BACK

You are in the Mailstrom.

The US govt. controls the only da
on the Consolidated stream is functionally unbreakable.

The Mailstrom is another way to skin that cat.

We punch a hole in Consolidated and route part of the stream through
don’t try to figure out the decrypt
them on *every* piece of data.

It almost never works. It’s more likely that a person will win the lottery three times
than that any particular email will get caught in the Mailstrom.

And yet some communications *will* get caught. This is simply a statistical function of the
number of messages going through the system. Wh
decryption field, th
extracted through the interface. So far this is the only attempt to hack consolidated to bear any
fruit at all.

Most of what comes through is junk. We don’t have the luxury of selection. The first day we tried
this we got something that convinced us the experiment was worth continuing. To see it, enter

Wreckage: gallows
Shard: Y3RG7J

Whether or not you agree with what was done to the informer after we interce
everyone can ag

TheMailstrom uses a server-jumping protocol that makes it nearly im
People are not so elusive. By the time you read this, there is a very high probability that several
of the original programmers will be in prison or dead. Please make our sacrifices count for
something.

You are in the Mailstrom.

The US govt. controls the only datastream American citizens have access to. The encryption
on the Consolidated stream is functionally unbreakable.

The Mailstrom is another way to skin that cat.

We punch a hole in Consolidated and route part of the stream through a decryption field. We
don’t try to figure out the decryption keys for any one piece of data: we make a few keys and try
them on *every* piece of data.

It almost never works. It’s more likely that a person will win the lottery three times in a row
than that any particular email will get caught in the Mailstrom.

And yet some communications *will* get caught. This is simply a statistical function of the
number of messages going through the system. When data “particles” interact with our
decryption field, the Mailstrom stores the “wreckage” of that collision and the “shards” can be
extracted through the interface. So far this is the only attempt to hack consolidated to bear any
fruit at all.

Most of what comes through is junk. We don’t have the luxury of selection. The first day we tried
this we got something that convinced us the experiment was worth continuing. To see it, enter

Wreckage: gallows
Shard: Y3RG7J

Whether or not you agree with what was done to the informer after we intercepted this email,
everyone can agree on value of the tool.

TheMailstrom uses a server-jumping protocol that makes it nearly impossible to shut down.
People are not so elusive. By the time you read this, there is a very high probability that several
of the original programmers will be in prison or dead. Please make our sacrifices count for
something.