Light Novel Pub

Chapter 246: Terminator 20

Chapter 246 Terminator

Zhang Ailun went out to stretch his muscles, threw the handbag containing banknotes into the car, and when he came back, he made himself a glass of lemonade and chatted with Dominic on his mobile phone, informing him of the recruitment news.

Dominic: I'll do it right away. There are many people waiting for you to arrange a side job for them. I believe no one would be unhappy to get a well-paid job.

Zhang Ailun was sitting on the sofa watching short videos. Not long after, he saw Xige get up. He rubbed his waist and went downstairs. He looked listless, as if he hadn't slept well. It was obvious that he was weak!

Zhang Ailun smiled.

"How do you feel? You must have slept very late last night, right?"

The chief leader asked with concern, "How many people are there? Can you walk with the help of the wall?"

Xige was a little embarrassed. "It feels good. There is only one person. My God, you can't imagine how proactive she is."

"How can one person end up like this?" Zhang Ailun raised his middle finger and said disdainfully, "If you are new, practice more!"

"Boss, do you think everyone is like you? I've tried my best!"

Xige was a little envious and jealous.

"This is my ability, which shows that I am popular. If you have the ability, you can do the same." Zhang Ailun remained calm.

Can you do it? No! I don't have the ability to do it.

Of course, Xige knew that he could not reach the level of the chief leader, so he simply did not dwell on it too much.

After Jennifer and Irene got up, they found some ingredients in the kitchen, made some simple breakfast, and then went out to their separate ways.

Zhang Allen drove Jennifer and Irene to the Armed Nation to work, and then he went back to the camp to find Blitz, told him about the BTC intelligence mission, and asked him to strengthen the firewall function of his mobile phone.

"Four bitcoins? The employer is really generous. This means the information is very important. I've also heard about WikiLeaks. They specialize in searching for scandals about politicians and celebrities from various countries. The famous Little St. James Island incident was exposed by them. They also hold a lot of shady information."

Blitz replied: "I can share with you a hack-proof mobile phone software program. This is not a big problem for me. Although WikiLeaks often collects intelligence in the underground network, they certainly will not conduct hacking identity investigations on those who sell intelligence without notice, otherwise no one will be willing to disclose information to them anymore."

"I do this just to be prepared. After all, who knows whether the manipulator on the other side of the network is a human or a ghost," said Zhang Ailun.

"I have a software that I use frequently. I can copy it and send it to you now." Blitz immediately took the computer and started operating it. After a few minutes, Zhang Ailun's mobile phone received an anonymous message.

I clicked on the link and saw an unknown software. I downloaded and unzipped it directly and followed the steps to bind it to my phone. It was a black and red skull style. After clicking it, there were several simple options.

[Black Box Mode] You can block your cell phone signals and messages, and seal yourself in a black box. You can receive messages sent to you by others and reply to them, but others cannot find your location information. It is similar to the Anonymous Mode of VT Exchange. But the functionality and privacy are much stronger, and it is free and open source.

In black box mode, other app stores on the phone can be used as usual, and you can also connect to the Internet. The network used is a substitute network, that is, you use other people's hotspots or wifi to access the Internet. There is no browsing trace of yourself. It should be called global stealth mode or parasitic mode.

If something goes wrong, it's all someone else's fault, and it has nothing to do with you. As long as you don't run into a tough opponent with the size of the national defense force to fight you to the death, you will basically be safe.

[Signal Search Mode] You can search and display nearby mobile phone signals. Click on the profile picture to learn some of the other party's personal information. But it is limited to the collected and recorded information, such as name, age, home address. Annual income and resume will not be displayed unless it is an important person who is noted for tracking.

In other words, as long as the information database is full of information, no one will have any privacy in front of you.

The national defense information capabilities of major countries are supported by a complete set of logic and databases, and big data analysis on the Internet can easily determine a person's whereabouts.

Zhang Allen saw Jennifer's cell phone signal avatar coming from West Street, as well as the location information of Blitz's girlfriend Sarah, as well as people nearby, Jack, Dave, Sig, many shops, and police officers. There was also a note with the label "Family".

He looked at Blitzcrank with a strange expression, "You have always been able to see the approximate location of the camp members and their daily movements?"

What a peeping Tom! No wonder most hackers are perverted otakus.

