Today, it's a booming, multi-location kids' book empire, with some in-credibly innovative2 bookselling practices that get books and kids togetherin really exciting ways. The best of these is the store's mobile book-fairs,in which they ship huge, rolling bookcases, already stocked with excel-lent kids' books, direct to schools on trucks — voila, instant book-fair!
Anderson's Bookshops: 123 West Jefferson, Naperville, IL 60540 USA+1 630 355 2665What would you do if you found out you had a spy in your midst?
You could denounce him, put him up against the wall and take him out.
But then you might end up with another spy in your midst, and the newspy would be more careful than the last one and maybe not get caughtquite so readily.
Here's a better idea: start intercepting3 the spy's communications andfeed him and his masters misinformation. Say his masters instruct him togather information on your movements. Let him follow you around andtake all the notes he wants, but steam open the envelopes that he sendsback to HQ and replace his account of your movements with a fictitiousone. If you want, you can make him seem erratic4 and unreliable so theyget rid of him. You can manufacture crises that might make one side orthe other reveal the identities of other spies. In short, you own them.
This is called the man-in-the-middle attack and if you think about it,it's pretty scary. Someone who man-in-the-middles your communica-tions can trick you in any of a thousand ways.
Of course, there's a great way to get around the man-in-the-middle at-tack: use crypto. With crypto, it doesn't matter if the enemy can see your129messages, because he can't decipher them, change them, and re-sendthem. That's one of the main reasons to use crypto.
But remember: for crypto to work, you need to have keys for thepeople you want to talk to. You and your partner need to share a secretor6 two, some keys that you can use to encrypt and decrypt your mes-sages so that men-in-the-middle get locked out.
That's where the idea of public keys comes in. This is a little hairy, butit's so unbelievably elegant too.
In public key crypto, each user gets two keys. They're long strings7 ofmathematical gibberish, and they have an almost magic property.
Whatever you scramble8 with one key, the other will unlock, and vice-versa. What's more, they're the only keys that can do this — if you canunscramble a message with one key, you know it was scrambled9 with theother (and vice-versa).
So you take either one of these keys (it doesn't matter which one) andyou just publish it. You make it a total non-secret. You want anyone in theworld to know what it is. For obvious reasons, they call this your "publickey."The other key, you hide in the darkest reaches of your mind. You pro-tect it with your life. You never let anyone ever know what it is. That'scalled your "private key." (Duh.)Now say you're a spy and you want to talk with your bosses. Theirpublic key is known by everyone. Your public key is known by every-one. No one knows your private key but you. No one knows theirprivate key but them.
You want to send them a message. First, you encrypt it with yourprivate key. You could just send that message along, and it would workpretty well, since they would know when the message arrived that itcame from you. How? Because if they can decrypt it with your publickey, it can only have been encrypted with your private key. This is theequivalent of putting your seal or signature on the bottom of a message.
It says, "I wrote this, and no one else. No one could have tampered10 withit or changed it."Unfortunately, this won't actually keep your message a secret. That'sbecause your public key is really well known (it has to be, or you'll belimited to sending messages to those few people who have your publickey). Anyone who intercepts11 the message can read it. They can't change130it and make it seem like it came from you, but if you don't want peopleto know what you're saying, you need a better solution.
So instead of just encrypting the message with your private key, youalso encrypt it with your boss's public key. Now it's been locked twice.
The first lock — the boss's public key — only comes off when combinedwith your boss's private key. The second lock — your private key — onlycomes off with your public key. When your bosses receive the message,they unlock it with both keys and now they know for sure that: a) youwrote it and b) that only they can read it.
It's very cool. The day I discovered it, Darryl and I immediately ex-changed keys and spent months cackling and rubbing our hands as weexchanged our military-grade secret messages about where to meet afterschool and whether Van would ever notice him.
But if you want to understand security, you need to consider the mostparanoid possibilities. Like, what if I tricked you into thinking that mypublic key was your boss's public key? You'd encrypt the message withyour private key and my public key. I'd decrypt it, read it, re-encrypt itwith your boss's real public key and send it on. As far as your bossknows, no one but you could have written the message and no one buthim could have read it.
