The logical explanation of the doubt about article of bilk of xinhua net telecommunication and P2P c

On April 11, 2016, be versed in firewood a group of things with common features Mr Han encounters telegraphic bilk, between one night bank, pay treasure all fund be transferred entirely. Have a lot of these days about telegraphic bilk report a case to the security authorities, comparing following faces to link is new China the personal experience that viewpoint reports netizen of a Beijing. (the link is: Http://dwz.cn/373wR0)

The safe expert great majority in the report thinks this is to use " individual information + USIM fills exchange card + software changing name sends bilk short message " telegraphic bilk case.

Although small make up undertake communication with Mr Han personally, also had enquired particular case, confirm this is the case of actual existence, but to cheater be what how operate still is to put have doubt, at the same time small the viewpoint that makes up pair of xinhua net to publish raised a few doubt.

Specific as follows: Beijing shift says, on April 8 17 when 45 minutes, date of this mobile phone logs onto the postal service hall on the net, play screen 2 times to land through the webpage. Affirm 2 times land mean the business password that inputs 6 digit first, go to short message of hair of code of test and verify again on date of this mobile phone (the code of test and verify here is not so called victim the saying test and verify that sends cheater piles up) , 18:1Login 3 minutes with same way dealt with change the USIM of 4G blocks business. This means two kinds of conditions, the first kind is 17 when the behavior that disembarkation of 45 minutes is cheater, from party the response looks is this meaning, party says him already very long did not land, forgot a password even. That is strange, the password wants not merely here even the mobile phone sends test and verify to pile up, and right now party has not had information contact with cheater. That can show cheater only this moment already filch the mobile phone date of party, received code of test and verify directly. If right now cheater already filch the mobile phone date of party, the reappearance after that does not need those follow-up subscription sends USIM to block test and verify to pile up the thing of and so on. Because cheater has achieved the goal of date of filch victim mobile phone. If say this cheater has not obtained the mobile phone order of party right now, that postal service hall on entry net and from the back of conduction subscription may be him party only. So, guide oneself the business that performs oneself is very clear. The 3rd kind of circumstance, the likelihood is mobile company has inside thief, but if the enterprise that the individual feels mobile the company is so big is adverse to oneself information it is won't direct fair show what go up in the net, if be company interior,giving an issue is furtive connection for certain party will solve, won't put oneself in adverse place, still be the Supreme Being particularly mobile company. Although a few flaw exist really inside relevant system, but this thing special odd. Actually thing already so far, already knowing is historicity has been compared, or everything is acclaim and be cheated to had been compared without the person. Why to give this speech? Because the allegation of this victim has too much flaw. If this pilfer money incident exists, right general collect masses is not what favour. If this issue is nonexistent, what this does not have harbour intentions is concoctive the attention with diddle netizen and help, also not be what favour. And below the small gain of provenance, the comment is condemn shift company mostly, or condemn bank and handle a case policeman, helpless is, present public opinion is guided easily namely. So small make up a decision to point out doubtful point come. Additional, still have a few doubtful point, mobile phone date changes card to need cycle, and the neglect about him party is minor make up not repeat. Carry again simply at 3 o'clock: 1. Will look as the audience, the allegation of party connects an authenticity that proves this matter without any evidence. Perhaps somebody should be refuted say party has a lot of cut to pursue, right, but short message and pay treasure to turn the cut plan that Zhang and Baidu purse tie calm bank to get stuck can't prove at all by pilfer fund belong to the same organization, the bank that because these capital are,flows to him party blocks account. Can prove this matter authenticity exclusively, and the evidence that is police clue is: The net silver of victim of the reoccupy after the cash that cheater pays treasure the victim turns into victim bank to get stuck turns to cheater bank account turn Zhang is recorded (the circumstance) that this one basis comes from him victim to state. And from the point of the victim's allegation he had gone to a bank printing trade Zhang is odd, but he did not show this evidence, also did not provide this record to police it seems that. 2. From the angle analysis of convict, the bunco process of a cheater should want to avoid trival zephyr risk, simpler safety is better. In this case, it is OK that cheater does not need completely to use net silver the money in blocking victim bank is transferred. From the point of the victim's allegation, he is to have in pay treasure enlightened bank check is quick pay a service, become what cheater has had a victim to pay treasure account password and the circumstance that pay a password, need what block the bank the money inside to turn into the victim to pay treasure only, went on the bank card that from the victim's disbursement treasure turns to cheater again. Pay treasure to turn the forehead that Zhang blocks to the bank is spent still is very considerable. Why to expend setbacks ground to pay treasure the cash in the victim greatly even for many times small turn to the victim to bind decided bank card to go up? And still turn to the bank card of two different banks, undertake for many times crossing turning all right through net silver again between card of these two pieces of banks next Zhang. This increased a risk to also raise needless cost undoubtedly. 3. Block the problem with net silver about the bank namely, the problem of sex of a few common sense. If want to do business in the bank on the net, must want to net silver-colored account logs onto a password, net silver-colored password, and the equipment password code of U aegis or U Key and so on, even some of bank on the net still needs to set phrase beforehand, or equipment password code and mobile phone test and verify pile up double insurance. Calculate hypothesis part bank not to need equipment to countersign is piled up and set phrase beforehand, and cheater has had yard of mobile phone test and verify, but account entry password and net silver-colored password are must. Cheater is these two passwords that how obtain a victim, the mailbox that has a victim and mobile phone date can be not obtained, also can not revise by mailbox and mobile phone date. Although cheater has Id number of the victim it may not be a bad idea of false even Id, also need oneself to hold certificate to go to a bank bar just can be revised and be being dealt with. Connection arrives here at 2 o'clock, if just think presses the process that the victim states, cheater need is accurate know a victim the account of two banks at least 4 passwords, forbid to still be no good truly, be defeated by a fault for many times account can be frozen. What and two banks still have system of byelaw, equipment and operation method go up is a lot of and different. Cheater of we should like to ask has simpler guilty ploy obviously, why to expend week of Zhang De to take a risk greatly even? This and the cheater fact that be infinitely resourceful not agree with in some. The partial doubtful point in the course that above is allegation of this incident victim. If this matter is belonged to solid, explain information of general collect popular and belongings are in extremely hazardous condition, involves deepness and range, the cheater that is infinitely resourceful so, believe not only the victim's account, ma Yun or the account cheater that are Wang Saicong also are hands-down. Can say to still be done not have only by pilfer money be luck problem only.

