Sihai network

China Internet Conference 2014isc: 17-year-old white hat Chinese hackers crack Snowden monster brain

In the past, speaking of network security, we must have thought of Kaspersky, Blue Shield firewall, Jinshan and Ruixing. Now 360 has changed this history. Nearly 150 million users in China have installed 360 security guards, and they are still soaring. By the end of this year, it may exceed 200 million or even 300 million. Recently, 360 Internet Security Center, a big man in the field of network security, held the China Internet Conference 2014isc. The story of a 17-year-old wrong school boy becoming a white hat has moved every network security worker.

The 17-year-old white hat video of China Internet Conference 2014isc will be sent to the 360 hackers who will appear on the scene of China Internet Conference 2014isc on the next page.

China Internet Conference 2014isc is likely to focus its research on Snowden's latest hacker weapon 'monster mind', which is China's largest cyber security event.

"The United States is developing a secret weapon for cyber warfare & lsquo; Monster mind; and the US National Security Agency (NSA) that caused the country's Internet paralysis during the 2012 Syrian civil war

'these attacks are deceptive. "Snowden told Wired magazine, 'for example, maybe that person is in country a, but it can make these attacks seem to come from country B, and eventually turn into a counterattack against country B. what happens next?" he said, which is likely to lead to an' unexpected war '.

Snowden said that while other cyber warfare programs can automatically detect and prevent hacker attacks, monster mind is a greater threat to privacy because it requires access to almost all private communication records that enter the United States from overseas before it can work.

"If we want to analyze all the data streams, it means we have to intercept all the data streams," he told wired. This is a violation of the fourth amendment to the U.S. Constitution, which is to seize private information without a search warrant, without a reasonable basis or with suspicion of a crime. '

This is Snowden's latest major unveiling of NSA monitoring program since the outbreak of prism gate last year. At present, he is applying for asylum in Russia, which was granted a three-year residence permit in Russia last week. But he said he was willing to return to the United States, even if that meant imprisonment.

'I told the government that I would like to go to prison as long as the name is reasonable. 'he said,' I care more about the country than about myself. But no matter how profitable the deal may be, we cannot allow the law to become a political weapon or agree to intimidate people not to insist on their rights. '

The U.S. government hopes Snowden will return to the United States to face charges such as divulging state secrets. U.S. officials have repeatedly urged him to return to the United States. But he had previously said he would not go back and hoped that it would be better to get asylum in Russia. In May this year, he told the US media that he would not simply 'walk into a cell'.

On the next page, we present the personal information and growth story of 360 chief engineer to inspire everyone who wants to contribute to network security.

According to the public information, mj0011 (hereinafter referred to as' MJ '), whose real name is Zheng Wenbin, is now the chief engineer of 360 and an expert on anti Trojan horse. He once discovered the vulnerability of Microsoft's windows' DirectShow video development kit' and was officially acknowledged by Microsoft. He also has the title of 'driver prodigy'. He is known as the first person in China's kernel.

Before contacting MJ, Xianfeng Zhi searched the search engine for background information with the key word "mj0011". The information was very few. This was related to mj0011's emphasis on personal information, which was occupational disease. However, there were many negative comments and even personal attacks in these few information. So he asked a giant in the security field to review the information:

'mj0011, how about this population monument

'well, he's younger. But you can't presuppose your position. You should judge after you see him. '

This afternoon, after an activity at 360 headquarters, pioneer met MJ himself. According to the introduction of the staff, MJ always see the head but not the end, so it is not so easy to see him. When Xianfeng Zhi passed by a work station with the words "Zheng Wenbin, chief engineer of 360", the station was not used frequently. The monitor, keyboard, notepad and a pen were black and gray. Besides, there was no water cup.

MJ's hair is slightly curly, longer than his ears; he is a little fat, with blue T-shirt and breeches, and the dressing of technical personnel is not pressing. We shook hands, sat down and started talking. His voice is very small, and his eyes are not so firm, which is far from the description on the Internet that he is not low-key, domineering, undisguised and often abusing his peers' -- MJ acquiesced that he was too ruthless in some technical forums and that he was very young at that time, which was also the main reason why he was criticized.

