>>105838244
Drone strikes tend to have a chilling effect and binaries can be steganographically fingerprinted to trace who did it. My threat model already assumes possible exfiltration from a running server, so there is no binary in storage, just what's in RAM at the time. It's possible to set it up that the master binary doesn't exist outside of a device in my pocket that requires manual authorization from me. My recruitment process already screens out gamers and gamer sympathizers for unrelated reasons. And local AI is getting pretty good at writing against my APIs, so who knows if I'll need anyone.
Game on, NYPD. It's kill or be slaughtered. I've leveled up since we last met, have (You)?