Does the Da Vinci code use NFT in the age of web3.0?

金色财经 view 27124 2021-12-30 15:13
share to
Scan QR code with WeChat

What is NFT? This may be a question that cannot be properly answered in the long run. This is important because, although NFT itself is multifaceted, it is in the historical period of rapid development and self-transformation as a new technology that needs to be explored. In this case, our knowledge could be the end of the ice,Even the iceberg grows at a price beyond our experience.

Can NFTs be used for criminal purposes? In a recent study, the Sister Sa group found that in addition to providing laundry assistance, NFTs could be used in specialized crimes in certain cases, resulting in threats to national security and other social and legal interests. , making it difficult to follow the process. . this problem.

1. Digital art with anonymity

I believe everyone has seen or heard the famous and classic movie "The Da Vinci Code". In the film, the male protagonist, Robert Langdon, is tasked with projecting a series of works of art with da Vinci. In the process of collaborating on many characters and unusual codes with the heroine Sophie Neveu, she discovers several secret secrets in the works of Leonardo, which seem to have many secrets.

Data encryption is an ancient science, and fast, efficient, and confidential communication is the key to winning any attack.In our old country, there were many ways to encrypt data."Case of the Blue Goose"This is a classic case.

According to historical records, King Gojong of the Tang Dynasty died in AD 683, and Wu Zhechen became Yi Dan, the fourth son of Emperor Wu Zi Tian. President Pei Yan, along with Emperor Xu Jingye, Emperor Luo Bin and others, fought to force Wu Zetian to return to Emperor Li Dan. However, the letter was intercepted by Wu Zetian before it was sent.

However, the secret letter that was not sent contained only the word "blue goose", so the police were confused. Wu Zetian quickly deciphered the encrypted message behind "the green goose". The word "green" means "December", and the usual letter "鵞" of "goose" means "I am white" when opening and descending. So, according to MeSince, Xu Jingye and Luo Binwang led their troops to attack in December, and Pei Yan internally.

So in the era of modern web3.0, is there a similar 'da Vinci password' hidden in NFT graphics?Technically, this is completely accomplished, and in a more cryptic form.Actually, sending passwords to public channels is nothing new as all kinds of encrypted data is hidden in photos, music and videos. violence, especially violence.

In May 2012, when German Federal Criminal Police arrested al-Qaeda in Berlin, according to intelligence sources, police found him with a memory card. KickAss' is on the map. , but there is strange sound and blind sound interference during playback.

According to an article in a German magazine, hackers have discovered the secrets of the film. About 140 files were hidden in porn movies like this. As an expert from the German Federal Police's Crime Prevention Unit, the document contains a wealth of information on Al Qaeda operations and future action plans.

2. How to convert files using NFT?

Since digital graphics are a very common tool in the NFT industry, using digital graphics to encrypt, mask, and transmit data is the best option. Below I will show you how to hide txt text as jpg image using the easiest method any writer with no computer background can do.

First you need to select a txt file and an image in jpg format, create a new folder, put the image there and convert it to a compressed file. For ease of use I have called the image 1.jpg and the compressed file 1.zip.

利用NFT犯罪 web3.0时代的达芬奇密码?

利用NFT犯罪 web3.0时代的达芬奇密码?

Then directly type "cmd" into the "Search programs and files" box on your computer and press Enter key to bring up a window onion prompt to open the interface.

利用NFT犯罪 web3.0时代的达芬奇密码?

Here, we will use the Lenovo folder of the author's computer as an example by downloading the compressed 1.jpg and 1.zip image files to a folder displayed in the cmd window.

利用NFT犯罪 web3.0时代的达芬奇密码?

Then type the command cmd: copy / b 1.jpg 1.zip 2.jpg and press Enter.

利用NFT犯罪 web3.0时代的达芬奇密码?

In the meantime, a new image has been created, which on the surface is no different from the previous image, but in fact already has a 1.zip archive. Extracting compressed files is easy. Simply unzip the image yourself.

利用NFT犯罪 web3.0时代的达芬奇密码?

Consider an artist drawing a 2.jpg file with data hidden in a public channel for NFT, placed on a foreign platform such as Kwanghae, and traded for another at the same price yam. The goal is to go out to sea and send information.

The process of transferring images to NFTs itself is the same as secondary encryption, and low cost NFTs occur thousands of times a day on the platform, making it easy to create multiple scenarios of protection and concealment. behaviour. Whether you like to launch NFTs from competitors you don't know or others, you can bypass anonymous suspicion in the Ethereum public channel.

And this is just a trick for hiding hidden information that anyone can learn, in fact there are many ways to hide information hidden in steganography of pictures. This type of data encryption has very high limits. Ordinary steganography is detected by special tools, converting image pixels, etc., and filling other pixels with special encrypted data. Even this type of steganography with the lowest procedures is very difficult to find. The image after saving the file is almost indistinguishable from the original image. Even the passwords themselves require special tools to decrypt the data.

A spy, arrested in 2010 in a large northern country, has used technology to send information to the public in secret and creative ways. The spy was able to completely confuse various secretions using only the most basic steganography. The data is transmitted securely. the country for many years.

It's hard to imagine how bad the outcome would be if an expert could use this method to send stolen state information, trade secrets, or other confidential information that could have a serious impact.

