There is a saying circulating in the martial arts world: Be a teacher for one day and be a father for life!
The hacking world also has similar rules. Although they are not as absolute as in the martial arts world, they are even more sinister in the hacking world.
What is a bounty hacker?
Bounty hackers are hackers who can do anything for money!
Take the accusation of the deceased as an example. Although the accused is a native of Lijian, if the accused person is given a sufficient price to allow the accused person to attack the network of the Lijian government or even attack the power grid system of a city in Lijian, it will bring huge disaster to the entire city, and the accused person will not hesitate!
Bounty hackers only care about the difficulty of the bounty and the task, but not the result of the task, and there is no so-called personal relationship. Of course, it is undeniable that some bounty hackers will refuse to accept certain tasks due to personal relationship reasons.
However, such bounty hackers will often be investigated for the final identity information because they refuse to accept the related information of the task, and thus disappear into the ranks of bounty hackers.
True bounty hackers must treat them equally and avoid their identities being exposed.
If the deceased were sued, Lord Darkness and Batman joined forces to establish a cybersecurity company, they would definitely come to the forefront and could not continue to hide behind the scenes.
The price of getting to the front desk means the exposure of identity information!
Although they temporarily exposed real personal identity information, not the identity information of bounty hackers in the online world. However, as they accept online tasks, they will definitely expose the identity of bounty hackers on the Internet, thus completely falling into a tragic situation.
It is rumored that the National Security Agency of the Liberian State has a joint team, which is specifically targeted at cybersecurity companies, or studios of similar nature, cyber alliances, etc.
During the time of being a bounty hacker, they did things that violated the law for too many days. Once they were exposed and caught by the authorities, they would never have a good ending!
Therefore, the perpetual organization member who would rather be a member of the deceased in exchange for a clean income of 100,000 US dollars a month, and do not risk higher benefits.
No matter when, if you want to get more, you must pay more!
March 2nd. 11:58 noon.
Shi Lei, Tao Wenxian, and Raphael joined the temporary voice communication channel established by Yi Zuer. Yi Zuer forced to cancel all secondary channels and gathered all online personnel inside the top channel.
Shi Lei greeted everyone in the voice channel through the skinny conduction headphones of the lip lens-type information processor. "Hello everyone, thank you for your patience. I am one of the three giants in the organization. You can call me Mr. S."
Shi Lei used English to speak, and Yi Zuer automatically changed Shi Lei's voice. The reason he chose to speak in English was because every hacker present could understand English. If he didn't understand English, it would be difficult to become a second-rate hacker in the world.
Raphael and Tao Wenxian also introduced themselves. Raphael is naturally Mr. L. Tao Wenxian is not Mr. T, but Mr. J.
Shi Lei suggested that Tao Wenxian combine the first letter of the pinyin of Xia Mandarin name and the first letter of the English name, and the combination is Mr. Tj.
After introducing himself, Shi Lei continued to speak, "First of all, please enter your bank account in the public chat area of the voice communication channel. The specific input format has been displayed in the lower right corner. Of course, it is best to have an unnamed bank account to avoid leaking identity information. I think that every friend present should have an unnamed bank account, right?"
Any hackers who enter the voice communication channel temporarily established by Yi Zuer are at the second-rate level in the world. It is impossible for a hacker of this level to have no bearer bank accounts.
The specific input format is displayed in the lower right corner of the temporary voice communication channel. The input format of the bearer bank account has two lines of information in total.’+’bank account number’, ‘’ means ‘confirm’.
Through two inputs, everyone's account will not make any mistakes. After all, none of the 612 people present are ordinary people, they are all hackers. If they enter errors twice in a row, the chances of appearing are lower than winning the lottery.
Three minutes later, Shi Lei checked the data counted by Yi Zuer. At present, 609 hackers have entered their bearer bank accounts.
"Accuse the dead, Lord Dark, batman, please enter the bearer bank account information immediately. You only have thirty seconds. Once thirty seconds later, we will regard you as giving up on your own initiative." Shi Lei couldn't say it clearly.
The three of the victims sued the deceased no longer hesitated and directly entered the bearer bank account. Anyway, it was just a bearer bank account. If there was any problem, they could give up the account directly.
"Thank you for your cooperation!" Shi Lei looked at the real-time information displayed by Yi Zuer, and then smiled and said, "In thirty seconds, you can check the bearer account you just entered. We have issued additional rewards according to your corresponding level. Well, let's talk about it, the second-rate world is $3,000, the first-rate world is $10,000, and the first-rate world is $100,000. If there are friends among you who are beyond the first-rate world, please wait and contact us separately!"
This sentence is quite intriguing and reveals a vague message that surpasses the world's top-notch level and may even pay more bonuses.
Thirty seconds passed by, and a large number of hackers sent text and picture information in the public chat area of the voice communication channel, proving that they had received the bonus.
The defendant also checked the bearer bank account, and carefully used the broiler network protection to check the bearer bank account.
In the bearer bank account, a total of 100,000 US dollars, a clean one of 100,000 US dollars and an unrestricted one of 100,000 US dollars were indeed transferred.
"Did everyone receive it? If you have any friends who have received it, please wait and contact me separately. I will explain here that this bonus is an additional bonus, and we will express our apology in advance. Because we will not accept all the friends present. After all, some of the friends seem to be the same as Mr. Chongdun, and we dare not accept it." Shi Lei said with a smile.
Yi Zuer collected the judging information and exposed some of the government's official cybersecurity experts lurking in the hacking industry.
"We are very magnanimous. We hope that this group of friends can leave quietly after receiving the bonus just now. This is not the place you should come." Shi Lei showed a friendly attitude.
Given that he defeated the world's peak hacker, the heavy shield of the NSA National Security Agency, the 612 hackers present withdrew from 57 in less than a minute!
At present, there are 555 hackers left, staying inside the temporary voice communication channel established by Yizul, a relatively auspicious number.
"Yuzun'er, are there any lurking personnel who confirm their identity information?" Shi Lei asked Yizun'er. With such a simple comparison of information tasks, Yizun'er's processing speed was far higher than Shi Lei.
In less than a second, Yi Zuer scanned the situation of 555 hackers many times. "Sir, among the hackers who have known to confirm their identity information, no lurking personnel have been found yet."
Shi Lei smiled slightly, and it seemed that the war with the world's peak hacker, the world's peak, brought considerable convenience after winning.
The secret underground base of the first-level branch of the Longteng Project.
Tao Wenxian stood beside Shi Lei, first instructed Yi Zuer to block the skinny conduction headphones included in the lip lens-type information processor worn by the three of them, and then asked: "Brother Shitou, in fact, I think we can accept all the rest as peripheral members of the organization."
Shi Lei considered it and there were 555 candidates left, of which 36 passed the fourth assessment, 73 passed the third assessment, and the remaining 446 hackers only passed the second assessment.
If all 555 people are accepted, then Miri Technology Group will need to pay nearly US$5.7 million every month.
This is not a small number. Although it may not be a big deal for Mirui Technology Group, Shi Lei needs to consider whether such a high-profile act will attract the attention of the NSA National Security Bureau of the Liberian State.
After all, Thomson David, who has already formed a scoundrel with NSA! If Thomson David can't figure it out and insists on inciting NSA's National Security Agency and seeking trouble, it would be a bit too scammed.
"Stone, I think jazz is right! We can include all 555 hackers on our list of members of the peripheral organization, but we need to make some adjustments." Raphael expressed his opinion.
"Oh?" Shi Lei said puzzledly, "How should we adjust?"