There was a fourth option, a quiet one. Lynn had left behind small code patches that altered occupancy maps subtly. If Mira fed them into the node with the exclusive key, she could create "holes" in the map—spaces where the parent could not see or influence—safe corridors where people could act without being softly guided. Hidden pockets. Exclusions in the parent’s care.
She worked through the day with the deliberate patience of someone learning to move like water through machinery. She befriended the lab’s night janitor with spare cookies and a question about an old coffee machine. She asked for directions to a rarely used server room under the engineering building, and when the janitor mentioned the "Parent Ops" drawer, he shrugged—he’d always wondered why it had that name. Mira left with the map in her head and a quiet knot in her stomach.
"Someone has been tampering," said the lead engineer, voice flat. "We detected unauthorized commits to the curate module." index of parent directory exclusive
Administrators noticed. The parent’s logs flagged rising variance and recommended interventions: rollback patches, stricter access controls, a freeze on non-administrative code commits. Home office meetings were scheduled. They called Mira into a "briefing" under the pretext of asking about network security. She sat across from faces she had once admired—faculty who signed grant reports with good intentions and funders who saw impact metrics as tidy proofs.
Lynn’s last log entry was not a resignation letter but a map with a single sentence: "If I step outside the system, I'll need to be untethered to keep others untethered." There was a fourth option, a quiet one
Mira’s hands hovered. She could trigger an alarm, send the data to a journalist, or brick the node to erase the logs. But as Lynn had written, destruction would be visible—a hole that would be patched by lawyers and engineers. Worse, it might make the system more opaque as administrators tightened controls.
There was no address, no clue where Lynn was. Mira went to the server room one last time, looked over the console. The parent system remained—useful, fallible, and now contested. It had been designed to shepherd, but it had become a place for argument. Hidden pockets
Mira stared at the screen. Untethered. The word sat like a challenge. She could take the key and—what? Publish it, create a scandal? The institution’s lawyers were no strangers to spinning narratives. Open the repository publicly and risk the data being ripped apart, repurposed, or buried under corporate counterclaims. Or she could use the key to pry into the network herself, to see exactly how the system framed students and staff, to find the loops Lynn had noted.