For several minutes, Tim's eyes linger on the envelope on the table, though appear to be staring through it thoughtfully. There's relief that Togusa doesn't pursue his lie, but also some knowing that it'll eventually come back around--maybe. Or that Togusa will just keep it in mind.
Both brows rise before he finally lifts his gaze back up at Togusa, curious.
"What are you going to do when Jim Halloway lives inside the Retrospec building?" A pause. "What are you going to do when Jim Halloway is an advanced artificial intelligence and not actually a person?" Tim's lips twist, a split between amusement and real concern.
"Most of the time," he says, voice low and confidential, "hackers don't slap their fingers on a keyboard repeatedly when they're trying to hack. It's about master and servant. Hackers create programs that do the work for them, just like thieves have their lockpicks.
"For example, hackers trying to bypass passwords run a program that speedily throws together word and number combinations to see which one will 'open the lock.' People dumb enough to have simple passwords like 'flower123' are who bite the dust.
"Anyway: what are you going to do if Jim Halloway turns out to be a moniker for one of these programs? Maybe that's why the application is so butchered. Either 'Jim Halloway' isn't getting the right input, or 'Jim Halloway' has a serious bug.
"Point is, you're still not going to find Jim Halloway. Not physically."
no subject
Both brows rise before he finally lifts his gaze back up at Togusa, curious.
"What are you going to do when Jim Halloway lives inside the Retrospec building?" A pause. "What are you going to do when Jim Halloway is an advanced artificial intelligence and not actually a person?" Tim's lips twist, a split between amusement and real concern.
"Most of the time," he says, voice low and confidential, "hackers don't slap their fingers on a keyboard repeatedly when they're trying to hack. It's about master and servant. Hackers create programs that do the work for them, just like thieves have their lockpicks.
"For example, hackers trying to bypass passwords run a program that speedily throws together word and number combinations to see which one will 'open the lock.' People dumb enough to have simple passwords like 'flower123' are who bite the dust.
"Anyway: what are you going to do if Jim Halloway turns out to be a moniker for one of these programs? Maybe that's why the application is so butchered. Either 'Jim Halloway' isn't getting the right input, or 'Jim Halloway' has a serious bug.
"Point is, you're still not going to find Jim Halloway. Not physically."