Integrated Emotional Binding

It was incredibly annoying to wait for Noname to scan the files on the hidden server. Bored with waiting, I began trawling a local Wonderland network to see if I could learn anything new.
The first five to ten pages that I looked at was just mindless drivel. A few articles about resource gathering in Wonderland, a political one describing the importance of resistance, a pity story about a family where she was a resistance fighter and he decided to work for the machines. (In the end, she accidentally shot him.) Getting discouraged, I started clicking through faster and faster.
Click, click, click, wait - go back! On one of the pages, a bold headline that said "Learn About Mind-Reading Chips" attracted my attention. Without hesitation, I followed it.
The article began by describing newly discovered chips that the resistance managed to steal from machines and which they hoped to one day reproduce. The chips were first found embedded into former human prisoners' heads and acted to connect humans to humans and humans to ... machines. The first type of connection was described in all possible aspects: for instance, a mother could connect with her child to know in-depth how he or she felt. In other scenarios, couples connected via one of these chips were discovering something new in their relationships; they called it "integrated emotional binding." The second type of connection, between humans and machines, was scarcely explained at all. It seemed a bit shady that this article would omit the part where enemies were forced to be mentally in sync with one another. Why omit the part that we were all fighting to prevent? Aren't there enough secrets in this place already?
I wondered if there was a history available for this page. Fortunately, there was a log of all changes to this article for the last 5 years. There was quite a bit of material, but the most significant change appeared to have happened the day before I first arrived at Wonderland. It was titled "Final cleanup." I opened it, eager to catch every word.
Of course, I should have known that getting any useful information wouldn't be that easy. There was protection on the change log. It required knowing something, called " inheritance ." The only thing left to do was to search for that term in the system and learn enough to get access to the change log. The timing of the massive change couldn't be a coincidence, and I had a gut feeling something important was hiding in there.