The network graph instantly flattened. The latency dropped. The VOIP phones chirped back to life.
He pulled the packet capture. He expected to see encrypted uTP or µTP traffic. Instead, he saw a flood of HTTPS requests to a legitimate cloud storage CDN. GET /video/segment_001.ts . POST /upload/cache_chunk . It looked like a Netflix stream. It looked like a Zoom call. Blacklist Torrent
Marcus had two choices. He could throttle all HTTPS traffic to 1 Mbps, which would break the entire university’s ability to use the internet. Or he could find the machine. The network graph instantly flattened
Whoever was running the node wasn't a student downloading "The Batman." This was a professional—or a very clever researcher. They were using WebTorrent , a protocol that tunnels peer-to-peer traffic inside WebRTC, masking it as standard HTTPS web traffic. To the blacklist, it was invisible. To the firewall, it was a saint. He pulled the packet capture
He swiped his badge, walked through the silent corridors, and opened the rack. A tiny Intel NUC, plugged directly into the core switch. No label. No work order.