volt versed in codes crypt
analysis of bytes forms
lines ___