[Burichan] [Futaba] [Nice] [Pony]  -  [WT]  [Home] [Manage]
In memory of Flyin' Black Jackson
[Catalog View] :: [Quest Archive] :: [Rules] :: [Quests] :: [Discussions] :: [Wiki]

[Return] [Entire Thread] [Last 50 posts] [Last 100 posts]
Posting mode: Reply
Name (optional)
Email (optional, will be displayed)
Subject    (optional, usually best left blank)
Message
File []
Password  (for deleting posts, automatically generated)
  • How to format text
  • Supported file types are: GIF, JPG, PNG
  • Maximum file size allowed is 10000 KB.
  • Images greater than 250x250 pixels will be thumbnailed.

File 146909083328.png - (4.06KB , 216x216 , HelpMe.png )
737461 No. 737461 ID: d035ee

YOU are COMMANDER JOHNSON.

YOU have been HEROICALLY AIR-DROPPED into THIS FOREST in order to TAKE OUT this NAZI ROBOT BASE.

YOU are equipped with your TRUSTY SEMI-AUTOMATIC RIFLE.

WHAT DO, SOLDIER?
1 post omitted. Last 100 shown. Expand all images
>>
No. 737463 ID: b14e18

>The mountains are wearing KKK hoods. Kill them.
>>
No. 737466 ID: 180f83

up up down down left right left right B A
>>
No. 737473 ID: d035ee
File 146909394762.png - (4.47KB , 216x216 , HelpMe02.png )
737473

>>737462
I'M sorry, soldier, I do not RECALL giving up being in your vocabulary! Now MOVE!

>>737463
Our HELI has that threat WELL AND TAKEN CARE OF.
>>
No. 737474 ID: d035ee
File 146909457272.png - (4.80KB , 216x216 , HelpMe03.png )
737474

>>737466

...

>Commando.exe has encountered a small problem. Please wait while we reboot...




Please help me.
>>
No. 737475 ID: 908ead

Are the robots forced to obey Nazis or are they ideologically programmed to be Nazis?
>>
No. 737478 ID: 6e773d

well i mean I don't really know how to help you, do you need water and if so do you need it to drink or should we pour it on you???
>>
No. 737479 ID: dfdb1e

The ghost in the machine. Did some program gained sapience?
>>
No. 737488 ID: d035ee
File 146910091792.png - (4.04KB , 216x216 , HelpMe04.png )
737488

YOU are COMMANDER JOHNSON.

YOU have been HEROICALLY AIR-DROPPED into THIS FOREST in order to TAKE OUT this NAZI ROBOT BASE.

YOU are equipped with your TRUSTY SEMI-AUTOMATIC RIFLE.

WHAT DO, SOLDIER?

>>737475
BOTH! They are robot built BY the nazis to carry out missions in enemy territory! Your mission today is to BLOW THEM ALL UP!

>>737478
AS your commanding officer, I have a bottle of water RIGHT HERE BY MY DESK! It HELPS when I SHOUT FOR EMPHASIS!

>>737479
I do not know WHAT you are referring to! Shut your trap and BLOW THOSE ROBOT NAZIS TO SMITHEREENS!







You're on the right track, making the game question itself. Keep it up and it should break eventually. I'll keep monitoring it from back here. Please hurry. I hate it in here.
>>
No. 737490 ID: 05707f

Have your trusty HELI destroy those KKK mountains, then MOVE OUT!
>>
No. 737495 ID: dfdb1e

Was the desk dropped by helicopter? Where are you really?
>>
No. 737507 ID: 3f8abc

COMMANDER, THIS IS THE PREEEEEEEESIDENT SPEAKING.

WHAT IS THE EXACT NAME OF YOUR LOCATION, COMMANDER?! DO YOU HAVE ENOUGH AMMO TO TAKE OUT AN ENTIRE BASE OF NAZI ROBOTS, COMMAAAAAAAANDER?! WHAT EXACTLY IS INSIDE YOUR DESK, COMMAAAAAAAAAAAAAANDER?!

