Starting with security issues can provoke conflicts between users and Pangu and Tiangong systems to the greatest extent possible.

This method has been tried and tested in the history of mutual benefit network competition.

When Zhongxing wanted to enter the United States, the US said that Zhongxing's products had security loopholes and were monitored by Xia Guo, which could permanently steal the data of Americans.

The news was widely reported by the media in the United States, and the center was invited to participate in various hearings. It took a lot of money to settle the so-called security door. The price paid is not only money, but also the emperor of the United States who is placed at the top of the center. The Supreme Emperor is an American, and he can read any technical and financial information of Zhongxing Company unconditionally and without restriction, and the senior officials of Zhongxing Xia Guo have no right to interfere.

When Warwick wanted to enter the United States, major companies such as Cisco in the United States made joint efforts to publicize to the media and users that Warwick had serious security loopholes. A large number of obstacles directly caused Warwick to give up entering the US market.

As long as it is something from the Xia Kingdom, security loopholes are the best attacking weapons. The propaganda of the Xia Kingdom threat theory in the West for hundreds of years has made it easy for ordinary people to believe the rhetoric of the media and giants.

The way of attacking opponents under the pretext of security is not only used on Xia Guo enterprises, but also on competitors of American enterprises.

Google and Qualcomm have also attacked Apple's closed system to steal users' privacy, but Apple is a native American company, familiar with the US judicial system and how to deal with the media, so Apple survived.

Now, the giants are targeting Pangu Technology.

Google and Microsoft are very anxious. Tech giants are usually not afraid of companies such as Zhongxing and Xiaomi, but they are worried about Huawei and Pangu, because the former does not have much core technology, while the latter has.

Satya and Sundar reached an agreement after negotiation. The two sides are committed to prohibiting Tiangong and Pangu from entering the Omi market. If Pangu wants to enter the Omi market, it must disclose its own kernel code to accept everyone's supervision to ensure that it will not threaten User's security, will not steal user's data.

This condition is not a condition. You ask Microsoft and Apple to announce the possibility of kernel code being 0.

Google is also preparing to cooperate with Xia Guo's friends and businessmen to jointly attack the insecurity of Tiangong's system.

After all, there are only two or three mobile phone manufacturers in Xiaguo who have the opportunity to cooperate with Pangu Technology, and there are more than ten mobile phone manufacturers in Xiaguo.

"The people of Xia have no country in front of their interests." Google's strategic analyst Peter said: "If you can kill Pangu,

I think many Xiaguo manufacturers are more willing. "

After the talks, the capitalists behind Google and Microsoft began to mobilize public opinion.

On Twitter, an industrial software engineer in the United States slammed the Pangu system for security flaws.

The mechanical industry software engineer named Carson sent a video attacking Pangu: "I strongly appeal to our people to stay away from the Pangu operating system in the Xia Kingdom!"

Carson said: "Pangu operating system is really very convenient to use, but! Guys! Our information will be stolen by the people of Xia! A certain precision control software developed by us using Pangu operating system and Xia language has not been officially announced. In the market, there is the same software in Xia Guo, and it is free to use!"

Carson said angrily: "We downloaded the software in the application market and found that it is exactly the same concept as our design! Shameless Xia people stole our results through the Pangu program!"

The video was retweeted 200,000 times on Twitter and became a trending video.

Netizens in the United States commented: "Oh my God! It's so exaggerated!"

"The Pangu system really steals the user's information?"

"It's too insecure! If the Pangu system is used in the high-end field, aren't all secrets stolen?"

"The Pangu system is the means by which the Xia people steal Western technology!"

Shortly after, a second tweet was posted.

The protagonist of the video is an Asian woman. She said that she brought a Jiasan mobile phone from Xiaguo and used it for a period of time, but found that all her photos were posted on the Internet because of this, and the Nuji Tiangong system had serious security problems.

The video was also reposted in large numbers in an organized manner, and successfully attracted the attention of the US security services.

The US information security department issued a warning notice, saying that the Pangu system and Tiangong system have not been confirmed by the US confidence and security department. Heavenly System.

The media propaganda and warnings from the security department really worked. Many companies in the United States using the Pangu system had no choice but to return to the WIN system under the interference of the outside world.

The United States echoed the news that the Pangu and Tiangong systems were banned in China, and they were also widely reposted on Weibo.

Some users have started to exert their efforts on Weibo.

"The United States is banned! A major security risk! Users who want to upgrade the Pangu system and buy a plus three mobile phone, please be careful!"

"U.S. users use the Pangu system to leak fruit photos, users must use the Pangu system carefully!"

"Serious security hazard..."

"Urgently appeal to everyone to stop using the Pangu system..."

With the help of these people, countless rumors spewed out.

For a while, someone's private photos were leaked, and for a while, the commercial secrets of a certain company were sold, etc. It was easy to believe what they said.

Pangu Technology has become an information dealer who steals user information and sells it.

Mobile phone manufacturers who have not cooperated with Pangu Technology will never miss this opportunity to promote themselves.

Xia Guo's mobile phone, Changge, ranked fifth in market share, posted on Weibo: "With Android, your safety is guaranteed!"

Samsung even said: "The world's most secure mobile phone." With a security advertisement.

For the first time, Apple liked the Weibo posted by Samsung and Changge Mobile.

The official Weibo of Microsoft Xiaguo also posted an advertisement, and the core content of the advertisement is only one - security.

Although Microsoft did not send any text, everyone knew that this advertisement was aimed at Pangu system.

As the first company to adopt the Pangu system, Shenchuan Computer quickly responded on the official website, indicating that there is absolutely no problem with the security of the Pangu system.

The Weibo of Jiasan Mobile has been exploded, and netizens who questioned the security issue began to swear.

Under the official website of Pangu Technology, many users began to question security issues.

Both Shenchuan and Huawei urgently contacted Pangu Technology. If this continues, the equipment equipped with Pangu system and Tiangong system is likely to encounter sales difficulties.

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like