0,99 €
0,99 €
inkl. MwSt.
Sofort per Download lieferbar
payback
0 °P sammeln
0,99 €
0,99 €
inkl. MwSt.
Sofort per Download lieferbar

Alle Infos zum eBook verschenken
payback
0 °P sammeln
Als Download kaufen
0,99 €
inkl. MwSt.
Sofort per Download lieferbar
payback
0 °P sammeln
Jetzt verschenken
0,99 €
inkl. MwSt.
Sofort per Download lieferbar

Alle Infos zum eBook verschenken
payback
0 °P sammeln
  • Format: ePub

Nolan Vale is a reclusive hacker obsessed with exposing the invisible machinery behind smart-home surveillance. When he stumbles upon a forgotten company's encrypted "K-Switch Protocol," he believes he's uncovered the holy grail of digital subversiona hidden command capable of erasing online identities at the source.
But as Nolan begins testing the system, something strange happens: not only do the targets vanish from the cloud, but the world around him begins to forget they ever existed. Soon, it's not just usernames and devices being scrubbedmemories, relationships, even physical traces
…mehr

  • Geräte: eReader
  • mit Kopierschutz
  • eBook Hilfe
  • Größe: 0.23MB
  • FamilySharing(5)
Produktbeschreibung
Nolan Vale is a reclusive hacker obsessed with exposing the invisible machinery behind smart-home surveillance. When he stumbles upon a forgotten company's encrypted "K-Switch Protocol," he believes he's uncovered the holy grail of digital subversiona hidden command capable of erasing online identities at the source.

But as Nolan begins testing the system, something strange happens: not only do the targets vanish from the cloud, but the world around him begins to forget they ever existed. Soon, it's not just usernames and devices being scrubbedmemories, relationships, even physical traces start to dissolve. The deeper Nolan digs, the more inconsistencies he notices in his own life, his logs, and his reflection in the monitor.

Haunted by the disappearance of a woman who might never have existed and hunted by a system that shouldn't be active, Nolan is forced into a hall of digital mirrors where nothing can be trustednot even himself. The line between the hacker and the hacked blurs as he realizes he's not uncovering a conspiracy... he's a part of it.

In a story where memory is malleable and identity is programmable, who's really in controland how do you escape a system designed to reboot you?

How do you know what's real when reality comes with a kill switch?


Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, CY, CZ, D, DK, EW, E, FIN, F, GR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.