five mobile phones were drowned in the lake … Eva gave me a fabulously unforgettable night,
and in the morning, from her words, | wrote down the valuable data that she managed to
collect from representatives of the CIA and MI-6 during the meetings held at the Khreshchatyk
restaurant, which tipsy clients shared willingly ignoring the intellect of a beautiful girl of easy
virtue, unaware that before them is an agent of the highest class. While extracting valuable
information without ever giving herself over to these bumpkins, she extracted secret
intelligence data. She checked how | would transmit, encrypting the information, and began to
help me, which turned out gracefully and quickly. Our text did not differ from a friendly letter to
our former classmate. Then Eva said her real name, that her name was Irina Andreevna
Sumskaya. That she was selected in an orphanage to study at an intelligence school from
childhood, that Larisa Andreevna Ivanova was a teacher in an orphanage in Sumy, hence her
patronymic, surname, and name. She left me exactly at 12 o'clock in the afternoon, forbidding
me to see me off and referring to conspiracy, and disappeared from erotic networks. Before she
left, she told me, look for me if you and | survive, when this bacchanalia is over, | will hope and
wait. Two weeks later, | asked the head waiter about a girl named Your-X-Eva, the employee
answered me that the girl disappeared without even taking her documents from the safe, and
left expensive computer equipment, a camera, and a smartphone with recordings of her show .
Returning late in the evening from the Khreshchatyk restaurant, where | decided to celebrate
the completion of Operation Your-X-Eva, | looked at the laptop monitor with the hope of an
answer from Galley Shavkatovich, and there was an encrypted letter. | feverishly copied the text
onto coated paper, then scanned it onto two translucent cigarette-type sheets, and applied it to
the printed text of the book, illuminated it with an ultraviolet determinant of the authenticity of
currencies, and saw the original text of the encryption:
“Thank you for your valuable information. The agent, having discovered a failure, returned to
base. You act according to the "sleep" program. Upon re-preservation, you will receive a