Chapter 265 Cyber ??Operations Command(2/2)
Since these people can get the design drawings of CPU, whether it comes from inside Intel or TSMC's chip manufacturing factory, this is a channel worth talking about.
Everyone has not discovered anything about Intel’s CPU changes for the time being.
However, in the search for graphics card entry, we found what they wanted.
Someone has released the packaged software for sale, through which all information about the graphics card chip can be changed.
The other party's offer is very high, so high.
According to the amount of certain coins issued by the other party, it is converted into RMB. Just to change the information to the graphics card, the other party asks for three million RMB of certain coins.
"I thought that since the internal data of chips were packaged from the factory, it would be impossible for third parties to make software-level changes.
Unexpectedly, there is such a thing in the world.
Hardware manufacturers, whether they are n cards or a cards, how can they allow software to change the information of their chips?
Aren’t they afraid of causing huge chaos in the market?
Once such software is rampant, all graphics cards on the market may be tampered with.
It can be modified after the chip is packaged, which is really beyond my understanding! "I didn't know if I didn't search. I was shocked. Although the price offered by the other party was very high, it was more than three million yuan. But it made everyone even more
Surprisingly, the software can actually change the information of the chip.
"Talk him first and ask him to give us some evidence, otherwise how could he pay him a few screenshots to pay him a certain currency worth three million yuan!" After all, this matter is beyond everyone's knowledge and cognition
, and there is no so-called after-sales service on the dark web, and even no one knows the target of the transaction.
If you pay in advance at this time, you may be cheated.
Soon, several people left messages to the other party, waiting for the other party's reply.
However, just after the message was completed, the other party actually gave a reply.
I didn't expect the other party to be online, but what I didn't expect was that the reply given by the other party surprised the people.
"General software really cannot modify the internal data of the chip.
If a software can easily change the internal data of the chip.
Then a super virus will be born in the world. These viruses will infect every computer, completely disrupting the CPU and graphics cards on each computer, and eventually causing the entire computer to be completely scrapped.
For the previous viruses, you can completely kill these viruses by reinstalling the system and then performing advanced formatting.
Even a higher-level virus can cope with ordinary
hard disk formatting.
But in the face of advanced formatting, most of the data will be completely cleared."
The other party’s message made several people confused.
"Didn't it mean to modify the internal information of the chip? Why are there viruses again?" Several people were confused.
However, just when several people were wondering what to reply, the other party's reply was sent again.
"I won't go around with you, I will tell you the source of this software very directly.
This software comes from the Fifth Operations Force, which is the so-called Cyber Operations Command.
Within the jurisdiction of this command, many manufacturers, especially hardware manufacturers, will leave backdoor programs on their chips.
Just master the key and you can easily bypass all firewalls.
The hardware backdoor on the chip is an existence that cannot be blocked by any software firewall.
While hackers around the world are still trying to get into an institution.
This cyber combat command directly controls all hardware manufacturers around the world and orders them to leave backdoor programs on all hardware.
Even Intel, every CPU has a backdoor program.
Once such a CPU is loaded into a core department of a certain country, you should be able to imagine the dangers in it.
The software I sell is a function package that was disassembled from this weapon package.
This function package can change all data inside the chip through the hardware backdoor reserved in the chip.
The reason why this function package has such capabilities is to facilitate the Fifth Operations Force to inject viruses into these chips.
However, I brought it here just to let some merchants change their 20 series graphics cards and change it to a 30 series graphics card!
I will send you a complete operation video later. When I am satisfied, I can place an order." After the other party's explanation, he shocked several friends.
When I was reading the news, especially when domestic chips were choked, some security experts would come forward and say that Intel would leave backdoor programs on their chips.
However, such a backdoor program has never been caught. Only those computers sold to nuclear power plants in a certain country have backdoors on the hardware.
However, the chips in the consumer market have never had such news.
Chapter completed!