Hearing the discussions around, many people said that in the future, they should choose the safe and free Linux system and the safe fruit system. Only a few people mentioned that when they wanted to use the Shenlong system, Li Chengqian sneered in his heart.

Because, they think too simple!

After this press conference, no one has the right to choose.

The Shenlong system will be the only choice for everyone.

Li Chengqian continued, "In the window system, I found the 1996 code."

"In the fruit system, I also found a similar code..." Li Chengqian began to demonstrate again. After entering a line of code, all the files in the fruit system deified by the user were placed on his desktop by him.

Fruit computer, fruit tablet, fruit mobile phone, as long as the fruit system is installed on the equipment, it is the same!

It is exactly the same as in the Windows system, as long as there is any file update, the updated file will be updated to Li Chengqian's desktop simultaneously.

Then, it is the linux system! And all systems that use the linux kernel, such as Android, such as Red Hat...

Still one line of code, all data stolen!

Moreover, all devices using the linux kernel can be controlled by this line of code, such as mobile phones, TVs, routers, game consoles at home...

There was an uproar at the scene, and everyone was dumbfounded watching Li Chengqian's demonstration.

Fruit system!

linux system!

Windows system!

For all systems, similar code exists for monitoring users.

Security, does not exist!

Privacy is bullshit.

"My ctmb, my computer is installed with anti-virus software that costs hundreds of dollars a year, but it is useless at all. In front of the three companies, we have no defense."

"Why? Why the Fruit Company,

Even doing the stupid thing of monitoring users. "The foreign reporter who uses the Fruit mobile phone is a fan of Fruit, and he was very proud before, saying that the system of Fruit is very safe and will not steal user data.

He is now full of doubts about life, and he has been hit the hardest.

There were a lot of people on the scene using fruit phones, and after seeing the picture demonstrated by Li Chengqian on the stage, everyone's faces were ugly.

Spend a huge amount of money to buy a fruit phone, isn't it just that the fruit phone is safe, smooth, and easy to use?

Safe eggs!

Especially there are many girls, what kind of photos are there for selfies on mobile phones.

After seeing Li Chengqian's demonstration, they were very nervous. Some people quickly turned off their mobile phones, and some people quickly deleted the private photos in their hands, for fear that the line of code released by Li Chengqian would take away the private information in the mobile phone.

Then how will they meet people in the future?

"It's terrible! This world is under the surveillance of three companies! As long as you use a computer, the data will be obtained overseas." Academician Lingqu felt shuddering.

"Fortunately, the country has doubts about the security of the operating system a long time ago. The network of our secret unit is isolated from the Internet, otherwise... the consequences will be unimaginable!" The only thing that makes Academician Lingqu feel lucky is this a little.

"It's too scary. This is simply a spy and a robber!" Even President Wu had fear in his eyes. If the three companies included the equipment of Shenlong University in the monitoring range, any scientific and technological achievements made by Shenlong University would be 3 companies obtained.

"I'm going to fuck you, even the open source, free, free, and safe Linux has this line of code in the system kernel. It's too dark! No wonder our software can't do it overseas. They have been stealing ours. The results..." He Hongyun almost cursed, and he was also shocked by the effect of Li Chengqian's demonstration, breaking out in a cold sweat!

He thought of a possibility that Qiandu Company has worked hard to develop new technologies and algorithms. After they are used, they will be ahead of competitors.

However……

Before Qiandu Company released the technology, its competitors copied the technology that Qiandu Company spent a lot of money to develop through this line of code.

And start using this new technology.

How to compete?

Playing with wool like this?

Overseas on the other side, Cook's face turned dark all of a sudden. He felt dizzy, his eyes darkened, and fear suddenly appeared in his heart.

Because of his emotional fluctuations, his hand was firmly pressed on his chest, and a stabbing pain came from his chest.

He opened his mouth weakly, breathing like a bellows.

"President!" The assistant quickly poured the life-saving medicine into his mouth.

Cook waited for a long time, finally recovered, and then he began to curse, "Fake, Fake! This wicked bastard... not only stole our company's source code, but also used the stolen data to attack us."

Fruit equipment is so expensive, why will it occupy the market?

Because the fruit system is synonymous with high-end, safe, and smooth.

It is well-known and is the secret of the fruit company's success.

Now, Li Chengqian directly announced the monitoring port left by the fruit company.

The security, privacy, and high-end of the fruit system suddenly became a joke.

Dense beads of sweat appeared on Cook's forehead. He knew that if this incident was not handled properly, the fruit company would face a major crisis.

However, Cook did not despair.

Because unlike Fruit Company and Windows Company, Windows Company only provides users with an operating system, and if users are not satisfied, they can replace it at any time.

As for the fruit company, the fruit system is built into the water equipment and is a closed-source system. Even if the user is not satisfied, there is no way to replace it.

Fruit products are known for their expensive prices.

Now let users directly give up the equipment that uses fruit and replace the cost of mobile phones, computers and tablets, which is not a small expense, and it is not easy to change.

As long as the fruit company shows a sincere attitude of admitting its mistakes and handles the problems exposed this time in a timely manner, the fruit company still has hope of retaining users.

However, the impact of this matter on the fruit company must be enormous, and if it is not handled properly, it will become a fatal problem.

On the other side, gkh, the person in charge of the Linux Foundation, who thought he was the biggest winner, was stunned. The monitoring code in the Linux core actually existed all the time, running and starting with the core program of the system.

Embedded in the underlying support code of linux, even though linux is an open source system, the source code has been widely disseminated on the Internet, but no one has ever discovered the problems in the core code.

For a long time, people's impression of linux system is safe, free, open source, stable...

I feel that starting today, the word security will disappear from the description of the Linux system.

"Even if you find the monitoring code of the linux system, so what? This is the world that can be separated from the Windows system, but it cannot be separated from the linux system!" However, although gkh was surprised, he was still confident.

What if everyone knew they were being monitored? Is there any alternative besides linux?

No!

In the server field, in the embedded field, there is no operating system that can replace linux.

This is where your confidence lies. Even if you know that there is something wrong with my stuff, you can only use mine. You have no choice but me.

Want to cancel the listening port?

That is impossible, because the port is a basic component of Linux, unless the kernel of the Linux system is rewritten, otherwise, it cannot be cancelled.

7017k

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like