Cherreads

Chapter 588 - Chapter 133: Skynet Virus, On the Moon? (2)

Once the assistance request is sent to the server, the server immediately writes a dedicated cracking program based on the received data code, specifically for hacking into various high-difficulty devices.

If the hacking fails, or is intercepted by ICE programs, or encounters antivirus programs upon entry and gets deleted, the server will immediately respond and automatically start cracking again.

In this constant process of hacking, continuously optimizing to overcome challenges, the ctOS System's hacking program is self-optimizing and advancing at an astonishing speed.

Another area where Mercer deploys hacking viruses is South Korea—because it's closest to the Busan Ghost City server, allowing the ctOS to respond at the fastest speed.

Compared to the viral expansion speed of the ctOS program on the North American Continent, the fall of South Korea is undoubtedly faster, due to geographic restrictions and highly concentrated population density.

Once the network devices in Seoul are infected by the virus and start spreading, the city's complete authority collapse is almost just a matter of time.

Countless networked devices form a dense intelligence network, constantly transmitting massive amounts of data, which is then filtered by Venus controlling the servers.

Ultimately, through a point-to-surface method, the ctOS hacking virus explosively infects 99% of the global device network like a network zombie virus.

Strictly speaking, if Mercer could obtain a vast amount of money and resources to build an unprecedentedly large server farm, Mercer could almost declare himself capable of interfering globally via the network.

This terrifying achievement is almost entirely completed by programs and AI automatically.

Because of this battle, Mercer even believes that the ctOS System developed by him could rival, or even far surpass, the 'Rabies Virus' that Bartmos once caused the Old Net to collapse!

Because Bartmos' virus could only automatically corrupt AI and pollute networks, while Mercer's virus truly controls the globe!

But several problems have simultaneously erupted—such as the enormous amount of data almost crippling Mercer's two servers, forcing him to redesign algorithms to reduce the data flow.

Even so, Mercer feels deep pressure, thankfully his target this time is only Arasaka, so most devices were set to sleep mode after being hacked and obtaining permissions by the ctOS System.

Otherwise, relying on only part of the servers in Busan and his own servers, even using Ultraman's Hong Kong servers might not suffice to meet the ctOS program's demands.

This realization also makes Mercer aware of the enormous potential his developed system contains—the original purpose was merely for intelligence gathering and surveillance programs.

With continuous iterations and optimizations, the most terrifying and standout feature unexpectedly lies in the hacking program existing within the pre-operation procedures of the program.

Mercer was initially worried that his global, widespread hacking might alert some people, or hit unyielding hurdles, or even expose the existence of his system.

But when he really let go, began hacking globally—damn, not a single worthy opponent?

Turns out I'm really this awesome?

This realization raises a strong sense of crisis and secrecy in Mercer.

Compared to the intelligence gathering capability of the ctOS System's automated operation, perhaps now, the most dreadful thing in his hands is the virus hacking program and mechanism within the ctOS program!

Even if Mercer makes no modifications to the virus, right now, he could be in Night City, publicly paralyze traffic lights in cities far in Asia, causing numerous cars to suddenly accelerate or decelerate, or even have subways running at full speed until derailing or colliding...

More unbelievably for Mercer is—his ctOS System has even spread into the military systems of many companies and countries!

He unexpectedly now holds numerous missile launch permissions, even permissions for explosive intelligent ordnance.

Not to mention combat robots, combat drones...

This astonishing result, not only Mercer himself, but even Venus cannot help but exclaim during work.

[Venus: If you existed in the Old Net, we might be able to obtain even the global nuclear buttons.]

[Mercer: I think if I let the ctOS continue hacking, it's only a matter of time...]

This is not Mercer exaggerating threats, but a deep review and investigation of the virus's hacking trajectory—even he himself finds it absurd, as the initial goal was merely to obtain permissions from public systems and private devices for intelligence gathering.

The purpose and level of original development were not designed for those advanced servers equipped with large ICE and powerful antivirus software!

But why achieve such terrifying, glorious results?

Because technically speaking, the ctOS System is not breaking through the defense systems of those large military and corporate servers.

But people.

When a target infected by the ctOS virus, due to negligence, carries it into a facility and directly plugs their data line into a computer—a silent, unavoidable virus spread begins.

One person infects ten devices, and those ten devices infect ten more unsuspecting humans who transmit data with them, and these ten people further spread the virus to more devices...

More Chapters