First steps

29 2 0
                                    


In this world, there are two choices: Good and Evil, each lying on its own spectrum. The true nature of Good and Evil remains shrouded, only revealing themselves when true Evil prevails. Our protagonist, Kali Syde, is keenly aware of his own malevolence, yet remains a stranger to his true self. However, Kali is not inherently evil. He simply walks his own path, distinct from the traditional dichotomy of Good and Evil.

Outside the protagonist's window, a propaganda billboard displayed an advertisement for the first commercial quantum computer, specifically tailored for corporate use. Our protagonist, had obtained key information from a number of large biotech companies. This knowledge could be utilized to harvest these quantum computers, allowing him to gather a substantial collection. these devices had the potential to break encryptions exponentially faster than conventional methods. The resulting data would be invaluable—a veritable gold mine that could provide an inroad to the most influential corporation in the world, DATA Ink, the manufacturers of these quantum computers.

Kali sets himself a task, to get his hands on a quantum computor. it is not as easy as to just get into a call with DATA Ink or a distributor. Kali knows that there would be traces on calls with providers with multiple step verification preventing  any penetration even with Kali's provided Pawned information. Kali decided to socially engineer his way onto knowing just the where abouts of a server that the bio tech companies will hold their quantum computers, then after getting access remote desktop along with an acquired master password Kali could gain free entry into a mult-billion-dollar device.   

a little earlier Kali sent a handfull of cryptocurrencies to an individual named AnonAnoff a user name on the most secure hacking site, Kali acknowledges the most anonymous site is not a comparison to direct messaging and on that site happened to be direct messaging that ran of a crypto currency that held and deleted messages every day, making this as clean as in the streets paper code message swapping as everything is gone before it is saved and only a quantum computor and a couple of days processing could handle leading to an un profitability in prosecution and that just felt ironic for our tyrannical privatized police and investigator system.

AnonAnoff stated the details of an individual who was the head of security at a biotech company that was an early adopter of this quantum technology. AnonAnoff also stated that the quantum computer was used to process DNA information to cure diseases and target medication and do protein folding in real time speeds all this shouted out bio tech as a target. the head of this insecure bio security was known to be soft on white hat hackers who daily penetrated there systems leading to the eventual black hat operation having a turn once the white hat published that they had been hacked and had not addressed this dormant decade old exploit. AnonAnoff then went on to sell for a secured lot of crypto with Kali, AnonAnoff handed over details including a master password.

after a couple of weeks Kali did it he found a decade old exploit, still un patched that allowed full remote desktop access and access to the quantum computor, kali then had the monumental  task of programing a quantum computor for cryptography. he took out of the remote access a copy of "a manual for quantum inscription" the leading proprietary book for quantum programing that came with the quantum computor, as Kali started to read into this book he noticed this was a biotech only volume and had no index for cryptography in it meaning he would need to use a bio tech language to program cryptography

this happened to be a god send as bio tech was seen as in compatible with cryptography by any unskilled sales man. Kali knew that if he could program in a biotech language it would not show up as a foreign file in a newly supported language. a day of research and development created the program a crypto graph soft where in a biotech language.


Running Through BytesWhere stories live. Discover now