And I get to sit in the middle, like a fat spider in a web, and all yoursecrets belong to me.
Now, the easiest way to fix this is to really widely advertise your pub-lic key. If it's really easy for anyone to know what your real key is, man-in-the-middle gets harder and harder. But you know what? Makingthings well-known is just as hard as keeping them secret. Think about it— how many billions of dollars are spent on shampoo ads and othercrap, just to make sure that as many people know about something thatsome advertiser wants them to know?
There's a cheaper way of fixing man-in-the-middle: the web of trust.
Say that before you leave HQ, you and your bosses sit down over coffeeand actually tell each other your keys. No more man-in-the-middle!
You're absolutely certain whose keys you have, because they were putinto your own hands.
So far, so good. But there's a natural limit to this: how many peoplecan you physically12 meet with and swap13 keys? How many hours in theday do you want to devote to the equivalent of writing your own phonebook? How many of those people are willing to devote that kind of timeto you?
131Thinking about this like a phonebook helps. The world was once aplace with a lot of phonebooks, and when you needed a number, youcould look it up in the book. But for many of the numbers that youwanted to refer to on a given day, you would either know it by heart, oryou'd be able to ask someone else. Even today, when I'm out with mycell-phone, I'll ask Jolu or Darryl if they have a number I'm looking for.
It's faster and easier than looking it up online and they're more reliable,too. If Jolu has a number, I trust him, so I trust the number, too. That'scalled "transitive trust" — trust that moves across the web of ourrelationships.
A web of trust is a bigger version of this. Say I meet Jolu and get hiskey. I can put it on my "keyring" — a list of keys that I've signed with myprivate key. That means you can unlock it with my public key and knowfor sure that me — or someone with my key, anyway — says that "thiskey belongs to this guy."So I hand you my keyring and provided that you trust me to have ac-tually met and verified all the keys on it, you can take it and add it toyour keyring. Now, you meet someone else and you hand the whole ringto him. Bigger and bigger the ring grows, and provided that you trustthe next guy in the chain, and he trusts the next guy in his chain and soon, you're pretty secure.
Which brings me to keysigning parties. These are exactly what theysound like: a party where everyone gets together and signs everyoneelse's keys. Darryl and I, when we traded keys, that was kind of a mini-keysigning party, one with only two sad and geeky attendees. But withmore people, you create the seed of the web of trust, and the web can ex-pand from there. As everyone on your keyring goes out into the worldand meets more people, they can add more and more names to the ring.
You don't have to meet the new people, just trust that the signed key youget from the people in your web is valid14.
So that's why web of trust and parties go together like peanut butterand chocolate.
"Just tell them it's a super-private party, invitational only," I said. "Tellthem not to bring anyone along or they won't be admitted."Jolu looked at me over his coffee. "You're joking, right? You tell peoplethat, and they'll bring extra friends."132"Argh," I said. I spent a night a week at Jolu's these days, keeping thecode up to date on indienet. Pigspleen actually paid me a non-zero sumof money to do this, which was really weird15. I never thought I'd be paidto write code.
"So what do we do? We only want people we really trust there, and wedon't want to mention why until we've got everyone's keys and can sendthem messages in secret."Jolu debugged and I watched over his shoulder. This used to be called"extreme programming," which was a little embarrassing. Now we justcall it "programming." Two people are much better at spotting bugs17 thanone. As the cliche18 goes, "With enough eyeballs, all bugs are shallow."We were working our way through the bug16 reports and getting readyto push out the new rev5. It all auto-updated in the background, so ourusers didn't really need to do anything, they just woke up once a week orso with a better program. It was pretty freaky to know that the code Iwrote would be used by hundreds of thousands of people, tomorrow!
"What do we do? Man, I don't know. I think we just have to live withit."I thought back to our Harajuku Fun Madness days. There were lots ofsocial challenges involving large groups of people as part of that game.
