Chapter 525: Ziyuan is at the highest level



Chapter 525: Ziyuan is at the highest level

10:00 AM Pacific Time.

As the public opinion storm about WeChat data security issues intensified, an unexpected development brought a dramatic turn to the storm.

The Washington Post and The Guardian, which initially disclosed the "Prism Project", have successively released several exclusive interview videos on major social platforms around the world.

The core figure in the video is the key figure who triggered this global privacy storm, former agent Edward.

In one of the videos that quickly garnered global attention, the reporter had an in-depth conversation with Edward.

In the video, Edward looked calm, but his eyes showed a bit of fatigue and determination.

The reporter leaned forward slightly and asked probingly:

"According to disclosed information, WeChat, the world's largest social software, does not appear on the list of Prism project partner companies.

Does this mean WeChat is indeed not involved in the plan? "

Edward pushed his glasses up and replied calmly, "The NSA did try to include WeChat in its surveillance scope, but ultimately failed."

The reporter's eyes widened unconsciously. "How is this possible? Can you explain it in detail?"

Edward: "WeChat has designed a very complex technical architecture that implements minimal data collection and layered encryption mechanisms."

Seeing the reporter's slightly confused expression, Edward further explained: "Let me put it this way, WeChat has strictly classified data types.

Core chat content uses end-to-end encryption technology by default. The encryption key is generated on the user's device, and the message is encrypted at the sending end and decrypted at the receiving end.

What is transmitted and stored on WeChat servers is just a bunch of ciphertext.”

"This is one of the most advanced encryption technologies currently available," Edward added.

The reporter nodded thoughtfully. "So, you're saying that WeChat's encryption technology is so perfect that the NSA is helpless?"

Edward shook his head slightly. "It's not that simple. As far as I know, the NSA did obtain some WeChat data through certain coercive means.

But later analysts found that the metadata they could obtain in a short period of time could only parse out basic information such as 'who, when, and with whom they communicated'."

“While this metadata itself can reveal users’ social circles and behavioral patterns,” Edward continued, “the inability to access the content of communications is always a huge drawback.

To completely crack these encrypted data, it would require unimaginable time and manpower costs.

What’s more, WeChat’s data protection measures are constantly being upgraded and iterated, coupled with the massive amount of social data generated every day around the world…”

At this point, Edward paused and emphasized, "To completely crack it, even if all NSA employees worked around the clock, it would be impossible to complete this task."

The reporter gasped: "This is really shocking..."

"One more thing," Edward continued, "WeChat databases are located in Singapore, Ireland, and Switzerland.

Moreover, the data structure has been specially designed, making cross-border queries extremely inefficient.

This means that even if you want to obtain data legally, you will need to go through a complex legal process.”

The reporter looked slightly relieved: "So, the chat content of ordinary users is still safe?"

Edward suddenly became serious. "I'm sorry, I don't think that's the case."

The reporter gasped again: "Could it be that the NSA has found a way to monitor WeChat?"

"This has nothing to do with WeChat itself," Edward explained solemnly. "The NSA has discovered that no matter what application, it ultimately has to run through a smart terminal, that is, Apple's iOS system or Google's Android system.

Rather than painstakingly attacking hardened standalone applications, it’s better to directly take control of the operating system platforms they rely on.”

The reporter's voice trembled slightly. "You mean... starting from the underlying system?"

"That's right." Edward nodded. "I've seen an assessment report submitted by NSA engineers that clearly points this out."

Edward paused for a moment and continued in a professional tone: "The report emphasizes that this is a strategic choice, not a question of technical capability.

NSA engineers believe: 'It is theoretically possible to crack WeChat's specific encrypted data.

However, it requires huge computing resources and time costs, which far exceed the value of the intelligence it can obtain.

With limited resources, we have countless more vulnerable and easier targets.'"

Edward took a deep breath and said, "This is not to say that WeChat cannot be conquered, but it has been deliberately built into a 'hard-shelled boat' in the global ocean of data.

The monitors are clearly more inclined to catch the 'unsuspecting fish.'"

At this point, Edward couldn't help but reveal a hint of admiration in his tone: "The smartest thing about the WeChat team is that they have long understood the nature of this surveillance game.

