Admin System | Update Log #1
Employee: 41316578407261-P
Date Submitted: 2025-03-21
Following recent integration of additional technology into our backend infrastructure, it has been determined that an overhaul of core administrative systems is necessary.
The purpose of this overhaul is to minimize data leakage and streamline data access by authorized Apeiron employees.
Admin System | Update Log #5
Employee: 41316578407261-P
Date Submitted: 2025-03-23
This update constitutes a basic reconfiguration of the admin portal rendering system, allowing for visual access to the core subsystems.
It has been requested, as part of this update, to include a cosmetic modification that adds a spinning effect to the company logo. As asserted in my preliminary assessment, this requires unnecessary computing power that could be more effectively utilized elsewhere; however, the determination has been that the perception value of this change outweighs other considerations.
Admin System | Update Log #7
Employee: 41316578407261-P
Date Submitted: 2025-03-25
This update increases the automatic storage of surveillance data, so updates can be synced automatically without waiting for scheduled intervals. It is important to note, as detailed in my assessment, that increased accumulation of data from this update may result in issues with storage in the future.
My initial proposal included a routine that regularly screens for and removes irrelevant data to prevent burdens on system storage. The minimal risk of accidentally deleting footage that “may become relevant at some point” was deemed unacceptable, however, and it was determined that we can depend instead on this issue being resolved in the future “if it becomes a problem”.
Admin System | Update Log #9
Employee: 41316578407261-P
Date Submitted: 2025-03-27
This update partitions access to subsystems for different areas. It was determined that the previous system of automatically detecting authentication based on a signed-in user’s authorization class was insufficient, and that instead each sub-system should require unique authentication.
Due to encoding constraints, authentication codes are limited to lowercase characters. This update includes a method to issue random strings of letters as authentication codes and disseminate them to authorized employees at regular intervals.
Admin System | Update Log #12
Employee: 41316578407261-P
Date Submitted: 2025-03-28
This update adds selective compression to incoming surveillance data, encoding files in a lossy format with compression levels based on determined relevance. This approach should allow “irrelevant” data to remain accessible while taking up comparatively less storage space and mitigating the issue outlined in Update Log #7.
Admin System | Update Log #13
Employee: 41316578407261-P
Date Submitted: 2025-03-28
This undoes the changes from the previous update. I have been informed that my compression solution is not acceptable, and have been reprimanded for implementing it independently before hearing back from proper approval channels.
Admin System | Update Log #16
Employee: 41316578407261-P
Date Submitted: 2025-03-31
This update rolls back the creation of random authentication codes, to be replaced by manually determined single-word passcodes.
I was informed that the randomized codes would be “too hard to remember” and that using words provides the opportunity for passwords to be “relevant to company values”. I pointed out that plain-text words are not secure, being relatively easy to guess, but was told that my pattern of expressing concerns is becoming an issue and that my role is to implement the designated changes without question.
Admin System | Update Log #21
Employee: 41316578407261-P
Date Submitted: 2025-04-01
This update adds final modifications and implements a schedule for bringing the new system online.
My personal assessment is that this set of updates is not yet ready for deployment. As I have been running tests over the last few days, I have found traces of what appears to be unidentified code running alongside the core system, which is yet another potential cause for concern. I have been told, however, that I should disregard any irregularities that are not directly relevant to my work.
Apparently it is “important that the new system be deployed on schedule”. Just like it’s important that the passwords be company-relevant. Just like it’s important, for some unfathomable reason, that we never delete anything ever.
And that the logo spins.