"OK, you're right. But let's at least try to keep this secret. Tell them thatthey can bring a maximum of one person, and it has to be someonethey've known personally for a minimum of five years."Jolu looked up from the screen. "Hey," he said. "Hey, that wouldtotally work. I can really see it. I mean, if you told me not to bring any-one, I'd be all, 'Who the hell does he think he is?' But when you put itthat way, it sounds like some awesome19 007 stuff."I found a bug. We drank some coffee. I went home and played a littleClockwork Plunder20, trying not to think about key-winders with nosyquestions, and slept like a baby.
Sutro baths are San Francisco's authentic21 fake Roman ruins. When itopened in 1896, it was the largest indoor bathing house in the world, ahuge Victorian glass solarium filled with pools and tubs and even anearly water slide. It went downhill by the fifties, and the owners torchedit for the insurance in 1966. All that's left is a labyrinth22 of weatheredstone set into the sere23 cliff-face at Ocean Beach. It looks for all the worldlike a Roman ruin, crumbled24 and mysterious, and just beyond them is a133set of caves that let out into the sea. In rough tides, the waves rushthrough the caves and over the ruins — they've even been known to suckin and drown the occasional tourist.
Ocean Beach is way out past Golden Gate park, a stark25 cliff lined withexpensive, doomed26 houses, plunging27 down to a narrow beach studdedwith jellyfish and brave (insane) surfers. There's a giant white rock thatjuts out of the shallows off the shore. That's called Seal Rock, and it usedto be the place where the sea lions congregated28 until they were relocatedto the more tourist-friendly environs of Fisherman's Wharf29.
After dark, there's hardly anyone out there. It gets very cold, with asalt spray that'll soak you to your bones if you let it. The rocks are sharpand there's broken glass and the occasional junkie needle.
It is an awesome place for a party.
Bringing along the tarpaulins30 and chemical glove-warmers was myidea. Jolu figured out where to get the beer — his older brother, Javier,had a buddy31 who actually operated a whole underage drinking service:
pay him enough and he'd back up to your secluded32 party spot with ice-chests and as many brews33 as you wanted. I blew a bunch of my indienetprogramming money, and the guy showed up right on time: 8PM, agood hour after sunset, and lugged34 the six foam35 ice-chests out of hispickup truck and down into the ruins of the baths. He even brought aspare chest for the empties.
"You kids play safe now," he said, tipping his cowboy hat. He was a fatSamoan guy with a huge smile, and a scary tank-top that you could seehis armpit- and belly- and shoulder-hair escaping from. I peeled twentiesoff my roll and handed them to him — his markup36 was 150 percent. Nota bad racket.
He looked at my roll. "You know, I could just take that from you," hesaid, still smiling. "I'm a criminal, after all."I put my roll in my pocket and looked him levelly in the eye. I'd beenstupid to show him what I was carrying, but I knew that there weretimes when you should just stand your ground.
"I'm just messing with you," he said, at last. "But you be careful withthat money. Don't go showing it around.""Thanks," I said. "Homeland Security'll get my back though."His smile got even bigger. "Ha! They're not even real five-oh. Thosepeckerwoods don't know nothin'."134I looked over at his truck. Prominently displayed in his windscreenwas a FasTrak. I wondered how long it would be until he got busted38.
"You got girls coming tonight? That why you got all the beer?"I smiled and waved at him as though he was walking back to histruck, which he should have been doing. He eventually got the hint anddrove away. His smile never faltered40.
Jolu helped me hide the coolers in the rubble41, working with little whiteLED torches on headbands. Once the coolers were in place, we threwlittle white LED keychains into each one, so it would glow when youtook the styrofoam lids off, making it easier to see what you were doing.
It was a moonless night and overcast42, and the distant streetlightsbarely illuminated43 us. I knew we'd stand out like blazes on an infraredscope, but there was no chance that we'd be able to get a bunch of peopletogether without being observed. I'd settle for being dismissed as a littledrunken beach-party.
I don't really drink much. There's been beer and pot and ecstasy44 at theparties I've been going to since I was 14, but I hated smoking (though I'mquite partial to a hash brownie every now and again), ecstasy took toolong — who's got a whole weekend to get high and come down — andbeer, well, it was all right, but I didn't see what the big deal was. My fa-vorite was big, elaborate cocktails45, the kind of thing served in a ceramicvolcano, with six layers, on fire, and a plastic monkey on the rim37, butthat was mostly for the theater of it all.
