looksfine: (but if you need, I'd be happy to make custom new ones upon request) (more hacking!)
Aya ([personal profile] looksfine) wrote in [community profile] tushanshu 2014-12-27 10:05 pm (UTC)

[She followed his thought process as best as linear logic would allow, fragments of information not quite fitting to form a whole picture, but enough for her to make educated hypothesis to fill in the gaps. It was fairly easy, as Tony had managed to highlight the most important parts of information.]

[With her eidetic memory, she would not soon forget a single flash, either.]


Impressive.

I am curious as to whether or not Extremis is built entirely out of technical code, or if there are any biometric recognition programs installed as well, that would further inhibit outside of those granted access?

Post a comment in response:

This community only allows commenting by members. You may comment here if you're a member of tushanshu.
If you don't have an account you can create one now.
HTML doesn't work in the subject.
More info about formatting