volt versed in codes crypt
analysis of data
bytes code base ___