They understand very well that in the face of national surveillance power, there is no absolute security, only relative cost.

Their goal has never been to make themselves 'uncrackable' but to make themselves 'unworthy of being cracked'.

They use their resources to raise costs for their opponents, which is in itself the most brilliant defensive strategy."

The reporter fell into deep thought and slowly shook his head: "This is really... thought-provoking."

This interview video, broadcast simultaneously by The Washington Post and The Guardian, instantly caused an uproar around the world!

The video spread across social platforms such as Twitter and Weibo at an alarming rate, topping all trending search lists.

Who is Edward? He is the gravedigger of the "Prism Project" and the "whistleblower" who holds core secrets.

The information revealed by the mouth has a natural and unquestionable credibility for ordinary people.

He explained the technical details with clear logic and calmly revealed the monitoring logic. Every word he said was well-reasoned and convincing.

The anger of netizens around the world seems to have found a new outlet.

At an unprecedented speed, people have shifted from questioning and resisting WeChat to a deep fear of the two underlying ecosystems, Apple's iOS and Google's Android.

In the hotel suite, Song Ci sat on the sofa, and the tablet in front of him was displaying the public opinion monitoring interfaces of multiple Western mainstream media and social platforms at the same time.

On the screen, the data stream is like a rushing river, refreshing in real time.

Seeing that the labels "WeChatSpy" and "DeleteWeChat" were being replaced by new hot spots at a crushing rate, my heart, which had been hanging in the air, finally settled down.

Leaning back deeply on the sofa, my long-tensioned mind finally relaxed for the first time.

The corners of his mouth couldn't help but curl up, revealing the first genuine smile in these few days.

His layout, the moves he had painstakingly crafted, were gradually yielding the desired results. This strategy of diverting the trouble to another place was not only precise, but also immediately effective!

It is a clever move to divert the conflict and focus from its own software applications to Apple and Google, the two major owners of the "foundation" of the mobile Internet world.

Song Ci knew very well that countless other application companies that were currently shrouded in the shadow of "Prism" must be secretly rejoicing at this moment.

In the cruel business world, "I would rather die than let my friend die" is an irrefutable rule of survival.

An invisible "invisible alliance" based on common interests has been formed, and everyone is eager to get out of this quagmire as soon as possible.

The information revealed in the video just provides them with a perfect "scapegoat", or in other words, it draws public attention to the root of the problem.

Behind all this, of course, is the key figure in the video, Edward.

As the whistleblower of the entire "Prism Project", when he went through hardships and fled to Hong Kong in a hurry, Song Ci had already arranged people and waited for a long time.

After some secret contact, Song Ci made an offer that Edward could not refuse:

Use covert channels to provide them with ways to avoid pursuit and ensure the safety of their families.

And a huge aid fund that can sustain their long-term life and legal battles.

Both parties got what they needed and hit it off immediately, which resulted in this interview video that contains the cruel truth mixed with some strategic guidance.

It is seven parts true and three parts false, and it is difficult to distinguish the truth from the false, but it is enough to turn the tide, pull WeChat back from the brink, and divert the war elsewhere.

Song Ci closed his eyes and thought about how to make the next move to turn this victory into a more lasting advantage.

At that moment, the top-tier encrypted phone on the coffee table emitted a low, distinctive beep. He immediately collected his thoughts, quickly picked it up, and answered it.

"Song! My dear friend!" The excited voice of ally and Wall Street tycoon John Paulson came from the receiver.

"Another pleasant day! Your fund account will soon receive a generous gift, at least $300 million in profit!"

Song Ci's smile deepened, everything was under control.

He had deduced countless times that once Edward's interview video was exposed, the core conflict of surveillance would shift to the underlying systems of Apple and Google. The stock prices of these two technology giants at the top of the global market value would inevitably plummet.

He asked Paulson to mobilize huge amounts of funds long in advance and use heavy leverage to short these two heavyweight stocks that were regarded as the mainstay of the Nasdaq.

"You have no idea how crazy this is!" Paulson spoke rapidly, recounting the results. "Just before the video was released, Apple's market capitalization was approximately $480 billion, making it the undisputed world leader in market capitalization!

