Confessions of a Dragon: Chapter 7
David and his team made those modifications to not only extend the range of the transmissions but also add super strong encryptions to it. even with all that security, everyone uses codewords and assume someone is always listening.
The Dark Choir
He tapped on a circle and whispered, then the shapes and squiggles all took a familiar, if still unreadable, shape, "these scrolls have encrypted magic writing, so that only my allies and i can read it, though these were written when magic script was more
Together
At first the flies she sought were encrypted but given her new found resources the android easily broke through it and discovered its dark secret. "ad 005: assault droid mk5.
Chapter 59: Back For More!
The file is encrypted with password and it took efforts to crack it open. he opened the file and look at it in surprise and amazement. "guys, i think we could use this to our advantages."
Phoenix Coven - Chapter 54
Three of these drives contained encrypted files, access codes, and passwords to access an underground website server on the galactic internet that was used as a hiring hub for transporters that clients with access could look up.
Virtual Friendship, Draft 1 CH 21
There was the one within the settlement, but if he was pursued, marc didn't think he could hold it long enough to assemble the file, run it through whatever encryption paul had and divide it so each of them would only get part of it.
Training of Thought [Patron Reward]
The training cipher was as close as they could get to replicating the unri empire's encryption. like a series of tightly wrapped, multi-layered parcels, interconnected and spider-webbing outwards. it made taig's head spin going through it.
Coming Home
The network is encrypted. it will not be able to connect. the mi turns the transmit antenna off again. best to conserve power. after logging the event, the mi turns on the camera. it wants to know what it is approaching.
Heroes for Villains - Techno Babble
The horse said getting through the encryption should be no problem for you," the bear said as he handed the cyborg a high-tech looking brick. "alright, give me a moment," hyper said as he took the module from grizz.
misc story 1: Chloe (p. 1)
He'd use a secure encrypted link to speak with her from now on, as he didn't want to endanger her life. he started up a chat line, which used information found across the web to secure a link with the person.
Desperate measures
Secondly, it meant that the computer systems used familiar encryption methods, which only further confirmed to me that the ship was not so mysterious as it first appeared.
White Knights [5]
And i'm giving it all to you, on one highly encrypted platter." sean finally spoke up from the back. "where does ashley fit into all of this?"