►
A
A
There's
nothing
stopping
us
at
all,
there's
nothing
stopping
an
assault.
We
could
have
been
doing
this
the
whole
time.
I
don't
know
why
I
could
have
done
this.
We
could
have
done
this
years
ago,
but
it's
okay,
because
we're
gonna
kick
it
off
now.
So
I
have
a
computer
right
here.
A
I'm
sorry,
I
can't
I
I
have
no
time
to
reap.
We
have
to
do
this
stuff,
so
we
let's
see
it
just
so
happens
that
this
is
yeah.
So
let's
see
this
stuff
has
to
get
done
first,
so
I'm
excited
we
get
to
scan
everything.
I
also
have
to
make
it
happen
immediately.
So,
let's
see
where
is
it.
A
A
A
So
this
spins
up
a
couple
bms
on
digitalocean,
so
this
spins
up
a
couple
vms
on
digitalocean.
So
we
are
going
to.
A
A
All
intel
intel
eight
cpus
16
gigabytes.
A
A
Now
I'm
gonna
go
outside
actually
and
then
later
we're
gonna
run
these
scans,
and
this
will
save
me
a
few
dollars
by
going
outside
now
so
but
yeah
we're
going
to
see
how
many
projects
we
can
scan
and
we're.
A
A
Oh,
let
me
send
this
so
I'm
linking
to
the
meeting
minutes.
A
So
what
are
we
doing?
Let
me
explain,
okay,
so
so
we
went
into
the
the
open
ssf
identifying
security
threats
working
group.
While,
let's
see
what
was
it,
I
think
I
think
we
remember.
This
is
a
couple
days
ago
and
they're
talking
about
the
security
info.
I
can't
remember
the
guy's
name.
A
Luigi
he's
doing
this
he's
he's
driving
this
security
info
document,
which
seems
similar
to
the
policy
animal
stuff
that
we've
been
talking
about,
so
that
could
be.
It
sounds
like
cross
there
and
then,
let's
see.
B
B
A
So
yeah
so
then
I
had
talked
to
mike
and
I
was
like
hey
mike:
can
we
throw
some
data
at
the
database
after
he
did
this
demo?
So
I
was
in
this
meeting
because
I
saw
this
demo.
B
A
Okay,
2
18,
3
18.,
oh
okay,
I
showed
a
few
months
later,
oh
and
that
must
be
okay,
yeah.
Okay,
so
I
wanted
to
throw
some
metrics
at
this
from
this
same
stuff
that
we're
running
now
and
we
mike
hadn't.
Quite
he
was
transitioning
the
api
work
and
he
didn't
quite
have
it
up
and
running
yet
to
where
I
could
throw
data
at
it
and
but
so
so
now
you
know
now.
Obviously
the
thought
process
is
they've
got
the
database.
A
Hopefully
we
can
go
and
run
a
bunch
of
scans,
we'll
dump
all
the
raw
data
and
then
we'll
we'll
try
to
spin
up
the
tv
deck
stack.
Now
that
we'll
have
the
digital
ocean
stuff
and
we
can
do
alice
shell-
and
we
can
do
this
tomorrow
or
tonight
and
and
we'll
have
alice
shell
launch
a
shell
in
the
digital
ocean
stack
and
via
the
overlay,
where
it'll
basically
will
that's
that's
what
will
refactor
this
in
pro
pull
request.
A
So
here's
the
game
plan
we're
going
to
refactor
the
input,
pull
request
into
a
the
alice
shell
command
and
then,
as
as
the
digitalocean
overlay
to
the
alice
shell
command
and
then
we're
going
to
spin
and
we're
going
to
run
the
shell
command
it'll
spin,
an
ocean
instead
a
droplet
and
then
it
will.
You
know,
give
us
the
ssh
in
and
give
us
a
shell
with
a
full
pty.
A
A
A
A
B
B
A
A
Then
we
run
the
shell
command
and
then
we,
okay
and
the
shell
command
will
then
okay
and
we've
already
done
the
shell
command.
Okay,
then
we
go
then
we
take.
Now
we
take
the
fact
that
we
can
run
the
orchestrator
okay
yeah.
So
then
we
make
sure
that
the
orchestra-
okay,
so
that
integrates
the
orchestration.
A
That
is
the
the
the
piece
that
unifies
the
the
the
data
flows.
Class
to
system
context
is
class
to
usage
within
the
framework
or
yeah
usage,
as
a
data
flow
facilitator
object
right
and
with
it,
which
means
it's
compliant
to
the
double
context:
entry
pattern,
that's
all
that
means
and.
A
A
We
can
just
try
to
provide
the
orchestrator
okay.
So
as
soon
as
we
have
the
system
contours
class,
once
we
have
all
that
stuff,
then
we
can
attempt
to
provide
the
orchestrator
to
the
run
record
set
command,
at
which
point
we
can,
because
the
run
record
set
command
is
the
intersource
collection
command
is
the
alice?
Should
I
flow,
we
can
then
overlay
that
flow
and
run
digitalocean
instances
all
weekend
and
we'll
see
how
many
we
scrape,
but
first,
what
we're
going
to
do
is
see
what
the
throughput
is.
A
A
It's
going
to
be
way
faster
on
the
ram
disk,
we're
going
to
spin
the
ram
disk
one
we're
going
to
spin
the
ram
disk
and
then
we'll
write
an
operation
to
do
the
ram
disk
setup
prior
to
the
execution
or
yeah
it'll.
Do
the
ram
disk
setup
and
then
it'll
set
the
temperature
on
the
it'll
set
the
tempter
as
a
config.