Rebirth: Let's Talk About 1984

According to reports, this story begins at an entirely unscientific moment: Zhou Ziye, a designer who rose from creating counterfeit mobile phones, suddenly time-traveled back to the year 1984.

...

Chapter 484 Digital Encryption

These days, it's much more satisfying to take a few Japanese soldiers down with you than to fight a few South Vietnamese monkeys.

Fighting the Japanese devils, fighting the Japanese devils, what a glorious thing that is!

It would be worth dying for!

After the people approached, there was a loud bang.

All three mines were deactivated, spreading out in a fan shape.

Number Two's heroic sacrifice can be described as being reduced to dust.

The Japanese and American sides suffered 34 injuries and 11 deaths, a huge embarrassment.

We couldn't catch the living ones, and we couldn't fight back the dead ones either.

They look like Asians, but the problem is the Japanese aren't sure if they're even from their own country, since they all look the same.

Besides, the equipment they use is all American-made.

A long-standing case has been born.

The case involves intelligence related to the M military, and SA is handling it together.

Thoroughly investigate the entire Japanese communication system and look for any clues.

All I can say is that this group of data thieves is extremely professional.

The CIA mobilized all its resources to find out who was selling this data, and the NSA also announced its intention to purchase the data.

In short, all sorts of tricks and schemes keep emerging.

Three days later, the typhoon finally passed, but its lingering effects were still felt, with large waves on the sea.

The boatman thanked the boat next to him, untied his mooring rope, and continued south.

It was blocked in the channel by the Minhai J after less than three hours of sailing.

They demanded that the ship stop for inspection.

Xing Baohua's hired boat captain is a Hong Kong national. Normally, he would stop the boat for inspection, but now he has a group of people with him. How can he accept that?

Then they turned their attention to Xing Baohua.

If Xing Baohua had suggested charging forward, the captain might have listened. These days, naval vessels are small.

The two boats had roughly the same horsepower. The captain on this side even secretly modified the horsepower, just in case something like this happened, so it would have more power.

He'll run as fast as he can, as long as he doesn't encounter the navy.

After all, he couldn't run as fast as a cannonball.

"Run!" Xing Baohua said calmly. As long as we get to the Hong Kong waters, we'll be fine.

Actually, stopping the ship for inspection is not impossible, but verifying identities is too troublesome, so none of us brought our identification this time.

Verifying identity is too troublesome and time-consuming.

Left with no other option, Xing Baohua had to let the boatman run away.

Don't let the dilapidated appearance of this fishing boat fool you; it's quite powerful when it's running at full speed, and with the waves being fast, it's even more rocky.

I've gotten used to the bumpy ride in the last couple of days, and I'm not vomiting anymore.

They're just taking advantage of the fact that our ships are small in tonnage and have low horsepower these days. They think that if we charge forward, they won't be able to keep up with us in such rough seas.

Xing Baohua and his group didn't reach the shore until after 8 p.m., and the satellite phone only started working after Xing Baohua entered Hong Kong waters.

He made several phone calls, and his expression turned serious.

Upon arrival at the shore, the car that was there to pick him up had been waiting for a long time.

We took everyone home to rest. We wanted to eat something, but after asking around, no one seemed to have an appetite.

Do nothing, just lie in bed and sleep. Even though the bed looks flat, you can still feel it shaking when you lie down.

I still feel that sensation when I roll out of bed and sleep on the floor. This usually happens when you've had too much to drink; you just want to crawl into the ground.

This is actually a side effect of the waves; it will be fine in a couple of days.

Just like when you get off a plane, it feels like water got into your ears and blocked them up.

Xing Baohua was waiting for the 3rd and 4th to return. Xing Baohua received news that a boat would pick them up tonight, which put Xing Baohua at ease.

It's a pity about Number One and Number Two. When Number Three and Number Four return, Xing Baohua wants to gather all the guards to hold a secret memorial service for the two.

After recovering some of their physical and mental strength, Xing Baohua led the trainees to begin repairing the hard drive.

The data has been saved, and although it hasn't been completely downloaded, software is needed to recover it.

Anyone who has used a download manager like Thunder knows that many files get stuck at 99.99% during download, just a little bit away from being finished.

In fact, most of the data has already been downloaded to the hard drive, but the download was incomplete, resulting in poor file execution and rendering the file unusable.

There are several ways to stop the download and load the file to run at this point.

Change the file extension of the overall file so that the file automatically forms an overall file in shell format.

Just run it like this. If it fails to run, you'll need third-party software to load the program and start the file to read its contents.

The group rallied and began to recover the documents they had obtained through the Gate of Life and Death.

When the trainees learned that two more people were permanently left on enemy territory, they silently shed tears.

Although we don't know their names, their sacrifice was indispensable in enabling them to safely escape that enemy territory.

The files were easily recovered by these professionals, but then another problem arose.

Whether it's text files or image/video files, they are all encrypted.

When they used their own reading software, all they got were garbled characters.

The US-based company used special reading software and file format. Only this type of software has the necessary file parsing code.

That's a bit difficult.

Xing Baohua didn't know the name or even the format of the software. To crack it, he could only break it down from the core program of the file.

Furthermore, they are difficult to analyze because these files are digitally encrypted.

It's intoxicating.

If it can't be cracked, these 20+ GB files are illegal, and two people have been implicated.

The best solution would be to break into the US and bring back a computer with this kind of decoding program.

But is it possible?

I could only find a small file, a few kilobytes or bytes, and try to access the core to create a custom software.

Accessing the core requires hardware decryption of the digital encryption.

My dear reader, there's more to this chapter! Please click the next page to continue reading—even more exciting content awaits!