Is the white hat black or white?

Since the word "hacker" was demonized, people in the elite circle couldn't find a suitable word to describe themselves. Suddenly one day they had an epiphany and found that "white hat" is a good word, completely changing from "black" to "white" . As a result, the word became popular in the elite circles. Everyone called themselves a "white hat" and wished they had the words "white hat" printed on their business cards, in order to declare to the world that they were actually the same as those "superstars" who were featured on TV. There is a fundamental difference between "criminal" and "hacker". After being exposed on many occasions, the media slowly began to accept this term, and from then on "white hat" became the identity symbol of the "media expert delegation".

To be honest, if the name were changed, there would be slight changes, and the complaint article today would not have appeared. The so-called "white hat" is explained by Du Niang: "It describes a positive hacker who can identify security vulnerabilities in a computer system or network system, but will not maliciously exploit them, but will publish the vulnerabilities. In this way, the system Vulnerabilities will be patched before they can be exploited by others, such as black hats."

It is true that this "white hat" sounds much better. It is no longer "black" but white! White! Really white! No more black! No more black! It’s really not dark anymore! Say important things three times! However, in essence, it is just a change of the soup without changing the medicine. It is just the masturbation (spiritual self-comfort) behavior of people in the aristocratic circle. For most people in the expensive circle, there is essentially no difference. Those who should be cheating are still cheating, and those who should be cheating every day are still cheating. It's just that now the cheats can be changed to Rank, and they can be more upright. Every now and then, I would make small fuss to find some loopholes in the website, and I would get the Rank with a single note from Sqlmap. With good luck, I bumped into Niu B's station, first robbed the store, and then exposed it on a certain platform. In one sentence: "White hats" come to blow up your anus, don't resist, go to the XX platform to claim your anus. The "white hats" have not only stripped the "sufferers" of their crimes, but also used some platforms to clean up their evil deeds openly.

And these "sufferers" don't know if they are used to "little suffering". I believe that many people in your circle are often found by some friends from outside the circle. The only reason they come is that the website has been tested by "white hats" and some "things" were taken away. Finally, it was exposed on some platforms. , can you help find someone to delete the post? When I encounter such a situation, there is basically only one reply: "Delete the post! Take a screenshot immediately! Notarize it! Call the police! Get to the bottom of it! This is like your daughter's pants being taken off and then taking a picture and circulating it on the Internet. You don’t want to call the police but delete the post, what kind of logic is that?” It is the “little suffering” mentality of the sufferers that makes these “white hats” use gadgets to find holes everywhere for fun.

In fact, it has become increasingly difficult to draw the line between "black" and "white" among "white hats." The various platforms in your circle are for their own benefit and do not play a guiding role at all. They are more using these "white hats" to gain more fame for themselves. As for what you can do with the fame you earn? You all understand.

I believe that if this continues, in the near future, "white hat" will be used as a derogatory term like "hacker". I wonder what people in your circle will call themselves? If “hackers” are demonized by the media, what about “white hats”? Was he demonized by his own people?
< img src="https://hnxx.oss-cn-shanghai.aliyuncs.com/official/1678694737820.png?t=0.6334725112165747" />

Guess you like

Origin blog.csdn.net/javagty6778/article/details/129569261