(Don’t click yet, finish this chapter as soon as possible)
This small program I brought to this world, as an ultra-simplified artificial intelligence program, will independently learn the knowledge in the computer and the network. However, its permission to call the network is not mandatory, but is required by the use of the computer.
When users actively use the Internet, they will read the knowledge on the Internet. Such a hidden setting may prevent other people who are studying this program from realizing that this small program can be connected to the Internet, right?
Therefore, the employees of Sindora Company will not hesitate to copy the data and directly copy the program that has been trained on the corresponding computer.
However, it was precisely this that gave Gao Yuan the opportunity to take advantage of the loophole——
Although the program will not actively call up network functions, if Gao Yuan takes the initiative to remotely control it, the program on the Internet around the world will synchronize all the self-learning data of the program on different computers together, accelerating growth.
At the same time, as long as Gao Yuan is willing, it will be easy to use this small program to call the computing power of every online computer to build a cloud supercomputer, just like the previous one in Hokkaido.
However, Gao Yuan has only done this once.
And it was that time that "Noah's Ark" was triggered without any warning.
Now, for the second time, I wanted to synchronize the self-learning data of all online mini-programs again, and tried to find out the data that might have been leaked from the computer in the R&D laboratory of Sindora Company. As a result, "Noah"
ark"!
What the hell is going on?
And this time is different from before.
That time in Hokkaido, "Noah's Ark" just sent himself an email.
But this time, the other party invaded your mobile phone and was discovered by the firewall on your mobile phone, but failed to stop it. It only sent out an early warning signal, and then it became what it is now. A "request permission" query popped up directly on your mobile phone.
——
In this step, because the mobile phone has been specially modified by me, I need to press the physical buttons on the phone to pass the permission. The program alone cannot break through, so in this last step, I forcibly intercepted the invasion of "Noah's Ark".
So, facing such a scene, Gao Yuan couldn't help but sigh——
Sure enough, physical means are the most reassuring way.
However, "Noah's Ark" invaded my mobile phone this time and wanted to obtain the permissions of my mobile phone. What exactly did it want to do?