Max will be hacking into Akuma's computer. I'm talking low-level, low-priority, semi-firewalled (if any) systems. If that's successful, it should be provide a nice backdoor into their more sensitive systems...such as NavControl, Powerflows, and security protocols.
Does Max recognize the logs he's looking at as "wrong" in the same way the data we were originally looking at when we chose this ship was? If they're cooked books or something, they might have been cooked by the same person. (Probably Jack-in-the-head girl.) Under this, the encrypted ones would probably be the actual ones, showing what they were really doing.
No, not that. It's obvious which one we want, the one with the goodies inside. The question is, do we copy it out and set off the software triggers designed to detect copying, or do we hack it in place and set off the software triggers designed to detect decryption?
If it'll help you pick something, copying it will let you hack it later if you want, or in a safer location, while hacking in place allows you to follow up on anything you find since you're already in the system.
I vote for copying it. If we're destined to get caught, at least we'll have it as opposed to just falling for the trap and not getting anything for our troubles.
Davis will provide watch for Max, whenever he gets around to cracking the file. Hopefully that will be sooner than later, since we might get scanned and searched any second now, and any bit of ammo we have to get our hosts to not sell us out would be very helpful.
Davis will provide watch for Max, whenever he gets around to cracking the file. Hopefully that will be sooner than later, since we might get scanned and searched any second now, and any bit of ammo we have to get our hosts to not sell us out would be very helpful.
I suppose the best course of action is to decrypt a bit, get a good 6hrs of rest, then resume decrypting.
Well, unless Max is going to be cranking out encryption workarounds or dictionary attacks by hand, I figure cracking it would be an automatic process. Plug the file into whatever decryption suite either Max's or Davis' laptops have and let it run. If that's the case, we could split the file up between the laptops for the decrypt and each person guard their own and try to stay out of trouble, or just keep it on one and take shifts watching over the decrypt.
Well, unless Max is going to be cranking out encryption workarounds or dictionary attacks by hand, I figure cracking it would be an automatic process. Plug the file into whatever decryption suite either Max's or Davis' laptops have and let it run. If that's the case, we could split the file up between the laptops for the decrypt and each person guard their own and try to stay out of trouble, or just keep it on one and take shifts watching over the decrypt.
Good point on having multiple copies. Is the file small enough to zip on to a thumb drive?
Yeah, you could split it up, but there will be a period of time where Max has to figure out what type of magical technobabbley Independence-Day-mockery-of-realistic-computing he's going to use to run the decryption. So, Max needs some time before bed to program/configure the decryption suite, then you can let it run on Max and Davis' lappies while you sleep, and check on it after you're rested. Or set an alarm so it'll wake you.
I like that plan, but instead of leaving the laptops unguarded, I think that whoever's awake watch them and make sure no one messes with them or sneaks a peek they're not supposed to.