Basically, a hacker can choose to "bug" a terminal. Since all things typed into a terminal are text, the text that was put in at the bugged terminal is sent to the hacker. So let's say Magenta is a hacker. They go to C-3 and find a seer terminal. They choose to bug it. A couple turns later, Olive finds the seer terminal. Olive wants to seer Grey. Magenta would get a message like: C-3 Terminal "Grey". Olive would get the response of "Green", but Magenta wouldn't get the response. Magenta would also still not know what the response was.
That was a poor example, because it doesn't have as much of a practical application there. But if a hacker were to bug other terminals, such as a validity check or a gas terminal, then they could know more incriminating things. Although on second thought, maybe relaying the answer as well would be a better idea.
That was a poor example, because it doesn't have as much of a practical application there. But if a hacker were to bug other terminals, such as a validity check or a gas terminal, then they could know more incriminating things. Although on second thought, maybe relaying the answer as well would be a better idea.


Comment