darwinatrix: (pic#8027050)
Maj. Gen. Olivier Mira Armstrong ([personal profile] darwinatrix) wrote2015-04-19 03:41 pm

IC Contact

This is Armstrong. Go ahead.
mathemagier: this is the letter 4 (Lecture)

text;

[personal profile] mathemagier 2016-03-17 01:09 am (UTC)(link)
Major General, I was referred to you by Miss Sabriel in regards to RISE's recruitment requirements.

As I'd informed Miss Sabriel, I'm afraid I would fall rather short of any physical evaluation, but that I would operate primarily as support to any of your field agents should I remain eligible for such a position.

I have the ability to remotely manipulate and teleport objects, allowing me to perform a wide variety of tasks from simple transportation to dismantling enemy artillery and defenses. In addition, I'm very well-rehearsed in modern technology and can offer advanced programming skills along with a particular aptitude for pattern recognition and decryption.

I am a theoretical physicist with an extensive background in abstract mathematics if you'd find such things of value.

As a final note, I would like to add that I have a full-time position at StarkTech in De Chima and would much prefer to sort out a schedule that would cause as few conflicts as possible.

I appreciate your time and consideration.

-Dr. Hermann Gottlieb
mathemagier: Ten years of experience!! (Default)

text;

[personal profile] mathemagier 2016-03-18 04:44 am (UTC)(link)
Well I promise that where my body may fail me, I more than make up for in a mental capacity.

Yes, I can break encryptions.
mathemagier: this is my predictive model- no touchie (Explain a thing)

text; private

[personal profile] mathemagier 2016-03-18 11:43 pm (UTC)(link)
To date, I've only run into one encryption algorithm I know I never would have been able to break.

[Though to be fair, he doesn't often try to break into government files or anything. The subtle bits of bypass access he did to work around various PPDC restrictions notwithstanding, but he's unquestionably their best programmer, so really.]

It was a self-reproducing algorithm. Utterly fascinating to study, but would have taken a lifetime if not longer to unravel. Network encryptions aren't generally difficult, but it does depend on the skill of the programmer behind the encryption. That said, breaking them isn't usually the issue, but doing so in a short manner of time before they're changed is the challenge. At least as far as heavily secured bits of sensitive data are concerned.

In essence, the more complex the encryption, the more time it would take to crack. But I'm sure you can understand that I'd have little interest in becoming a criminal.
Edited 2016-03-18 23:43 (UTC)