The Hound-1 Detection System answered Noah's questions in detail.

Its computing power is based on the AI ​​system, and its algorithm is completely based on the program set by Noah and Ava.

The logical judgment part has not been specially adjusted for the time being, and it uses the AI-assisted judgment logic of the current confidential building security system.

Therefore, in order to avoid errors and to debug the program accurately, the basis and source of each data point have been clearly listed.

Several people looked at the explanatory data above.

Even Virgil and Delayak, who didn't know much about the program's core, could clearly see that the chain of reasoning based on a large amount of data was complete.

Delayak looked at the data and said, "After being specifically marked, I took a closer look and it seems that there is indeed a problem."

The detectors attached to the isolation area are for easy data reference and to increase the angle of observation. When there are no special cases in the isolation area, the fluctuation of the data is relatively low.

However, from the current data chart, we can see an abnormal spoon-shaped fluctuation.

There will be an upward trend in the early stage, but it does not reach the limit, and then it is strangely flattened, and the fluctuation value approaches 0. After more than ten seconds, a small waveform deflection appears and returns to normal.

The entire particular fluctuation occurred within the threshold range and would not trigger an alarm.

Under normal circumstances, such fluctuations would be within the acceptable range and no one would consider them problematic. However, at this moment, they were singled out by the Hounds and their team. After all the data was tabulated, even Delyak could sense that something was wrong.

There are too many.

If it happened just once, perhaps it could be explained by chance.

However, similar waveforms occur in different places. Although there are some breakpoints in the middle, from the location where the waveforms are found, they can be connected into an intermittent trend direction.

If you look in this direction, you can clearly see the other party's target.

"They want access to the sub-control room."

Virgil said what everyone was thinking.

They came to steal confidential drawings, so naturally they had to know where the drawings were stored first.

The control room can directly check the distribution of security computing power, and based on the computing power distribution, the overall security protection strength can be checked.

The location with the strongest protection will naturally have a higher probability of being selected as the placement point for the drawing.

It was a gamble, but it must be said that they made the right bet.

The drawings are divided into four parts, each of which has strict security measures.

Moreover, the floors are placed from low to high, so they need time to buffer and time to trial and error. If the drawings are really stolen, they have to review the opponent's methods in a short time and plug the loopholes.

Avoid the same problem from recurring as much as possible.

It can be said that as long as the other party enters the control room and obtains the computing power distribution data, they can lock the approximate location of the drawing.

The method is simple but effective.

After all, the Empty City Strategy is mostly used when the military strength is inferior. Now the Confidential Building has the home advantage and a large number of troops, so it is naturally impossible to use the Empty City Strategy and place the drawings in a place where the military strength is weaker, which will only give the opponent a chance to steal.

Noah chuckled and said, "Interesting! It seems it's not that they didn't take action, but that we didn't notice. If it weren't for this unexpected data detection, we probably wouldn't have realized this problem until they stole the first blueprint."

After half an hour of preparation time, a counter (0/8) appeared on their task panel.

This means that in the mission, Ai clearly stated that there will be 8 stealing invaders this time.

They had already locked onto two people and suspected another, and the remaining five targets were motionless.

Now it seems that they did not fail to sneak in, but used other means to avoid the surveillance cameras.

Martin said with a serious face, "Then I will immediately adjust the data in the sub-control room. By falsifying the address information, I can mislead them and delay them for a longer period of time."

"Do not."

"no!"

Ava and Noah spoke at the same time.

Martin was slightly stunned and asked in confusion: "Why don't we take advantage of their plan when we know they are going to steal our data?"

Noah and Ava looked at each other and Noah nodded.

Ava said, "Let me explain."

"Although they are combat professionals, infiltration and stealth are compulsory courses for them. Combatants with high mobility and combat capabilities are best suited to individual infiltration. They can play a much stronger role than on the front lines of the battlefield."

"That's why every combatant who performs stealth missions is equipped with professional equipment."

What Ava said made others listen carefully involuntarily.

They don't know these things.

Before entering the library, they had actually never come into contact with combat professions. Not to mention the equipment of combat professions, they knew nothing about even the fighting methods. It was the first time for them to face combat professions at close range like in the subject design.

Delayak and Virgil wanted to ask Ava how she knew all this, but when they thought about the fact that she was an information analyst, it seemed easy to understand.

As we all know, this profession has both high upper and low limits.

Those with a high upper limit can even enter the core layer of Ai, while those with a low lower limit cannot even understand resource integration.

Virgil was a little confused. "I understand what you said, but what does this have to do with us modifying the data?"

Ava: "What I'm going to say next is related to this."

"The key to this decision is what level of equipment the opponent will carry."

"From the data we just saw, we can see that the device that was able to create this Olympic effect was most likely a high-precision signal jammer."

"The micro-surveillance clusters covering the entire quarantine area have extremely low signals themselves, and they've been specially modified so that most prosthetic eyes and head-mounted displays will simply ignore them. The fact that the enemy can detect them and use jammers to fake signals shows that their detection equipment must be very high-level."

"Based on these two points, the enemy's combat readiness level is at least A."

"Among the A-level equipment, there are quite a few useful intrusion devices. Although their functions are relatively dull, they are very powerful as auxiliary equipment to assist in infiltration."

"One of them is 'Admin Rights Duplicator.'"

