2,112
edits
m (changing link from http->https) |
m (changing link from http->https) |
||
Line 382: | Line 382: | ||
The Network possesses knowledge and resources to hijack any important infrastructure. With that not enough, they stole state archives and copied traffic by their infiltrated telecommunication companies. | The Network possesses knowledge and resources to hijack any important infrastructure. With that not enough, they stole state archives and copied traffic by their infiltrated telecommunication companies. | ||
Quantum computers weren't available yet but the Network acquired the next best thing to break gov encryptions: [ | Quantum computers weren't available yet but the Network acquired the next best thing to break gov encryptions: [https://phys.org/news/2016-11-quantum-physics-factor.html quantum simulators]. Being aware of the weakness of now factorable prime numbers the Syndicate themselves doesn't use such encryption anymore. | ||
As long as WCG doesn't attack the Network personal, they won't release state secrets or blow up some infrastructure. | As long as WCG doesn't attack the Network personal, they won't release state secrets or blow up some infrastructure. |