The hack: Chapter 10 (Trent)

"this tape drive is my digital scrapbook, i have encrypted files about everyone i have hacked and buried them deep in the tape drive through encryption and photos so that no one sees it" i replied. "why do you do it though?"

, , , , , ,

The hack: Chapter 11 (Trent)

"this tape drive is my digital scrapbook, i have encrypted files about everyone i have hacked and buried them deep in the tape drive through encryption and photos so that no one sees it" i replied. "why do you do it though?"

, , , , , ,

Apocalypse, Ch. 6

The log file turned out to be encrypted. i searched the desk for a piece of paper with passwords on it, but came up empty. "greg", i asked, "do you know anybody that can break encryption?" "no", he replied, "but the junkmaster might.

, , , , , , , , ,

Valahraoin

[encryption code:]-[gamma]...) (...[private key]-[file/ november-eight-two-three-five-zero]..) (...[date:]-[4/11/2327]...) (...[from:]-[chief geneticist officer (cgo) garrett lockwood]- [acorp[rid]: g-1221-4453]...) (...

, , , , , , , , , , , , , , , , , , , , , ,

Nazis Should Never be Normal (anthology excerpt)

Besides setting up our laptops on the table and already running our encryption software on a separate one resting on the counter, lawrence managed to get us midnight snacks.

, , , , , , , , ,

It's always time to back up

This person's mind, personality and memories have been encrypted. there is no way of recovering them without our help. please transfer on hundred bitcoins to this person's wallet, and they will pass them on to us.

, ,

From Elsweyr With Love (#5)

But they didn't know how it was encrypted - only what the original message had looked like, and what the resulting message had been. the encrypted symbols were nonsense, but she had memorized them on her trip here.

, , , , ,

Fine Dining

Bio-encryption usually required heavy emotional responses, as well as some sort of trigger mechanism; picture needing the correct keypad combination to open a physical keyhole in a door.

, , , , , , , , , , , , , , , , , , , , , , , , , , ,

Virtual Friendship, Draft 1 CH 03

What anyone who wanted to hide a transmission had to do was pass off theirs as something else after encrypting it. the problem was that encryption left its own mark on the transmission regardless of anything else.

, , , , , , , ,

Filling the Void - Chapter Twelve

"dagen, dagen, dagen..." he said, "why do you think certain files are encrypted?"

, , , , , , , ,

2020-05-23 An Unexpected Score

She was certain that it had to be something good, or why else would an exec be carrying it personally and with such tight encryption on it?

, , , , , , , , ,

Genetic Children-Log 03- No Work Today

He opened the encrypted messaging service on his computer and typed in a binary code to access the lab's message system.

, , , , , , ,