"This equipment has a limited scope of application and is not a conventional stealth equipment, but it can play a huge role in specific situations."

"This is a special virus that is pre-installed on a specific device. As long as it can trick the administrator into verifying the identity of the machine, it can replicate the administrator's permissions through token exchange."

"So powerful?!" Virgil was a little surprised. "Why isn't something this useful a regular piece of equipment?"

"Although it's not regular equipment, everyone will carry it when it reaches the A-level combat readiness level. The reason it's not rated as regular equipment is because its usage is not very common, not because it's not powerful."

Ava paused and continued, "Administrator privileges are the most crucial part of a system. Almost all systems perform self-checks on the number and status of administrators. This is paramount. Even if an 'Administrator Privilege Replicator' is adept at disguise, it wouldn't take more than a minute to be discovered."

"More importantly, many systems have taken precautions against this type of intrusion, but they may not be effective."

It turned out to be the case.

That makes sense.

Virgil understood.

Although it is possible to obtain the administrator's privileges, it is also easy to expose oneself. Even if the administrator's privileges are obtained, they can be easily revoked.

The most important thing is that if you act rashly without knowing whether the other party's system has taken targeted preventive measures, you may not get the expected results and may even alert the enemy.

Virgil couldn't help but sigh: "Despite all its shortcomings."

"But once they gain administrator privileges, there's so much they can do. Even if they're exposed, they can still disrupt all our arrangements in just a minute, or even just a dozen seconds."

"But since we already know this, why don't we deploy a targeted defense system?"

Ava: "Of course it's arranged."

"Then why..."

Virgil didn't continue.

"It seems you have figured it out."

Ava looked at Virgil and said calmly, "Although we've already made arrangements, we don't know if the other party has updated or iterated on the virus. Defense will always lag behind offense. They can try without any responsibility, but we can't risk the entire system."

"Perhaps the exposed trajectory of the fourth floor was revealed to us intentionally. The intruders have actually completed their deployment in stages, obtained the information, and are planning to trick us in the end."

……

Waited five minutes.

There was no other movement.

"Unfortunately, they didn't fall for it. Your method didn't work," Kara said stiffly.

David scratched his head and looked at Cecily and said, "Uh... maybe the clues I left behind weren't obvious enough for them to notice."

Cecily smiled somewhat disappointedly. "It would be best if they didn't notice, but that's unlikely. If they were really like that, they wouldn't have matched us. Or in other words, since they've matched us, even if they didn't notice, the AI ​​would have given them a hint."

"Of course, we can't rule out the possibility that they didn't even understand the clues, but we can't always think the best. I tend to think they realized it was a trap."

He has hired someone to update the "Administrator Identity Copy Virus" to the latest version, which has new loopholes that can be exploited against various mainstream protection measures.

He had intended to catch the other party off guard in this test, but he didn't expect that the other party would not be fooled at all.

Cecily sighed deeply.

"Really? We're all freshmen, why are we so strict? Things that could have been solved quickly are becoming even more troublesome. Elo, you win again!"

He had a deep understanding of the library battle matching mechanism and had long known that this was elo.

Battles in the Battle Block are hosted by AI.

Although AI does not seem to intervene, as long as the participating players have talents that can be stimulated, AI will still slightly tilt them through certain factors.

The same applies to this topic test.

According to Cecily's idea, as a freshman, being able to create a subject that AI is interested in and pulling these senior students as sparring partners has already demonstrated his talent.

In this project, AI will 100% give hints to the other party. Instead of waiting for hints from the other party, it is better to expose yourself and intentionally set the hints as traps to see if you can make a big mistake.

Use the Leo mechanism to give out honey mixed with poison.

Cecily had tried this approach several times before, with some success and some failure.

Once successful, it is very likely that the game will end directly. Failure has no impact, because you will win elo anyway.

If it doesn't work this time, they won't be able to accumulate enough advantages and the confrontation will drag on for a very long time.

Thinking of this, Cecily said, "We have to leave here. We have to get the first blueprint before the enemy defense forces surround us."

He clapped his hands and stood up to leave.

"Anyway, our cooperation has already been completed. From now on, obtaining the blueprints will depend on your own methods."

After he said this, the figure of the whole person suddenly blurred, and mottled blocks of color appeared, and then disappeared on the spot.

Kara and David exchanged glances and cursed in unison: "This turtle actually left behind a shadow!"

The next moment, the two people also left from different directions. Although the directions were different, they had the same goal.

According to the information in the control room, the drawings are divided into four parts, two of which are above the 9th floor and two are below the th floor.

There is a clear location for a drawing.

Although they didn't know why the location of this drawing was directly marked, they also speculated whether it was a trap or fake news.

But after verification by Cecily, it was considered valid information.

Cecily never lies.

Therefore, on the fifth floor, in the library reading room in the southwest corner, is the hidden location of the first drawing.

This is the one closest to them and has the weakest defense.

Do you want to pit them against each other, so you can observe their head-to-head statistics and expose them?

This guess came to the mind of the three people as soon as they saw the news.

They would not be fooled by this level of provocation, so the three of them agreed on the spot not to attack each other, and whoever got the blueprint would be deemed to own it, and no one would try to snatch it away.

However, the person who has obtained the blueprint can no longer participate in the strength of the remaining blueprints, and needs to provide help to the other two people as much as possible without worrying about his own interests.

The three men formed a brief and fragile alliance.

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like