Vol 22 Chapter 545: Technology beyond technology
-
Starting from Zero
- Thunderstorm
- 2970 characters
- 2021-02-27 10:50:00
Guests with a little bit of technology, after seeing those controlled power armors, asked a little strangely: "This isn't quite right?"
Someone who didn't understand asked, "Electronic invasion is nothing new. ±, is this weird?"
"It's not about electronic invasion." The guest who spoke was probably someone specializing in power armor-related business, so he understood a lot, and also went very deep. Opening his mouth was a bunch of jargon. "It is said that the power armor uses McCarran anti-replication technology. In theory, it is impossible to be controlled by the enemy because of electronic invasion. Besides, even if the McCarran system does not take effect, the mechanical self-regulation system should be activated. Ah! Was it broken in the previous battle? But that shouldn't be the case! Even if there are broken ones, it is understandable that one or two of them have been broken. All of them are broken, isn't that right? "
"Well ... what is the technology you said about Mai Helun? What is the self-discipline system?" The young man next to him asked awkwardly. He belongs to the type of half bottle of vinegar. He usually likes to ridicule other people's ignorance with the things he knows, but today he finds that the person around him seems to be the real person in the industry.
The one next to him didn't notice the embarrassment of the one around him, he just seriously explained: "Macallan anti-replication technology is a silicon crystal encryption programming technology invented by a scientist named Macallan. The hardware and software multi-layer security encryption technology, its principle is actually very simple. It is to add mandatory rules to the initial guidance information of the address code at the software level. Before every read-ahead of the data, the gates of the lattice where the encoding is located will be checked. Changshu If Gates Changshu code and address code ... "
"Stop and stop." The next person hurriedly grabbed the guest who entered the technology master mode. "We are all amateurs, and some people ca n’t even play with the functional software on their phones. You can use a simpler method Explain? "
The one next to him is obviously not the kind of complete technical house, he just knows more. It's not the kind of unscrupulous scientist. Of course, if that kind of person wouldn't show up at such a party. He also reacted when he heard the words of the people around him. These were not the mad men under his own hands, but some people such as tycoons or family agents, expecting them to understand those technical terms is basically equivalent to teaching the orangutans to speak pigeons. .
"A simple explanation is that the operating software inside the power armor is not installed in the computer disk. Instead, it is directly recorded in the silicon crystal and exists as a physical engraving. This crystal storage medium is compared with the disk in a civilian computer. The advantages are: fast reading speed, strong shock resistance, small size, low failure rate without mechanical parts, low power consumption, and the most important point is that the content cannot be easily modified. "
"Can't you modify the data, can't you write the information? What if the user needs to add some settings?"
"Information is just difficult to modify, and cannot be modified. Modifying this information requires special coding to modify it. Otherwise, the written information will be messy and cannot be stored in the storage lattice. Because the key to write information is not recorded In the device, it is remembered by the operator before the task begins, so each time you modify the information, you need to enter the password, otherwise the information will not be written into the recorder. Because of the principle problem of McCarran anti-replication technology, this kind of Writing restriction information is actually a protection technique in the form of semi-physical office software, so no matter how high the hacking technique is, as long as there is no password. You cannot write information anyway, because this is a semi-physical protection measure. "
"What if the enemy obtained the password through torture or other methods?" Asked the guest.
"That's why there is a mechanical self-discipline system." The knowledgeable insider explained: "In fact, this kind of thing is not only powered by armor. Robots are also there. The so-called self-discipline system is a self-management system used to restrain robots or automatic weapons. The class has automatic equipment with high self-control ability and ability to harm people. The reason why this self-discipline system is called a mechanic self-discipline system is not because it is mechanical, but because it does not simulate human emotions like artificial intelligence. Things like this, the self-discipline system is very engraved. Just like the robots in the first generation of science fiction movies, they are deadly.
The main program of this self-discipline system and automation equipment uses a complete chip and control circuit. All information of the main operating system is transmitted to the self-discipline system in one direction, while the self-discipline system does not send any information to the main program. You can think of the main program as a government worker. This self-regulatory system is like an anti-spy agency. The anti-espionage agency is constantly monitoring the government personnel, but the government personnel are completely unaware of the work of the anti-espionage department. The information between the two is one-way. As long as the basic working status of government personnel does not change, the anti-espionage department will never take the initiative to do something to him. However, once this important member of the government is bought by foreign forces, his behavior will definitely change, such as selling information or doing things without following the instructions of the superior or the original job requirements, but given by foreign forces. Instructions work. Once this happens, it proves that the person has been bought and is no longer working for the country. Then at this time, the anti-espionage organization will take the government personnel.
