Hacking Meridian’s shadow servers was a theater of mirrors. Firesheep IPs, thumbdrives in dumpsters, and a late-night meet with a courier who’d once been a node in the network. Her VM looped data until dawn. She found a master ledger: usernames, wagers, payouts, and a column labeled “Disposition” with single-word verdicts—Settle, Ghost, Neutralize.