At that moment, I received an anonymous email. The sender claimed to be a former programmer from the Foundation: "I have something to give you. But we need to meet."
"Why do you want to help me?"
"Because I wrote the initial code for that predictive model. But it has been completely altered. You need to take a look at this..."
The encrypted code used a rare obfuscation algorithm. If it weren't for my experience in the data security department, I might never have uncovered the hidden details.
When the final layer of encryption was cracked, my hands began to tremble uncontrollably. This was not just ordinary program comments; it was a complete project codename: "Life Value Quantification System Version 2.0 - Optimization Level: Final."
As a programmer, I understood all too well what this meant. Version 2.0 is often not an upgrade but a complete overhaul. What exactly had they "optimized"?
Just then, Xiao Yu sent a message: "I found my brother's medical records. Guess what? They are identical to all the other beneficiaries' records."
"Identical?"
"Yes, not similar—completely the same. Onset time, symptoms, medication... even the doctor's handwriting is identical."
My hands started to shake. If this was true, then these medical records were likely...
With a creak, the office door swung open.
"Xiao Zhang," Mr. Li's voice called out, "someone is looking for you."
I lifted my head, my pupils suddenly constricting—Chen Ci was standing at the door, her face still adorned with that signature smile.
"We need to talk," she said, "about some... inappropriate inquiries you've made recently."
My phone screen lit up abruptly; it was a voice message from Xiaoyu. The background was filled with noise, and her voice was frantic:
"Run! I found the real medical records... those so-called 'aid recipients' are not... they're in the underground lab... I saw... oh my god! Someone's coming..."
The message cut off abruptly amidst a cacophony of sound. I immediately tried to call back, but the ringtone was jarringly loud:
"The number you have dialed is unavailable."
On my phone screen, the last unfinished message froze on "they're doing something in the underground lab..."
"Reporter Li, let's discuss your interview draft," Chen Ci said, sitting across from me with a gentle tone. The office door was shut from the outside.
I forced myself to suppress the panic and quickly saved the decryption file: "Regarding the report on the Foundation, I do have some details I'd like to clarify."
"Such as?"
"Such as why a charitable Foundation needs to connect to overseas encrypted servers?" I deliberately emphasized my words.
Her expression shifted slightly, almost imperceptibly: "It seems you have indeed done your homework."
At that moment, both my phone and computer screens went black. Something was wrong! I stood up abruptly: "Excuse me, I need to use the restroom."
I hurriedly made my way to the Emergency Staircase. Behind me, Chen Ci's calm voice echoed, "He's trying to escape."
Fortunately, I was well-prepared. A month ago, I had installed a pinhole camera in the office, and it was currently transmitting data remotely. More importantly, I had uploaded the decrypted files to three different cloud storage services.
I ducked into the underground parking lot and dialed a number. "Old Ma, help me trace an overseas IP!"
Old Ma was my college classmate and now a cybersecurity expert. "Send it over."
I forwarded the code I had secretly recorded earlier. Soon, he replied, "This is a Cryptocurrency mining pool address. But interestingly, this pool only accepts coins from specific sources."
"What do you mean?"
"These coins have all gone through a special tagging program. Wait... this program..." His voice suddenly turned serious. "Xiao Zhang, you'd better not investigate further."
Comment 0 Comment Count