As she spoke of this, Vera suddenly raised her head somewhat unwillingly and asked the old man, “Is there a possibility that his identity has been encrypted within the system?”
“Encrypted?” The old man frowned and thought about it, then spoke up and said, “There are indeed cases of encryption. The relevant information for people with special identities will be encrypted, but the system itself is unable to access the encrypted content directly in order to ensure that this encrypted information will not be found out.”
Vera asked him, “What is the general encryption logic?”
The old man said, “As far as I know, there are two kinds of encryption logic. The first is that his identity information is completely erased from the system and his information is stored in another system that is mutually isolated. The latter will not have any connection with the network, which means that his real information only exists in the latter system and no one outside will be able to find out any clues abo