of an automated alert cut thro
source code, sealed under my department's auth
was authorized from my encrypted cr
technical impossibility of it,
rk, and my best friend, Molly Chavez, standin
d with an accusation that hit m
how could y
rtment, his eyes scanning my s
. To us. Corporate espionage? I neve
ind him, a perfect pictu
t believe it
My mind raced, trying to connect the dots. The data leak, thei
m despite the shock. "My credentials w
some face. "Spoofed? Jen, we're talking about your encrypte
he head of Data Integrity. He knew exactly how secure my cr
' s tear-stained one. The betrayal was so
ld. This wasn't just a work
/0/92611/coverorgin.jpg?v=ecd6c1dbaa6bd7adcd60f7e08dc5c829&imageMogr2/format/webp)
/0/73838/coverorgin.jpg?v=13386996a09e7a2f9334fc224055a59a&imageMogr2/format/webp)
/1/100111/coverorgin.jpg?v=e850e95497c801aebc8533c91eee1448&imageMogr2/format/webp)
/0/72913/coverorgin.jpg?v=359f7227b82fb9558a6bba211d39f585&imageMogr2/format/webp)
/0/86395/coverorgin.jpg?v=55bb4b33b13d15db79b49aea662af755&imageMogr2/format/webp)
/0/64977/coverorgin.jpg?v=02e092613713dd4e070d4c5259584f8c&imageMogr2/format/webp)
/0/83919/coverbig.jpg?v=8b3bd3df4afd4b4d984eef9dd84cf06d&imageMogr2/format/webp)