Genius Club

Chapter 366



Chapter 366: Chapter 42 The Strongest on the Surface_2 Chapter 366: Chapter 42 The Strongest on the Surface_2 …

Lin Xian nodded.

“I understand.”

It was VV who thought things through.

Just now, Lin Xian had only considered the dangers on a national level; if the Internet Security Great Wall were breached, it wouldn’t just be the leakage of secrets and financial losses, but also many unforeseeable grave consequences that would ferment over time.

But it was only after VV’s reminder that Lin Xian realized—

[Once the Skynet System is breached, my own personal safety will be closely related!]

Just as VV said.

When everyone else around you is compromised, all monitored by the enemy; at that time, relying on the super artificial intelligence VV to keep yourself unmonitored, trying to stay innocent alone, what’s the point?

It’s nothing different than directly exposing oneself to the enemy.

But then again, doing nothing when the time comes is even less of an option.

All the street cameras, audio recording devices, and even everyone’s mobile phones will become tools to monitor you.

Then, every single thing about you will be revealed, not to mention the existence of VV.

𝑛𝘰𝘷𝗴𝘰.co

Source: Webnovel.com, updated on ɴօνǤ0.сο

Unless the two of you never communicate for the rest of your lives.

Otherwise, would a normal person argue with a refrigerator every day and joke around with it?

Lin Xian looked up:

“VV, what’s the situation now, how much time is left before the Dragon Nation Skynet System is breached.”

He pressed both fridge doors firmly:

“Don’t waste electricity.”

VV transferred itself to the cleaning robot and started rotating out of the bedroom:

“Actually, as it stands…

those well-placed vulnerabilities and flaws are ready to be detonated at any time, as long as Black Hand, or the hacker behind it, is willing.

He can set off these vulnerabilities anytime, breaking through the Great Wall in one fell swoop and taking partial control of the Skynet System.

Moreover, once they infiltrate the interior, the system may never be completely clean again, akin to wildfires which are never fully extirpated, and new growth emerges with the spring breeze.”

“However, I don’t know what the hacker behind Black Hand is thinking, or rather, waiting for.

Right now, Black Hand is merely lurking outside the Internet Security Great Wall, simply staring hungrily but without taking further action.”

“Obviously, he is waiting for September 17th, ‘2023 World Hacker Competition’.”

Lin Xian said:

“Kevin Walker, that’s Black Hand.

Or rather…

the hacker behind Black Hand.”

Earlier, when VV talked about Black Hand outside the Internet Security Great Wall and that its main target was the Skynet System, Lin Xian had already thought of Kevin Walker, as well as the upcoming “2023 World Hacker Competition.”

On the private plane back from the Imperial Capital, Chu Shanhe had shown him the report.

This genius hacker from Mi Country vowed to break into the Dragon Nation Skynet System during the free display segment of the Hacker Competition, under the watchful eyes of the entire world.

Although according to the competition rules, he definitely wouldn’t do anything malicious—everything would stop short as soon as control was gained, which would qualify as victory in the competition.

After winning, he would also be required to report the vulnerabilities to the Dragon Nation officials for them to fix.

But!

This gentleman’s agreement ends the second the Hacker Competition is over.

Who knows if the hacker has disclosed all the vulnerabilities?

Who knows if he has left backdoors in the Skynet System?

Who knows what his next plan is?

Once the secure gates of the internet are opened, the consequences are unimaginable.

Especially because nobody knows what the stance of the Mi Country officials is on this matter; if all of this is instigated by the Mi Country with subsequent dealings and trades with Kevin Walker…

the safety of China, the Chinese people, including Lin Xian’s own safety, will face a tremendous threat.

It’s as if there’s a camera placed by Mi Country officials above everyone’s head, monitoring your every move, listening to your every word.

Lin Xian had previously learned about the “World Hacker Competition.”

The hackers there don’t just write code or develop programs on site to attack and hack.

Long before coming to the competition, they have already found vulnerabilities, laid out their attack methods, and most likely even have a one-click launch program ready.

Once on stage, within minutes, or even seconds, they can complete the hacking and attack.

Nobody would be foolish enough to search for vulnerabilities and write code on the spot; that’s merely asking for embarrassment.

So…

When VV mentioned that Black Hand had laid down vulnerabilities in the Dragon Nation’s Internet Security Great Wall but refrained from setting them off, and that its primary target was still the Skynet System, Lin Xian had already connected all the dots in the sequence of events.

“I’ve speculated as much,” VV said from the cleaning robot.

“These looming hacker attacks are very likely the work of the genius hacker Kevin Walker.

But at present, for the sake of safety, I can’t go searching for clues in the deep web overseas, which means I can’t find detailed information on Kevin Walker or understand what he is currently doing,” VV continued.

“Kevin Walker is very mysterious; at least with the data I’ve collected so far, I haven’t found any photos of him, any valid identity information.

Apart from a name, everything is unclear.”

“Moreover, in the information about the Hacker Competition released by Mi Country, Kevin Walker is only represented by a silhouette of a boy in a hoodie, without any photos.

In fact, whether ‘Kevin Walker’ is his real name is also uncertain, as he has always been active online, and this is the first time he will appear in reality.”

“So, currently, without any evidence, we can only subjectively conjecture that all this is the work of the genius hacker, Kevin Walker.

If I were allowed to collect data in foreign networks, I’m certain I could find some clues.

But as things stand, I can break through that Black Hand, but it will definitely leave traces and expose myself, which doesn’t align with your principle requirements for me.”

If you find any errors ( broken links, non-standard content, etc.. ), Please let us know < report chapter > so we can fix it as soon as possible.

Tip: You can use left, right, A and D keyboard keys to browse between chapters.