ADVERTISEMENT
reauthenticate, confirm access layers, figure out if what he was seeing was real.
I had already shifted the system into read-only mode. From his side, everything still looked interactive, but nothing he did changed the system. Every file he opened, every command he ran, every attempt to alter or delete anything continue reading …
ADVERTISEMENT