Chapter 74: Setting up system: LISA
Note: This Chapter contains a little info dump, but it’s recomnded not to skip it as it’s related to the foundation of the system and core power of MC.
*************************************************************************************************
Rohit stord into Ragini’s room. He wasn’t thinking much; he just wanted to comfort her, but soone else had already occupied the space.
Arya sat huddled close to Ragini, one arm around her shoulders, the other hand gripping hers lightly. Ragini herself was curled on the bed, knees drawn to her chest, face pale and drawn. Both won startled at the sudden intrusion.
Arya was the first to break the awkward silence. "What do you want?"
Rohit felt his throat tighten, but he moved closer and sat beside her on the bed.
He took her hand in both of his, holding it firmly. Ignoring Arya completely, he t Ragini’s eyes and said quietly, "Listen mom.."
"What those outsiders said doesn’t matter. It changes nothing about us."
"It was you who ca to the hospital to see , you who sacrificed so much for my treatnt. It was you who introduced
to the world outside, who gave
the umbrella to embrace glory and fa. That ans more than I can put into words."
Ragini bit her lips, a faint smile forming despite her tears finally flowing out. Finally she was acknowledged for all her efforts but hesitated, unsure how to respond, as if afraid that any word might shatter the mont.
Rohit let his gaze drop, recalling all the past incidents he didn’t rember fully but had witnessed—the devotion, the quiet sacrifices. "Sure, I don’t rember everything," he admitted softly, stepping closer and cupping her cheeks, "but I have seen your genuine care. Blood ties or not, you are still the woman I admire, respect, and love. So please... don’t take their words to heart. You are and will be my sweetheart."
Arya, seated a little away, blinked, her jaw dropping at being completely ignored. "Hey... I’m still here. We don’t need—"
But Rohit cut her off mid-sentence, addressing her directly. "And thank you, sis, for taking her side. I’m also glad you ca to the hospital."
At this point, Rohit figured, Arya was the key not to be taken lightly. Surely, making surface relations would serve him in the long run. Poking her would only make her cling to Ragini more, which he wasn’t enjoying one bit.
Arya scoffed. "Don’t bother. I ca because of Mommy."
Rohit smiled. "And that’s enough for . Thanks. "
With that, he left.
Arya’s gaze followed him, her lips curling into a sardonic smile. "Weird kid... butting in where it’s not needed," she muttered, then leaned toward Ragini. "Mom, have you noticed? Rohit seems... different. And why does he look so obsessed with you?"
Rohit, on the other hand, went straight to his room. He had never felt this emotionally attached to anyone in decades. He paced around his room, thinking of ways to improve the situation.
Finally, he sat on the bed and reached a conclusion: he needed to hack into people’s lives and bend them to his will. Information was power, and secrets were leverage—the kind that made people surrender.
Today it was the twins. Tomorrow, it could be anyone. He had to think long-term, not chase short-term gains. His future goals demanded it. For now, his priorities were simple: build a network, raise funds—and hacking would be at the core of it.
In his past life, after Keita and Ayane died, he and the remaining team completed the deal with the Chinese and collected their share. He had even volunteered to assist with the research and developnt of the Chinese re-engineered AI over the next two years.
From that work, they gathered intel and blueprints and hired professionals in parallel to create their own copy of EL0S, which they nad ELISA. Apart from that, they also had the advantage of access codes for NATO’s EL0S, which they’d faked as destroyed during the deal with the Chinese.
Their new AI was so powerful that, with its applications, they were able to bypass many firewalls and hack into servers undetected. Its efficiency was so high that its bots could operate as independent agents, managing tasks nearly ten tis faster than normal ones.
The best part was that it could write its own automation scripts to remotely run software or execute other commands digitally. Even captchas could be analyzed. That alone brought it close to being the most sentient digital entity.
However, any AI needs training, and so far they had only managed to train ELISA to generate plugins and a few remote jobs that suited their needs.
The best part of ELISA was that it had been built as a sentient system by core—one capable of adhering to its master’s will and taking real-ti action based on its training to fulfill its master’s needs. It was completely personal, unlike comrcial AIs with limited mory and restricted abilities.
That was how they had hacked into a Hong Kong bank’s data servers, the Chinese general surveillance network, and even penetrated the Japanese PSIA headquarters—all before the recent COVID pandemic.
If he wasn’t mistaken, their homade server was still running operations from Taiwan, Li’s ho country, which was relatively secure from Chinese and Japanese authorities.
There was a risk, however. If he accessed the ho server remotely, his old friends might notice his presence online—they had designed it together. Getting caught would an direct execution. He had no desire to fight them or try to explain sothing as absurd as transmigration. They wouldn’t believe him anyway. It would only end in blood.
After weighing his options, he chose a lower-risk route. His other friends weren’t as technically capable and would likely stick to generating plugins and taking data assistance, so he could hack in through a backdoor to log in as an autonomous guest.
