Transfer Complete

Although we did find the encryption key, a new problem surfaced—its sheer size.

It's a colossal file, with a size of 729 Terabytes. That's the equivalent of a text file containing 729 trillion characters' worth of raw data!

"Getting this thing won't be easy," I muttered, exhaling. "So... I guess it's time to deploy my macros!"

I'd prepared custom codes earlier, and this exact scenario was what I anticipated. Without hesitation, I tapped a button, activating two of the many snippets I had written in advance.

In the next instant, the entire framework of the Military Base… froze.

But don't misunderstand—it wasn't because I shut the system down directly.

No, what I actually did was overload the processors, forcing them to endlessly evaluate meaningless high-priority tasks—creating an infinite loop that hijacked nearly all computing resources. In this way, I ensured that no process other than mine could execute.

"And through the gaps…"