Chapter 144: Get into trouble


Starting with security issues can arouse the contradiction between users and Pangu and Tiangong systems to the greatest extent.
This method has been tried and tested in the history of the competition of the mutual benefit network.
At the time, Zhongxing was going to enter the country of China. The products of China Star said that it had security loopholes and was monitored by Xia, which could permanently steal the data of the people of the country.
The news was reported by the media of the United States, and the center was allowed to participate in various hearings, and it took a lot of money to settle the so-called security door. In addition to the money paid, there was also the Emperor Tai who was installed in the upper level of the center. The emperor is a citizen of the country, and can unconditionally and unrestrictedly browse any technical and financial information of the company. The senior management of the company Xia Guo has no right to interfere.
At the time, Warwick was going to enter the United States, and Cisco and other major companies jointly launched a campaign. It also advertised to the media and users that Warwick had serious security loopholes. The monitoring backdoor was implanted by the relevant departments of Xia Guo. A large number of obstacles directly allowed Warwick to give up entering the rice market.
As long as it is Xia Guo's thing, a security breach is the best attack weapon. The western propaganda of Xia Guo threatening theory in the past century makes it easy for ordinary people to believe the words of the media and the giants.
Attacking opponents under the pretext of security is not only used by Xia Guo enterprises, but also by competitors of Mi Guo's own enterprises.
Google and Qualcomm have also attacked Apple ’s closed system to steal users ’privacy. It ’s just that Apple is a native company in the United States and is familiar with the judicial system of the country. It is also familiar with how to deal with the media, so Apple survived.
Now, the giants are targeting Pangu Technology.
Google and Microsoft are both very anxious. Tech giants usually don't fear companies like Vimicro and Xiaomi, but they worry about Warwick and Pangu, because the former doesn't have much core technology, while the latter has.
After discussion, Satya and Sandal reached an agreement. Both parties are committed to prohibiting Tiangong and Pangu from entering the Omega market. If Pangu wants to enter the Omega market, they must disclose their kernel code and accept everyone's supervision to ensure that it will not threaten. The security of the user will not steal the user's data.
This condition is not a condition, you ask Microsoft and Apple to publish the kernel code possibility is 0.
Google is also preparing to cooperate with Xia Guo's friends and merchants to let them jointly attack the insecurity of Tiangong system.
After all, there are only two or three Xia Guo mobile phone manufacturers who can have the opportunity to cooperate with Pangu Technology. After all, there are more than ten Xia Guo mobile phone manufacturers. The cake is divided by the two or three. What about the remaining seven or eight?
"Xia Guoren has no country in the interests." Peter, a Google's strategic analyst, said: "If Pangu can be killed, I think many Xia Guo manufacturers are more willing."
After the talks, the capital behind Google and Microsoft began to mobilize public opinion.
On Twitter, an industrial software engineer in Miguo blasted a security breach in Pangu's system.
The software industry engineer named Carson issued a video attack on Pangu: "I strongly urge our people to stay away from Pangu operating system of Xia Guo!"
Carson said: "The Pangu operating system is indeed very convenient to use, but! Guys! Our information will be stolen by Xia Guo people! We have not officially announced a certain precision control software developed using Pangu operating system and Xia language. In the market, Xia Guo has the same software, and it is free to use! "
Carson said angrily: "We downloaded the software in the application market and found that it is exactly the same as the concept we designed! The shameless Xia Guoren stole our results through the Pangu program!"
The video was retweeted 200,000 times on Twitter and became a popular video.
Netizens of Miguo commented, "My God can't do it! Such an exaggeration!"
"The Pangu system really steals user information?"
"Too insecure! If Pangu was used in the high-end, wouldn't all the secrets be stolen?"
"The Pangu system is the means by which the Xia Guo people stole Western technology!"
Soon after, a second video of Twitter was posted.
The protagonist of the video is an Asian woman. She said that she brought a Jiasan mobile phone from Xia Guo and used it for a while, but found that all her photos were published on the Internet, and there was a serious security problem in Nuojitiangong system.
The video was also re-transmitted by a large number of organizations, and successfully attracted the attention of the security department of the United States.
The information security department of Miguo issued a warning announcement, saying that Pangu system and Tiangong system have not been confirmed by Miguo ’s confidence and security department. In order to protect the user ’s information, the public and companies in the fields of science and technology, industry, biology, software and other fields are advised not to use Pangu and Tiangong system.
Media propaganda and security department warnings really worked. Many companies in Miguo reluctantly returned to the WIN system under the interference of the outside world.
Miguo echoed the news that the Pangu and Tiangong systems were banned, and it was also reposted on Weibo.
Some users are starting to work on Weibo.
"Mi country is banned! Major security risks! Users who want to upgrade Pangu system to purchase plus three mobile phones, please be careful!"
"Migu users' use of the Pangu system resulted in the leakage of fruit photos. Users must use the Pangu system carefully!"
"Serious security hazard ..."
"I urgently call on everyone to stop using the Pangu system ..."
With the help of these people, countless rumors came.
Someone's private photos were leaked, some company's trade secrets were sold, etc. It's easy to believe that there is a clue.
Pangu Technology has become an information seller who steals user information and sells it.
Mobile phone manufacturers who have not cooperated with Pangu Technology will definitely not miss this opportunity to promote themselves.
Xiaguo ’s 5th-ranked Changge mobile phone publishes Weibo: "Use Android ~ EbookFREE.me ~ Your security can only be guaranteed!"
Samsung even said: "The safest mobile phone in the world." With a secure ad.
For the first time, Apple praised Weibo by Samsung and Changge.
Microsoft Xia Guowei ’s official Weibo also issued an advertisement, the core content of the advertisement is only one-security.
Although Microsoft did not send any text, everyone knew that this advertisement was directed at the Pangu system.
As the first Shenchuan computer to use the Pangu system, it quickly responded on the official website, indicating that there was absolutely no problem with the security of the Pangu system.
Plus three mobile phone Weibo has been exploded, netizens questioning security issues began to swear.
Under the official website of Pangu Technology, many users have begun to question security issues.
Both Shenchuan and Warwick urgently contacted Pangu Technology. In this way, equipment equipped with Pangu system and Tiangong system is likely to encounter sales difficulties.
Latest chapter of Ebook The Black Technology Era of Xueba Click here