Defensive Encryption

Functions

Image defensiveencryption.jpg
Description A solid, but potentially noisy, defense
Defense 2
Special Unexplained blocks of encrypted data can draw unwanted attention

Sources

2/6 - secured filter
2/6 - filtered HUD manager
1/6 - secure command script
1/6 - secured indexer

Notes

If you use this more than once in a hacking session (?) Some other trigger. Any ideas?:

The system notices you gathering encrypted data around your avatar. (+1 Unsubtle)

Unless otherwise stated, the content of this page is licensed under Creative Commons Attribution-ShareAlike 3.0 License