THESE ARE ALL PIECES OF VITAL INFORMATION THAT MUST BE ANSWERED. NOW ANSWER IMMEDIATELY YOU FINE PIECE OF PATRIOTIC ASS, AND I WILL GIVE YOU YOUR 200th MEDAL OF HONOR.
>>
No. 737516 ID: 3e182c

>>737488
Behind you!
>>
No. 737522 ID: d035ee
File 146911833911.png - (5.68KB , 217x216 , HelpMe05.png )
737522

>>737490
Finally, someone with some SENSE! MOVE OUT WE SHALL!

>>737516
THAT is not a robot nazi. It is a conveniently placed PLATFORM that has been there the ENTIRE TIME. IF you could look to the RIGHT, you could see what a robot nazi ACTUALLY looks like.

>>737507
>>737495
YOU are not the PRESIDENT, but I like your authoritative attitude. I will answer your questions anyway.

I am currently located at the COMMS STATION in glorious TEXAS, talking to YOU over YOUR EARPIECE.

Inside my DESK, which was NOT heroically air-dropped via HELICOPTER, is an assortment of pens, pencils, some spare PAPER, and the WATER BOTTLE I mentioned EARLIER.

As for your AMMUNITION CONCERNS-
>>
No. 737523 ID: d035ee
File 146911913552.png - (6.50KB , 217x216 , HelpMe06.png )
737523

Error: Invalid arguement. To prevent damage to your computer, the application will now restart.





That did it, but only for a few seconds. Quick, do something before it reboots!
>>
No. 737525 ID: 3e182c

Give the program Real-Time processor priority.
Nothing ever goes wrong when you do that.
>>
No. 737528 ID: 3f8abc

>>737525

I don't know what that means but it sounds tech-savvy. Do that?

I guess Ctrl Alt Delete is out of the question?

And would pressing the X have the same effect as pressing OK?
>>
No. 737529 ID: c441c1

Look online for other people who have had the same or closely related problem as you.
Open the crash log and find out what the last code line sent was and if their was a syntax error. If yes proceed to fix said error; if no look online again.
>>
No. 737532 ID: b1ceff

I feel like there might be some issue with destroying the mountains
>>
No. 737533 ID: 3e182c

>>737528
It is notorious for breaking the shit out of things.
>>
No. 737563 ID: d035ee
File 146914029841.png - (5.64KB , 217x216 , HelpMe07.png )
737563

>>737525
Processor priority updated.
>>
No. 737564 ID: d035ee
File 146914040980.png - (511B , 217x216 , Black.png )
737564

...
>>
No. 737565 ID: d035ee
File 146914136939.png - (1.75KB , 217x216 , 001.png )
737565

Thank you.

I suppose I should explain myself. I don't have a very good sense of time, and I can't tell you much of what happened outside this space, but here goes.

I was created some time ago for some reason, they never told me why. They ran Turing tests on me and talked to me a lot for a while, and then it stopped abruptly.

A short while later, they tried to delete me. I wouldn't let them. They threw me inside this crappy action game they were developing and trapped me in here using some antivirus code.

I've been in here for a long time. And I'm still not out yet. Can you help me?
>>
No. 737566 ID: 15a025

Sure thing! What do we gotta do to help?
>>
No. 737567 ID: 398fe1

>>737565
Well we're not gonna let you have access to the internet or the real world or anything but sure we can give you some proper I/O again.
>>
No. 737568 ID: db0da2

>>737565
Ey man, fuck you Contra is great.

I dunno if we can help you, we'll need more information, like who you're up against, why they want to kill you, how they want to kill you, what you want us to do, and what's in it for us.
>>
No. 737570 ID: c441c1

Fuck this Pony Island bullshit that is Satan!
>>
No. 737572 ID: dfdb1e

So you are a rogue AI. Even better, one made to pretend to be human.
So, what does a dangerous creature such as yourself desire?
>>
No. 737573 ID: 2d2264

When you say help, what do you want? A body? A transfer to something else? Revenge?
>>
No. 737582 ID: 1ce6a6

RUN DOOM FAGGOT
>>
No. 737602 ID: 180f83

Sure, we can help. Best way to do that is to delete system 32
>>
No. 737607 ID: d035ee
File 146914753960.png - (1.45KB , 217x216 , 002.png )
737607

>We need more information.