I actually like being drunk. I just don't like being hungover, and boy,do I ever get hungover. Though again, that might have to do with thekind of drinks that come in a ceramic46 volcano.
But you can't throw a party without putting a case or two of beer onice. It's expected. It loosens things up. People do stupid things after toomany beers, but it's not like my friends are the kind of people who havecars. And people do stupid things no matter what — beer or grass orwhatever are all incidental to that central fact.
Jolu and I each cracked beers — Anchor Steam for him, a Bud Lite forme — and clinked the bottles together, sitting down on a rock.
"You told them 9PM?""Yeah," he said.
"Me too."135We drank in silence. The Bud Lite was the least alcoholic47 thing in theice-chest. I'd need a clear head later.
"You ever get scared?" I said, finally.
He turned to me. "No man, I don't get scared. I'm always scared. I'vebeen scared since the minute the explosions happened. I'm so scaredsometimes, I don't want to get out of bed.""Then why do you do it?"He smiled. "About that," he said. "Maybe I won't, not for much longer.
I mean, it's been great helping48 you. Great. Really excellent. I don't knowwhen I've done anything so important. But Marcus, bro, I have to say… "He trailed off.
"What?" I said, though I knew what was coming next.
"I can't do it forever," he said at last. "Maybe not even for anothermonth. I think I'm through. It's too much risk. The DHS, you can't go towar on them. It's crazy. Really actually crazy.""You sound like Van," I said. My voice was much more bitter than I'dintended.
"I'm not criticizing you, man. I think it's great that you've got thebravery to do this all the time. But I haven't got it. I can't live my life inperpetual terror.""What are you saying?""I'm saying I'm out. I'm going to be one of those people who acts likeit's all OK, like it'll all go back to normal some day. I'm going to use theInternet like I always did, and only use the Xnet to play games. I'm goingto get out is what I'm saying. I won't be a part of your plans anymore."I didn't say anything.
"I know that's leaving you on your own. I don't want that, believe me.
I'd much rather you give up with me. You can't declare war on the gov-ernment of the USA. It's not a fight you're going to win. Watching youtry is like watching a bird fly into a window again and again."He wanted me to say something. What I wanted to say was, Jesus Jolu,thanks so very much for abandoning me! Do you forget what it was like whenthey took us away? Do you forget what the country used to be like before theytook it over? But that's not what he wanted me to say. What he wanted meto say was:
"I understand, Jolu. I respect your choice."136He drank the rest of his bottle and pulled out another one and twistedoff the cap.
"There's something else," he said.
"What?""I wasn't going to mention it, but I want you to understand why I haveto do this.""Jesus, Jolu, what?""I hate to say it, but you're white. I'm not. White people get caught withcocaine and do a little rehab time. Brown people get caught with crackand go to prison for twenty years. White people see cops on the streetand feel safer. Brown people see cops on the street and wonder if they'reabout to get searched. The way the DHS is treating you? The law in thiscountry has always been like that for us."It was so unfair. I didn't ask to be white. I didn't think I was beingbraver just because I'm white. But I knew what Jolu was saying. If thecops stopped someone in the Mission and asked to see some ID, chanceswere that person wasn't white. Whatever risk I ran, Jolu ran more.
Whatever penalty I'd pay, Jolu would pay more.
"I don't know what to say," I said.
"You don't have to say anything," he said. "I just wanted you to know,so you could understand."I could see people walking down the side trail toward us. They werefriends of Jolu's, two Mexican guys and a girl I knew from around, shortand geeky, always wearing cute black Buddy Holly49 glasses that madeher look like the outcast art-student in a teen movie who comes back asthe big success.
Jolu introduced me and gave them beers. The girl didn't take one, butinstead produced a small silver flask50 of vodka from her purse andoffered me a drink. I took a swallow — warm vodka must be an acquiredtaste — and complimented her on the flask, which was embossed with arepeating motif51 of Parappa the Rapper characters.
