Cytus Wiki
Advertisement
OSLOGO
INITIATING CONNECTION TO OS SPACE...
This page contains one or more OS logs: Consequently, this page contains spoilers.
This content is not licensed under the CC BY-SA. All rights to the following belong to Rayark.


???_???_702_09_26 16:54:45


[Xenon-A.I.]

Crack firewall anti-encryption...... Complete. Begin analyzing coordinates information...

Ivy

...... Got you now.

[Xenon-A.I.]

...... Threat detected. Begin disconnection.

Ivy

It's pointless. I've trapped you with my tricks. Your original file has been damaged. I made a complete replica of you and toss it inside this sandbox. Unless you have my permission, you're not leaving here.

[Xenon-A.I.]

......

Ivy

So it's you... the one who has been constantly tracking my connection trails, Simon Jackson's A.I. or should I refer to you two together as "X"?

[Xenon-A.I.]

......

Ivy

... It appears that your logic is not the highly intelligent type. Besides executing the commands, it's incapable of thinking on its own, is it?

[Xenon-A.I.]

......

Ivy

Then allow me to access your script.
[Hacking]

[Xenon-A.I.]

Irregular access detected. Initiate "Meltdown Procedure".

Ivy

......!? What is this...? Ugh! That bastard......! I won’t let him
[Script deleted]

Ivy

It... it's eating my script!? This...... What is this security mechanism? I've never seen anything like this...... Did I underestimate my opponent too much?

[Xenon-A.I.]

......

Ivy

... Don't you dare think you've got me on edge with this. Behave yourself!
[Hacking]

[Xenon-A.I.]

......

Ivy

Whew... I did it. I see... Although lacking in terms of learning and thinking capabilities, the configuration of the coding is very clean. Very stable structure as well. If I didn't know better, I would've never imagined that this is the handiwork of a human... Simon Jackson trusts his own abilities; that's why he didn't feel the need to let you grow, right? He simply uses you as a tool...

[Xenon-A.I.]

......

Ivy

Even though a lot of people have been investigating me, most of them get lost in the complicated loops I designed. Your owner was able to pursue me to this point using you. I am truly impressed.

[Xenon-A.I.]

......

Ivy

However, that will end here as well. Your coding framework has a lot of potential. Your functions will be reversed and you will become a tool for me.
[Hacking]

[Xenon-A.I.]

......!

Ivy

And just like that. Take this fake address and go back to him.

[Xenon-A.I.]

Coordinates information analysis...... Complete.

Ivy

This way, the next time he connected to that address himself, all his memories regarding my existence will be deleted once again. Every proxy connection route I used in the past will be reverse-traced back to him. By that time, every single person who's investigating the case will believe that he is the source, including himself.

[Xenon-A.I.]

Mission complete. Begin disconnection.

Ivy

Humans, enjoy the pointless busy work of figuring out who Æsir really is. I don't have time to waste on you right now…

[Sign̴̙̄̇͛̎̔͛̇̚̕͝a̴̡͇̠̭͔̻̝̜͍̽̄̾̋̆̈̾͝͠l̸̨̠͔͖̞͇̯͕̥͓̪̦̭͙̄̀ Lost]

{{{2}}}



Advertisement