[It's written in a very self-taught, strange, but effective style, with programming meant to adapt to outside attempts at un-encryption with an adaptiveness that almost borders on rudimentary AI. Even though it has to use the hardware they were given, it almost borders on being its on operating system.]
[It definitely does not match the terrible kludgy normal programming of the rest of the comms and network, and certainly is a far cry from that terrible slideshow they were all shown.]
[It screams white hat hacker trying to circumvent corporate surveillance.]
no subject
[It definitely does not match the terrible kludgy normal programming of the rest of the comms and network, and certainly is a far cry from that terrible slideshow they were all shown.]
[It screams white hat hacker trying to circumvent corporate surveillance.]