"It's Japanese," she said as I played another LED keyring over it. "Theyhave all these great booze-toys based on kids' games. Totally twisted."I introduced myself and she introduced herself. "Ange," she said, andshook my hand with hers — dry, warm, with short nails. Jolu introducedme to his pals52, whom he'd known since computer camp in the fourth137grade. More people showed up — five, then ten, then twenty. It was aseriously big group now.
We'd told people to arrive by 9:30 sharp, and we gave it until 9:45 tosee who all would show up. About three quarters were Jolu's friends. I'dinvited all the people I really trusted. Either I was more discriminatingthan Jolu or less popular. Now that he'd told me he was quitting, it mademe think that he was less discriminating53. I was really pissed at him, buttrying not to let it show by concentrating on socializing with otherpeople. But he wasn't stupid. He knew what was going on. I could seethat he was really bummed54. Good.
"OK," I said, climbing up on a ruin, "OK, hey, hello?" A few peoplenearby paid attention to me, but the ones in the back kept on chatting. Iput my arms in the air like a referee55, but it was too dark. Eventually I hiton the idea of turning my LED keychain on and pointing it at each of thetalkers in turn, then at me. Gradually, the crowd fell quiet.
I welcomed them and thanked them all for coming, then asked them toclose in so I could explain why we were there. I could tell they were intothe secrecy56 of it all, intrigued57 and a little warmed up by the beer.
"So here it is. You all use the Xnet. It's no coincidence that the Xnet wascreated right after the DHS took over the city. The people who did thatare an organization devoted58 to personal liberty, who created the networkto keep us safe from DHS spooks and enforcers." Jolu and I had workedthis out in advance. We weren't going to cop to being behind it all, not toanyone. It was way too risky59. Instead, we'd put it out that we weremerely lieutenants60 in "M1k3y"'s army, acting61 to organize the localresistance.
"The Xnet isn't pure," I said. "It can be used by the other side just asreadily as by us. We know that there are DHS spies who use it now.
They use social engineering hacks62 to try to get us to reveal ourselves sothat they can bust39 us. If the Xnet is going to succeed, we need to figureout how to keep them from spying on us. We need a network within thenetwork."I paused and let this sink in. Jolu had suggested that this might be alittle heavy — learning that you're about to be brought into a revolution-ary cell.
"Now, I'm not here to ask you to do anything active. You don't have togo out jamming or anything. You've been brought here because we knowyou're cool, we know you're trustworthy. It's that trustworthiness I wantto get you to contribute tonight. Some of you will already be familiar138with the web of trust and keysigning parties, but for the rest of you, I'llrun it down quickly —" Which I did.
"Now what I want from you tonight is to meet the people here and fig-ure out how much you can trust them. We're going to help you generatekey-pairs and share them with each other."This part was tricky63. Asking people to bring their own laptopswouldn't have worked out, but we still needed to do something hellacomplicated that wouldn't exactly work with paper and pencil.
I held up a laptop Jolu and I had rebuilt the night before, from theground up. "I trust this machine. Every component64 in it was laid by ourown hands. It's running a fresh out-of-the-box version of ParanoidLinux,booted off of the DVD. If there's a trustworthy computer left anywherein the world, this might well be it.
"I've got a key-generator loaded here. You come up here and give itsome random65 input66 — mash67 the keys, wiggle the mouse — and it willuse that as the seed to create a random public- and private key for you,which it will display on the screen. You can take a picture of the privatekey with your phone, and hit any key to make it go away forever — it'snot stored on the disk at all. Then it will show you your public key. Atthat point, you call over all the people here you trust and who trust you,and they take a picture of the screen with you standing68 next to it, so theyknow whose key it is.
"When you get home, you have to convert the photos to keys. This isgoing to be a lot of work, I'm afraid, but you'll only have to do it once.
You have to be super-careful about typing these in — one mistake andyou're screwed. Luckily, we've got a way to tell if you've got it right: be-neath the key will be a much shorter number, called the 'fingerprint69'.
Once you've typed in the key, you can generate a fingerprint from it andcompare it to the fingerprint, and if they match, you've got it right."They all boggled at me. OK, so I'd asked them to do something prettyweird, it's true, but still.
