[ familiarity is the first step, and daisy's glad to hear it. knowing how to use the systems on the front end makes accessing them from the back just that much easier. ]
So you already know the layouts of the file cabinets. That's good.
[ a considering bite of her dessert gives her a moment to swap gears. personal clutter is swept aside, a clean slate pulled up on a secondary workstation in a motion not entirely unlikely windows 10's task view functionality. this workstation is clean, almost unnaturally so; it's entirely devoid of any personality that might betray its owner.
as if by explanation, daisy mutters, ] Work. [ this is her vyonation desktop, and to vyonation, daisy is anything but a radical. she does her job, she does it well, and that's all they need to know. ]
Getting into a system from the back end is a lot like picking a lock. You have to know what you're working with to know its vulnerabilities.
[ she pulls up a blank tab and navigates to an access page for a local grocery chain. her team has been assigned a contract for streamlining their digital security, and so daisy's spent the last few weeks at work investigating how the different systems talk to each other. monetary pathways, employee access to restricted products for sales, keycodes and digital id requirements for delivery services, all seemingly mundane but interesting in their own right. what works in one place may work in another. ]
It's not that different from sneaking in somewhere back home. People are bad at keeping secrets — talk to the right person, listen to the right conversation, loiter a little in a lobby, you'll learn a lot. [ daisy is pretty damn sure peggy already knows this. social engineering is not something she thinks she'll have to teach the other woman. ] This one, the manager keeps a holopicture of his kid at his desk. Looked her up, found her birthday —
[ a few blinks, and a collection of encrypted symbols spill onto the screen. even in digital, plaintext isn't the thing. ]
And you're in. The way the systems here are set up, the passcodes seem to override the neural ID.
[ in this system, with low priority security in place, it identifies the user by the code provided, and even then only by a task name with standardized clearance. it's enough for daisy to poke around, pull up lists of employees and internal documents on payroll, enough to showcase what's possible. ]
But I haven't gotten into anywhere deep yet.
[ government agencies are still on her to-do list, but they take time. effort. attention. a level of skill she's not completely comfortable with yet. ]
how do you hack, half of this could be wrong, i just don't know.
So you already know the layouts of the file cabinets. That's good.
[ a considering bite of her dessert gives her a moment to swap gears. personal clutter is swept aside, a clean slate pulled up on a secondary workstation in a motion not entirely unlikely windows 10's task view functionality. this workstation is clean, almost unnaturally so; it's entirely devoid of any personality that might betray its owner.
as if by explanation, daisy mutters, ] Work. [ this is her vyonation desktop, and to vyonation, daisy is anything but a radical. she does her job, she does it well, and that's all they need to know. ]
Getting into a system from the back end is a lot like picking a lock. You have to know what you're working with to know its vulnerabilities.
[ she pulls up a blank tab and navigates to an access page for a local grocery chain. her team has been assigned a contract for streamlining their digital security, and so daisy's spent the last few weeks at work investigating how the different systems talk to each other. monetary pathways, employee access to restricted products for sales, keycodes and digital id requirements for delivery services, all seemingly mundane but interesting in their own right. what works in one place may work in another. ]
It's not that different from sneaking in somewhere back home. People are bad at keeping secrets — talk to the right person, listen to the right conversation, loiter a little in a lobby, you'll learn a lot. [ daisy is pretty damn sure peggy already knows this. social engineering is not something she thinks she'll have to teach the other woman. ] This one, the manager keeps a holopicture of his kid at his desk. Looked her up, found her birthday —
[ a few blinks, and a collection of encrypted symbols spill onto the screen. even in digital, plaintext isn't the thing. ]
And you're in. The way the systems here are set up, the passcodes seem to override the neural ID.
[ in this system, with low priority security in place, it identifies the user by the code provided, and even then only by a task name with standardized clearance. it's enough for daisy to poke around, pull up lists of employees and internal documents on payroll, enough to showcase what's possible. ]
But I haven't gotten into anywhere deep yet.
[ government agencies are still on her to-do list, but they take time. effort. attention. a level of skill she's not completely comfortable with yet. ]