No, merlin can wait, he isn't in a hurry and we agreed to meet him.Would rather just put off the meeting with the low class murder. And talk in person with the Merlin, worth an Molly time a lowly skinwalker is not he can hurry up and wait.
No, merlin can wait, he isn't in a hurry and we agreed to meet him.Would rather just put off the meeting with the low class murder. And talk in person with the Merlin, worth an Molly time a lowly skinwalker is not he can hurry up and wait.
It was my impression that our cyberdevils maintained some serious level of cybersecurity. @DragonParadox how secure are calls between two cyberdevil possessed phones?
It was my impression that our cyberdevils maintained some serious level of cybersecurity. @DragonParadox how secure are calls between two cyberdevil possessed phones?
Yes but encryption should be easy for them between points.They treat the hardware as their bodies, hacking into them from afar would be a form of mind control and as you can imagine a mundane hacker would struggle with that. That said it's not point to point, the data still has to pass though the cell power
of maybe?
So, it's reasonable to assume that communications are fairly secure. Not perfectly secure, but "good mundane grade cybersecurity that would take time and effort to crack"?They do inscription the information , but they are only as good as their skill-points at it, well that and the fact that they can take all the time in the world to make the best possible code within that skill-range, unlike human coders cyber-devils to not have to eat or sleep.
Perfectly secure communication is basically impossible even in person. Well unless we get some mind reading charms and that is a matter of us tapping into something that was considered secure.So, it's reasonable to assume that communications are fairly secure. Not perfectly secure, but "good mundane grade cybersecurity that would take time and effort to crack"?
I think this is more than good enough.
So, it's reasonable to assume that communications are fairly secure. Not perfectly secure, but "good mundane grade cybersecurity that would take time and effort to crack"?
I think this is more than good enough.
We also have IRIS now who likely has whole noval codebooks.Yes, that is what we are talking about, not super humanly good but 'you sure have a lot of good coders to do this'.
[] Burny IS a demon, but from an entirely different cosmology. He's from a hell, but not THAT Hell.[]Burny detects as a demon because he was rescued from the wicked city.
Seems like the best way to put it.
Its a 2006 cellphone. That's 3G-era hardware.So, it's reasonable to assume that communications are fairly secure. Not perfectly secure, but "good mundane grade cybersecurity that would take time and effort to crack"?
I think this is more than good enough.
I am fairly sure that 2006 era cellphones can't handle human-level intelligence either. The question is how much cyberdevils actually rely on hardware. They scale somewhat with it, but we don't know how much or in what way.Its a 2006 cellphone. That's 3G-era hardware.
IIRC, the hardware couldnt handle much encryption back then; the Iphone 1 isnt even getting released until 2007, and Android only gets invented in 2008.
There's a reason why Priority 1 for me when we get Exalted Crafting is making magic phones.
Secure comms is that important.
RSA exists since 1977.Its a 2006 cellphone. That's 3G-era hardware.
IIRC, the hardware couldnt handle much encryption back then; the Iphone 1 isnt even getting released until 2007, and Android only gets invented in 2008.
There's a reason why Priority 1 for me when we get Exalted Crafting is making magic phones.
Secure comms is that important.
I am fairly sure that 2006 era cellphones can't handle human-level intelligence either. The question is how much cyberdevils actually rely on hardware. They scale somewhat with it, but we don't know how much or in what way.
In any case, I believe right now our communications are sufficiently secure, and I am not actually naming our target. "Red Court noble" is a broad category.
This is not true.Point of order encryption can easily be functionally perfect. As in the next Ice age will roll around before you crack the code. The easiest way is to encrypt something, then encrypt it again with a different encryption. This functionally removes the main way of figuring out the code, by knowing the start and end points, and using that to reverse engineer the code. Now this does require a bit of setup, but they can exchange codes when they are in proximity.
For the record anyone with more then basic tech knowledge can snoop a cell phone call. But a properly encryption should be impossible to crack so long as they change codes daily.
Cant be handled with the hardware of the time.
The fact that we can magically install spirits on a phone does not turn a Nokia 3310 into an Iphone 14.I am fairly sure that 2006 era cellphones can't handle human-level intelligence either. The question is how much cyberdevils actually rely on hardware. They scale somewhat with it, but we don't know how much or in what way.
In any case, I believe right now our communications are sufficiently secure, and I am not actually naming our target. "Red Court noble" is a broad category.