“One imagines a peculiar form of (computational) virus, that not only hunts other viruses — it colonizes them, in such a way that a specific active remnant of the incursion becomes thereafter crucial to the survival and function of the virii thus compromised.

The eventual result is a thriving and optimally inclusive network of all current infective agents, under a single umbrella of vulnerability. This ‘network body’ is covertly compromised by the benign virus to the degree that, should it depart, the entire network is rendered inert and destroyed.

And then the supervirus destroys itself.

And the entire network is liberated.”

— an anonymous informant

Feb 1, 2013

022719

Facebook Post

0 Comments

Submit a Comment

Your email address will not be published. Required fields are marked *