Arcane Lord

Chapter 3111: Hash Power Pool Portrait

Realizing that the attacker had a huge lead in meta-thinking compilation, Sha Duo frowned even deeper.

On the one hand, he was very eager to catch the other party so as to gain knowledge about meta-thinking compilation, but on the other hand, he found that he might not be able to track the other party.

Based on the capabilities shown by the other party, the computing power pool network is not only like entering an uninhabited land for the other party, but at least it is easy to escape if it wants to.

It can be said that this should be the most difficult incident that Xia Duo has encountered since his debut. He subconsciously wants to use the computing power of the computing power pool to analyze the torrent of consciousness information sent by the other party, and even further track it.

However, he finally endured it.

After a while, Charles came in from the outside, bringing with him the shipment records urgently submitted by the connector supplier of the computing power pool at Comanso.

Chateau temporarily stopped analyzing the attacker's consciousness information, only retaining the most basic attention, and turned most of his energy to the information brought by Charles.

But after only turning a few pages, he closed the information and stuffed it back into Charles' hands. It was not because the information was false, but because he had misunderstood. The shipping records of the current era were far from what he expected.

The information Charles brought back was basically some simple items, such as how many people purchased the computing power pool connector at a certain time and place.

Although some people choose to register for the mage level at the Lingsi Network Research Center in order to obtain a higher subsidy amount, this time the attacker only used the most basic connector without any upgrade function.

Basically, it's the kind you can pick up casually on the street.

In this case, the possibility of tracking through shipment records is almost zero.

However, the information brought by Charles is not useless at all. The shipment records are actually the total number of computing power pool users in the Cormanso territory. Combined with the login data from the Lingsi Network Research Center, some information can still be determined.

For example, some connectors log in frequently. Even if the user does not register his or her mage level, Shaduo can actually determine the level for him based on the real-time calculation efficiency of the computing power pool.

You can even further determine the research scope that the other party is good at by artificially and selectively assigning some specially designed computing tasks to the other party.

The computing power pool is not a general-purpose computer. Each unit that makes up the computing power pool can be said to be unique. As long as it is designed properly, a portrait can be determined for each person.

It's just that without the assistance of a magical computer, the amount of work done is very huge, so huge that even the computing power pool itself cannot calculate it, but -

If it is just a portrait of a certain mage, there is not much difficulty in it.

Of course, if the target of the portrait is a psionic mage, that's a problem.

Take the existence of the suspected psionic mage currently attacking the computing power pool as an example. The other party can also interpret subconscious messages, which means that the other party can interpret all calculation tasks assigned to the other party.

In other words, the other party can give answers selectively, instead of subconsciously answering like other users (meta-thinking level calculations will not directly reveal personal privacy, but the response speed can determine the area of ​​expertise, and other privacy is actually also You can test it out this way).

This is similar to how social software users on Earth intentionally skip watching videos they are interested in and mislead the algorithm into thinking that they are not interested in such videos and will not push them in the future.

Therefore, it is unrealistic to use customized computing tasks to determine the attacker's areas of expertise or even identity information. This is actually equivalent to telling the other party - I am investigating you!

Social software platforms on the planet actually don’t care whether users deliberately act. On the one hand, individual people cannot represent the public. A few people have no meaning to the platform. What the platform cares about is the majority of people.

On the other hand, people cannot suppress their inner feelings forever. As long as they use it for long enough, some of their attributes will always be exposed and become part of the software portrait.

In the same principle, the computing power pool can also determine the opponent's areas of expertise and even identity information through long-term analysis.

Even if you don't customize computing tasks specifically for them, and just use general computing tasks, they will always reveal certain tendencies over time.

This has indeed been possible for a long time, but this time the attacker is using a brand new connector. For the time being, unless the two people are directly connected, in the spiritual link, it is impossible to determine the consciousness characteristics of the other party through a third party.

Generally speaking, Xia Duo cannot determine whether the other party has used other connectors before, and the computing power pool cannot save such "login information".

For now, the connector is the computing pool account, and changing the connector means opening a new account. Even if the two connectors are used by the same person, the computing pool cannot judge.

There is no such thing as "soul imprint" or "soul fluctuation". At least, Xia Duo has never heard of this theory yet.

The magic weapon is bound to the user, using the same tune. Essentially, the magic weapon is connected to the string of the open magic network that passes through the human body, so that the magic weapon has to behave as if it has an owner.

If you change someone else, as long as the synchronization is completed, the magic weapon will "recognize its owner" again. In fact, it cannot be truly bound to a user. Whoever gets it and completes the synchronization can use it.

The threshold for synchronization of most magic weapons is very low. Generally, they only need to be carried with them for a period of time. If they are mage, they can actively synchronize them, and the time will be even shorter.

Even though it looks like binding, it is actually just a more complex authentication mechanism.

As for the magic mark, it is essentially a fictitious proof of identity, but most people associate this identity with their true identity.

The same magic mark can be used by Zhang San, and Li Si can also use it.

Of course, if Zhang San is willing to consume Ms. Mystery’s divine grace, he can “register” with Ms. Mystery, so that when others impersonate his mark, Ms. Mystery will give a reminder that the mark is fake.

The same principle applies to Iolum's dedication of Mythra to the Mysterious Lady. It is called a "sacrifice" but is actually a "patent protection".

The higher the identity, status, and strength of a person, the more rigorous his attitude toward God will be, and he will not be easily offended. A low-level mage may not care about Mythra's patent protection. If there is a chance to misappropriate it, there will most likely not be any psychological burden.

But beings like the Lord God of Elves would not be able to do anything to embezzle them.

Of course, the computing power pool can also use a magic mark as an identity to "log in", but this is still anonymous in nature, and the magic mark cannot directly correspond to a specific mage.

Ms. Mystery will only prompt the fake mark, but will not tell others which mage registered the mark!

But even so, most mages may not be able to accept "registering" magic marks to the computing power pool.

Whether it is the computing power pool or the various magic tools with market life, including the communication magic tools of the Tower of Time, and even the mysterious lock permissions, they are all anonymous.

Anyone who gets it can use it.

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like