AI network security has opened the curtain AI crime is also close at hand

Everything will have two-sided features, and artificial intelligence can't be avoided. It brings us not only the gospel, but also the threat that we can't see. Artificial intelligence cybercrime has come to you.

At the 2017 GMIC conference a few months ago, Hawking once again threw out the AI ​​threat theory. "The rise of powerful AI is either the best in human history or the worst. I have to say that it is good or bad. We are still not sure."

The good side has already appeared around. From technical concepts such as robots and Alpha dogs to product entities such as AI mobile phones, AI TVs, smart speakers and smart cars, AI is gradually landing and moving into everyday life.

The bad aspects have also appeared. On January 14th, at the 2018 Guardian Program Conference, Ma Huateng, Chairman and CEO of Tencent, said that Tencent assisted the police in destroying the largest platform for domestic AI technology to crack the verification code, and thus dig out the hacking and cracking from the library. Verification code, the entire chain of black goods that sells citizen information and implements online fraud.

AI network security has begun to open AI crime is also close at hand

The case intercepted more than 1 billion personal information of citizens and found out that the amount involved was more than 50 million yuan. According to statistics, the AI ​​coding platform only cracked 25.9 billion verification codes in the first quarter of 2017, and the cumulative crack reached 100 billion. Behind it, we can feel the efficiency and professionalism of AI's network black production, and the upcoming hurricane in the Internet security field.

Internet security in 2018 started with the two keywords of AI and network black production.

â–¼ parties aim at AI network security â–²

Looking back at three outbreaks of virus attacks worldwide in 2017, the WannaCry virus swept across at least 150 countries worldwide in May. In June, Petya virus infected more than 60 countries around the world. In July, the CopyCat virus killed 14 million Android phones. When the industry is still discussing the application of AI technology behind the Petya virus, more than 80 security companies around the world have introduced AI technology to fight viruses and black products.

AI network security has begun to open AI crime is also close at hand

At the same time, the trading activity (including investment, mergers and acquisitions, etc.) of AI technology security companies in the first quarter of 2017 far exceeded the average of the past five years. Even unicorns that use AI to predict cyber attacks, Cylance is valued at more than $1 billion.

In the domestic market, Internet companies represented by Tencent have integrated AI capabilities in cyber security, and they have cooperated with the police to extend the defensive reach to the source of network black products. For example, Tencent uses a situational awareness system that combines big data and AI capabilities, and a coffin system to extend cybercrime from “after-the-fact defense” and “interception” to “pre-warning”. In Ma Huateng’s strategy of responding to the “three new” strategy of network black production (using new technology to counter new crimes, expanding new alliances to solve new problems, and building new ecological prevention new risks), new technology ranks first, with higher order The technical means of technology against cybercrime is currently effective.

ETH Miner

Mining is the process of creating a block of transactions to be added to the Ethereum blockchain in Ethereum's now-deprecated proof-of-work architecture.

The word mining originates in the context of the gold analogy for cryptocurrencies. Gold or precious metals are scarce, so are digital tokens, and the only way to increase the total volume in a proof-of-work system is through mining. In proof-of-work Ethereum, the only mode of issuance was via mining. Unlike gold or precious metals however, Ethereum mining was also the way to secure the network by creating, verifying, publishing and propagating blocks in the blockchain.

Mining ether = Securing the Network

Mining is the lifeblood of any proof-of-work blockchain. Ethereum miners - computers running software - used their time and computation power to process transactions and produce blocks prior to the transition to proof-of-stake.


ETH Miner:Antminer E9 2.4Gh/S,Bitmain E9 2.4Gh/S,Bitmain Antminer E9 2.4Gh/S

Eth Miner ,Antminer E9 2.4Gh/S,Bitmain E9 2.4Gh/S,Bitmain Antminer E9 2.4Gh/S

Shenzhen YLHM Technology Co., Ltd. , https://www.ylhm-tech.com

This entry was posted in on