[ She's no stranger to sharing a neural interface like this between her work at city hall and her work with Fitz. For a woman hailing from a world where battlefield plans were paper and sand tables, having the ease of a digital workspace is something she's gladly adapted to. It's intuitive, really. Likely easier than if she'd woken up in the 21st Century.
Her gaze skips over what Daisy lays between them, focusing on it rather than the woman behind it, all while eating a slice of pie. Because one does not work on an empty stomach. ]
I'm familiar, [ she says after a moment. ] Work has been a great help in catching me up to speed. God forbid you hire a secretary incapable of doing something as rudimentary as clerical duties. I'm more interested in the art of remaining undetectable. [ She's thinking of remote access. This vintage spy is keen to learn about hacking. ] Whilst getting into places I shouldn't.
[ Her lips curve, she refocuses on Daisy. You know, just spy stuff. ]
how do you hack, half of this could be wrong, i just don't know.
[ familiarity is the first step, and daisy's glad to hear it. knowing how to use the systems on the front end makes accessing them from the back just that much easier. ]
So you already know the layouts of the file cabinets. That's good.
[ a considering bite of her dessert gives her a moment to swap gears. personal clutter is swept aside, a clean slate pulled up on a secondary workstation in a motion not entirely unlikely windows 10's task view functionality. this workstation is clean, almost unnaturally so; it's entirely devoid of any personality that might betray its owner.
as if by explanation, daisy mutters, ] Work. [ this is her vyonation desktop, and to vyonation, daisy is anything but a radical. she does her job, she does it well, and that's all they need to know. ]
Getting into a system from the back end is a lot like picking a lock. You have to know what you're working with to know its vulnerabilities.
[ she pulls up a blank tab and navigates to an access page for a local grocery chain. her team has been assigned a contract for streamlining their digital security, and so daisy's spent the last few weeks at work investigating how the different systems talk to each other. monetary pathways, employee access to restricted products for sales, keycodes and digital id requirements for delivery services, all seemingly mundane but interesting in their own right. what works in one place may work in another. ]
It's not that different from sneaking in somewhere back home. People are bad at keeping secrets — talk to the right person, listen to the right conversation, loiter a little in a lobby, you'll learn a lot. [ daisy is pretty damn sure peggy already knows this. social engineering is not something she thinks she'll have to teach the other woman. ] This one, the manager keeps a holopicture of his kid at his desk. Looked her up, found her birthday —
[ a few blinks, and a collection of encrypted symbols spill onto the screen. even in digital, plaintext isn't the thing. ]
And you're in. The way the systems here are set up, the passcodes seem to override the neural ID.
[ in this system, with low priority security in place, it identifies the user by the code provided, and even then only by a task name with standardized clearance. it's enough for daisy to poke around, pull up lists of employees and internal documents on payroll, enough to showcase what's possible. ]
But I haven't gotten into anywhere deep yet.
[ government agencies are still on her to-do list, but they take time. effort. attention. a level of skill she's not completely comfortable with yet. ]
i am so so so so sorry for the wait
Her gaze skips over what Daisy lays between them, focusing on it rather than the woman behind it, all while eating a slice of pie. Because one does not work on an empty stomach. ]
I'm familiar, [ she says after a moment. ] Work has been a great help in catching me up to speed. God forbid you hire a secretary incapable of doing something as rudimentary as clerical duties. I'm more interested in the art of remaining undetectable. [ She's thinking of remote access. This vintage spy is keen to learn about hacking. ] Whilst getting into places I shouldn't.
[ Her lips curve, she refocuses on Daisy. You know, just spy stuff. ]
how do you hack, half of this could be wrong, i just don't know.
So you already know the layouts of the file cabinets. That's good.
[ a considering bite of her dessert gives her a moment to swap gears. personal clutter is swept aside, a clean slate pulled up on a secondary workstation in a motion not entirely unlikely windows 10's task view functionality. this workstation is clean, almost unnaturally so; it's entirely devoid of any personality that might betray its owner.
as if by explanation, daisy mutters, ] Work. [ this is her vyonation desktop, and to vyonation, daisy is anything but a radical. she does her job, she does it well, and that's all they need to know. ]
Getting into a system from the back end is a lot like picking a lock. You have to know what you're working with to know its vulnerabilities.
[ she pulls up a blank tab and navigates to an access page for a local grocery chain. her team has been assigned a contract for streamlining their digital security, and so daisy's spent the last few weeks at work investigating how the different systems talk to each other. monetary pathways, employee access to restricted products for sales, keycodes and digital id requirements for delivery services, all seemingly mundane but interesting in their own right. what works in one place may work in another. ]
It's not that different from sneaking in somewhere back home. People are bad at keeping secrets — talk to the right person, listen to the right conversation, loiter a little in a lobby, you'll learn a lot. [ daisy is pretty damn sure peggy already knows this. social engineering is not something she thinks she'll have to teach the other woman. ] This one, the manager keeps a holopicture of his kid at his desk. Looked her up, found her birthday —
[ a few blinks, and a collection of encrypted symbols spill onto the screen. even in digital, plaintext isn't the thing. ]
And you're in. The way the systems here are set up, the passcodes seem to override the neural ID.
[ in this system, with low priority security in place, it identifies the user by the code provided, and even then only by a task name with standardized clearance. it's enough for daisy to poke around, pull up lists of employees and internal documents on payroll, enough to showcase what's possible. ]
But I haven't gotten into anywhere deep yet.
[ government agencies are still on her to-do list, but they take time. effort. attention. a level of skill she's not completely comfortable with yet. ]