#Toutiao Creation Challenge# In recent years, the game between China and the United States has entered a white-hot stage. On the surface, the two major powers still maintain relatively stable relations, but in fact, the United States has long launched offensives in multiple field

2025/04/1217:24:35 technology 1449

#Toutiao Creation Challenge# In recent years, the game between China and the United States has entered a white-hot stage. On the surface, the two major powers still maintain relatively stable relations, but in fact, the United States has long launched offensives in multiple field - DayDayNews

Recently, public opinion continues to ferment, and China continues to expose the US's plots. Previously, China's National Computer Virus Emergency Response Center had released an investigation report, which clearly pointed out that the mastermind behind the cyber attack at Northwestern Polytechnical University was . The National Security Agency was locked into its "Special Invasion Operations Office" (TAO), and also announced their attack paths and tools for crimes. It also followed the clues to find out the relevant cyber attack contracts between the National Security Agency and US operators.

#Toutiao Creation Challenge# In recent years, the game between China and the United States has entered a white-hot stage. On the surface, the two major powers still maintain relatively stable relations, but in fact, the United States has long launched offensives in multiple field - DayDayNews

At the time of Gulf War , the United States was the first country to propose cyber information warfare invasion, and used its dominant position to launch a series of cyber attacks. At this point, many countries realized the concept of information warfare. The United States has committed many crimes in the field of cybersecurity for so many years. The most famous one is the 2010 "Shock Network" virus , which used system security vulnerabilities to attack Iran's nuclear facilities. Although the United States did not publicly admit it, former U.S. national intelligence officials, scholars, etc. have more or less revealed that they are proud to show off their skills, and at that time the only one who could make such a virus was the only one in the United States. Another famous one is the "Prism Gate" incident, which exposes the United States' penetration of global network monitoring, including American telecom operators, Microsoft , Google , Apple and other network giants all participated. This is why the United States has to block , Huawei , and not allow other countries to install Huawei basic equipment. Huawei's equipment has no backdoor, no preset secret channels or surveillance programs, and is not monitored by the United States, so the United States is afraid that it will not be able to monitor the world.

#Toutiao Creation Challenge# In recent years, the game between China and the United States has entered a white-hot stage. On the surface, the two major powers still maintain relatively stable relations, but in fact, the United States has long launched offensives in multiple field - DayDayNews

Let me say that, now the United States is doing this is a de facto act of war. China publicly named US National Security Agency , which is equivalent to "responding to the challenge". China has also stated that "China and the United States have existing consensus in the field of the Internet, and there have been subversive changes." Simply put, since you have all broken your face, you will rely on your skills in the future. But this is just a starter. Recently, China released its second investigation report again, and this time it shocked the outside world. What was shocked was that China's counterattack method caught the big fish of the United States.

In this report, China announced the specific process of TAO's attack on Northwestern Polytechnical University. Operational errors exposed the working path. It also announced the platform IP address of the TAO network attack, and successfully locked the target nodes, multi-level springboards, main control platform, encrypted tunnels, attack weapons and the original terminals that launched the attack, and found the identity clues of the attack implementer, and found the true identities of the 13 attackers. This may be what we usually joke about "catching people along the network cable". Many countries are difficult to find out the network attack address, let alone the operators hiding behind the computer. This time, they are just about to come across the country to catch people. In addition, the Chinese technical team also found that TAO used the same tool combination to control the telecom infrastructure networks in at least 80 countries around the world. This time we have also worked together with European and Southeast Asian countries to successfully complete technical analysis and intend to find an opportunity to announce it to help the world jointly resist and prevent cyberattacks by the US National Security Agency. This time the United States encountered a tough problem, and its old nest was hit by a slaughter. This is announcing that the United States will be defeated in the cyber information war and will be transmitted to all countries in the world. The United States can be defeated in the cyber war. (A Dream)

technology Category Latest News