In the cyber architecture of the workers' forum, hidden cameras are everywhere, and information within this LAN is monitored through some European Union-standard communications.
At the moment, this hacker is using a very conservative communication encryption method, embedding information within the communication protocol, loading keys and ciphertexts in segments across communication packets.
It's not a rare encryption method; it can indeed bypass European Union supervision, but if the receiver doesn't know the encryption method, they won't be able to decode the ciphertext, not to mention the receiver could report it.
And Lille can interpret the ciphertext mainly because the AI is extremely sensitive to numbers, especially the encryption methods used—
The encryption method for this segment of ciphertext originates from Night City, one among the chaotic network's encryption techniques.