Chapter 508 Digging and digging, but still not enough



Captain Han rushed back and immediately notified everyone at the base to hand over their cell phones.

Besides rice, Motorola, Nokia, and other brands jointly produced by Nokia and Sony will also be checked through the phone's system to see if any certain programs are installed.

The inspection was so thorough! Thankfully, nothing serious happened; the scenario Xing Baohua had imagined did not occur.

To paraphrase what Captain Han said, it's good to have it checked, so you can have peace of mind.

Xing Baohua nodded and said, "I guess the NSA can't do anything to us for now. The first-generation motorcycle analog can be used to carry out stunts through radio interception, while the second-generation digital can only be installed through an installation program."

This involves a secret location, similar to your setup in the US, which requires a wireless network or server for transfer. We're not widely connected yet, leaving them helpless. Once connected, for example, if a large storage device is built here, the data can be transferred to them via a server.

Team Leader Han nodded and said, "If we crack their program, wouldn't that be a way to prevent this?"

“The software is simple, but the encryption is complex. Cracking it only works for this version of the file. Once the other party upgrades and changes the file, we are helpless against them unless we crack it again,” Xing Baohua replied.

“You’re right! We should start preparing for network and telecommunications defenses now. Any suggestions?” Captain Han asked.

“It’s not too late to create our own system for functional and key departments,” Xing Baohua suggested.

If it were a few years earlier, Xing Baohua would never have suggested to Han that they build their own system.

Having witnessed the sheer size of the base, and with the ability to mobilize so many hidden talents, we are confident that we can develop domestically produced products.

Just like what Qian Xuesen said, whoever says Chinese people can't do it, I'll show you.

If there are no computers, use mechanical ones; if there aren't enough mechanical ones, use manual abacuses.

A room full of mathematicians were rapidly calculating on their abacuses; if one person couldn't solve it, then a hundred would do it.

There's not much else, just a lot of people.

Of course, we can't compare it to then; the computing power of a single microcontroller can now rival that of tens of thousands of people.

Just like supercomputers, weren't we developed independently?

And so, elementary schools had to add abacus lessons. Do you think this is a legacy from our ancestors that we should inherit and carry forward?

This is just one aspect; the most fundamental issue is the threat posed by the Great Mushroom.

If that thing explodes, it will affect all electronic devices, even causing them to malfunction.

The most primitive calculator, the abacus, can be used again.

Not only do they inherit our ancient cultural specialties, but they can also be truly useful in critical moments.

The most common example is at bank counters. Many employees don't use calculators when reconciling accounts; they use abacuses directly, and their speed is just as fast as using a calculator.

Because of the threat of the giant moth, both polar bears and we are using mechanical devices for defense.

This is where the backwardness is reflected: although backward, it is safe!

If we also start comparing ourselves to them, competing with them, and developing rapidly, we might fall into their trap.

As our ancestors would say, suffering a loss is a blessing.

It's better to suffer some humiliation than to be beaten. If you lay a solid foundation, your strength will gradually increase.

Let's see who dares to make us suffer this humiliation again.

After discussing some details with the Korean team, Xing Baohua first had the national team lead the formation of a security and information technology group.

In the beginning, not many people were needed, and Geng Xin and her group were put to good use.

After that, we will have someone from country A come to receive training and form a domestic security information network team.

One is for external affairs, and the other is for internal affairs.

Any beginning is difficult, just like Xing Baohua's attempt to replicate Motorola's satellite communication chip.

Replicating is easy, but truly understanding the underlying structure is extremely difficult.

If we were to adopt our own domestically developed operating system, it would be even more difficult. This would not only require designing a smooth-running system, but also making changes to the hardware.

The CPU is crucial, and the motherboard needs to be compatible with the CPU.

You can't build an architecture based on x86 or AMD; you must have your own dominant system that is compatible with x86 or AMD architectures.

Otherwise, you'll always be following the same path others have taken.

Windows collects copyrights globally, but here in China, they allow rampant use of it.

They also charge fees, but only for large enterprises. The laxity towards civilian use is designed to make us dependent on them.

Once you develop your own system, they'll team up with hardware manufacturers to gang up on you and make your life impossible.

At that time, we had to play dumb, pretend to be transparent, and secretly develop our own systems and hardware.

This has been a painful experience for many years. Of course, this is all in the civilian market; for important departments, we do have our own system.

We will never be like India, where the most important departments use civilian-grade Windows systems.

They've made quite a few jokes before, saying that their domestically built aircraft carrier uses civilian XP, while we've been using Windows 10 for years. They're still stuck in the XP era. The most ridiculous thing is that a temporary worker stole the hard drives from that system and sold them for 5,000 rubles each on a secondhand trading platform.

It is said that top-secret information about India's aircraft carrier was sold for over 900 million yuan, but no one knows how that was calculated.

India's software industry is second or third in the world, so why can't they develop their own operating system for their important organizations?

It's absolutely true that there are no secrets in the world of the Third Brother. Any hater can get what they want.

Having become accustomed to relying on the US operating system, how can we wage an information war? By talking?

This chapter is not finished yet. Please click on the next page to continue reading the exciting content!

Continue read on readnovelmtl.com


Recommendation



Comments

Please login to comment

Support Us

Donate to disable ads.

Buy Me a Coffee at ko-fi.com
Chapter List