"I usually don't turn on this mode." Blitzcrank said, "I know you all very well. There is no need to monitor one person."

Zhang Ailun gained further understanding of this self-developed software.

[Sentinel Mode] When turned on, it will occupy a portion of the phone's memory and turn on the firewall antivirus shielding state. If someone tries to hack into your phone, it will turn on the barrier to protect their information and fight back.

[Reverser Mode] After being turned on, you can block other people's mobile phone signals, hack into cameras, manipulate traffic lights, and even project mobile phone screens. You can also simulate electromagnetic signals, such as stealing vehicles, unlocking with fingerprints, and anti-theft doors that use face recognition. You can hack and unlock them with just one click.

These are all things Blitzcrank has used before. There are simple mini-programs in this software. Although the functionality is not very strong and only one sentinel function is relatively practical, it is generally sufficient.

"What's the name of this software? It has many uses." Zhang Ailun quickly got the hang of it and was full of praise.

"This is a software I programmed in high school. I called it Terminator . At that time, it had relatively few functions and was open source to the public. Anyone could download and use it, but it was later removed from the official website. After I started working in the company, I didn't have time to continue updating it. After that, after my subsequent optimization and updates, and with the use of modern AI, it also has many more simple functions."

"When you browse underground websites, turning on the Sentinel feature can block spam ads and viruses," Blitz explained.

Zhang Ailun happily turned on the sentinel mode. Then he opened the deep network, searched for the intelligence mission posted, and clicked to receive it.

He also selected two videos of black people rapping and doing group sex, packed them into an encrypted folder and sent them to the other party.

The other party received the file quickly and only browsed a few seconds of the video. The subsequent one-minute video required a key to unlock it. If the input was wrong three times in a row, the file would be automatically destroyed.

This is also a common method used by many people when doing underground information transactions.

Australian Lobster: Hello, I have received the video message you sent, which is very useful to me. Please send me your virtual account link and I will send you the reward of 4 bitcoins.

Blitz took a look and immediately refused, reminding: "He is testing you. Don't give him any information. You just need to ask him to transfer the BTC to the root directory storage folder marked as , and the key will be automatically unlocked. At that time, the folder will be unlocked and implanted in his computer. The video in the folder belongs to him. You can remotely extract the recovery package from the cloud and transfer the BTC data to your own account."

Zhang Ailun suddenly realized and immediately sent a message to the other party.

Burger King: Please transfer the BTC to the root storage folder of . I will extract it.

Australian lobster: ok.

Soon the folder showed that it had been unpacked. And a data link appeared.

Zhang Ailun clicked on the copy link, entered it into his virtual account, and successfully withdrew the 4 bitcoins from the cloud.

Virtual currency is just a programmed number, and it is very convenient to transfer and trade in a decentralized manner. As long as the gray industrial chain and money laundering industry exist, it will not be easily replaced.

Without Bitcoin, there is Dogecoin. Without Dogecoin, there is Ethereum. Even if there are no other currencies mentioned above, there will be Catcoin and Bugcoin. Anyway, they are just a means of decentralized transactions.

If you don't want to take risks, then use gold currency. Seeing that 4 bitcoins were refreshed in his account, the chief leader couldn't help but sigh that this money is really easy to make.

But this is only for him personally. It is not easy for others to collect evidence and videos. Maybe he will be shot 27 times in the back and die by suicide while collecting intelligence.

A minute later, the other party sent another message.

Australian Lobster: I have read your video, the clarity and content are very exciting. Are you interested in cooperating with us? I am a non-staff member of WikiLeaks. If you can provide us with more evidence videos of the gray industry chain in the future, we will give you 1-10000 bitcoins or gold of equal value according to the influence and market price. Don't worry that we will not fulfill our promises, we at WikiLeaks will never default on our debts.

How much? Ten thousand bitcoins?

How much is that?

At current prices.

$6 million!!

The head of the headquarters was shocked. It would take a lot of influential black material to be worth so much money.

It is estimated that it involves the secret of the death of the imaginative president, the dark materials of the deep government consortium family, the chain of evidence of the military region's arms trafficking, the dark materials against civilians on the battlefield, and the secret spies lurking in various countries.

It can easily shake the foundation of a country and change the course of history and presidential elections.

