During Chapter 10.3.4, he made off made off with data Cryptos was using for his research into countering intruder override codes because he believed that the Cypherites should not be be trusted to use such information selflessly. However, the Cypherites pursued the operative, capturing both Negligible and re-obtaining the stolen data.
Attributes | Values |
---|---|
rdf:type | |
rdfs:label |
|
rdfs:comment |
|
sameAs | |
dcterms:subject | |
hacker |
|
Real |
|
dbkwik:matrixonlin...iPageUsesTemplate | |
Appearances |
|
Name |
|
dbkwik:matrix/prop...iPageUsesTemplate | |
Entity | |
Gender |
|
abstract |
|