Defensive Encryption
Functions
Image | |
Description | A solid, but potentially noisy, defense |
Defense | 2 |
Special | Unexplained blocks of encrypted data can draw unwanted attention |
Sources
2/6 - secured filter
2/6 - filtered HUD manager
1/6 - secure command script
1/6 - secured indexer
Notes
If you use this more than once in a hacking session (?) Some other trigger. Any ideas?:
The system notices you gathering encrypted data around your avatar. (+1 Unsubtle)
page revision: 6, last edited: 09 Jul 2016 13:28