Cherreads

Chapter 604 - Chapter 138: Black Light Virus, Lark's Reply

If the essence of the Black Wall is destruction, and the essence of the Rabies Virus is corruption, then the complexity of the Black Light Virus far surpasses both.

The name "Black Light Virus" comes from a game called "Prototype"—a powerful virus similar to a zombie virus.

In the game, this virus can infect humans and turn them into zombies, further mutating them into various terrifying monsters.

But in today's Cyber World, the danger posed by this virus is even more terrifying than the Black Light Virus in the original game.

Firstly, the Black Light Virus possesses extremely high transmissibility.

This transmissibility arises from the autonomous hacking system of the Sky Net System developed independently by Mercer—once the target is infected with the Black Light Virus, they automatically become a source of infection.

The Black Light Virus hijacks the target's Brain-Computer Interface, automatically hacking into and taking control of all devices capable of data transmission.

In other words, once a person is infected with the Black Light Virus, any target within their network proximity will automatically become a target for hacking.

If a camera is infected with the Black Light Virus, it will automatically scan and hack any target within its field of view.

If the target is connected to a server, Black Light will also automatically hack the server, subsequently using the server to provide computational power to all virus-infected devices, and automatically hacking all devices the server can reach.

The entire process is fully automated, but it is not just crude, mindless hacking—because the Black Light program itself, has an AI consciousness cluster.

Yes, just as the Black Wall possesses AI control, even the Rabies Virus developed self-awareness when it rampaged through the old net.

Mercer believes that an AI with strong infectious abilities and destructive capabilities—even if it doesn't possess an AI core—could very well accidentally generate an AI core of its own during the hacking of AI-equipped devices.

Rather than waiting for it to awaken an uncontrollable AI core, Mercer prefers to provide it with a reliable, logically clear, and clearly defined AI core from the start.

But this AI is different from Venus or the Black Wall—as previously mentioned, the AI consciousness cluster Mercer involves with the Black Light Virus is unique.

This technology stems from Mercer's breakthroughs on the Soulkiller Program, as well as his development of the Super Deep Dive State, reflecting his profound research and understanding of human consciousness data.

This means all Black Light programs carry a consciousness data framework, but do not carry a consciousness data core when the Black Light Virus consciousness data core, i.e., the main AI, is absent.

The Black Light programs will synchronize all memories and knowledge, operating automatically as a non-intelligent AI program.

When the Black Light Virus wants to manipulate, all the Black Light programs can become its embodiment, with the AI core freely residing in any of the Black Light programs as its main body.

All hacked targets will become small computational power providing devices, automatically networking and transferring data with each other, providing continuous computational support to the Black Light main program while synchronizing consciousness data.

Infecting ten people means support from ten people's computational power, infecting one hundred means support from one hundred people's computational power.

Theoretically, when Black Light devices infect a city's people and devices, all the city's humans will transform into biological servers providing computational power, and those devices will become its data storage servers and minions.

All Black Light programs will automatically exchange and synchronize data to ensure there are no special entities. If a mutated entity appears, the collective consciousness will automatically overwrite its erroneous data or even physically destroy the "alien" entity different from itself.

The ability to accomplish all these things must be attributed to the Black Light Virus's intrinsic formidable and terrifying destructive capability.

The attack nature of the Black Light Virus is primarily reflected in two aspects.

The first is control over all devices.

Unlike the Sky Net system, which sneaks in to steal data, the Black Light Virus' hacking for device control is predatory and permanent.

It doesn't penetrate ICE but rewrites the device's firewall, and after invading the device, implants the virus directly into its built-in network or device protocol,

such as a network protocol like TCP/IP or a widely-existing underlying system command.

As long as this protocol or command is in use, the Black Light Virus cannot be eradicated. It will persistently regenerate and automatically optimize its attack methods until it finds a target vulnerability and secures victory.

Once it takes control of a device, ordinary devices need no further mention—they naturally become the property of Black Light.

More frighteningly, Black Light can even control the human body—an outcome thanks to Mercer's research on the human neural operating system. It will automatically hijack the human Brain-Computer Interface, seizing the authority for brain-computer interface data transmission.

This authority is not limited to data signals transmitted from the brain to the body; it includes reverse data signals transmitted to the brain from the body.

In other words, once infected with the Black Light Virus, your body will suddenly lose control, as your Brain-Computer Interface sends neural signals that the Black Light program desires, turning all your cybernetics into Black Light's weapons.

More Chapters