C1380 Two Tubes down
Like a real computer hacker, he was able to crack the other person's firewall data with a considerable amount of data. Disintegrate it from the outside and then invade it. This way, it can easily enter without causing any alarm.
What she was doing now was similar to a hacker's covert invasion.
Of course, there were some differences in comparison. That was