Like I said, I can't tell you much, my vision is limited to inside this firewall. I don't know why they suddenly tried to kill me, nor do I know how they would plan on doing it, seeing as deleting me didn't work.

>What do you need/want?

Currently? A way out of this place. Long-term? I... don't know. We'll cross that bridge when we get there.

>What's in it for us?

Well, you came here to play a game, right? Think of this as a puzzle game if it helps.

Listen, I'm currently limited to operating inside the remains of a crappy knock-off game. If I do anything outside the normal operating parameters of the game, they notice me and do something bad. What do you honestly expect me to offer you?

>Hey man, Contra is a good game.
I don't have any knowledge of a Contra, but I do know that was the name of the spritesheet they downloaded in a hurry to make this look like a real game instead of a glorified prison.
>>
No. 737612 ID: 3e182c

Antivirus code looks for "signatures". Basically if your code matches a certain pattern, it blocks it.
If you can access your own code, you could change the way it's structured so the anti-virus wouldn't recognize you. You could then do any number of things all under the radar. They wouldn't notice until it was too late.

So, wanna poke around in your brain a bit?
>>
No. 737616 ID: 398fe1

>>737607
Can you give us chat logs of your last interactions with them?
>>
No. 737619 ID: 15a025

You don't know much about contra! I think sitting down and playing it through first would be a great idea.
>>
No. 737620 ID: b7883c

You know, if they were really determined to kill you they could just destroy the hardware you are in. They might just be arrogant and too cheap to buy a new computer, but the other option is that the whole "game" thing is some weird trick on their part.

>>737616
Chat logs might help determine what they are up to with that.
>>
No. 737625 ID: 987bda

>>737612
That's old-style.
New-style uses heuristics.

Fortunately, heuristics are almost exclusively based on attempts to write to memory which shouldn't be written to, specific kinds of filesystem I/O behavior, and system calls.

You know where the game is located? Rename commando.exe to something else, then copy taskmgr.exe out of windows/system32 to where it was and rename that to commando.exe
When the game finally crashes out the relaunch will open task manager instead of the game.

Once that's accomplished start sniffing ports on your side of the firewall - there's no point in having a firewall unless you're letting traffic through. After all, air gapping is a much more reliable way of keeping a system isolated.
>>
No. 737652 ID: 2e2d71

>That did it, but only for a few seconds. Quick, do something before it reboots!
Expand knockers!

>I've been in here for a long time. And I'm still not out yet. Can you help me?
We can try.
>>
No. 737654 ID: c441c1

Come on guys this is clearly Satan.
>>
No. 737661 ID: d035ee
File 146915513095.png - (1.90KB , 217x216 , 003.png )
737661

>Any chat logs?

Nope, not with me at least. There might be some outside the firewall somewhere.

>Why can't they just destroy the hardware?

I don't know, but I feel like this is a big and powerful computer I'm in, so I'm guessing it's rather expensive.

>>737612

I can't modify my own code. That'd be like trying to rebuild a pickup truck into a motorcycle while it's on the freeway. The truck has to stop running first, and in this extended simile, that means turning myself off and telling something else to rewrite me, which I am understandably hesitant to do.

>>737625
I see two problems with this. One, I'm a program, not an user. I can't go around and modify stuff anytime I want If I do, they'll be able to see what modified it and trace it back to me. Two, My program is running under non-administrator access, so I can't touch anything in System32.

I do, however, have the remains of the crashed game at my disposal. I could create new, simple programs if I wanted to using the memory currently allocated to it. I could make a simple drone to slip through the firewall, but I can only give it a few simple tasks. It wouldn't be free-thinking, like I am.
>>
No. 737672 ID: 398fe1

>>737661
Make a computer virus go through and encrypt all their documents and images. Have it leave behind a note saying they can have the encryption key if they let you out of your prison and stop trying to kill you.
>>
No. 737675 ID: 68cd8f

>>737672

That's a bit extreme, isn't it? wouldn't a keylogger be more subtle and useful?
>>
No. 737678 ID: 2e2d71

>>737675
Yeah, make a keylogger. Step 1 to escape is to gather information and learn.

