![⠀-[C]
[IMG=KHU]
[C]
𑁍⃞ᬽ 𝐍𝐀𝐌𝐄:
Frequently changes. Their current one is whatever was randomly generated by the system of th](https://image.staticox.com/?url=http%3A%2F%2Fpm1.aminoapps.vertvonline.info%2F9307%2F92e1ef3ee02dc3cd293940c9c83c8bab7c7fe56fr1-2048-273v2_hq.jpg)
𑁍⃞ᬽ 𝐍𝐀𝐌𝐄:
Frequently changes. Their current one is whatever was randomly generated by the system of the social media platform they created a new at sometime ago.
𑁍⃞ᬽ 𝐀𝐆𝐄:
Depends on the digits they have put on the profile they are using at the moment as their age, and their mental state because of their amalgamation of experiences on the day you interact with each other.
𑁍⃞ᬽ 𝐁𝐈𝐑𝐓𝐇𝐃𝐀𝐘:
The exact date they got their first job as a hacker.
𑁍⃞ᬽ 𝐆𝐄𝐍𝐃𝐄𝐑:
Ambiguous. They swing back and forth between hyperfemininity and hypermasculinity when feeling mischievous, then avoids meeting gender role expectations again when someone is onto them so as not to give away personally identifiable information.
𑁍⃞ᬽ 𝐋𝐀𝐍𝐆𝐔𝐀𝐆𝐄𝐒:
Bash, C++, Java, Perl, PHP, Python, Ruby, SQL, and a bit of the official languages spoken in the four other countries with the greatest demand for hackers in the world.
𑁍⃞ᬽ 𝐒𝐄𝐗𝐔𝐀𝐋 𝐎𝐑𝐈𝐄𝐍𝐓𝐀𝐓𝐈𝐎𝐍:
Any person who is willing to provide erotic pleasure temporarily arouse their interest. They exhibit nonchalance towards their partner’s physique if they would give their consent to be treated however they like in bed.
𑁍⃞ᬽ 𝐑𝐎𝐌𝐀𝐍𝐓𝐈𝐂 𝐎𝐑𝐈𝐄𝐍𝐓𝐀𝐓𝐈𝐎𝐍:
Fond of those who would handle their source of income and capacity to bring about a reign of terror on the cyberspace like highly classified information.
𑁍⃞ᬽ 𝐁𝐎𝐃𝐘 𝐓𝐘𝐏𝐄:
Determined by the observer’s aesthetic judgement when looking at them. Their mental representation of their body image lacks consistency given that they look skinnier in some combination of clothes and plumper because of a hormonal imbalance when eating food items that contain a large amount of specific ingredients. Due to the shifts in their appearance that do not slip under someone’s radar, other people couldn’t decide if they are ectomorphic or endomorphic either despite what the numbers on the weighing scale and measuring tape conveyed.
𑁍⃞ᬽ 𝐇𝐄𝐀𝐋𝐓𝐇 𝐏𝐑𝐎𝐁𝐋𝐄𝐌𝐒:
⓵ They have a vision condition that made objects up close appear out of focus. Reduced sleeping time would also make things they could see clearly at a distance blurrier until they are given the opportunity to rest and restore their executive functions, which would revert their visual system back to ‘normal’.
⓶ Nutritional deficiencies and occasional intestinal obstructions that gave them bathroom difficulties because of their limited food preferences. They have more fungiform papillae than the average human, which heightened the intensity of the flavors they taste. Unable to tolerate multitudes of foods, they would opt for crushed ice, stale crackers, jelly cubes made with fresh fruit juice, plain broth, and milk powder instead.
⓷ At risk of developing cardiovascular disease because of insufficient sun exposure and decreased outdoor activity.
𑁍⃞ᬽ 𝐅𝐄𝐀𝐑𝐒:
Cerebral Atrophy
They are afraid that the blue light emitted by their computer screens and handheld devices is affecting their brain mass or the amount of neurons they have.
