"Wouldn't you already know, if you are how you claim?"
Before Cipher could answer, the enthusiastic young woman gave the game away by assigning power-based nicknames to everyone.
"My affinity for detecting Meta-Humans is a passive one, at first." Cipher continued, unabated. "Beyond that, I did not wish to invade your privacy unless you permitted it."
The last part was what is commonly known as 'a bare-faced lie'.
"If you still require a demonstration..." Cipher internally reviewed all of the active electronic devices in the room. His attention was drawn by a quiz machine over in the far corner, offering a cash prize. "go to that machine over there, and deliberately answer every question incorrectly. See what happens."
Such a task was child's play for Cipher.
"So network,"
"My name is Cipher." Cipher interrupted, grimacing a little in annoyance.
"Are you constrained on how much data you can process at one time?"
"At a level of passive data gathering, there is no limit that I have discovered." Cipher answered, partially truthful. His attack would regularly interfere with his ability, but he saw no reason to let any of them know anything about that yet. "For me, that takes about as much effort as breathing. More active tasks: Hacking security systems; uploading or altering information; and operating machinery, require far more effort."
Before Cipher could answer, the enthusiastic young woman gave the game away by assigning power-based nicknames to everyone.
"My affinity for detecting Meta-Humans is a passive one, at first." Cipher continued, unabated. "Beyond that, I did not wish to invade your privacy unless you permitted it."
The last part was what is commonly known as 'a bare-faced lie'.
"If you still require a demonstration..." Cipher internally reviewed all of the active electronic devices in the room. His attention was drawn by a quiz machine over in the far corner, offering a cash prize. "go to that machine over there, and deliberately answer every question incorrectly. See what happens."
Such a task was child's play for Cipher.
"So network,"
"My name is Cipher." Cipher interrupted, grimacing a little in annoyance.
"Are you constrained on how much data you can process at one time?"
"At a level of passive data gathering, there is no limit that I have discovered." Cipher answered, partially truthful. His attack would regularly interfere with his ability, but he saw no reason to let any of them know anything about that yet. "For me, that takes about as much effort as breathing. More active tasks: Hacking security systems; uploading or altering information; and operating machinery, require far more effort."