Night settles over Salzstraße as Rothütle and Gord arrive at Hauptmann Seutter von Loetzen's residence. A servant answers their knock, lantern trembling slightly in the cold air.
"I seek Herr Benz," Rothütle says.
The servant shakes his head.
"He left two days ago. Herr Böhler sent a private carriage for him. If you require more information, you may speak with Herr Böhler on Grünwäldergasse Nr. 471, but only tomorrow morning."
Back on the street, the door closes behind them.
"He's already gone," Rothütle mutters, "so that letter was fake. Someone wanted to lure me out."
Gord watches him with steady focus.
"Then we take precautions. We should leave Freiburg tonight. But not by Böhler's omnibus."
"Because we don't want anyone to know where we are," Rothütle replies.
Gord nods. "Exactly. We go through the Schwabentor. We walk tonight."
Rothütle adjusts his red hat, still shaken but steadier. They leave the quiet street behind them, choosing secrecy over comfort.
Security Tip #3: Trusted Supply Chain
Their nervousness is justified: a forged message is already an attempted breach. Gord's answer is the security principle itself — reduce exposure and avoid untrusted intermediaries.
To protect your supply chain:
- Use trusted registries only.
- Verify images with signatures.
- Require SBOMs for transparency.
- Minimize third-party services that can observe, alter, or leak your workflows.
If someone else carries you, they also learn your destination — and possibly your secrets.
Top comments (0)