Of course, this is a metaphor for me. The self-discipline system in powered armor and armed robots is like the anti-spy unit. Once the powered armor or armed robot's program is invaded, its behavior must be different from the previous setting. The self-discipline system has the original operating system settings, so the self-discipline system can know the working condition of the main system at any time. Once the behavior of the main system abnormally exceeds the tolerance range of the self-discipline system, it means that it has been invaded or rewritten. The self-regulatory system will begin to intervene. It formats the entire operating system, and then copies its internal backup system to the main program location instead of the original operating system and restarts work.
Because this self-discipline system is a complete system, unless you can grab the power armor or armed robot, and then take it apart to take out the self-discipline system and slowly modify it, otherwise it is difficult to manipulate the self-discipline system. Although this method cannot guarantee that the power armor and armed robot will never be controlled by the enemy, at least on the battlefield, the enemy has absolutely no time and equipment to control his own power armor and armed robot, and this has reached the self-discipline system. aim of design. "
The guests who thought we controlled the normal power armor before they heard this person's explanation began to wonder. "No! If the self-regulatory system can prevent information from being tampered with, then how are those power armors controlled?"
The very professional and technical guest frowned: "I can't figure out any doubts! As long as I suspect that the self-discipline system is broken, but even one or two power armored self-discipline systems can be broken. Understand, but so many power armors are all broken self-discipline system, which is obviously impossible. In other words, the other party has a way to invade the self-discipline system and paralyze the self-discipline system and the main system in a short time.
Although this person said that there is a very good way, and it is very deep, the guesses he said are very different from what we do. If he knows how we bypass the self-regulatory system and McCarran anti-replication technology for operating system replacement. Probably fainted.
In fact, in his opinion, the Macallan anti-replication technology that is easy to resolve the price is more troublesome for us. As for the self-discipline system that is almost unsolvable to him, it is not a problem at all. .
This self-discipline system is actually like creating an automatic restoration software with a stand-alone computer. Once this computer determines that there is something wrong with the monitored computer, it will automatically format the whole disk of that computer and then run the restoration software. To restore the data originally recorded on this machine to that computer. In this way, whether it is a virus or a hack, it is useless, because the inside of that computer has been thoroughly cleaned again. As for hacking directly into this computer with an automatic recovery system ... sorry, that kind of thing is too difficult. Having that effort is easier than thinking of another method.
Because of this setting, most people will find it very difficult to bypass this mechanical self-discipline system, and then they think that it is impossible to bypass it to rewrite the information of the main system. However, these people are thinking in terms of software, but we use the hardware method.
In fact, we did not touch the software content of this automatic restoration system at all. What we did was-unplug the network cable.
Yes, the method we used is very simple. The data line connecting the self-regulatory system and the main system is cut directly. No matter what the self-regulatory system is. In the end, it is necessary to rewrite the information of the main system to eliminate the possibility of power armor or armed robots being controlled by the enemy, but what if there is no physical connection between this self-discipline system and the main system? Information cannot pass. How do you restore it?
Of course, there is also a countermeasure to our method of cutting the network cable. That is to set up a device. As long as the connection between the main system and the self-discipline system is broken, the main system will restore itself or simply explode. However, this method can prevent the equipment from being controlled by the enemy. But it definitely reduces the viability of the device itself. Because all self-regulatory systems are military equipment, that is, the environment is very dangerous, especially powered armor and armed robots. It's not surprising that it hurts in the rain of gunfire. If there is such a self-explosive or self-formatting setting inside the device, then this machine is too dangerous. Because of this kind of setup, the production unit of automatic equipment knows that there are such defects. But rarely do you really set up such a protective measure. Because it's too mentally disabled.
However, the wire cutting I said is actually just a metaphor, and it is not so simple to do it. The arms company is not an idiot, of course, it is impossible to really make two computing cores, and then connect a data cable in the middle. In time, the self-regulatory system and the main system are basically packaged together. Both share a circuit board and a processor chip. The only difference is that the circuits and computing units in the chip are the same. Packaged on a circuit board and sealed in the same chip, but each has its own electrical circuit, except for a few data monitoring and restoration and replication nodes are connected together, basically two sets system. Therefore, it is not so simple to cut these two parts.