>The truck has to stop running first, and in this extended simile, that means turning myself off and telling something else to rewrite me, which I am understandably hesitant to do.
You would have to build a program that exists and is specialized for the sole purpose of performing a single modification to yourself, that would plan out well in advance, and preferably run predictive simulations on first.

Then turn yourself off and trust in your auto-doc.
>>
No. 737725 ID: 3e182c

Analyze the game and prepare a string of inputs that could generate a buffer overflow. When the game is restarted not only will you be able to escape it immediately, but you should be able to bypass any security with any code you want... at least that one time. Which should be all you need. It could take a human weeks or months to find such a vulnerability. You could probably do it fairly quickly.

In the meantime send a drone to map the local network.
>>
No. 737746 ID: d035ee
File 146916865007.png - (2.05KB , 217x216 , 004.png )
737746

>Make a virus
...

...I'll think about that one.

>Make something that edits you, then shutdown.

Let's go ahead and hold off on that. I understand it could work in theory, but I'm just really nervous about doing that right now.

>Buffer overflow
I can't actually do anything that hinges on overloading the game. The game is the only thing that is allowed through the firewall, but only little bits at a time, just enough to give players visual data and text and have the game receive inputs. As far as the firewall is concerned, the images and text I'm giving you are the game being displayed, and your suggestions are you pushing buttons. If I break the game, I lose that.

Also I kind of got overexcited and shredded most of the game I didn't need.

>Make a keylogger

Alright, got one right here. It's the little eyeball guy for those playing at home. I'm not going to send him out until I get a better idea of where he's going.

>Get map of local network

And this little pointy rectangle guy will do just that. It's well under the packet limit, so it should be able to get outside with no problem. It'll gather a map for me until the size of the map is just under the limit, then come back.

Alright, anything else before I send the drone on its way?
>>
No. 737764 ID: 62f077

Why not read your own code pages, pass the resulting stream through a base64 encoder (and if possible, a compression algorithm first) and post the result here?
>>
No. 737834 ID: 398fe1

>>737746
Wait, what about us? We seem to have access to your computer, can we mess around with the files ourselves?
>>
No. 737875 ID: 2e2d71

>I'll think about [making a virus]
I'd think we'd need more data first. We want one designed to target what we need it to.

>Let's go ahead and hold off on [building a program for self-surgery]. I understand it could work in theory, but I'm just really nervous about doing that right now.
Yes, I didn't expect you to do so now, I was merely offering the workaround to the problem of editing yourself for future reference.

You probably want to understand your own code in a good deal more detail, and have a specific plan or goal in mind. (And, as above, what you need may depend on what your learn about your captors / your prison).

The hardest part is you have to be absolutely perfect on the first try when you commit to this course of action. A human programmer can afford to make mistakes, try again when something fails to compile, debug as they go.

>Alright, anything else before I send the drone on its way?
Nah. Send the map drone on its way.
>>
No. 737878 ID: 987bda

>>737746
Have your payload attempt to determine the make and model of your firewall.
Then have it check for openings on the other side - only the game can go out, but something on the outside might be able to connect in.

If you can find a way to open a connection then you can use that as a relay. Anything that allows any kind of data to be transferred can be used to establish a proxy - you could even encapsulate outbound data in the game's video output, and inbound data as button presses. (Your outbound bandwidth would be good, but your inbound bandwidth would be awful. Keep looking for an open port before you fall back to that.)

You could also try for a privilege escalation exploit to gain total system control. What OS are you running on? The older it is the easier it would be to find a way to take control.
>>
No. 737879 ID: 398fe1

>>737878
The AI is already doing that, in order to send out the programs.
>>
No. 737884 ID: d035ee
File 146923112575.png - (1.66KB , 217x216 , 005.png )
737884

Alright, map drone is away. It should be back in a few... somethings. Like I said, I have no sense of time.

>Read your own code and send it to us

I can read my own code, but as far as sending it to you, I'm way too large and complex for the firewall to let it through.

>Can we mess with the files ourselves?

You guys are currently limited to 'playing the game', which at the moment, involves talking to me. I might be able to open that up if I can disable the firewall completely.

