Straight to the computer.  Hm.  Kid Win pocketed the hovering camera, then turned his attention to the smartphone.  According to the phone, there were three wireless modems in the building.  One was named with a string of violent swear words, the other was on its default settings.  Both were unlocked.

Hehe.

The two wi-fi networks in my house have boring names. The main one just has my dad’s first initial and our surname stuck together, and the one in my bedroom is called “Gjester”, meaning “Guests”.

He chose the third, locked connection, clicked a button on the screen to have his phone decrypt the password.

Heh. I guess there’s no use in locking your networks when the person who wants access is a tinker with access to PRT resources.

Fifteen seconds later, he could see someone online.  Kid Win watched the white text scroll by with details on the connection’s activity.

Damn, that was a fast hack job. Got some good resources on that phone, or a bad password on the network.

Google docs – pages of technical stuff, the boy was adding notes on gold wiring, shortform notes on antigravity, 3D crystals.

Oh, neat, he was intrigued enough by what you showed him to take notes on it, perhaps in the hopes of using some of it himself.

The next page the boy visited, five minutes later, was an email account.

Twenty seconds later, an email was sent.

Can you read that too over this system?

To: C1298475739@cryptmail.com

Well, that’s promising. Nobody sketchy would use an anonymous mailing address, right?

Guy from wards came.  I’m in.

That’s.

Bad. Probably.

It kinda sounds like a Reverse Taylor is being planned here.

Leave a comment