Swordfish
föregående.
visa.
bokmärken.
nästa.

:33:13
- So how did you do it?
- Do what?

:33:15
Break the code.
:33:16
I dropped a logic bomb
through the trap door.

:33:19
No, you didn't.
You didn't have time.

:33:23
- What'll you have?
- Scotch.

:33:25
- You can do better than that.
- I used a password sniffer.

:33:30
How did you do it?
:33:32
I don't know exactly. I see the code
in my head. I can't explain it.

:33:38
Let me show you something.
:33:53
Pretty impressive, huh?
:33:58
So, what we need from you is a worm.
A hydra, actually.

:34:03
A multiheaded worm to sniff out digital
footprints across an encrypted network.

:34:08
- What kind of cipher?
- A Vernam encryption.

:34:12
The key code is destroyed
upon implementation.

:34:15
And it's a true 128-bit encryption.
:34:18
Well, actually,
we're talking a 512-bit.

:34:23
- That's definitely not possible.
- What if I give you 10 million dollars?

:34:29
That would cover all your problems.
Yes?

:34:32
Unless, of course, it's not possible.
:34:35
But you think about it.
:34:47
It won't bite you. I promise.
:34:56
This is not just a multi-screen system.
It has a DS-3 connection.


föregående.
nästa.