How do the strongest post-80s train hackers?
1. Course settings: Six classes a day, each 90 minutes long, learning programming languages and operating systems, etc., show that North Korea attaches great importance to hacker technology education. This intensive course arrangement may be aimed at quickly improving students' technical level.
2. Technical research: Students are required to analyze programs such as the Windows operating system and study how to break into other countries' computer information systems. This shows that North Korea's hacker training is not limited to theory, but also involves practical attack technology research.
3. Independent development: The core task is to develop its own hacking programs and computer viruses instead of relying on external existing tools. This independent development strategy may be aimed at reducing dependence on external resources while improving the concealment and uniqueness of attacks.
4. Technical level: The description mentions that the technical level of North Korean hackers is not inferior to that of top programmers at Google or the CIA, and may even be better. This statement may be a bit exaggerated, but it also reflects North Korea's confidence and ambition in the field of cyber warfare.
5. Grouping and tasks: Students are divided into different groups, focusing on attacking different countries or regions. This division of labor may help improve the targeting and efficiency of attacks.
6. Cultural penetration: Hackers are required to spend two years "undercover" into the target country to learn local language and cultural knowledge. This strategy of cultural penetration may be aimed at increasing the success rate of attacks, because understanding the culture and language of the target country can help hackers better hide themselves and avoid being discovered.
7. Mission and goals: From the first day of education, these students are given clear missions and goals. This early sense of mission instilled may help cultivate loyalty and execution.
Recently, a potential coin was ambushed. It is Trump's concept presidential dog Conan, known as the strongest military dog on the surface! He has made great contributions in many important tasks! Backed by top IP and strong community empowerment, it will definitely go viral this year! #bybit被盗 #钱包安全 #币安上线KAITO #TRUMP #Conan $BTC $TRUMP $BNB