Even if it is not convenient to perform the performance calculation, the data can’t be rooted in the chip-for example, the bartender in front of Russell made this data platform, which is why the company in this store also makes this large-scale and systematic operation system … This is also to ensure that no one will take the brain away or benefit the company’s computing resources to calculate something by themselves.

There is no such thing as "personal notes" in this world, and of course it is also because the group is not allowed to produce them.
So how do those psychic hackers and network detectives roam the network?
Do they each carry a huge desktop brain with them?
That’s certainly impossible.
Psionic hackers and network detectives can travel in the "matrix" world directly.
It’s a virtual world full of sympathetic illusions, which looks like a real thing, but it’s actually different … It’s a "psionic network" built by seven islands. It’s said that people in the body and subconscious can speed up so fast, even close to "simultaneous synchronization". It’s precisely because this network is not just a signal, but a psionic one.
That’s a kind of "empathy" rather than a kind of "empathy"
On the other hand, skilled psionic hackers can get into this matrix world and attack "ICE" through psionic power-that is, the network protection system can even paralyze the firewall of the other party at the data level.
The biggest difference between psionic hackers and network detectives is "understanding". If they understand the matrix world as a "sea of body subconscious", they can use psionic powers, but it also means that things such as firewalls and anti-virus software, which were originally only at the data level, will also be killed by symbolic entities in the matrix, even if they are suddenly disconnected from the network, they will become vegetarians in reality.
While the latter is just to understand the matrix world and the data world, so that they can enter or leave the matrix world at any time.
The common weapon they need is the "disc board", a highly integrated auxiliary computing device-which can also be understood as "semantic body"
Because there is no doubt that the disc board has passed the vast majority of security through the same-level prohibition law of firearms, it is absolutely impossible to directly install the body.
But it is a kind of "equipment" to link with the semantic interface at any time … it is much easier to carry.
There will be three kinds of people on the disc-psionic hackers, network detectives and information security engineers, probably like bandits, chivalrous men and escorts.
If you have a blackboard, you can invade the surrounding network anytime and anywhere, quickly control the surrounding cameras and display screens … even directly control the chip behind the other person’s head, and then control the other person’s body.
Of course, different levels have different personal firewalls.
There must be a psychic hacker among the gangsters in the front boat.
So he can accurately release the virus in the first class-the virus developed by Babel in the same network environment can destroy the highest firewall of the elves.
Different types of discs have different functions.
In order to ensure portability, it is characterized by specialization rather than ability … By changing the disk, different kinds of information can be invaded.
Kingfisher is making the disc known as the "eye of god", which can quickly crack the "key" of most camera security protocols.
Originally, it would take more than ten seconds to invade a camera kingfisher technology, which is likely to be discovered by information security engineers.
However, if the "God’s Eye" assists her, she can control all the storefront cameras in a street in two or three seconds, and even one of them can be accurately disabled.
Because the display bases of ordering food, billboards and billboards are not protected by the security protocol, she can easily control them without the help of the saucer.
Now there are dozens of windows in front of the kingfisher.
These windows are semi-arc-shaped, wrapping her around the department like a front-facing light shield.
In order to make the "saucer" show windows and analyze data to the greatest extent, she is much more efficient in staying in the office than going out.
Although delphinium is not a psychic hacker, it is still possible to leave some tails because of distraction if it is disturbed too much.
In order to prevent fatigue caused by too much information impact … At the same time, it is also not to directly attack the firewall of the hive nightclub. She will invade Russell herself as a springboard-the inferior will report to her that Russell has entered the hive nightclub department, and she will immediately display the disc board and plunder all the probe information around her.
As soon as Russell’s chip entered the "Honeycomb Nightclub", he had already connected to the local area network of Honeycomb Nightclub.
Delphine took control of sixteen cameras in the lobby of Honeycomb Nightclub for the first time and dropped seven windows where Russell could not be tracked.
When Russell approached the front desk, Kingfisher eavesdropped on Russell’s conversation with the bartender by the monitoring equipment at the front desk.
So she ran the disc system at full load again to quickly collect the cameras of all rooms in the whole nightclub and found the small glass room in just five or six seconds by closing it very quickly.
It is very troublesome for a director of Tianen Group to hack into its personal information database.
But it will be much easier to find today’s room records.
Delphine quickly located the guest identity information by looking for the record of today’s disappearance with the room number already known.
After that, she learned that Xiao Liuli made a pseudonym-this is a matter of course.
Since everyone comes in wearing masks, of course, it is impossible to give their real names. Otherwise, wouldn’t wearing masks be the same as not wearing them?
Before the conversation between Russell’s bartenders ended, Delphine quickly sent information and wrote the latest screen that Russell could see.
Looking at the monitor, Russell took a bracelet from the bartender and registered his pseudonym.
Delphine was relieved.