Swordfish
prev.
play.
mark.
next.

:35:04
Let me show you something.
:35:19
Pretty impressive, huh?
:35:26
So, what we need from you is a worm.
A hydra, actually.

:35:30
A multiheaded worm to sniff out digital
footprints across an encrypted network.

:35:36
- What kind of cipher?
- A Vernam encryption.

:35:40
The key code is destroyed
upon implementation.

:35:43
And it's a true 128-bit encryption.
:35:46
Well, actually,
we're talking a 512-bit.

:35:51
- That's definitely not possible.
- What if I give you 10 million dollars?

:35:57
That would cover all your problems.
Yes?

:36:00
Unless, of course, it's not possible.
:36:04
But you think about it.
:36:16
It won't bite you. I promise.
:36:25
This is not just a multi-screen system.
It has a DS-3 connection.

:36:31
We can access 6 different networks
simultaneously.

:36:38
It has a central encryption you
have to crack to utilize the system.

:36:44
Try it.
:36:45
It'll be hard without a gun
to my head.

:36:48
Maybe I should put a gun to your head.
:36:56
I thought you were Gabriel's.
:36:58
- I'm not what you think I am.
- Ginger.


prev.
next.