Above is the doubt that the viewpoint place that is based on xinhua net raises, right small make up for, the individual thinks of the first pace receive ' 1065800 ' number pretends to be namely. Should be to use " bogus radical stands " the form has group of hair, this kind is a when use hemp to save manage to be versed in army that opens a source communication radical stands, it is to be used at Iraqi war mobile to use originally, but be used to rise by illegal element undertake short message bilk. So small make up speculation Mr Han by the whole process of bilk: The outside serving a password discharge of the user the premise of this bilk. This has the possibility of the 3 discharge outside planting probably: 1, of mobile and in-house personnel inside ghost. 2, weak password alls over all previous, pattern recognition defeats code of solution test and verify to undertake bumping into a library to serve a password in order to obtain. 3, black produce those who serve a password to trade; And should produce rubbish short message, need 3 big " god implement " : The software of modification telephone number, short message group hair implement with disloyal name the phone that register gets stuck. Before both can buy on the net, latter comes from the public sale of operation business directly even, then from operation port of a short message is obtained over there business group hair password can carry out bilk. Cent of whole bilk process is 6 paces: 1, the organizing into groups of mobile phone number that all test and verify pass a code, obtain Bai Ka first (the target that check writes in sky namely gets stuck) , use bogus radical station to weigh recrudesce to send a short message next or colour letter, for instance 10658000 port send a mobile phone to sign up for center wide finance and economics. Content is optional. Right now, some users can reply TD, or 0000 and so on, irrespective, this does not affect sequel to undertake. 2, in the 1st pace, the number that sends a success (equipment of bogus radical station has a daily record) , use bogus radical station to send a short message again, for instance " 3 minutes are retreated order do not collect fees " , clew has been ordered make XX include year of business, and remaining sum is not worth, remind pay fee. Right now the user begins insecurity, pay close attention to a system to retreat order clew information. 3, use foregone code, order in operation business website make the professional work that exchange card, push send get short message of test and verify of operation business website. Right now user mobile phone gets from systematic port " USIM test and verify piles up XXXXXX " information. 4, with the short message port that gets ahead of schedule, send successful client to send message to the 2nd pace " if want to cancel, ask a reply to cancel + test and verify is piled up " . 5, the user ceases to letter of this port response. 6, the code of test and verify that uses user response, self-help changes calorie of success, use this calorie of follow-up that finish to transfer accounts next wait for an operation. There are a few to want watchful place actually inside: 1, cancel business to need to send only " 0000 " to 10086 can retreat order business, won't offer codes of any test and verify to perhaps ask to offer a password. 2, operation business orders the free time that makes professional work, it is 72 hours mostly, should appear only "XX is retreated inside minute order do not collect fees " , it is cheater. Operation business won't arrive accurately minute of class. Sum up finally, the necessary premise of whole technological process is user service password divulge. From the angle of the user, this is OK of active avoid. From the angle of operation business, the design of partial business flow, need undertakes the risk is evaluated afresh.

Pullback subject, of the thing find out should be found out by the government, and small a when make up the operation that regards flyer finance as the company, begin to solve

The value of the problem is far bigger than going after the value of cause to want. Complain when what flyer finance P2P receives some Zhang order say him bank gets stuck to be brushed by pilfer, the person that hold card is denied trade, date of be in debt has bidden in our company, but was not carried to show temporarily. After the person that hold card contacts flyer finance, we and tripartite is mandatory undertake urgent communicate, freeze account instantly, let capital cannot be carried now, the capital that assures investor is safe. Next we and the abundant Fu Jin with mandatory tripartite go technical defrost capital, develop the interest that already generated, still wind capital smoothly the person that hold card.

We had received 3 sheet recently such telegraphic bilk, flyer finance is to devote oneself to to escort the Emperor for investor all the time convoy, safeguard social justice. Won't resemble a bank absolutely, pay business of treasure, operation mutual in that way shift of responsibility, delayed the increase of investor.

The logical explanation of the doubt about article of bilk of xinhua net telecommunication and P2P case (achieve formerly)

未经允许不得转载:News » The logical explanation of the doubt about article of bilk of xinhua net telecommunication and P2P c