However, it may not be so simple for others, but not for us.
Because of our electromagnetic control capabilities, we used the electromagnetic control capabilities to burn down the silicon crystal data gate between the self-regulatory system and the main system during the invasion. This thing is like the customs inside the electronic device, except that it checks the data instead of the goods. This level only allows one-way transmission of data, the effect is to prevent outsiders from invading the self-regulatory system. Because there is no feedback signal at the level that passes information in one direction, hackers or other intruders cannot invade such a system at all. Of course, this method can only be used by the self-regulatory system. Because the main system needs to communicate with the outside world, such as adding a battlefield data link, there is no way to set up such a physical filtering device.
but. This device is now a network cable on this circuit board. When we burned down this small, large chip with no human fingernails, the main system and the self-discipline system were completely disconnected.
Because the self-regulatory system is offline, we can change it as we want. Anyway, there is no way to restore the podium. As for the anti-replication technology ... In fact, although this thing is troublesome, it is not unsolvable.
The key to this anti-replication technology is that the memory chip is defined with a lattice type when it is produced. Make an analogy in a way that ordinary people can understand. You can imagine the data as one physical substance. The code of 0 is square, and the code of 1 is triangle. The usual memory crystal space is a large space, whether it is a square or a triangle, you can put it in. This way you can record any information in this memory crystal. However, the lattice of the memory crystal produced using the McCarran anti-replication technology is very similar to the lattice when it is produced. Only the information entered can be recorded. If your information is 0, 1 code and lattice The shape is different, so you ca n’t insert it. This will cause write failure. This is why this technique makes it difficult to overwrite a memory crystal, because you can't insert the data of the corresponding shape into the corresponding lattice without knowing the order.
Each memory crystal in McCarran anti-replication technology has a password. This password is actually the arrangement rule of the lattice, so after the password, according to this rule, data can be written and read, otherwise the data will not be completely written into the lattice, and it will also be garbled when read. As for the fear of being aware of the lattice password by the enemy ... it is actually very easy to solve. The army orders massive memory chips, and their passwords are almost all different. Although like the manufacturers of lock cylinders, there are occasionally two lock keys that can be interchanged, but in fact this probability is very low. The memory crystals sent by military units are all disrupted, so each memory chip has its own code, and it takes time for the spy to get this code. And each device has its own code, which increases the difficulty of obtaining information. Moreover, there is a regular exchange system for such crystals in the army, which means that crystals that do not communicate with the army will change positions after a period of time. Even if you get a password, it will expire for a few days at most, and you know the crystal of the password I don't know where it will be changed, there is no way to effectively use the obtained password.
This method can greatly increase the difficulty of stealing information, thereby reducing the harmfulness of spies.
All of the above are the key to this technology being difficult to break, because the cost of trying to crack a memory crystal is too high, and only one crystal at a time, the cost-effective ratio is completely unacceptable, so no one is stupid enough to crack this. Kind of password.
However, we have another method.
Our method is still derived from our electromagnetic control capabilities, and the method we use is actually very simple-rebuilding the lattice.
Generally speaking, the crystal lattice is fixed when it leaves the factory, but the arrangement of the German crystal lattice in the crystal is not impossible to change ~ EbookFREE.me ~ You can modify the crystal lattice in the crystal with the proper voltage and electric field. structure. However, this modification can only be a triangular hole. If you have a block that cannot be put in, I can directly dig the small triangular hole and then insert the block into it. However, if the lattice is too large, it will not work. Of course, whether it is a square-triangulation or a triangle-triangular modification, it can be achieved by expansion, so basically it is not necessary to shrink the lattice.
However, this method will cause the crystal lattice of the memory crystal to become larger, which will cause the physical structure of the crystal to change. The final direct consequence is that the life of the crystal that we reset will decrease, and it can only be modified once, and it will be scrapped next time.
However, none of this is a problem for us, because we are using this method to control the enemy's equipment and work for us for a while. Do we still expect that thing to be guaranteed for 100 years? Therefore, this defect is not really a defect to us.
Using this method, we easily converted the memory chip with McCarran anti-replication technology into an ordinary memory card, and then directly rewritten the operating system. Because the self-regulatory system has also been cut off, the new operating system is completely unsupervised, and the internal information is not what we want to change? Therefore, what the guests see now is that the power armors that have not completely broken up all climbed up, then became zombie troops and started to follow us to attack them. (To be continued ...) u