CONNECT TO SERVER

You tunnel into the Bucharest server. You find layers of decoy code—but beneath it, something real.

Encrypted messages. IP logs. It’s risky… but there’s something big here.

"Root access possible. Proceed?"

Next move?

  1. Download the evidence before you’re discovered.
  2. Plant a virus to disrupt their network from within.