Starting From Zero

Chapter 488 Fake Dragon Clan

"Boss, what's going on?"

When I heard this question, I wanted to say that I should pull away from the Japanese first, but before I could say anything, I suddenly found a rather unstable and strange identification signal appearing in my electromagnetic force field.

The identification signal between our dragons is a code mixed with the characteristics of our own brain waves. This kind of thing is very random and has no regularity at all. If there are any rules for this kind of recognition coding, it would be that the rules of thinking methods will be relatively uniform. This is actually like the way humans identify similar species, usually by looking at their appearance. If you digitize the facial features of two people, you will basically not find anything to worry about when comparing them, but other people will know at a glance that some people look very similar and some people do not. This is a kind of Very complex cognitive model.

The identification signal of our dragon family is not as easy to identify as a simple electronic transponder. Our brain wave signal itself represents our thinking mode. Therefore, each member of the dragon family has its own independent signal, and the two will not appear at all. The overlapping situation also avoids the situation of getting the wrong person. At the same time, because everyone’s thinking characteristics are completely different, we can accurately identify the signal of each member of the mental network.

However, the signal I just received is very strange. The source of this signal is not one, but a large group, numbering at least twenty, and the number is impossible to identify because it is too dense. In addition, the reason why I say this signal is very weird is mainly because this signal actually contains some characteristics of our dragon clan. No, it shouldn’t be said to have the characteristics of our dragon clan. It feels more like the other party is deliberately imitating our characteristics, but because they don’t know us well enough. It seems that he has learned something nondescript.

The other party's strange electrical signal waves are mixed with mechanical codes. This part is a starting point that our dragon family also has. Because mechanical coding is relatively simple and direct, we will add a mechanical identification code at the beginning of the signal, so that our electronic brain can identify the source of the signal, and then only send the necessary signal to the biological brain for processing, and the rest Parts have been blocked. This can also be regarded as an effective method to improve signal processing capabilities.

The other party obviously knows that our recognition signal contains such a structure. So they also added such a mechanical code, and what surprised me very much was that the other party's code actually existed and was not made up randomly.

There are mechanical identification codes in the friend-or-foe response systems currently used by various countries, but this code is not fixed, but a dynamic code. This encoding is different from a password in that it is not a certain number. It is a dynamic variable. When you transmit the identification code, the transponder on the opposite side receives the signal, then puts it into a set of dynamic formulas, and finally gets a result. If the result number is the same as the reservation number, the response is passed. The one sending the signal on the opposite side is a friendly force, and the opposite indicates that the other side is an enemy force.

During this process, because the calculation formula used by one's own answering machine is always changing, if the opponent comes out with a set of numbers in advance, there will definitely be no way to pass the response. Since no one knows what formula the answering machine currently uses, there's no way you can change the numbers on the spot based on its formula.

so. Deceiving this kind of encoding requires a rule. For example, we agree to divide the current time into three groups of two-digit numbers according to hours, minutes, and seconds, and the calculation formula is required to multiply these three two-digit numbers by three and then add what you have given After the number is given, you have to count it as much as possible, and it will be considered passed. This is the agreed rule. If the other party doesn't know this rule. They have no way to give an appropriate number based on the current situation, and because this change is accurate to the second, manual methods will definitely not be able to keep up with the speed of change, because this formula is changing every second. Of course, the actual response rules are much more complicated than this. I am just giving a simple example here.

The identification coding pattern is very complicated. Although it can still be stolen and deceived in advance, it is very difficult to do this. In other words, it is very difficult to deceive this response pattern under normal circumstances. Moreover, in the response mode used by some special units, not only one of the final numbers is correct.

Some people may think that if the final number is large, wouldn't it be easier for the opponent to get it right?

That is of course impossible. Having more correct answers will indeed increase the opponent's hit rate, but considering the complexity of the response signal itself, this little improvement is actually almost no improvement. It's like buying a lottery ticket. Assume that the hit rate of this lottery is one in 10 billion, which means that when the lottery is drawn, the jackpot is a number selected from 10 billion numbers. At this time, if you fill out one lottery ticket compared with ten lottery tickets, the hit rate of the latter will of course be slightly improved, but everyone knows that this improvement is basically equivalent to no improvement, because it is still difficult for you to encounter.

However, in fact, the method of adding multiple answers to the response is actually more difficult to fool around, because the answer itself is the filler number of the second set of responses. This is called compound response recognition.

Give a simple example. Suppose there is a dynamic formula. When responding, you need to fill in numbers and then get the calculation result. As long as the answers are single digits, they are all correct answers. It seems that the hit rate is quite high, because Dana does not only have one number, but can be from 1 to 9. It seems that there are many answers.

However, in fact, this calculation result will be used for secondary recognition later.

For example, the identification numbers of the Air Force are 1 to 3, the Navy is 4 to 5, the Army is 6 to 8, and 9 is the logistics force. You drive a fighter jet, and then the other party performs response recognition. You deceive the answering machine because you got the other party's encoding rules, and then the number you got is 6. It seems to be correct, but in fact it is equivalent to exposing yourself. enemy facts. Because you are flying a fighter jet, and the Army does not have fighter jets. Even the Army Aviation only has helicopters and a small number of attack aircraft. The fighter jets are all in the Air Force sequence. In other words, as long as the answer for a fighter jet is not 1 to 3, it is considered wrong.

