of an automated alert cut thro
source code, sealed under my department's auth
was authorized from my encrypted cr
technical impossibility of it,
rk, and my best friend, Molly Chavez, standin
d with an accusation that hit m
how could y
rtment, his eyes scanning my s
. To us. Corporate espionage? I neve
ind him, a perfect pictu
t believe it
My mind raced, trying to connect the dots. The data leak, thei
m despite the shock. "My credentials w
some face. "Spoofed? Jen, we're talking about your encrypte
he head of Data Integrity. He knew exactly how secure my cr
' s tear-stained one. The betrayal was so
ld. This wasn't just a work