Chapter 180: shudder

Chapter 180 Shivering

Hearing the discussions around, many people were saying that in the future, they should choose the safe and free linux system and the safe fruit system. Only a few people mentioned that when they wanted to use the Shenlong system, Li Chengqian sneered in his heart.

Because they think too simply!

After this press conference, no one has the right to choose.

The Shenlong system will be the only choice for everyone.

Li Chengqian continued, "In the window system, I found the 1996 code."

"In the fruit system, I also found a similar code..." Li Chengqian began to demonstrate again. After entering a line of code, all the files in the fruit system deified by the user were placed on his desktop by him.

Fruit computer, Fruit tablet, Fruit mobile phone, as long as the device with the Fruit system installed, this is true!

It is exactly the same as in the Windows system, as long as there is any file update, the updated file will be updated to Li Chengqian's desktop synchronously.

Then, it is the linux system! And all systems using linux kernel like android like redhat OS...

Still one line of code, all data stolen!

Moreover, all devices using the linux kernel can be controlled by this line of code, such as mobile phones, TVs, routers, game consoles at home...

There was an uproar at the scene, and everyone was dumbfounded watching Li Chengqian's demonstration.

Fruit system!

linux system!

Windows!

All systems have similar codes for monitoring users.

Security, simply does not exist!

Privacy is simply nonsense.

"I, CTMB, my computer is installed with anti-virus software that costs hundreds of dollars a year, but it is useless at all. In front of the three companies, we have no defense."

"Why? Why does the fruit company even do stupid things like monitoring users." The foreign reporter who used the fruit phone was a fan of the fruit. He was very proud before, saying that the fruit system is very safe and will not steal user data.

He is now full of doubts about life, and he has been hit the hardest.

There were a lot of people on the scene using fruit phones, and after seeing Li Chengqian's demonstration on stage, everyone's faces were ugly.

Spend a huge amount of money to buy a fruit phone, isn't it because the fruit phone is safe, smooth, and easy to use?

Safe eggs!

Especially there are many girls, what kind of photos can be taken by mobile phones.

After seeing Li Chengqian's demonstration, they were very nervous. Some people quickly turned off their mobile phones, and some people quickly deleted the private photos in their hands, for fear that the line of code released by Li Chengqian would take away the private information in the mobile phone.

Then how will they meet people in the future?

"It's terrible! This world is under the surveillance of three companies! As long as you use a computer, the data will be obtained overseas." Academician Ling Qu felt shuddering.

"Fortunately, the country has doubts about the security of the operating system a long time ago. The network of our secret unit is isolated from the Internet, otherwise... the consequences will be unimaginable!" The only thing that makes academician Lingqu feel lucky is this. .

"It's too scary. This is simply a spy and a robber!" Even President Wu had fear in his eyes. If the three companies included the equipment of Shenlong University in the monitoring range, any scientific and technological achievements made by Shenlong University would be 3 companies obtained.

"I'm going to **** you, even the open source, free, free, and safe Linux has this line of code in the system kernel. It's too dark! No wonder our software can't do it overseas. They have been stealing ours. The result..." He Hongyun almost cursed, and he was also shocked by the effect of Li Chengqian's demonstration, breaking out in a cold sweat!

He thought of a possibility that Qiandu Company has worked hard to develop new technologies and algorithms. After they were originally used, they would be ahead of competitors.

Before Qiandu Company released the technology, its competitors copied the technology developed by Qiandu Company at a large price through this line of code.

and start using this new technology.

How to compete?

Still playing with wool like this?

Overseas on the other side, Cook's face turned dark all of a sudden. He felt dizzy, his eyes darkened, and fear suddenly appeared in his heart.

Because of too much emotional fluctuation, his hand was firmly pressed on his chest, and a stabbing pain came from his chest.

His mouth opened weakly, breathing like a bellows.

"President!" The assistant quickly poured the life-saving medicine into his mouth.

Cook waited for a long time, finally recovered, and then he began to curse, "Fake, Fake! This wicked bastard... not only stole our company's source code, but also used the stolen data to attack us."

Fruit equipment is so expensive, why does it occupy the market?

Because the fruit system is synonymous with high-end, safe, and smooth.

It is well-known and is the secret of the fruit company's success.

Now, Li Chengqian directly announces the monitoring port left by the fruit company.

The security, privacy, and high-end of the fruit system suddenly became a joke.

There were dense beads of sweat on Cook's forehead. He knew that if this incident was not handled properly, the fruit company would face a major crisis.

However, Cook did not despair.

Because it is different from Fruit Company and Windows Company, Windows Company only provides users with an operating system, and if users are not satisfied, they can replace it at any time.

As for the fruit company, the fruit system is built into the water equipment and is a closed-source system. Even if the user is not satisfied, there is no way to replace it.

Fruit's products are known for their expensive prices.

Now let users give up the equipment that uses fruit directly, and the cost of replacing mobile phones, computers and tablets is not a small expense, and it is not easy to change.

As long as the fruit company shows a sincere attitude of admitting its mistakes and handles the problems exposed this time in a timely manner, the fruit company still has hope of retaining users.

However, the impact of this matter on the fruit company must be enormous, and if it is not handled properly, it will become a fatal problem.

On the other side, GKH, the person in charge of the Linux Foundation, who thought he was the biggest winner, was stunned. The monitoring code in the Linux core has always existed, and it runs and starts together with the core program of the system.

Embedded into the lowest supporting code of linux, even though linux is an open source system, the source code has been widely disseminated on the Internet, but no one has ever found any problems in the core code.

For a long time, people's impression of linux system is safe, free, open source, stable...

GHK feels that starting today, the word security will disappear from the description of the linux system.

"Even if you find the monitoring code of the linux system, so what? This is the world that can leave the Windows system, but cannot do without the linux system!" However, although GKH was surprised, he still had nothing to fear.

Even if everyone knows that they are being monitored, so what? Is there any alternative besides linux?

No!

In the server field, in the embedded field, there is no operating system that can replace linux.

This is where GHK’s confidence lies. Even if you know that there is a problem with my stuff, you can only use mine. You have no choice but me.

Want to cancel the listening port?

That is impossible, because the port is the basic component of linux, unless the kernel of the linux system is rewritten, otherwise, it cannot be cancelled.

(end of this chapter)

Subscribe
Notify about
0 comments
Intertextual Reviews
View all comments