"I don't speak much now. I usually dive in the forum," MJ said. "Even if I speak, I don't swear. 'mj's tone shows the contrast between the past and the present. In fact, he is only 27 years old now, and he was 19 years old when he joined 360 in 2006.

Many people wonder what meaning 'mj0011' stands for, but in fact it doesn't make any sense -- '& lsquo; MJ & quo; is the abbreviation of & lsquo; Waistcoat & quo; Pinyin. At the beginning, they prepared to name it & lsquo; MJ & rsquo;, which was occupied. Then they tried & lsquo; MJ001 & quo; and it was also occupied, until & lsquo; mj0011 & rsquo; was displayed and used today. '

We usually learn about hackers and security experts from movies and TV works, and those images are usually treated with artistic exaggeration. They are either science geeks or geek, who are full of jargon. However, hackers in real life, such as MJ, are actually very common. They are submerged in the crowd and will never be found out mercilessly.

When MJ first came into contact with computers in senior high school, he got to know some basic computer technology on the forum. He was interested in learning at the same time. After reading most books about computers in the school library as a freshman, he left school because he felt that he could not learn anything new. When he started a business together with a few small business partners in Shenzhen. In his spare time, he still likes to bubble various security forums, communicate with people in the circle, and answer various questions. Fu Sheng, who was the head of 360 security guard at that time, found him in a forum. After some exchanges, Fu Sheng threw out an invitation to join MJ to join 360. In December 2006, MJ flew from Shenzhen to Beijing in a T-shirt with short sleeves. It was snowing in Beijing at that time. It was unforgettable. 'it's freezing. '

At that time, 360 was only established for more than one year, and its strength was not enough to form a special attraction for the skilled talents. If you have been talking with Mr. Zhou for a long time, it's natural to talk with Mr. Zhou

'if you work with your partner, the platform is too small, and the people who can help are limited after all. Why don't you come to 360. '

For MJ, a dead house with money and no place to spend, money is not so attractive (in fact, the price offered by Zhou Hongyi to MJ is not particularly competitive), and it can affect the lives of many people. This is the driving force for many hackers to become hackers.

Later, Fu Sheng left and took away some members of the security guard team. Zhou Hongyi had an oral agreement with him: he can go or take people away, but there are a few people who can't move. One of them is MJ. Zhou Hongyi loves talent, and he will give enough treatment and respect to technical talents like MJ. 'mj said that twice.

All the experienced headhunters no longer have the idea of MJ, because they know that the hope of poaching him is too slim.

As mentioned above, when MJ started his business, he did not do security attack and defense, but did embedded development. He was very interested in network security at that time. He really started to do security attack and defense after entering 360. One of the biggest charms of the Internet is openness. As long as you have the ability to learn, many resources are readily available. Looking back on MJ's resume, the role of school education in him is not obvious, and the self-learning ability is the booster for him to go to the present. Some people say that MJ can become the top domestic kernel master because he is willing to spend seven years studying windows.

MJ's desire for expression is not strong. The whole interview process is basically a question and answer. In the face of such problems as' how do you understand the hacker spirit 'and' how to restrain the destructive power that you have in your hands', MJ didn't give a full expression in his vanguard's expectation, but just stressed that he was not willing to be 'that kind of hacker' and wanted to use technology Do something good. 'the mentality and motivation of hackers are doomed to be impetuous and can't go too far. "When he heard this, Xianfeng Zhi almost forgot that he was born in 87. Up to now, 360 is his first and only official job (he calls the hacker who has no ownership as the 'opposition party').

After the interview, Xianfeng Zhi asked for a photo with MJ, and MJ readily agreed. However, the request of "not to put it on the Internet" was still out of his professional vigilance as a security worker. The photos in this article are not available.

After chatting with MJ, Xianfeng Zhi finds that his fantasies about hackers are wishful thinking. They are just ordinary people who specialize in technology. They have chosen a relatively narrow field which is not enough for outsiders. That's all.