There were twelve.

The voice on the other end was quiet for a long moment. "How did you get past the library block?"

And then she noticed something else. A hidden file in the root directory: .

Maya opened a second terminal and pinged the update server. No response. She tried a traceroute. The packets hopped through seven nodes, then stopped at a server registered to , the same company that owned Aegis-7.

1970? The Unix epoch. Someone had reset the system clock—or the system had never been properly initialized. She navigated to the directory containing the deactivation codes. The folder was there, but the files inside were scrambled: random binary, no headers, no signatures.

She pulled up the log file manually, scrolling past rows of timestamps and status codes. Buried in the noise, something caught her eye:

The real work had just begun.

"I didn't," Maya said. "I just didn't need it."

She bypassed Solar Putty's library downloader entirely, pulling the WinSCP libraries manually from an open-source mirror. The download completed in seconds. She pointed Solar Putty to the local files, restarted the client, and connected to Aegis-7 on the first try.

[WARN] winscp_lib_hash_mismatch: expected 9F2A... got 00:00:00:00:00

Then she called the number listed for TransOrbital's security office.

But the block had failed, because she had gone around it.

Someone had been siphoning data out of Aegis-7 for years, but they had made a mistake. They had modified the WinSCP libraries on the server to log and exfiltrate data, then redirected Solar Putty's update checks to their own malicious server to prevent legitimate library downloads. The "unable to download" error wasn't a bug. It was a feature—a deliberate block to keep her from noticing the tampering.

The progress bar flickered. Ten percent. Twenty. Then—freeze. The error again.