Fortunately, the AI was restricted from viewing the server logs, so he could gamble that his presence wouldn’t be easily discovered by them.
With that decided, he pulled out his phone, inserted his newly registered SIM, and powered on his new laptop and connected via mobile data.
He logged into his private website, entered the password, and passed a series of security questions and riddles personally set by him. Satisfied the site unlocked.
Three versions appeared in the download nu:
[ELISA_clone_version_ready_2017]
[Elos_clone_version_root_2016]
[Elos_access_mod_remote_2014]
Rohit hesitated. Since India relied heavily on ta services, using EL0S would be tempting—but he suspected EL0S supervisors might have remote counterasures that could flag access from a non-sponsored country like India. Worse, EL0S was nearly a decade newer; the risk of detection felt higher.
The 2017 ready version was upgraded and actively used by his forr teammates. Logging into it partially was possible but he wont be able to gain full acess due to authentication protocols. Further it risks getting caught by Elisa herself.
So he chose the 2016 root version and reconfigured it under a new na: LISA(Linguistic Intelligent System Assistant). Fortunately, it was never used and yet to be authenticated.
Under Add-ons, he set the training modules across all three tiers—basic, interdiate, and advanced—then selected basic and let it run in background. This initialized a clone AI on his laptop, with its root AI server running and upgrading in Taiwan 24x7.
The basic training completed in ten minutes only. It was also one of its perk, as comrcial AIs drag for days or weeks due to safety layers and ethical constraints. Lisa skipped all that, allowing rapid, efficient learning through its custom-built filters that help it diagnose and digest.
A green dialog box appeared and ran a scan, blocking multiple data-stealing malware protocols linked to ta services. Then the screen shifted to a hopage ssage:
[Hello, host. Camouflage feature enabled.]
Since the AI was only on basic training, chat communication was enabled; video and audio functions would unlock after layered training.
Other than that, it had another default feature: camouflage, which allowed it to hide its presence automatically once launched.
Even so, it did a remarkable job of blocking data-stealing or suspicious behavior from third-party ta services that typically ca online by default, all without hampering normal services. With this in place, Rohit’s laptop beca the most secure device for his activities.
Soon, another ssage appeared.
Since the next step was binding, he received another prompt:
[Hello, host. Please scan your eye for binding authorization.]
The original EL0S had been designed to be subservient to its master, chosen either by heartbeat authentication or retinal scan before the very first launch. The first option required specialized hardware, so he opted for the second — riskier, but viable as an ergency thod.
(A/N: Since eyes can be stolen.)
Rohit leaned toward the laptop cara. After a few seconds, another ssage appeared:
[Binding with host successful.]
[Please assign host a na.]
He typed his favorite choice.
Chief.
Another ssage followed:
[Welco, Chief. Lisa at your service.]
This baby version of Lisa functioned as a generic application, installable across Windows, macOS, and Android. He swapped his old SIM into the iPhone and set it aside to charge, then installed Lisa on his Android as well—isolating his communications from surveillance.
Next, he started the interdiate training, which would take about twelve hours across twelve phases. However, it would beco partially accessible after one hour, while the rest continued in the background.
With that ongoing, he moved to the next step.
Since his first target was the twins, he decided to hack them first. He checked their Facebook profiles: Tanya’s was private, so he tried the other cousin, Aisha. Surprisingly, Aisha had an open account.
After scrolling, he discovered Aisha’s professional account. She was a social influencer who did bitcoin trading and affiliate marketing for pocket money.
And she’d listed her phone number for DMs.
A smile crept over Rohit’s face. A personal phone number is a hacker’s key. It was an irony that, despite being cousins, they didn’t have each other’s numbers; their relationship was that sour. That problem seed solvable now.
He went back to his private server, and under "Add-ons," he scrolled past chat modules and scrapers to a compact library of pre-tested exploits — small, proven scripts his crew had used many tis and shelved.
He downloaded an SMS-phish template and a micro-exploit payload as an add-on, patched to his locale.
After installing the required SDKs, he ordered Lisa to reconfigure the code into malware capable of compromising Android devices through a single click. Unlike current public AIs, Lisa was unhinged and produced the necessary scripts in seconds.
He copied the link, pasted it into the SDK, did minor edits for data binding, and embedded the bug into a ssage inviting Aisha to a Zoom-style eting for a collaboration. For that, he created a fake profile with Lisa’s generated image and text-generated content and sent the invite.
Now all that remained was waiting.
An hour passed, and phase one of Lisa’s interdiate training completed, unlocking the partial access he urgently needed. As he checked the logs, a familiar female voice called his na, breaking his focus.
"What are you doing? Is that so server stuff?"
He turned around in panic, and it was his second sister, Arya, standing at the doorway with her bossy hands on her waist, trying to figure out his situation.
*************************************************************
A/N: The technical details are intentionaly morphed and wrapped to keep it genre driven.
Reviews
All reviews (0)