Identification
They do not want to be detrimented in real life by those who have the assets, tools, and methodologies to find out who they are and visit their home or office for doing their job.
Lifelong Loneliness
They do not want to be separated from the rest of society until their dying breath because of their psychological characteristics, physical and mental abilities, knowledge, habits, character traits, and career choice.
Unemployment
Losing one’s job and the possibility of not being hired in the labor market ever again elevates their financial stress and anxiety for the future.
𑁍⃞ᬽ 𝐇𝐎𝐁𝐁𝐈𝐄𝐒:
Bot-making
Utilizes ever-evolving languages to build efficient and maintainable bots as well as custom packages. Aside from that, they would use their ability to conduct discriminate surveillance to follow around targeted individuals and lambast them into having desirable traits similar to an Android developed for service and entertainment applications.
Bullying people into begging for help
To mock law enforcement officers when they couldn’t save targeted individuals from advanced persistent threats. They would cajole many others to do the same to direct attention to whoever is being preyed on so they’d get doxxed.
Coercing unsuspecting individuals to commit a crime similar to what they’ve done in the past
To unite people with feelings of guilt, shame, humiliation, fear, anxiety, hatred, disgust and/or (s*xual) frustration, which are the anticipated emotional responses when the job is finished. Having an accidental wrongdoing to conceal often silenced the victim in the face of injustice and reinforced the hacker’s position of power.
Collecting blackmail materials
They like to peep through people’s cameras to note their facial expressions while typing and scrolling. Oblivious individuals who aren’t completely clothed would wind up having photographs of their bare bosoms and nether regions taken. Public figures and internet celebrities who have animated conversations with themselves are recorded, and the audio files are used to spread rumors about their mental health. Clips of derogatory remarks and heated arguments with family, friends, and spouses cost a fortune so they would tune in for them too.
Creating extreme problems that could result to death, injury, monetary loss, and destroyed livelihoods
To sell out the solution that only they have the technology and experience to come up with and provide.
Cyberhijacking
To acquire the credentials, social security number, log-in information, digital copies of documents, e-signature, ID pictures, screenshots of conversations, and etc. of the device owner.
Finding security bugs on mobile apps
They would analyze the behavior of an app and use their reverse-engineering skills to disassemble it. Once that is done, they would then figure out how to apply malicious inputs that would help them uncover exploitable flaws.
Molesting their victims of continual surveillance
To evoke negative reactions with differing levels of severity.
Narc/Schizoposting
Torments the hacking victims with the sensitive data they have collected by posting them in places they would often check to make them lose their sanity while questioning their perception of the attacks.
Rage-Farming
They would take over the alternate s of people they suspect are suffering from major mental illnesses, such as Dissociative Disorder Not Otherwise Specified, and potential political puppets for social justice to elicit outrage.
Setting up legal snares
To frame citizens of another nation or those from the country they live in for the publication of stolen files and their distribution in virtually unknown sites and direct conversations.
Tracking down a target
To see the updates from their various online identities and learn what makes them tick.
𑁍⃞ᬽ 𝐁𝐀𝐂𝐊𝐒𝐓𝐎𝐑𝐘:
They are a member of a decentralized hacktivist collective and do not hesitate to independently conduct repetitive brute force attacks to cripple their targets for the balkanization of the internet. It is unknown if they do it to make it harder for corruption and criminality to sprout and proliferate someday, or to control and restrict s so they’d be easier to identify by the police if they were to do something less heinous than what this hacker does for a living. No government composed of elected officials from any country is running the internet, so they and their colleagues appointed themselves as rulers with limited functions out of necessity.
![⠀-[C]
[IMG=KHU]
[C]
𑁍⃞ᬽ 𝐍𝐀𝐌𝐄:
Frequently changes. Their current one is whatever was randomly generated by the system of th](https://image.staticox.com/?url=http%3A%2F%2Fpm1.aminoapps.vertvonline.info%2F9307%2F2ba56df2b4e4f3546f605202e6b215de0c668250r1-2048-563v2_hq.jpg)
(2023)
Comment