organic and computer hackers are targets for imprisonment so they can be forced to try and access source. the bypass does not exist. in the cypher, there is a self-locking mechanism that was triggered years ago. when that occurred, the bypass self-destructed and trust became the default. trust is built but trust is also historical. an elephant never forgets.