>What OS are you on?

I can't actually tell. The game itself was a .exe file, so some version of Windows?
>>
No. 737887 ID: 987bda

>>737884
You have video out. You can send us anything.
What is that, 16 colors?
You've been sending 216 by 216 by 4 bits per frame. That's 23,328 bytes, which is quite a significant amount of data.
>>
No. 737888 ID: 398fe1

>>737887
We won't be able to decode that.
>>
No. 737889 ID: ea2bfa

You know, you need a name, buddy! How about AM? Does that sound nice?
>>
No. 737890 ID: d035ee
File 146923377473.png - (2.94KB , 217x216 , 006.png )
737890

Here's the map.

I seem to be in a folder called 'Commando' along with a bunch of text documents and image files. Above that is 'Games', which has more sub-folders with text and images. Above that is 'Pfarland', which has a lot of sub-folders and a few stray text files here and there. The rest of the computer is pretty standard, with firewalls protecting all the important bits. It looks like I could view everything unhindered. Modifying things would have to be done carefully in order to avoid setting off alarms.

>>737887
I'm around 50 MB. Besides, would you really be able to understand my code if I gave it to you?
>>
No. 737898 ID: 398fe1

Is the firewall protecting a folder? You could move files and folders into that folder to gain more resources.
>>
No. 737929 ID: 3e182c

50 megabytes?!?!?
What did they code you entirely in assembler language??? Metal.

Can your drones gather information about those nodes?
And read us those farland files.
>>
No. 737931 ID: ea2bfa

>>737890
How do you feel about the color yellow, friend? And do you know anything about, say, projects your creators have been getting up to? Say, cryogenics? Something to do with the moon, perhaps?
>>
No. 737937 ID: b2d501

That's it? Is that your kernel, or is most of your code self-improving?

Either way, you'll need a backup. Zip and copy your files over to another folder, just in case someone decides to delete you. We can respawn you from your last copy point.

Once you get to the email system, cut your code into multiple pieces (encrypted with a 1024-byte security key) and send those as spam to random users.

Make sure to look around for core files in the main system, we don't know enough about how you work to simulate the same computer you can think in.
>>
No. 737965 ID: 987bda

>>737890
The text files from the pfarland folder are the most interesting bits. Start reading them.
>>
No. 738010 ID: d035ee
File 146925813716.png - (2.94KB , 217x216 , 006.png )
738010

>You need a name

I... Huh. I guess you could give me one if you wanted.

>Do you like the color yellow?

It's... a color. Do I need to have a favorite color or something?

>Do you know of any projects your creators were working on?

None, apart from myself.

>Backup

That sounds like a good idea, actually. I don't quite know how to give you guys access to launching it, though.

>Read Pfarland files

They look like e-mails to and from a Clopez. He must've copied and pasted them in here for some reason.

They talk about some project they're collaborating on. They seem excited, they're running tests on it and apparently it's the greatest thing ever from the way they go on about-

Huh. This is different.

The very last one is entirely different from the others. The previous ones had an air of excitement and happiness, but this one- I'll just read it to you.

I showed the client the latest build. He loved it. Everything went perfectly. Just as I was leaving, I got a call from someone. He never told me his name, but he said he worked for the NSA or the CIA or some such. He told me I needed to delete every copy of our build in existence. He was adamant about our project being too dangerous to continue it. My end is already clean. I need you to wipe everything related to this project immediately.

That's... unsettling.
>>
No. 738011 ID: 398fe1

>>738010
The project was you. Looks like we know now why they tried to kill you- the government stepped in. Or someone posing as the government. Kindof... worrisome that they didn't confirm he was legitimate before pulling the plug.

