These ghostlike beings drift along the hundred terabit trunklines, since they cannot substantiate far from a data source. If they pay enough for the protocols, and their VR gear is comprehensive, then their substantiation is stronger, and even modifiable, and they can hear and smell. Hackers flood to where avatars are the thickest, however, cracking firewalls and into the code stream. They wreak havoc with the imagery, but also hack along the line, getting to the source, which is the reclining meat body which controls so much of the wealth of the society.
Young people want to hack, old people want to use the system to their advantage, and groups set up events where code reality is mixed with what they call real. Anything is possible if you have a high data line and money and the willingness to take risks.
Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, CY, CZ, D, DK, EW, E, FIN, F, GR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.