene was in an uproar, and everyone looked at Li Chengqian's demonstration in stunned silence.
Fruit system!
linux system!
Windows system!
All systems have similar code for monitoring users.
Security, does not exist!
Privacy is bullshit.
"My ctmb, I have anti-virus software installed on my computer that costs several hundred dollars a year, but it is of no use at all. In front of the three companies, we are not on guard."
"Why? Why does Fruit Company actually do stupid things like monitoring users?" The foreign reporter who uses Fruit Phone is a fan of Fruit. He was very proud before, saying that the Fruit system is very safe and will not steal user data.
His face now looks full of doubts about life, and he has been hit the hardest.
There were many people using fruit phones at the scene. After seeing the scene demonstrated by Li Chengqian on the stage, everyone had ugly expressions.
Isn’t it because you spend a huge sum of money to buy a fruit phone because you want it to be safe, smooth and easy to use?
Safe eggs!
Especially there are many girls who have all kinds of selfie photos on their mobile phones.
After seeing Li Chengqian's demonstration, they were very nervous. Some people quickly turned off their mobile phones, and some people quickly deleted the private photos in their hands, fearing that the line of code published by Li Chengqian would take away the private information in their mobile phones.
Then how will they see each other in the future?
"It's terrible! This world is under the surveillance of three companies! As long as you use a computer, the data will be obtained overseas." Academician Lingqu felt shuddering.
"Fortunately, the country has doubted the security of the operating system a long time ago. The networks of our secret units are isolated from the Internet. Otherwise... the consequences would be disastrous!" The only thing that makes Academician Lingqu happy is this.
a little.
"It's too scary. This is simply a spy or a robber!" Even Principal Wu had fear in his eyes. If the three companies included Shenlong University's equipment within the scope of monitoring, any scientific and technological achievements achieved by Shenlong University would be 3
obtained by companies.
"Fuck you, uncle, even open source, free, free and secure Linux has this line of code in the system kernel. It's so shameful! No wonder our software can't compete with overseas ones, they have been stealing ours. The result..." Stanley Ho almost yelled, but he was also shocked by the effect of Li Chengqian's demonstration and broke into a cold sweat!
He thought of a possibility. Qiandu Company had worked hard to develop new technologies and algorithms. After being used, it would have led its competitors.
However……
Before Qiandu released the technology, his competitors used this line of code to copy the technology that Qiandu had spent a lot of money to develop.
And start using this new technology.
How to compete?
Are you still playing with yarn like this?
Overseas on the other side, Cook's face suddenly turned dark. He felt dizzy, his eyesight turned black, and fear suddenly emerged in his heart.
Because his emotions fluctuated so much, he pressed his hand firmly on his chest, and a stinging pain came from his chest.
His mouth opened weakly, and his breathing was like a bellows.
"President!" The assistant quickly poured the life-saving medicine into his mouth.
Cook waited for a long time and finally recovered. Then he started to curse angrily, "Fuck, Fuck! This unscrupulous bastard...not only stole our company's source code, but also used the stolen data to Attack us."
Fruit equipment is so expensive, why do they dominate the market?
Because the fruit system is synonymous with high-end, safety and smoothness.
It has a good reputation and is the secret to the success of the fruit company.
Now, Li Chengqian directly announced the monitoring port left by the fruit company.
The security, privacy, and high-end of the fruit system suddenly turned into a joke.
Dense beads of sweat broke out on Cook's forehead. He knew that if this incident was not handled properly, the fruit company would face a major crisis.
However, Cook did not despair.
Because unlike fruit companies and Windows companies, Windows companies only provide users with operating systems. If users are not satisfied, they can replace them at any time.
As for the fruit company, the fruit system is built into the water equipment and is a closed source system. Even if the user is not satisfied, there is no way to replace it.
Fruit products are known for their high prices.
Now the cost of asking users to simply give up using fruit devices and replace their mobile phones, computers and tablets is a big expense, and it cannot be replaced by just replacing them.
As long as the fruit company sincerely admits its mistakes and handles the problems exposed this time in a timely manner, the fruit company still has hope of retaining users.
However, the impact of this incident on the fruit company must be extremely huge. If it is not handled properly, it will become a fatal problem.
On the other side, gkh, the head of the Linux Foundation, who thought he was the biggest winner, was stunned. The monitoring code in the Linux core has actually always existed, running and starting together with the core program of the system.
Embedded in the lowest-level support code of Linux, even if Linux is an open source system and the source code is widely spread on the Internet, no one has ever discovered the problems in the core code.
People's impression of Linux systems has always been that they are safe, free, open source, and stable...
ghk believes that starting from today, the word security will disappear from the description of Linux systems.
"What if you discover the monitoring code of the Linux system? This is a world that can leave the Windows system, but it cannot live without the Linux system!" However, although gkh was surprised, he was still confident.
What if everyone knows that they are being monitored? Are there any other options besides Linux?
No!
In the server field and the embedded field, there is no operating system that can replace Linux.
This is where ghk's confidence lies. Even if you know that there is something wrong with my stuff, you can only use mine. You have no choice other than me.
Want to cancel the listening port?
Chapter completed!