当前位置:网站首页>Thoughts on Technology Sharing
Thoughts on Technology Sharing
2022-08-10 18:18:00 【51CTO】
Story Reason
Tell a story about yourself, at the request of netizens, help him find a person who has had financial transactions with him through Alipay, and there may be some disputes later,I don't know the specific reason, but his request is: can the mobile phone number of the other party be queried through the transfer record on Alipay.
Due to Alipay's privacy mechanism, if the other party's mobile phone number does not exist in your mobile phone address book, you will not be able to see the other party's full mobile phone number, only the first threeThe first and last two digits, you can see the other party's avatar and nickname when transferring money. When the amount is relatively large, you can still know the other party's name, but you can't see the complete 11-digit mobile phone number
In the above paragraph, there areA very important implicit condition, the other party's mobile phone number is stored in your mobile phone address book, then I can see his complete number through Alipay!
This piqued my interest and thought I could try it, because the idea is to revolve around the above mechanism, the problem will be simplified to add all possible numbers to my mobile communicationrecord.
How do I find all possible numbers?The simple and rude thing is to list all the default 6-digit numbers in the middle in the form of permutation and combination. Anyone who has learned point permutation and combination knows that there are ten possibilities of 0-9 for each digit of 6 digits.There are 10 to the 6th power, that is, one million kinds... Even if it can be listed, the mobile phone will have to explode. Does it have such a large capacity to store 1 million numbers?
The problem has become to narrow the scope as much as possible, not to mention too detailed, for fear of being used by people with ulterior motives.
Then is to use the code to generate all possible numbers, the problem becomes how to import the generated mobile phone number into the mobile phone, this is another problem, I still use the code to solve, and don't say too much, for fear of being used by people with ulterior motives.
As a result, I finally found it for him.
But I'm going to say two other things:
General ideas for problem solving:
When you face a problem, you must first focus on the final result, propose solutions around the final result, and be able to propose a solution, indicating that the problem is theoretically solvable, otherwise there is no feasibility; then gradually dissect the problem around the solution, decompose the transaction into the most basic components, and use various methods to solve every problem in the process of decomposition. The final result in the case is found through Alipay.Someone's number, the solution is to use Alipay's mobile phone address book to add friends, the problem becomes adding the other party's number to the address book, the premise of adding is to get the number, the solution to get the number isViolent traversal, but after analyzing too many violent traversal results, it is almost unfeasible, the problem becomes how to reduce the traversal results, the solution to this problem is *****************Narrowing down the scope, this solution can be implemented after optimization. It can be done with three or two clicks of the code, and a bunch of numbers are obtained. The problem arises again. How to quickly import thousands of numbers into the mobile phone?Think about this problem and find a solution. In short, under the guidance of this kind of thinking, you will be able to slowly approach the final goal.
Consequences of Technology Abuse
In the end, I helped that person achieve his goal. I wanted to record the complete process and share it with everyone, but I thought that if this solution was used by people with ulterior motives,Wouldn't that be a trick of the tiger and help the tyrant to abuse it? This goes back to the old-fashioned question, technology is not guilty of human beings, any technology is neutral, and what it is used for depends on people. Angels can be used to create heaven, and devils can be used to create nightmares.
Summary
Influenced by open source culture, sharing is the virtue of programmers, but for technology sharing, you should be more careful, so as not to be used for evil without your knowledge.
The three views are the same, yes
边栏推荐
猜你喜欢
直播回顾|多云时代,如何建设企业级云管理平台?(附建设指南下载)
「Web应用架构」轮询,SSE 和WebSocket,如何选择合适的?
烟雾、空气质量、温湿度…自己徒手做个环境检测设备
【深度学习21天学习挑战赛】4、初尝循环神经网络(RNN)——股票预测
不能直接在交易所期货开户
三坐标雷达显示软件 SPx Viewer-3D
瑞虎8 PRO产品性能分析,一文读懂究竟何为“全域动力科技旗舰”
【HMS core】【FAQ】Account Kit、push Kit典型问题合集1
【接入指南 之 直接接入】手把手教你快速上手接入HONOR Connect平台(中)
机器人控制器编程实践指导书旧版-实践五 数字舵机(执行器)
随机推荐
Go 语言快速入门指南:第四篇 与数据为舞之数组
想玩转监控神器Prometheus吗?
leet面试150
从Delta 2.0开始聊聊我们需要怎样的数据湖
R语言ggplot2可视化:使用ggpubr包的ggscatter函数可视化分组散点图、stat_mean函数在分组数据点外侧绘制凸包并突出显示分组均值点、自定会均值点的大小以及透明度
Interpretation of ZLMediaKit server source code---RTSP push and pull
产品-Axure9英文版,A页面内a1状态跳转B页面的b2状态,(条件跳转状态)
接口测试进阶接口脚本使用—apipost(预/后执行脚本)
Toronto Research Chemicals霉菌毒素分析丨伏马菌素B2
eager模式和graph模式 Tensorflow
【HMS core】【FAQ】Analytics Kit、Push Kit典型问题合集3
Xilinx FPGA收发器参考时钟设计应用
Mysql索引、事务与存储引擎
FFmpeg extract H264 nalu from the mp4
一小时搞定 简单VBA编程 Excel宏编程快速扫盲
欧洲核子研究中心首次在量子机器学习研究中取得实效
去除富文本标签样式
【图像去雾】基于颜色衰减先验的图像去雾附matlab代码
海思HI3516DV300开发资料
破解校园数字安全难点,联想推出智慧教育安全体系