logo

The Amazing Son in Law/

Chapter - 5064

Chapter 5064

"Can his identity be hidden within the system through encryption?" Maria asked the old man somewhat reluctantly. The old man frowned in thought before responding, "Yes, there are cases where certain individuals' identities are encrypted to protect them. However, the system itself cannot access the encrypted information to avoid detection. Do you understand?" "What is the general process for this encryption?" Maria inquired. "As far as I know, there are two types of encryption methods," the old man explained. "One involves completely erasing the person's identity information from the system and storing it in a separate, isolated system that is not connected to the network. This means that the person's real information only exists in that separate system and cannot be traced by anyone outside of it. The other method is more complicated. It involves encrypting the person's real identity information within the system, creating a one-way identity." "What does one-way mean?" Maria asked for clarification. "One-way means that his identification documents, like his ID card, passport, and driver's license, as well as his family register, marriage certificate, and other identity documents are real," the old man explained. "His ID number is also real, but if you try to search for his information within the system using fuzzy queries, his information will not be found. For example, if you search for anyone named Charlie nationwide, the system will return results, but his information will not appear. If you search for all people named Wade in the country, he will not appear in the results, even if you pull the information of hundreds of millions of men in the country. To find his information, there are two conditions. First, you must know his name and have his accurate ID number. This basically eliminates the possibility of a wide search because in this case, you would really need to use the system to search for someone specific among a sea of people. If you know his ID card number, it's the same as having his real information, so you don't need to use the system to cast a wide net."

"Yes, this encryption method is very clever," Maria sighed. "People who don't know him well won't be able to find him in the system, and those who do know him are unlikely to come back to the system to check his information. Even if they do, the results that come out will be true, and they won't be able to find out anything. "Exactly," the old man nodded. "Some people with very special identities use this method to hide, so that people with ulterior motives have no way to find out information about them. “Such a person, using his own identity, doesn't have to worry about being found out by others and his life will not be affected in any way," the old man added. "In addition to what I just said, his documents can only be used as one-way inquiry channels. For example, if a police officer checks his ID card on the road, as long as the officer uses the device to read his ID card, they will be able to check all of his information within the system and won't find any abnormalities. If he wants to fly, he can simply use his correct name and ID card when buying a ticket and board the plane smoothly. If he wants to go abroad, he can book a ticket with his name and passport number and leave the country smoothly with his passport. However, if someone tries to check his information through the plane's passenger list, they won't be able to find any information about him, even if they search for anyone named Charlie Wade who has flown in the country. If they only know his name, his information still won't show up.” Maria's eyebrows furrowed slightly as she looked at the old man with a grave expression. After a moment of hesitation, she asked, "With your status and connections, can you find out this hidden information whether the person I'm looking for is using the first or second method?"