NovelLamp

Font: Big Medium Small
Dark Eye-protection
NovelLamp > The Amazing son in law > The Amazing son in law Chapter 5317

The Amazing son in law Chapter 5317

    <h3 ss="wp-block-heading">Read Chapter 5 of the novel <strong>The Amazing Son in Law</strong> & <strong>Hero of Hearts</strong> by <strong>Lord Leaf</strong> for free online


    “Encrypted?” The old man furrowed his brows, contemting the question. He replied, “Yes, there are indeed instances of encryption, particrly concerning individuals with special identities. However, to ensure that this encrypted information remains undiscoverable, the system itself cannot directly ess the encrypted content.”


    Lin Wan’er (ni) inquired, “What is the general logic behind such encryption?”


    The old man exined, “From what I know, there are two primary types of encryption logic. The first type involvespletely removing an individual’s identity information from the system, storing it instead in a separate, isted database that has no inte connection. In this case, the individual’s real information only exists in this isted system, making it impossible for anyone outside to find any clues.”


    As he borated, the old man continued, “The second type is more intricate. Here, the individual possesses legitimate identity information, but this information is encrypted within the system. To a certain extent, it bes a one-way identity.”


    “What does one-way mean?” Lin Wan’er (ni) asked for rification.<h3 style="background-color:DodgerBlue">


    The old man borated, “One-way means that all of his identification documents—such as his ID card, passport, driver’s license, household registration booklet, and marriage certificate—are genuine, and the ID number is valid. However, if someone tries to search for him in the system, they won’t find any information. For instance, if I search for anyone named Charlie across the country, his information will not appear in the results returned by the system. Even if we pull data on millions of men nationwide, he will not be included.”


    “To obtain his information, two conditions must be met: first, you need to know his name, and second, you must have his exact ID number. Only then can you retrieve his information,” he added. “If you don’t know his ID number, you cannot utilize this system to locate him. Knowing his ID number means you already possess his actual information, and there’s no need to use the system to search further.”


    Lin Wan’er (ni) sighed, “This encryption method is indeed clever. Those who are not familiar with him cannot track him down in the system. Moreover, even if someone who knows him tries to check, inputting his name and ID number will yield no results.”


    “Exactly,” the old man nodded in agreement. “Individuals with very special identities often employ this method to remain hidden, effectively allowing them to live undetected within the city. Those with ulterior motives cannot verify their identity.”


    He added, “Using this identity, such a person not only avoids detection by others but also ensures that their life remains unaffected in any way.”


    “Aside from what I’ve mentioned, their information can only be essed through their name and ID number. All their identification documents serve as one-way inquiry channels.”


    “For example, if a police officer checks his ID card during a routine stop, as long as the officer scans the ID card, all of his information can be retrieved from the system, making it appear normal to the police.”<fn3b0b> For original chapters go to Find~Novel</fn3b0b>


    “If he wishes to fly, as long as he purchases a ticket using the correct name and ID card, he can check in without a hitch.”


    “When going abroad, he can book a ticket using his name and passport number, allowing him to pass through customs smoothly. However, if someone attempts to search for him through the flight information, it will be impossible to locate him. For example, if someone searches for a person named Charlie who has flown within China, and they only know his name, they will not find any information.”


    Lin Wan’er (ni) furrowed her brows slightly, her expression turning serious and concerned.


    After a moment of contemtion, she asked the old man, “Based on your status and connections, can you determine whether the person I’m looking for falls into the first or second type of encryption?”<h3 ss="has-text-align-center wp-block-heading" id="chapter-list"><strong>Next Chapter</strong>
『Add To Library for easy reading』
Popular recommendations
Shadow Slave Is It Bad That the Main Character&#x2019;s a Roleplayer? The Survival of the Third-rate Villain The Return of the Legendary All-Master Infinite Evolution: My Idle Evolution System NTR: Minor Villain Wants to Be the Main Villain