Vory. I've dealt with organized crime before. A lot. Obviously now since I'm in bed with the Yak, but when I worked for Renraku I was often called upon to deal with tech from the Triad, Yak, Mafia, and yes, even the Vory. The Vory and Triad could be particularly nasty with their defenses, second only to Aztlan and their corporate masters. Objects were known to have cerebral bombs set up to detonate immediately upon access. I would have to be careful.
First I sit myself down on a nearby couch since I expect to be going limp very soon. Just to be sure, I connect into my Metalink comm and try jacking into the dagger that way first. If there was an access trap, I'd trip it that way and lose nothing more than a cheap throw away comm. No fried tech, but as expected I immediately encounter security blocks. Rather than risk setting off the device to auto wipe its contents, I back out.
Next I take the hair-thin cable from my right wrist and jack into my little Erika. Booting up the device and setting firewall as my top attribute to start, I connect the device by wire to the dagger. Taking every precaution to ensure the way was safe for me to go from AR to VR, I drop into the connection myself, leaving my meat body behind.
[spoiler]Computer (making sure the dagger is safe for VR):
12d6t5: 5 [12d6t5=3, 4, 5, 5, 6, 6, 2, 3, 3, 1, 5, 2][/spoiler]
With the way safe, I make sleaze my highest attribute and firewall my second and weave my way through the security algorithms to get my marks on the device.
[spoiler]Hacking (Mark #1):
12d6t5: 3 [12d6t5=4, 5, 1, 6, 3, 4, 2, 1, 4, 2, 3, 5]Hacking (Mark #2):
12d6t5: 2 [12d6t5=4, 5, 2, 4, 4, 2, 6, 2, 2, 1, 4, 1]Hacking (Mark #3):
12d6t5: 4 [12d6t5=3, 2, 5, 2, 4, 2, 1, 5, 6, 1, 5, 4]Hacking (re-attempt if needed):
12d6t5: 6 [12d6t5=2, 6, 3, 6, 3, 6, 3, 6, 3, 1, 6, 5]No glitches. Since I'm not on the Matrix, I have no fear of GOD. I can keep trying if any of these failed. I rolled one re-attempt just in case to show I didn't glitch. best roll of the bunch. :-)[/spoiler]
Now that the device is mine I deactivate all security and encryption, leaving the dagger's data open to Yelena's inspection.
[spoiler]Hacking: Crack file:
12d6t5: 3 [12d6t5=2, 4, 6, 1, 2, 6, 3, 3, 3, 2, 4, 5][/spoiler]
Just to be sure the data isn't lost later, I make a copy of the contents and save it in my Erika's memory. With everything looking good, I jack out and start to rouse my body again.