The hacker

The hacker

One application gave him power.

Chapter 1 by SioDerSio SioDerSio

This story is a literal translation of my own German story "Der Hacker". I appreciate it if you point out bad English in my text, it's not my native language and I'd like to improve my story.

The keyboard clacked, Thomas stared at the computer screen as if spellbound. The instant noodles had already gotten cold, his cola just tasted stale, he hadn't closed the lid. His eyes burned like hell and his head ached. It had to be possible.

Another line of codes flowed from his fingers, another one, he easily understood all the things he was doing. Sure: Thomas lacked some basic skills. He wasn't sporty, but rather an overweight leek, he didn't have much general knowledge, and his social skills were minimal, but what he could do was use a computer and unlock its full potential.

He paused for 10 seconds. 3:35 AM, and he had to wake up early for school in two days. But he was captivated, he had had a very precise brainwave for a program that no one in the world had ever managed to create.

He was so exhausted, he felt like a dead man. Thomas hammered the last line of code. He dropped backwards from the gaming chair into bed and was already half asleep while falling.

It was 11:30 am when Thomas opened his eyes. Without hesitation, he got up. He was so close to reaching his dream. He turned on the computer again. He downloaded his program onto his jailbroken smartphone using a USB cable, his hands were sweating and shaking, his heart was pounding like a hard techno track.

He pressed the app icon, which was a simple T. "Talcontrol". Perfect. That was the name he gave this app. Had he done it? Did he just develop an app with which he could penetrate any smartphone and collect all of the data? The menu looked exactly as he designed it. "Start Intrusion" should start the attack. The rest of the buttons were gray because he wasn't connected yet. "Transfer data" copied data from the hijacked device onto Thomas' phone and vice versa. "Write message" placed a message on the victim's device. "Wipe data" gave him the option of deleting individual or all files from the victim's cell phone. "Control device in spectator mode" and "control device without spectator mode" finally gave him the opportunity to navigate through the device via the surface as the owner could, with the spectator mode allowing the victim to see how the changes took place, while the second mode gave no indication of the intruder to the victim. Last there was a "Spectator" mode, in which Thomas could watch the victim operate his device without him being able to intervene.

Now all Thomas had to do was test the device ...

Who was his first victim?

Want to support CHYOA?
Disable your Ad Blocker! Thanks :)