This method sounds very simple, and in fact it is very simple, but it is precisely this kind of coding that is most likely to stun the enemy. Because the unit's identification code can be changed at any time. The enemy cannot steal your intelligence as fast as you can change the code. In this way, as long as the unit's identification representative authentication method changes every three to five days, the enemy's spies will probably not be able to send out useful information even if they are exhausted. Intelligence, because it has become ineffective by the time the correct information is obtained and sent out.

The signal I just received is such a wrong identification code.

The numerical rules of this mechanical code are correct, because the final answer is indeed the identification code of our own Long Yuan, and it is not an outsider. It is our dragon clan’s own identification code.

Originally, it seemed like there was no problem. After all, the identification code given by the other party was correct. However, the biggest failure of the other party was that they actually used our dragon family's identification code.

Our dragon clan has a spiritual network, and in the spiritual network we are all a whole, just like in a small online community. Everyone can see each other's thinking fluctuations, and can accurately According to this way it goes by who the other party is. This is the same as how ordinary people can call an acquaintance's name by seeing their face in real life. This is very simple.

However, these guys who pretended to be our signals used our coding, which is equivalent to stealing our names, but their thought wave signals were completely messed up. It's like someone comes up to you and says he is your colleague so-and-so. It turned out that he looked nothing like the person he was talking about. It's a joke in reality of course, but to us that's what the other person is doing now.

The other party's identification code is equivalent to our network name, and after the other party goes online using our network identification code, it is obvious that it is not the person we are, and we don't even need it. As soon as I received the signal, I realized that this was not one of my own at all. It's ridiculous that the other party thought they had obtained our identification code and applied to join our spiritual network.

"Boss. What's going on?" I received such a signal, and of course other people around me also received it, but this signal was too obvious, except that the mechanical identification code on the front was correct. The other parts are completely wrong. This kind of messy deception actually hopes to join our spiritual network. Are these bastards mentally ill? Besides, let’s not worry about the issue of resemblance. Even if their disguise is perfect and they can join our spiritual network, what do they want to do when they come in?

The spiritual network of our dragon family is a thinking network. To put it bluntly, it is a computing model similar to cloud computing used by biological computers. Each of our individual dragons is equivalent to an independent computer, and the mind network is our cloud computing platform. In the end, this cloud computing platform is not a computing program, but an artificial intelligence, which is the legendary collective. wisdom. This is why our dragon clan has such a high degree of coordination, because each of us is just a component in the spiritual network, and we are like multiple branch components of a huge collection of wisdom. Just like a person operating his own hands and feet will never interfere with each other, our spiritual network itself is a huge collection of wisdom, just like an independent consciousness. We are the hands and feet of this conscious body, and it is of course easy for this conscious body to operate its own hands and feet.

However, the other party actually tried to deceive our identification code and then blend into our spiritual network. This is obviously a very stupid behavior.

Not to mention that our cloud computing method simply cannot allow ordinary people to use computers to invade. After all, it is not a part of us. If a piece of thinking that does not belong to him is suddenly inserted into a consciousness, what do you think will happen?

Besides, even if we put aside all these previous problems and ignore them, we just hope that the other party can join our spiritual network completely without any obstacles, but so what?

We are dragons, not humans. Our brains are biological computers, which are completely different from human brains because we are artificially created, not evolved.

Human beings did not appear out of thin air. Human beings evolved bit by bit from the simplest single-celled organisms to their current state. During this process, an evolved individual suddenly evolved nerve cells, and then this feature was inherited and gradually Magnified, eventually nerve cells evolved into a simple brain. Of course, the first creatures with brains actually had almost no brain capacity and very low-level thinking abilities. However, with evolution, the brain became more and more developed, and then reached the point where humans are now.

However, the evolution of nature is different from that of humans. The evolutionary rule of nature is survival of the fittest, rather than purposeful modification. Therefore, the evolution of the human brain is actually a process of inheritance and development. The brains of those primitive creatures have not completely disappeared from the human brain. In fact, the process is like building blocks. In the process of evolution, humans actually continued to add things little by little to the brains of primitive creatures, and finally obtained the human brain. Although some unnecessary brain structures degenerated during this process, they did not Complete degeneration, which is why humans are unable to use all of our brain structures, because these structures are actually useless parts left over from the past evolutionary process. These parts have not completely degenerated. They are still working, but because they do not have corresponding organs and corresponding functional systems, they can only remain idle.

In other words, the human brain actually contains a lot of useless bits and pieces, but our brains are different.

We dragons are man-made biological weapons, so we pay attention to efficiency. There is no extra part in our brain, and all brain capacity can be used 100%. Therefore, although our brain capacity is actually slightly smaller than that of humans, our thinking and computing capabilities are completely unimaginable by humans.

It is because of this computing power that is so powerful that it surpasses all others, so our thinking speed is so fast.

Usually when we use human thinking mode to perform calculations, our brains are in an idle state, and our normal thinking mode should actually be sixteen times speed mode, which is combat mode. When we enter the battlefield, our brains will be fully activated. At this time, our thinking speed is sixteen times that of normal people, which means that the pictures that normal people see are one sixteenth slower in our perception. Put it. However, the mental network is a network with very large data throughput, so our mental network operates according to the speed of our thinking. In other words, this is a 16x speed network, where all information is transmitted in a flash. Pass. With the speed of human thinking, even if they hack into our network, they probably won’t be able to see anything clearly, right? (To be continued ~^~)

Chapter 3282/3436
95.52%
Starting From ZeroCh.3282/3436 [95.52%]