CHAPTER 027: THE FILE THAT SHOULD NOT EXIST
The file opens, and for three seconds, I just stare at it.
Not because I'm scared. Because I'm cataloguing.
The architecture is wrong. The compression format is wrong. The metadata tags don't match anything in my system, which means whoever placed this here didn't just access Morriston Tech's infrastructure. They understood it well enough to build something that could live inside it undetected for five years without triggering a single anomaly flag.
That's not hacking. That's fluency.
"Talk to me," Dominic says quietly.
His voice is close. He's looking over my shoulder now, and the space between us is gone. Neither of us acknowledges it.
"It's not mine," I tell him, pulling up the code structure. "The compression layer uses a framework I don't recognize, and the encryption doesn't match anything in my architecture."
Dominic's eyes narrow at the screen. "Can you open it?" he asks.
