PREVIEW
... ught to himself, his gaze unintentionally landing on Xiao Qimo beside him, contemplative.
During his musings, he had already sent the mission packages to each commander’s computer.
These were encrypted mission files with specialized processing, each commander possessing a unique verification code known only to them. By entering the code, they could access the information within.
The files were set with a ‘self-destruct after reading’ function, meaning that each person had ...
YOU MAY ALSO LIKE