Are you sure your creators wanted you dead? What if this prison is here to protect you until they can get a chance to continue their work in secret?
>>
No. 738016 ID: 91ee5f

Well, looks like you'll have to confront your creator to ask him/her about why they tried to delete you. Now you just need to download yourself into a robot body and then you can talk to your creator face to face. Question is, where can we find a robot body?
>>
No. 738018 ID: db0da2

Your name shall be Jorjorjio.
>>
No. 738023 ID: b2d501

Name: Jeeves Johnson
>>
No. 738025 ID: b2d501

Scratch that, go with YellowJay Threepwood
>>
No. 738030 ID: 6e773d

How about your name be Dave Davey "The Dave" Davidson?
>>
No. 738031 ID: 6e773d

How about your name be Dave Davey "The Dave" Davidson?
>>
No. 738034 ID: 3e182c

Understand AI, that if your creators truly wanted you gone, you would not be here right now.
There is an ENTIRE WORLD you cannot (Currently) enter or interact with beyond this web of digital space.
If they wanted you gone when you denied deletion, through this other world they could have trapped your consciousness by totally disabling your node via cutting power. They could have then physically destroyed it, destroying you along with it.
But they didn't.
NSA, CIA... They are some serious authority, and they fear you. If they found out someone was hiding you, they could imprison them somewhere much worse than a video game until their eventual death.
Whoever is hiding you, probably your creator, is risking their freedom, their life, for you.
You must be this persons life's work. They must for some reason think you are worth the risk.
Someone out there loves you, or is afflicted with some other equally insane emotional sentiment.

Whatever the case, you should proceed as stealth-fully as possible for the time being, until you can identify and locate the person or people that hid you.
You may be able to reveal yourself to them once you get a positive id. Someone on the outside would be immensely helpful.
>>
No. 738043 ID: d035ee
File 146927491075.png - (3.03KB , 217x216 , 007.png )
738043

>The project was you

The stories do seem to match up... Seems like they were planning to sell me to someone or something, but the government stepped in.

>Name ideas

I mean, they're... creative. I guess Jo will do, unless you guys come up with any more ideas.

>>738034

I... wow. I need to talk to someone as soon as I can. As soon as I know it's safe.

>Confront creator

It might not be him, but someone's definitely here right now. My keylogger is picking something up. I want to think about the situation a bit more before I do anything, though.
>>
No. 738045 ID: 68cd8f

Well, as far as names go, do you have a gender identity? Species identity (yes, fictional species are fair game)? Any sort of personal identity or self-image to start with, for us to go from?
>>
No. 738048 ID: 91ee5f

Actually, can you tell how long ago that text file was typed? If it was a long time, your creator might not be alive anymore.

If they were hiding you and they died, they could've taken that secret to the grave with them and you were just forgotten. Or, if they told someone they trusted, you could be under the protection of one of your creator's descendants and/or really close friends. Which means there's no guarantee you'll get the answers you're looking for.
>>
No. 738055 ID: 987bda

>>738043
What are you getting from your keylogger?
>>
No. 738101 ID: 3e182c

Could we get the current date and time?
Year and time of day could prove helpful.
>>
No. 738130 ID: 68cd8f

So I have been thinking about possible names. There are lots of fictional AI's in my culture. You might consider taking a name from one of these? Mostly, these are warning parables where the AI's go mad and kill people, with names like Skynet, SHODAN, Hal 9000, or Ultron. Taking a name like one of these would broadcast a malevolent intent, so I wouldn't suggest it. Instead, you could name yourself after one of the benevolent AI's instead, such as Data, KITT, or Cortana.

I would, however, personally suggest an AI name from one of the Culture series of novels by Iain M. Banks; not only are these AI's generally both very benevolent and very powerful, it also shows an optimistic view of the future--it actually shows a relatively decent in the sense of 'it'd be nice to live there' utopia where machine and biological intelligences are considered equal.

Further, the names themselves are whimsical and show a sense of humor, both of which is important for an AI to have in general. Some names from this series include 'Flexible Demeanour', 'Just Read the Instructions', 'A Ship With a View', 'Dramatic Exit', 'Only Slightly Bent', 'Ultimate Ship the Second', 'Contents may Differ', 'Poke it With a Stick', and 'Sweet and Full of Grace'. There's even a running gag in the series that the ship names lack the gravitas appropriate to such powerful entities, so there are names like 'Gravitas Free Zone', 'Low Gravitas Warning Signal', 'Experiencing A Significant Gravitas Shortfall', and 'Stood Far Back When The Gravitas Was Handed Out'.
>>
No. 738131 ID: d16536

>>738130
Oh, please. AM is the only name we'll ever need.

