You are in the Mailstrom.



The US govt. controls the only da

on the Consolidated stream is functionally unbreakable.



The Mailstrom is another way to skin that cat.



We punch a hole in Consolidated and route part of the stream through

don’t try to figure out the decrypt

them on *every* piece of data.



It almost never works. It’s more likely that a person will win the lottery three times

than that any particular email will get caught in the Mailstrom.



And yet some communications *will* get caught. This is simply a statistical function of the

number of messages going through the system. Wh

decryption field, th

extracted through the interface. So far this is the only attempt to hack consolidated to bear any

fruit at all.



Most of what comes through is junk. We don’t have the luxury of selection. The first day we tried

this we got something that convinced us the experiment was worth continuing. To see it, enter



Wreckage: gallows

Shard: Y3RG7J



Whether or not you agree with what was done to the informer after we interce

everyone can ag



TheMailstrom uses a server-jumping protocol that makes it nearly im

People are not so elusive. By the time you read this, there is a very high probability that several

of the original programmers will be in prison or dead. Please make our sacrifices count for

something.

You are in the Mailstrom.



The US govt. controls the only datastream American citizens have access to. The encryption

on the Consolidated stream is functionally unbreakable.



The Mailstrom is another way to skin that cat.



We punch a hole in Consolidated and route part of the stream through a decryption field. We

don’t try to figure out the decryption keys for any one piece of data: we make a few keys and try

them on *every* piece of data.



It almost never works. It’s more likely that a person will win the lottery three times in a row

than that any particular email will get caught in the Mailstrom.



And yet some communications *will* get caught. This is simply a statistical function of the

number of messages going through the system. When data “particles” interact with our

decryption field, the Mailstrom stores the “wreckage” of that collision and the “shards” can be

extracted through the interface. So far this is the only attempt to hack consolidated to bear any

fruit at all.



Most of what comes through is junk. We don’t have the luxury of selection. The first day we tried

this we got something that convinced us the experiment was worth continuing. To see it, enter



Wreckage: gallows

Shard: Y3RG7J



Whether or not you agree with what was done to the informer after we intercepted this email,

everyone can agree on value of the tool.



TheMailstrom uses a server-jumping protocol that makes it nearly impossible to shut down.

People are not so elusive. By the time you read this, there is a very high probability that several

of the original programmers will be in prison or dead. Please make our sacrifices count for

something.