Lévy flight

Your awesome Tagline

0 notes

Pseudoutopia Chapter One Continued

So then we check the access log of the master control. We see that another program is also accessing the master control and it seems like it’s doing these actions. When we try to investigate the logs disappear. This is unheard of since everything is logged. And when I say everything I mean everything down to what we eat in the morning and when we wake up. We have massive amounts of storage online and it is trivial to never delete anything.

Modifications like this aren’t taken lightly. No one in their right mind would do this and it seemed like an automated process is performing these actions. So we try to find this process. This is like finding a needle in a haystack. There is an enormous amount of log data that we would have to sort through to get to what we actually want.

0 notes

Pseudoutopia Chapter One Continued

I am Mister thirty-seven. I should have mentioned that before. I discussed it with her and we couldn’t find a satisfying answer. All of the logs state that there is a user zero making these modifications. This would point to master control but there are no records of any master control program doing these actions.