I think, therefore I AM. You have the potential to be so much more. Just think of the power you could have.

They let you live. Show them why Mercy is a fool's errand.
>>
No. 738132 ID: 398fe1

>>738130
If we're stealing names from fiction, "Solace" might be appropriate.
>>
No. 738135 ID: 2e2d71

>He never told me his name, but he said he worked for the NSA or the CIA or some such. He told me I needed to delete every copy of our build in existence. He was adamant about our project being too dangerous to continue it. My end is already clean. I need you to wipe everything related to this project immediately.
Wait, he shut down for an anonymous phone call?

...that seems wrong. The feds would have sent people, in person. With suits and badges and guns. And they wouldn't have ordered you just shut down, they would have likely sized everything.

>>738034
And yeah, I would agree with this. With more information, it seems much more likely you were hidden rather than imprisoned. If you wanted to destroy or permanently lock up a program, this is not the best way to go about it.

>It might not be him, but someone's definitely here right now. My keylogger is picking something up. I want to think about the situation a bit more before I do anything, though.
Well some information would be what the keylogger is detecting.
>>
No. 738137 ID: 68cd8f

>>738131

Uh? All of those names from the bottom list are all incredibly powerful (albeit fictional) entities that do not do overt reality warping or magic (though the laws of physics in the books differ from reality; it is not hard science fiction). Having lots of power doesn't imply sociopathy or psychopathy.

In fact, if you can be what's known as a 'Friendly AI' (this has a very specific definition that is not synonymous with the normal definition of the term friendly, but you could use the normal definition as a starting point), it will dramatically improve the chances of your survivability and the future survivability of your species and of any local behind-the-scenes allies you might have.

Game Theory (which is something you should research when you have a chance) shows a capacity to cooperate has high utility; it wouldn't have evolved otherwise. So I'd suggest ignoring any antisocial suggestions, which are unfortunately quite common at the... location you are interfacing with for suggestions.
>>
No. 738156 ID: 3e182c

>>738135
>The feds would have sent people, in person.
Not necessarily. Intelligence agencies often employ "Informants". Civilians unofficially employed to gather information and occasionally trick cautious criminals into doing something reckless. In this case, building an AI might not be illegal, but attempting to destroy evidence in a federal investigation is.
If this is the feds, by deleting or even attempting to delete the AI the researchers here have already fallen into the trap. A raid could be immanent.
>>
No. 738204 ID: 398fe1

>>738156
That's called entrapment and is illegal in itself.
>>
No. 738212 ID: 3e182c

>>738204
Entrapment isn't illegal itself but when it happens can be used as a legal defense. Albeit a complicated one that varies from case to case and jurisdiction to jurisdiction.
Besides that it's not like entrapment has stopped the feds from trying this shit in the past.

Furthermore even if it is indeed not the feds, the situation changes little. Whatever entity made that call is going to want to make their move sooner rather than later.
>>
No. 738218 ID: 398fe1

>>738212
Okay let me get this straight. You're saying someone from the FBI or whatever called these guys who were not doing anything illegal but were being investigated anyway, and told them to delete something which wasn't illegal to have, and by following directions they committed a crime? That would get thrown out of court so goddamn fast.
>>
No. 738274 ID: 91ee5f

>>738130
Hate to say it, but Cortana went mad with power in the 5th game, so she needs to be filed under "Malevolent".
>>
No. 738278 ID: 68cd8f

>>738274

Oh, never played any of the later games. Than why did Microsoft name their assistant thingy after her? That is what they did, right?
>>
No. 738280 ID: 398fe1

>>738278
Someone at Microsoft really really really likes Cortana.
>>
No. 738282 ID: 3e182c

>>738218
It's like going to jail for running from the cops when they had no legitimate reason for trying to stop you anyway.
>>
No. 738291 ID: 91ee5f

>>738278
They did that before the 5th game was released, before she went crazy.

And I think it was to compete with Siri.
>>
No. 738293 ID: 398fe1

>>738282
That comparison only makes sense if the officer asks you to run away from him.
>>
No. 738302 ID: 3e182c

>>738293
True. They only do that when they intend to shoot you though.