Although I knew that the intelligence industry was very profitable, I didn't expect it to be so profitable.

No wonder so many people want the founder of WikiLeaks to die, but they are also afraid that he will die.

Burger King: If I were short of money, I might consider doing this.

Australian Lobster: I hope we can have a pleasant cooperation.

Zhang Ailun exited the chat box.

Not long after, the sentry mode sent out a reminder that someone was trying to investigate his information, but it was quickly blocked by the firewall and responded with a color, which had no effect on him at all.

Zhang Ailun also couldn't help but sigh that this thing was really useful.

"If you have a more difficult problem, I can help you solve it on the console," said Blitzcrank.

The mobile version of Terminator is equivalent to an independent sub-clone, and its functions are simplified. If you really want the mother software to be useful, it has to be the Terminator version operated by Blitz himself on the computer.

Zhang Ailun operated the Terminator mobile app again, noting his friend Dominic and highlighting all the people he had contact with. He could also see the location of the unfinished building, the camp of the short-tailed dogs, and the blank avatar of the Mexican that needed to be edited.

Zhang Ailun simply copied and pasted their resumes. Clicking on the avatar showed his detailed data package.

This is so useful!

What kind of urban social game from a bird's eye view?

It was not until the leader moved the map from the city to the suburbs, marked his own Green Manor Ranch as the [Base Camp], the Wells Fargo Bank in Palmdale and the Star Entertainment Casino in Little Rock as [Copies], and Sadie's Razer Motorcycle Gang as [Allys], that he was satisfied and transferred the Bitcoin to Blitzcrank's account.

"Please help me sell these four bitcoins. Cash is more convenient to use."

The chief leader is not used to using this currency whose price changes every day. If he keeps it in his hands, he will lose hundreds of dollars at any time.

"Ok. I'll find a reliable person to sell these four bitcoins to." Blitz readily agreed.

Zhang Ailun chatted with him for a while and then left. He still had to find a way to deal with Weir, the head of the land mining resources department, to apply for an oil mining license.

After searching the application process, I found it to be quite convenient. You just need to fill in the corresponding information on the official website and wait for approval.

If you have connections, it can be done in a few hours. If not, depending on the efficiency of the staff in each department, it may take 3-15 days. By then, the opportunity will be gone!

Zhang Ailun immediately edited a message and sent it to the other party through the phone number of the supervisor provided by the intelligence.

Burger King: Hello, Mr. Weir, I have some personal matters that I would like to ask you for a favor. If you have time, I would like to treat you to dinner tonight. What do you think?

Will: Who are you? I don't think I know you.

Burger King: I am the owner of a manor ranch in Green Town, and I am currently preparing to do some resource investment projects in my yard.

Will: Oh, you want to apply for an oil exploration license? This needs to be handled according to regulations and procedures. There are many people in line ahead of you. You just need to wait patiently.

Burger King: I have some exciting shows here, and I would like to invite Mr. Weir to come over and taste them.

I also sent the other party two photos of the party at Rip Villa.

Veer looks at the picture and gasps.

Sitting in the office, I immediately straightened my attitude and typed: In principle, I personally don't support any social activities related to work. In fact, I get off work around 6 pm, so I will have free time to visit you.

Burger King: I will send someone to pick you up. I wonder what kind of beauty Mr. Weir likes?

Will: I like black people.

Burger King: Ok, I'll get someone to take care of it.

After agreeing on the time and place, Zhang Ailun also sent a message to Tommy, telling them to help him entertain someone and he would pay for the expenses.

After all, they are professionals in this area.

Tommy: That's really polite of you. Who are you going to invite? We can definitely handle it!

Zhang Ailun: He is the director of the land resource exploitation department. I have to deal with him before I can start my business. My friend's family has a piece of land that needs to be developed.

Tommy: Ok! I'll take care of it. What we do best is to get them into trouble. Do we need to film it? What kind of hot chicks does he like?

Zhang Ailun was speechless.

Look at you, how can you be so sinister? You always take short videos to blackmail people.

This is really a common tactic in your Hollywood entertainment industry.

Zhang Ailun: You don't need to do that. This is just a normal social job. You just need to let him have fun. He likes group sex and black girls.

Tommy: Got it! I promise he'll have a blast! He'll be begging us to come to the party next time.

(End of this chapter)

Loading...