点击收听单词发音
1 dedicated | |
adj.一心一意的;献身的;热诚的 | |
参考例句: |
|
|
2 innovative | |
adj.革新的,新颖的,富有革新精神的 | |
参考例句: |
|
|
3 intercepting | |
截取(技术),截接 | |
参考例句: |
|
|
4 erratic | |
adj.古怪的,反复无常的,不稳定的 | |
参考例句: |
|
|
5 rev | |
v.发动机旋转,加快速度 | |
参考例句: |
|
|
6 secretor | |
n.分泌器[管],分泌腺 | |
参考例句: |
|
|
7 strings | |
n.弦 | |
参考例句: |
|
|
8 scramble | |
v.爬行,攀爬,杂乱蔓延,碎片,片段,废料 | |
参考例句: |
|
|
9 scrambled | |
v.快速爬行( scramble的过去式和过去分词 );攀登;争夺;(军事飞机)紧急起飞 | |
参考例句: |
|
|
10 tampered | |
v.窜改( tamper的过去式 );篡改;(用不正当手段)影响;瞎摆弄 | |
参考例句: |
|
|
11 intercepts | |
(数学)截距( intercept的名词复数 ) | |
参考例句: |
|
|
12 physically | |
adj.物质上,体格上,身体上,按自然规律 | |
参考例句: |
|
|
13 swap | |
n.交换;vt.交换,用...作交易 | |
参考例句: |
|
|
14 valid | |
adj.有确实根据的;有效的;正当的,合法的 | |
参考例句: |
|
|
15 weird | |
adj.古怪的,离奇的;怪诞的,神秘而可怕的 | |
参考例句: |
|
|
16 bug | |
n.虫子;故障;窃听器;vt.纠缠;装窃听器 | |
参考例句: |
|
|
17 bugs | |
adj.疯狂的,发疯的n.窃听器( bug的名词复数 );病菌;虫子;[计算机](制作软件程序所产生的意料不到的)错误 | |
参考例句: |
|
|
18 cliche | |
n./a.陈词滥调(的);老生常谈(的);陈腐的 | |
参考例句: |
|
|
19 awesome | |
adj.令人惊叹的,难得吓人的,很好的 | |
参考例句: |
|
|
20 plunder | |
vt.劫掠财物,掠夺;n.劫掠物,赃物;劫掠 | |
参考例句: |
|
|
21 authentic | |
a.真的,真正的;可靠的,可信的,有根据的 | |
参考例句: |
|
|
22 labyrinth | |
n.迷宫;难解的事物;迷路 | |
参考例句: |
|
|
23 sere | |
adj.干枯的;n.演替系列 | |
参考例句: |
|
|
24 crumbled | |
(把…)弄碎, (使)碎成细屑( crumble的过去式和过去分词 ); 衰落; 坍塌; 损坏 | |
参考例句: |
|
|
25 stark | |
adj.荒凉的;严酷的;完全的;adv.完全地 | |
参考例句: |
|
|
26 doomed | |
命定的 | |
参考例句: |
|
|
27 plunging | |
adj.跳进的,突进的v.颠簸( plunge的现在分词 );暴跌;骤降;突降 | |
参考例句: |
|
|
28 congregated | |
(使)集合,聚集( congregate的过去式和过去分词 ) | |
参考例句: |
|
|
29 wharf | |
n.码头,停泊处 | |
参考例句: |
|
|
30 tarpaulins | |
n.防水帆布,防水帆布罩( tarpaulin的名词复数 ) | |
参考例句: |
|
|
31 buddy | |
n.(美口)密友,伙伴 | |
参考例句: |
|
|
32 secluded | |
adj.与世隔绝的;隐退的;偏僻的v.使隔开,使隐退( seclude的过去式和过去分词) | |
参考例句: |
|
|
33 brews | |
n.(尤指某地酿造的)啤酒( brew的名词复数 );酿造物的种类;(茶)一次的冲泡量;(不同思想、环境、事件的)交融v.调制( brew的第三人称单数 );酝酿;沏(茶);煮(咖啡) | |
参考例句: |
|
|
34 lugged | |
vt.用力拖拉(lug的过去式与过去分词形式) | |
