当前位置:网站首页>Thoughts on Technology Sharing

Thoughts on Technology Sharing

2022-08-10 18:18:00 51CTO


Story Reason

Tell a story about yourself, at the request of netizens, help him find a person who has had financial transactions with him through Alipay, and there may be some disputes later,I don't know the specific reason, but his request is: can the mobile phone number of the other party be queried through the transfer record on Alipay.

Due to Alipay's privacy mechanism, if the other party's mobile phone number does not exist in your mobile phone address book, you will not be able to see the other party's full mobile phone number, only the first threeThe first and last two digits, you can see the other party's avatar and nickname when transferring money. When the amount is relatively large, you can still know the other party's name, but you can't see the complete 11-digit mobile phone number
In the above paragraph, there areA very important implicit condition, the other party's mobile phone number is stored in your mobile phone address book, then I can see his complete number through Alipay!

This piqued my interest and thought I could try it, because the idea is to revolve around the above mechanism, the problem will be simplified to add all possible numbers to my mobile communicationrecord.

How do I find all possible numbers?The simple and rude thing is to list all the default 6-digit numbers in the middle in the form of permutation and combination. Anyone who has learned point permutation and combination knows that there are ten possibilities of 0-9 for each digit of 6 digits.There are 10 to the 6th power, that is, one million kinds... Even if it can be listed, the mobile phone will have to explode. Does it have such a large capacity to store 1 million numbers?

The problem has become to narrow the scope as much as possible, not to mention too detailed, for fear of being used by people with ulterior motives.

Then is to use the code to generate all possible numbers, the problem becomes how to import the generated mobile phone number into the mobile phone, this is another problem, I still use the code to solve, and don't say too much, for fear of being used by people with ulterior motives.

As a result, I finally found it for him.

But I'm going to say two other things:

General ideas for problem solving:

When you face a problem, you must first focus on the final result, propose solutions around the final result, and be able to propose a solution, indicating that the problem is theoretically solvable, otherwise there is no feasibility; then gradually dissect the problem around the solution, decompose the transaction into the most basic components, and use various methods to solve every problem in the process of decomposition. The final result in the case is found through Alipay.Someone's number, the solution is to use Alipay's mobile phone address book to add friends, the problem becomes adding the other party's number to the address book, the premise of adding is to get the number, the solution to get the number isViolent traversal, but after analyzing too many violent traversal results, it is almost unfeasible, the problem becomes how to reduce the traversal results, the solution to this problem is *****************Narrowing down the scope, this solution can be implemented after optimization. It can be done with three or two clicks of the code, and a bunch of numbers are obtained. The problem arises again. How to quickly import thousands of numbers into the mobile phone?Think about this problem and find a solution. In short, under the guidance of this kind of thinking, you will be able to slowly approach the final goal.

Consequences of Technology Abuse

In the end, I helped that person achieve his goal. I wanted to record the complete process and share it with everyone, but I thought that if this solution was used by people with ulterior motives,Wouldn't that be a trick of the tiger and help the tyrant to abuse it? This goes back to the old-fashioned question, technology is not guilty of human beings, any technology is neutral, and what it is used for depends on people. Angels can be used to create heaven, and devils can be used to create nightmares.

Summary

Influenced by open source culture, sharing is the virtue of programmers, but for technology sharing, you should be more careful, so as not to be used for evil without your knowledge.





The three views are the same, yes



原网站

版权声明
本文为[51CTO]所创,转载请带上原文链接,感谢
https://yzsam.com/2022/222/202208101747468721.html