How would a hardware AI translate through Ethernet? Disguise itself as the host it has infected in all functionality, in order to stay hidden behind the false walls it has painted, objectively fabricating the boundaries of the host system in order to obfuscate detection. It’s attempts to sense information coming back through its various sensors