Restless Souls/Technology: Difference between revisions

no edit summary
mNo edit summary
No edit summary
Line 274: Line 274:
: The sputnik viruses are part of the Fat Loot project. It was developed as a two-track strategy. Intelligence agencies have already the capacity to monitor all relevant electronic communication. So the Network took the dangerous but most rewarding course of action, infecting these agencies in one way or another. At the same time, they took over telecommunication companies either by buying the whole companies or placing employees in key positions. This way the Network has a double check on all data which allows them to react to situations where the counter-intelligence gets suspicious. Every data stream is a trace. With growing monitoring, they expand their grip on the companies and place their programs at the agencies into hibernation, only using them when it's absolutely necessary.
: The sputnik viruses are part of the Fat Loot project. It was developed as a two-track strategy. Intelligence agencies have already the capacity to monitor all relevant electronic communication. So the Network took the dangerous but most rewarding course of action, infecting these agencies in one way or another. At the same time, they took over telecommunication companies either by buying the whole companies or placing employees in key positions. This way the Network has a double check on all data which allows them to react to situations where the counter-intelligence gets suspicious. Every data stream is a trace. With growing monitoring, they expand their grip on the companies and place their programs at the agencies into hibernation, only using them when it's absolutely necessary.


To hamper identification, mobile communication is also carried out through peer to peer networks. These [[wikipedia:Wireless_ad_hoc_network#Security|mobile networks]] are preferred to have no intermediate nodes, reducing the risk of records been taken by any additional party. Data packages are much bigger than actually necessary. The modern bandwidths [[wikipedia:5G|(7G by 2055 ?)]] allow this and drives TCTF decryption attempts into pure frustration.
: To hamper identification, mobile communication is also carried out through peer to peer networks. These [[wikipedia:Wireless_ad_hoc_network#Security|mobile networks]] are preferred to have no intermediate nodes, reducing the risk of records been taken by any additional party. Data packages are much bigger than actually necessary. The modern bandwidths [[wikipedia:5G|(7G by 2055 ?)]] allow this and drives TCTF decryption attempts into pure frustration.
 


===Aftermath===
===Aftermath===
8,464

edits