参考例句: |
|
|
35 foam | |
v./n.泡沫,起泡沫 | |
参考例句: |
|
|
36 markup | |
n.加价,涨价,利润 | |
参考例句: |
|
|
37 rim | |
n.(圆物的)边,轮缘;边界 | |
参考例句: |
|
|
38 busted | |
adj. 破产了的,失败了的,被降级的,被逮捕的,被抓到的 动词bust的过去式和过去分词 | |
参考例句: |
|
|
39 bust | |
vt.打破;vi.爆裂;n.半身像;胸部 | |
参考例句: |
|
|
40 faltered | |
(嗓音)颤抖( falter的过去式和过去分词 ); 支吾其词; 蹒跚; 摇晃 | |
参考例句: |
|
|
41 rubble | |
n.(一堆)碎石,瓦砾 | |
参考例句: |
|
|
42 overcast | |
adj.阴天的,阴暗的,愁闷的;v.遮盖,(使)变暗,包边缝;n.覆盖,阴天 | |
参考例句: |
|
|
43 illuminated | |
adj.被照明的;受启迪的 | |
参考例句: |
|
|
44 ecstasy | |
n.狂喜,心醉神怡,入迷 | |
参考例句: |
|
|
45 cocktails | |
n.鸡尾酒( cocktail的名词复数 );餐前开胃菜;混合物 | |
参考例句: |
|
|
46 ceramic | |
n.制陶业,陶器,陶瓷工艺 | |
参考例句: |
|
|
47 alcoholic | |
adj.(含)酒精的,由酒精引起的;n.酗酒者 | |
参考例句: |
|
|
48 helping | |
n.食物的一份&adj.帮助人的,辅助的 | |
参考例句: |
|
|
49 holly | |
n.[植]冬青属灌木 | |
参考例句: |
|
|
50 flask | |
n.瓶,火药筒,砂箱 | |
参考例句: |
|
|
51 motif | |
n.(图案的)基本花纹,(衣服的)花边;主题 | |
参考例句: |
|
|
52 pals | |
n.朋友( pal的名词复数 );老兄;小子;(对男子的不友好的称呼)家伙 | |
参考例句: |
|
|
53 discriminating | |
a.有辨别能力的 | |
参考例句: |
|
|
54 bummed | |
失望的,沮丧的 | |
参考例句: |
|
|
55 referee | |
n.裁判员.仲裁人,代表人,鉴定人 | |
参考例句: |
|
|
56 secrecy | |
n.秘密,保密,隐蔽 | |
参考例句: |
|
|
57 intrigued | |
adj.好奇的,被迷住了的v.搞阴谋诡计(intrigue的过去式);激起…的兴趣或好奇心;“intrigue”的过去式和过去分词 | |
参考例句: |
|
|
58 devoted | |
adj.忠诚的,忠实的,热心的,献身于...的 | |
参考例句: |
|
|
59 risky | |
adj.有风险的,冒险的 | |
参考例句: |
|
|
60 lieutenants | |
n.陆军中尉( lieutenant的名词复数 );副职官员;空军;仅低于…官阶的官员 | |
参考例句: |
|
|
61 acting | |
n.演戏,行为,假装;adj.代理的,临时的,演出用的 | |
参考例句: |
|
|
62 hacks | |
黑客 | |
参考例句: |
|
|
63 tricky | |
adj.狡猾的,奸诈的;(工作等)棘手的,微妙的 | |
参考例句: |
|
|
64 component | |
n.组成部分,成分,元件;adj.组成的,合成的 | |
参考例句: |
|
|
65 random | |
adj.随机的;任意的;n.偶然的(或随便的)行动 | |
参考例句: |
|
|
66 input | |
n.输入(物);投入;vt.把(数据等)输入计算机 | |
参考例句: |
|
|
67 mash | |
n.麦芽浆,糊状物,土豆泥;v.把…捣成糊状,挑逗,调情 | |
参考例句: |
|
|
68 standing | |
n.持续,地位;adj.永久的,不动的,直立的,不流动的 | |
参考例句: |
|
|
69 fingerprint | |
n.指纹;vt.取...的指纹 | |
参考例句: |
|
|
欢迎访问英文小说网 |