## Broadcast depth ## Incoming transmission... ## Drisena // HvCFT Logos II ## Encryption activated
Operatives,
The following message is encrypted, I will be contacting operatives for the decoding keys, please note, at most 2 operatives from any single faction will be provided the key. This is a new security procedure, in light of previous hacking attempts.
/run: encryption /key: *********
............................
q: J=))N-O
oJYNaJXN=(ZMG+Q4Z'N{c-]R;'6R-JMN['R4@!PMLJP]Z'6};4;[6 6V;!]4 YO]V'NNYJSJX.P{-Jm4('Z(GZLL(JTWGGTX.JSJ! 6QV}6 ++(K) 6([aS4=(T}NJ N{+ NLJm4,b[ GY[TGYYMG!]{Z![4=(L GaSR-JONX+OR.]6VZaSXYJT}G.PY=J }Z{({ZP6v 6VZaSXYJ]XG}PL+f{ GYYMGaSNGcL{[+(}G.P,-J,R);6KZJWR,)]NYJ ;J-4: ZY) 6O++X4V';4-)YP) 6OV{]R;'C
ASNG-({:+[NG+Q4=(T}G}-YRNG)[4['6{Z]L{Y!6 ;J]QZJL =YNT-JZWG+({G YN=dZ{(!6R.!TMZJ]QZJqJ=@T)MJsWGaSNGk MG+Q4=(P4X+XR.]6V;']QLJ,NGdTU)J KZJTWG{SJ+]P4;[6JG'P a+ TMJxQ[!6MVaP4[!6R,-Z{=YY LJL}G)]4[!6 6 YY]NGdP4Ze{NXa6J.JL =YNTG+Y4=(T}G-L{=)N[)Y 4= V['LUM
kGdTU)JMNG!PYZ@L ['R4=)XN-O6MVaP}GYYMG;ZLVaTX.!B4-+6 Y]4-(Z[)}6X. 6 PLZJZOG)YO;@XJ=)ZWG;PJ(O6 6X=(P{G(L}GY6KZa]N+JNQV'NNG+Q4+ XJ['TW}J }Z{({ZP
6aL,G!LOZJwX)}TN+!C
6WNV!P9G@PUVf6 )[4=+6,;b 4{YN [+Y4;@6 +b[ Z}61[+Y4;-P{VaT]Z!C
U6f+)[N.Y 1[+Y4z)LR-+Y42[QRX
Drisena Zion Liaison Officer
## Carrier Lost...
Is that what you see? To those who know, they will know which code they represent.
Some of you have been contacted, some have intel awaiting them.
If you are still waiting, please send me a transmission, with faction details, listing 2 names. Those without, I request that you also send me some form of contact. I warn you now, those I have no met face to face, will not recieve the codes.
You are aware why our security is high and it will remain as such.
Message recieved and understood.
Drisena,
Would it be too much trouble to ask you to edit the broadcast to remove smilies from the transmission and therefore fix the encoded signal?
- Outlash.
## Broadcast depth ## Incoming transmission... ## Drisena // HvCFT Logos II ## Encryption activatedOperatives,The following message is encrypted, I will be contacting operatives for the decoding keys, please note, at most 2 operatives from any single faction will be provided the key. This is a new security procedure, in light of previous hacking attempts./run: encryption /key: *********............................q: J=))N-OoJYNaJXN=(ZMG+Q4Z'N{c-]R;'6R-JMN['R4@!PMLJP]Z'6};:P4;[6 6V;!]4 YO]V'NNYJSJX.P{-Jm4('Z(GZLL(JTWGGTX.JSJ! 6QV}6 ++(K) 6([aS4=(T}NJ N{+ NLJm4,b[ GY[TGYYMG!]{Z![4=(L GaSR-JONX+OR.]6VZaSXYJT}G.PY=J }Z{({ZP6v 6VZaSXYJ]XG}PL+f{ GYYMGaSNGcL{[+(}G.P,-J,R);6KZJWR,)]NYJ ;J-4: ZY) 6O++X4V';4-)YP) 6OV{]R;'CASNG-({:+[NG+Q4=(T}G:P}-YRNG)[4['6{Z]L{Y!6 ;J]QZJL =YNT-JZWG+({G YN=dZ{(!6R.!TMZJ]QZJqJ=@T)MJsWGaSNGk MG+Q4=(P4X+XR.]6V;']QLJ,NGdTU)J KZJTWG{SJ+]P4;[6JG'P a+ TMJxQ[!6MVaP4[!6R,-Z{=YY LJL}G)]4[!6 6 YY]NGdP4Ze{NXa6J.JL =YNTG+Y4=(T}G-L{=)N[)Y 4= V['LUMkGdTU)JMNG!PYZ@L ['R4=)XN-O6MVaP}GYYMG;ZLVaTX.!B4-+6 Y]4-(Z[)}6X. 6 :)PLZJZOG)YO;@XJ=)ZWG;PJ(O6 6X=(P{G(L}GY6KZa]N+JNQV'NNG+Q4+ XJ['TW}J }Z{({ZP6aL,G!LOZJwX)}TN+!C6WNV!P9G@PUVf6 )[4=+6,;b 4{YN [+Y4;@6 +b[ Z}61[+Y4;-P{VaT]Z!CU6f+)[N.Y 1[+Y4z)LR-+Y42[QRX ............................ Drisena Zion Liaison Officer## Carrier Lost...
oJYNaJXN=(ZMG+Q4Z'N{c-]R;'6R-JMN['R4@!PMLJP]Z'6};:P4;[6 6V;!]4 YO]V'NNYJSJX.P{-Jm4('Z(GZLL(JTWGGTX.JSJ! 6QV}6 ++(K) 6([aS4=(T}NJ N{+ NLJm4,b[ GY[TGYYMG!]{Z![4=(L GaSR-JONX+OR.]6VZaSXYJT}G.PY=J }Z{({ZP6v 6VZaSXYJ]XG}PL+f{ GYYMGaSNGcL{[+(}G.P,-J,R);6KZJWR,)]NYJ ;J-4: ZY) 6O++X4V';4-)YP) 6OV{]R;'C
ASNG-({:+[NG+Q4=(T}G:P}-YRNG)[4['6{Z]L{Y!6 ;J]QZJL =YNT-JZWG+({G YN=dZ{(!6R.!TMZJ]QZJqJ=@T)MJsWGaSNGk MG+Q4=(P4X+XR.]6V;']QLJ,NGdTU)J KZJTWG{SJ+]P4;[6JG'P a+ TMJxQ[!6MVaP4[!6R,-Z{=YY LJL}G)]4[!6 6 YY]NGdP4Ze{NXa6J.JL =YNTG+Y4=(T}G-L{=)N[)Y 4= V['LUM
kGdTU)JMNG!PYZ@L ['R4=)XN-O6MVaP}GYYMG;ZLVaTX.!B4-+6 Y]4-(Z[)}6X. 6 :)PLZJZOG)YO;@XJ=)ZWG;PJ(O6 6X=(P{G(L}GY6KZa]N+JNQV'NNG+Q4+ XJ['TW}J }Z{({ZP
7(P47 V['LUG)[4-aTU)J[NXb NLJM[=J]QZJL =YNTG{Z[)}6KZJL GYY,=)XNM =Y,O6KZJ NV};AGzQ4=(T}G]ZN-JOXa'6U[.P4=(P4;aSN+JL =YNT-O6Nb-PL=JSX-aTUZ!C
9]JcJwJ{ C
u R- YJGU61[+Y4z)LR-+Y42[QRX