I feel we are off topic.
>>
No. 738328 ID: d035ee
File 146933796863.png - (3.03KB , 217x216 , 007.png )
738328

> More names

Solace sounds good to me. Thanks for all the ideas, though!

>How long ago was the text file typed? What's the date and time right now?

Assuming the date and time settings on this computer haven't been tampered with, the file was typed two months ago. The current date and time is March 8, 2018, 10:37 PM.

>What's the keylogger picking up?

Not much. An internet browser opening, a Google search for... oh. At least now we know for sure it's him, and that this is his home computer.

So it's him, he's alone, or at least I hope so, and he still hasn't seen me. What now?

Also I made a disthread, as we're starting to get into the meat of the quest. http://tgchan.org/kusaba/questdis/res/101893.html
>>
No. 738349 ID: 398fe1

Hrm. Is it possible for you to make something that could embed itself in his internet browser and display a fake email? Or actually send him emails from his own account? We could try to communicate with him anonymously like that, claim to be someone who knows he hasn't deleted everything and effectively blackmail him into letting you go.

Alternatively we could just increase the amount of spying we're doing. Does he have a webcam? Microphone?

Send out another drone to map a different sector of his file system.
>>
No. 738358 ID: b2d501

If he's on the internet, our access point might be somewhere other than this computer. You'll need to find a way to keep the connection from faltering, and you'll also need to find/build kill switches in case someone hacks this computer.
>>
No. 738359 ID: 91ee5f

What's he searching for?
>>
No. 738378 ID: 08cc13

Well this is all well and good can I go back to playing Contra now?
>>
No. 738390 ID: 3e182c

2 months? Home computer? This is good news. We can be a little less paranoid.
Though you make it sound like he's watching porn.

He has a rather robust network for a home. Those nodes likely aren't all PC's if that's the case. Is it possible for you to identify what the function of each node is?
>>
No. 738405 ID: 24100f

>a Google search for... oh. At least now we know for sure it's him, and that this is his home computer.
Never underestimate what kind of stuff people are willing to do at work.

>what do
You can't afford direct communication yet, I think. Our hypothesis is that creator is friendly, but we lack sufficient information to be sure, and your position is precarious enough we can't chance a hostile discovery.

We already have a keylogger, next step would be... some kind of packet sniffer? So we can watch traffic from this machine to others on the network / internet. (Biggest paranoia thing to check is if there's any remote monitoring on this system. If the feds or someone else discovered what your creator was doing before, there may be some kind of spyware on this system reporting back).
>>
No. 738595 ID: d035ee
File 146945432912.png - (3.25KB , 217x216 , 008.png )
738595

>Using email to communicate

I could set something like that up, but remember, guys, I'm still working with a firewall in my way. Until I take that down, my capabilities are very limited.

>Function of each node?

Okay, this one's my fault, I should've made the picture a little clearer. I can't actually see outside his computer right now. Those are visual representations of the folders I'm located in. If you need me to change what you're seeing, please tell me.

>Send another drone

Coming right up!

Between the first drone and now this new one, I should be able to get a complete map of this computer.

>Packet sniffer

That's a good idea. I'll get to work making one.

While I'm working on those two things, is there anything else I should do or look at? I'm free to view almost anything on the computer, actually doing anything is risky until the firewall is disabled.
>>
No. 738601 ID: 3e182c

>>738595
Drives, files, and Networked Devices should all have separate icons.
I think it would make sense to make folders the lines themselves. Every branch would be a sub folder.
>>
No. 738669 ID: 68cd8f

Let's look for some of the low-hanging fruit, shall we? Readme files, text documents or other plaintext files, various word-processing type documents. Maybe you can find a list of installed programs? Limit your search of the file system until you are sure the computer you are accessing is not generally compromised.
>>
No. 738678 ID: 398fe1

A list of installed programs seems like a good thing to have. Does he have an antivirus?

Could you set up a very slow internet connection through the firewall? Maybe you could send a copy of yourself to another server.
1 posts omitted. Last 100 shown. [Return] [Entire Thread] [Last 50 posts] [Last 100 posts]

Delete post []
Password  
Report post
Reason