GRUNDER SOFTWARE GmBH NEURAL NET SUITE
NEURAL NET DATASTREAM SOFTWARE v1.2
USER: HANAMURA, NODOKA ERROR: REGISTRATION EXPIRED 2973 DAYS AGO. NON-FATAL EXCEPTION - NULLPIRATEN.SO NOT FOUND (0X000000AA)
NEURAL UPLINK: ONLINE
CONNECTION STATUS: ONLINE
GATEWAY: tau-ext-23339.tau.nnbackbone.kimidori.co.ku (234.91.11.4)
[DEFINED BY NETWORK POLICY VIA NDHCP]
DMARC POINT: DMARC.UTSUNOMIYA.OUROBOROS.CO.EW
(c49a:99ca:c892:1120:19a3:1dad:feed:9344)
VERIFYING CHECKSUM... OK
DATALINK XMIT DEVICE SLAVED AS /dev/ens4p1.
XMIT TYPE IS SET - BIG ENDIAN.
ENCRYPTION SUITE IS SET - AGEIRA 4098 QUANTUM-RESISTANT HASH W/ PRESHARED KEY
ENCRYPTION DEVICE IS TYPE - EFUSE
EFUSE DEVICE IS /DEV/MODULAR/EFS90E30.
READY FOR DATASTREAM - LISTENING FOR PACKETS ON LOOPBACK DEVICE.
USER ID: NODOKA HANAMURA Network DMARC Point: DMARC.UTSUNOMIYA.OUROBOROS.CO.EW Client Relay DMARC Point: ship-nn-proxy-exblilth VALID ENC CERTIFICATE PROXY PASSTHROUGH FLAG FOUND, SPOOFING IDENTITY FOR ALL RECIPIENTS.
Negotiating security policy from Network Policy Server.. ERROR - NO NETWORK POLICY DEFINED - CONSULT WITH YOUR FACTIONAL NETWORK ADMINISTRATOR.
Continuing with local policy..
Negotiating routing path from Gateway..
Route received from Gateway.
Opening port 42010 on /dev/ens4p1..
Transmitting datastream
To all bounty hunters, unlawful parties or others with interest.
It seems vessels I have a vested interest in seem to be falling victim to insufferable hacks, one of which who should know better than to deprive all profit in a trans-sirian hauler's run.
A bounty is being offered for the destruction of the Grga Pitik, a Junker Frigate of Libertonian construction squawking the GK| IFF Subcode. The vessel was last seen in Omicron Delta and Omicron Kappa. Its' base of origin is unknown.
1,000,000 Credits for confirmed destruction of the vessel - with 500,000 credit bonus if the ship is carrying any sizable amount of goods - likely pirated, in their hold.
Send unto them this message. "Go back to Liberty where you belong."
EXUBERANT LILLITH
// Remark: The preamble of this message (Data prior to the message body and metadata) is not visible to other characters. Use of any information within will be considered metagaming and will be subject to a VR.