Board Thread:Off-topic/@comment-26566521-20151209234142/@comment-26566521-20151210182758

ScaryStuffAhoy wrote: Bixbite starts to ruffle his hair and speak in a far more relaxing tone.

Bixbite: See..? We aren't doing anything bad to you.

The gem yanks out a particularly jagged piece of shrapnel. It may hurt a little.

The hacker's computer was connected with a bunch of other computers, all with their hard-drives filled to the brim with spam and unimportant things. By the time the counter-hacking system sifts through all the spam and junk, the hijacking will be long over, considering it will only last for one or two minutes.

And all the computer profile's names were identical, so they couldn't target a certain computer at a time.. Hue hue. That ain't how it works.

A super rich and popular gem's computers vs Rebel hackers computers.

And once the hacking was over, it'd still be stealing stuff.

And that's not how comp identification works.

Each one is still slightly different internally, so if there were to be connected, each one would still be internally marked different. If the hacker removed it, it'd cause network glitches.

also, no convenientness plz)