3. Encrypted nft encoder can be used

Encrypted nft can be a great way to send data, but it can also have its drawbacks. First of all, there is a limit to the encrypted data that advanced steganography can be used for photos, music, and videos, and the more you use it, the more likely it is to be exposed. Second, the process of broadcasting the encrypted nfts is time consuming and cannot be accomplished by sending the data immediately. This means that the encrypted nft is used in the same way as sending and sending e-mails. If so, what is the relationship?

(1) International smuggling

Contraband is the illegal importation of goods into or out of the country without inspection. In terms of the most commonly used international smuggling methods, encrypted NFTs can be used for drugs, weapons and ammunition, valuable animal and plant products, vital cultural relics, and valuable iron.

Export pull liability refers to the restriction or illegal restriction of the entry or exit of taxable goods or commercial goods without passing through open ports and import and export permits. The smugglers using contraband bypass usually have a smuggler base in their destination or on the beaches, aware of the situation on both sides of the border, have connections and convenient transportation. Those involved in border smuggling often include smuggling gangs, border residents, and even terrorist organizations.

People involved in smuggling around customs at sea usually have ocean freight, and sea smuggling is characterized by high volume and speed. China's long coastline, difficult loading situation and the operation of a large passenger vessel make it very difficult to prevent smuggling. In particular, hijackers use high technology to assemble ships and turn ordinary ships into hijackers.

In international smuggling campaigns, important information such as the time and location of the agreed connection between the smuggler and the sender is very important, and information which is usually short and encrypted by NFT feels perfectly like a carrier. . information.

(2) International trade population

International trafficking in human beings is a serious crime against humanity. Use force, coercion or any other crime to search, transport, transfer, conceal and exchange people around the world for goods. According to the 2017 World Map Statistical Report, the global human trafficking case is worth $ 32 billion, and the United Nations estimates that 800,000-4 million men, women and children are being cheated and collected around the world. Every year it was exported around the world and sold into slavery.

According to United Nations statistics, about 20% of human trafficking in the world is linked to labor costs and about 80% of human trafficking in the world is linked to labor costs. work of the sex industry. Traders usually have three encounters: (1) being forced into prostitution, (2) being sold as coolies, and (3) being shot and killed on their bodies. According to a 2012 survey by the International Labor Organization (ILO), there are around 20.9 million victims of trafficking worldwide, but only 0.4% of them are identified globally and very few were saved or rescued.

Public research data from the US FBI shows that most companies operate on specialist companies created in the Dark Web. I can't help but wonder if victims of trafficking can be locked in NFT products and sold out in the open or half open to the public.

Moreover, this type of business can translate the company's capital into legitimate competition to benefit from NFT artwork, but also to complement financial activity. After all, at this point, NFT auction platforms in many countries do not have strict inspection mechanisms, but for large NFT trading platforms there are probably naturally high-priced NFT series. . It is difficult for regulators. Contamination to catch the dirty secret behind the trade.

(3) Crimes affecting national security

According to South Korea's crime law, the crime of threatening national security is a threat to national sovereignty, justice and security, dividing states, overthrowing the people's democratic dictatorship and overthrowing the socialist system. Attacks on national security are common offenses and many specific offenses are set out in article 12 of chapter 1 of the Code of Criminal Procedure. This type of crime is the most serious type of crime provided for in the Criminal Code.

Like the operation of the encrypted NFT to send data, the "punishment" falls under Article 105 of the Penal Code for violation of state power, criminal offenses under Article 110, and violation of records and other offenses. . It is very suitable. Encrypted NFTs can also be used by terrorist organizations as weapons by terrorists to spread terrorist plans, recruit and organize attacks.

Fourth, use encrypted NFT anti-crime measures

The key to crime prevention is the use of cryptographic NFTs in the integration of administrative and NFT platforms. The current work of extracting steganographic data from images such as unarmed warfare, vaccines, anti-smuggling, etc. Look for files hidden in files like large internet photos, videos, audio etc. like finding a needle in a haystack.

Moreover, in order to store this encrypted data, even a specialist must first know the characteristics of the encrypted data. In the case of cracked steganography, the traditional recognition method is to use traces of various steganographic tools, for example, variations in data characteristics and specific types left behind a file have been changed to identify photos, from music or documents. He was hidden with steganography in the video.

Over the past few years, Backbone Security has created a database of thousands of records from steganography tools, and has used this data to determine if keys to other records are hidden in the information. However, this sensitive and sensitive information is often difficult to share between other specialist companies and regulators at the national and international levels, which also leads to global violence that is difficult to resolve.

In addition, according to the specialization of NFT products, the process of using steganography to create digital images in the broadcast process for NFT is similar to re-encryption of data, providing "bad" criminal devices. . This will require the use of more stringent KYC policies and alternative methods of more stringent monitoring of larger NFT platforms in the future.

enter at the end

In the era of website 3.0 where information could be stored, many breaches would create a deep and confidential secrecy. Historical experience has shown that just as a kitchen knife can cook or kill a person, any large animal can be marginalized and used inappropriately.

The idea that the legal team of Sister Sa has always had a strong conviction is as follows:Take advantage of the latest technology in the most appropriate, legal and compliant way.. We oppose the use of new technologies for criminal purposes and we oppose obscurity control of the use of technology.

But ultimately, it can be an inevitable process for financial technology and legal professionals to know, understand, and research the dark side of technology.

btcfans公众号

Scan QR code with WeChat

Disclaimer:

Tags: Web3.0 NFT
Previous: DeFi, a new lending model, will sweep incredible finances. Next: Arcane Research publishes forecasts for 2022

Related