Chapter 502 - 246 Terminator 2.0_2
This software has been previously used by Blitz, and it features convenient mini-programs. Although its functionality is not too robust – only the Sentinel function is quite useful – it’s generally sufficient for everyday use.
"What’s the name of this software? It seems to have quite a few uses." Allen Zhang got the hang of it quickly and was full of praise.
"This is a piece of software I programmed back in high school. I call it Terminator 1.0. Its functionality was somewhat limited back then, and it was open-source, available for public download. But it got taken down from the official website later on. After I started working at the company, I didn’t have time to update it. However, after several rounds of optimization and updates, and the use of modern AI, it now incorporates many convenient features."
Blitz explained: "When you browse underground websites, enabling the Sentinel feature will block spam ads and virus interference."
Allen happily activated Sentinel mode. Then he opened the deep web, located the posted intelligence task, and clicked to accept it.
He also selected two multi-person Black rap sports videos for the other party, encrypting and sending them in a packaged folder.
The recipient quickly received the files. They only viewed a few seconds of the video, and to watch the subsequent one-minute-long video, a key was needed to unlock it. Inputting the wrong password three times would automatically destroy the file.
This is a common practice many people use when conducting underground information transactions.
Australian lobster: Hello, I’ve received the video message you sent, it’s very helpful. Please send me your virtual account link, and I will send you a Bitcoin reward worth 4 coins.
Blitz glanced at it and immediately refused, advising: "He’s testing you. Don’t give him any information. You just need to have him transfer the BTC to the root directory storage folder labeled seven.25, which will automatically unlock the key. At that point, the folder will unlock and be implanted into his computer. You then can extract the recovery pack remotely via the cloud, transferring the BTC data to your own account."
