"If Aymad and I between us cannot obscure the use of a legitimate set of credentials, this mission has larger problems than Virmad's timeline," Sasha observes. "What we need from you is information about how the investigation's files were organized. It's typically not so hard to expand access privileges once you're in a system, but I'd rather not waste time downloading some magistrate's holiday pictures."
Re: 31 flavors of encryption