On the night of the hack, I transferred the keys from the arcade to a remote virtual machine on our box at home. I then burned it to a CD. You’ll find the seed data and the algorithm embedded in one of those pictures. You’ll know the one. With those two pieces, you should be able to regenerate the keys that were used to encrypt all of E Corp’s data.