Realizing that the attacker had a huge lead in metathinking compilation, Xia Duo frowned even deeper.
On the one hand, he was very eager to catch the other party so as to gain knowledge about meta-thinking compilation, but on the other hand, he found that he might not be able to track the other party.
Based on the ability shown by the other party, the computing power pool network is not only like entering an uninhabited land for the other party, but at least it is easy to escape if it wants to.
It can be said that this should be the most difficult incident that Xia Duo has encountered since his debut. He subconsciously wants to allocate the computing power of the computing power pool to analyze the torrent of consciousness information sent by the other party, and even further track it.
However, he finally endured it.
After a while, Charles came in from the outside, bringing with him the shipment records urgently submitted by the computing power pool connector supplier on Cormanso.
Chateau temporarily stopped analyzing the attacker's consciousness information, only retaining the most basic attention, and turned most of his energy to the information brought by Charles.
But after only turning a few pages, he closed the information and stuffed it back into Charles' hands. It was not because the information was false, but because he had misunderstood. The current shipping record was far from what he expected.
The information Charles brought back was basically some simple items, such as how many people purchased the computing power pool connector at a certain time and place.
Although some people choose to go to the station of Lingsi Network Research Center to register as a mage in order to obtain a higher subsidy amount, this time the attacker only used the most basic connector without any upgrade function.
Basically, it's the kind you can pick up casually on the street.
In this case, the possibility of tracking through shipment records is almost zero.
However, the information Charles brought is not useless at all. The shipping records are actually the total number of computing power pool users in the Cormanso territory. Combined with the login data from the Lingsi Network Research Center, some information can still be determined.
For example, if some connectors log in frequently, even if the user does not register his or her mage level, Xia Duo can actually determine the level for him based on the real-time calculation efficiency of the computing power pool.
You can even further determine the research scope that the other party is good at by artificially and selectively assigning some specially designed computing tasks to the other party.
The computing power pool is not a general-purpose computer. Each unit that makes up the computing power pool can be said to be unique. As long as it is designed properly, it can determine the portrait for each person.
It's just that without the assistance of a magical computer, the amount of work done is very huge, so huge that even the computing power pool itself cannot calculate it, but -
If you just create a portrait of a certain mage, there won't be much difficulty.
Of course, if the target of the portrait is a psionic mage, that would be a problem.
Take the existence of the suspected psionic mage currently attacking the computing power pool as an example. The other party can also interpret subconscious messages, which means that the other party can interpret all the calculation tasks assigned to the other party.
In other words, the other party can give answers selectively, instead of subconsciously answering without reservation like other users (meta-thinking level calculations will not directly reveal personal privacy, but the response speed can determine the area of expertise, and other privacy is actually also You can test it out this way).
This is similar to how social software users on Earth deliberately skip watching videos they are interested in without watching them. In this way, they mislead the algorithm into thinking that they are not interested in such videos and will not push them in the future.
Therefore, it is not realistic to use customized computing tasks to determine the attacker's areas of expertise or even identity information. This is actually equivalent to telling the other party - I am investigating you!
Social software platforms on the planet actually don’t care whether users deliberately act. On the one hand, individual people cannot represent the public. A few people have no meaning to the platform. What the platform cares about is the majority of people.
On the other hand, people cannot suppress their inner feelings forever. As long as they use it for long enough, they will always expose part of their attributes and become part of the software portrait.
In the same principle, the computing power pool can also determine the opponent's areas of expertise and even identity information through long-term analysis.
Even if you don't customize computing tasks specifically for them, and just use general computing tasks, they will always reveal certain tendencies over time.
This has indeed been possible for a long time, but this time the attacker is using a brand new connector. For the time being, unless the two people are directly connected, in the mind link, it is impossible to determine the consciousness characteristics of the other party through a third party.
Generally speaking, Xiaduo cannot determine whether the other party has used other connectors before, and the computing power pool cannot save such "login information".
For now, the connector is the computing pool account, and changing the connector means opening a new account. Even if the two connectors are used by the same person, the computing pool cannot judge.
There is no such thing as "soul imprint" or "soul fluctuation", at least Xia Duo has never heard of this theory yet.
The magic weapon is bound to the user, using the same tone. Essentially, the magic weapon is connected to the string of the open magic network that passes through the human body, so that the magic weapon has to behave as if it has an owner.
If you change someone else, as long as the synchronization is completed, the magic weapon will "recognize its owner" again. In fact, it cannot be truly bound to a user. Whoever gets it and completes the synchronization can use it.
The synchronization threshold for most magic weapons is very low. Generally, they only need to be carried with them for a period of time. If they are mage, they can actively synchronize them, and the time will be even shorter.
Even though it looks like binding, it is actually just a more complex authentication mechanism.
As for the magic mark, it is essentially a fictitious proof of identity, but most people associate this identity with their true identity.
The same magic mark can be used by Zhang San and Li Si can also use it.
Of course, if Zhang San is willing to consume Ms. Mystery's divine grace, he can "register" with Ms. Mystery. In this way, when others use his mark fraudulently, Ms. Mystery will give a reminder that the mark is fake.
The same principle applies to Iolum's dedication of Mythra to the Mysterious Lady. It is called a "sacrifice" but is actually a "patent protection".
The higher the identity, status, and strength of a person, the more rigorous his attitude towards God will be, and he will not be easily offended. A low-level mage may not care about Mythra's patent protection. If there is a chance to misappropriate it, nine times out of ten, he will not do it.
What a psychological burden.
But beings like the Lord God of Elves would not be able to do anything that would allow them to be misappropriated.
Of course, the computing power pool can also use the magic mark as an identity to "log in", but this is still anonymous in nature, and the magic mark cannot directly correspond to a specific mage.
Ms. Mystery will only prompt the fake mark, but will not tell others which mage registered the mark!
But even so, most mages may not be able to accept "registering" magic marks to the computing power pool.
Whether it is the computing power pool or the various magic tools with market life, including the communication magic tools of the Tower of Time, and even the mysterious lock permissions, they are all anonymous.