Google's market capitalization is approximately $275 billion, firmly placing it third in the world, behind only ExxonMobil! But now?"

He let out a hearty laugh. "The video went viral, instantly igniting market panic. Apple's stock price plummeted 5.2% during trading, and Google's was even worse, falling 5.7%!

The simultaneous collapse of two tech giants dragged down the entire Nasdaq market! I used 10x leverage to short sell, and this time, I made a killing!

"Congratulations. But, John, you must remember to secure the prize as soon as possible." Song Ci warned solemnly, without any trace of pride in his voice.

He knew very well that this panic drop caused by the sudden event was only temporary.

Apple and Google have deep technological roots, strong profitability, and huge cash flows.

Once this wave of public opinion storm subsides and investors return to rationality, its stock price will soon rebound and may even reach a new high.

"I understand! Don't worry!" The tacit understanding formed through years of cooperation made Paulson's judgment on Song Ci almost as sacred as a god.

He chuckled and lowered his voice, with a hint of tacit understanding, "Song, your plan is truly amazing.

Two tech empires with market capitalizations of hundreds of billions, rich enough to rival a nation, and their stock prices are actually moving like this... Haha, amazing, really amazing."

When Song Ci heard this, his face straightened, he coughed lightly into the microphone, and said in a serious tone: “John, watch your words.

Stock price fluctuations are normal, and Wall Street has stories of money being made and lost every day. These things have nothing to do with me.

"I understand! I understand! Keep a low profile, we must keep a low profile!" Paulson understood and responded quickly.

I have already determined in my heart that this Eastern partner must have cleverly made in-depth arrangements behind the scenes.

How could such a coincidence happen? Just as WeChat was facing a life-or-death crisis, a key figure came out to speak up for it, while the short-selling target precisely targeted the giant directly involved.

In this coincidence, there is a precise inevitability everywhere.

However, he and Song Ci are core allies, their interests are deeply intertwined, and they prosper together.

As for "electronic leaks" and "Prism Project", what do these have to do with him, the Wolf King of Wall Street who only pursues pure profits?

All he cares about is the green, real US dollars!

After finishing the call with Paulson, Song Ci walked to the desk and opened the laptop he carried with him.

The exposure of the "Prism Project" is bound to have far-reaching impacts, fundamentally shaking the structure, rules and trust foundation of the global Internet.

Song Ci clearly foresaw that countries' attention to "cyber sovereignty" and "data sovereignty" would be elevated to an unprecedented strategic level.

After the incident broke out, the top leader personally asked him to compile and write a report on how to effectively improve national network security.

At this moment, while the external public opinion war situation had settled down a little, he calmed down and began to write the opening part of the report.

In the afternoon, the time was ripe for a counterattack.

At a time when public opinion has completely reversed and public and media attention is drawn to security vulnerabilities at the operating system level.

Wilson posted on major social media platforms, using unprecedentedly strong words to declare that WeChat has never participated in the "Prism Project."

It also announced that it would sue a number of media outlets, including The Wall Street Journal, for maliciously slandering and spreading false information in previous reports.

They accused it of severely damaging WeChat's global reputation and demanded huge compensation for its reputation according to law.

At the same time, WeChat’s official website released a major announcement: [WeChat launches the “Transparency Plan” - disclosing its data security architecture to the world].

The announcement announced three core measures:

1. Actively invite a top international third-party security organization with high credibility to conduct a code audit on WeChat

2. Plans to establish 12 data centers around the world to achieve localized storage and management of user data

3. Establish a $500 million data security fund for the research and development of cutting-edge privacy protection technologies

This combination of punches, like a thunderclap, caused a huge shock in the global technology community and among the vast number of users.

Western netizens and media, who had previously criticized WeChat, have now made a 180-degree turn in their attitude.

We highly praise WeChat's courage, openness and determination in protecting user privacy.

(Please give me a monthly ticket at the beginning of the month! Thanks (ω))

(End of this chapter)

Continue read on readnovelmtl.com


Recommendation



Comments

Please login to comment

Support Us

Donate to disable ads.

Buy Me a Coffee at ko-fi.com
Chapter List