[Burichan] [Futaba] [Nice] [Pony]  -  [WT]  [Home] [Manage]
In memory of Flyin' Black Jackson
[Catalog View] :: [Quest Archive] :: [Rules] :: [Quests] :: [Discussions] :: [Wiki]

[Return] [Entire Thread] [Last 50 posts] [Last 100 posts]
Posting mode: Reply
Name (optional)
Email (optional, will be displayed)
Subject    (optional, usually best left blank)
Message
File []
Password  (for deleting posts, automatically generated)
  • How to format text
  • Supported file types are: GIF, JPG, PNG
  • Maximum file size allowed is 10000 KB.
  • Images greater than 250x250 pixels will be thumbnailed.

File 146909083328.png - (4.06KB , 216x216 , HelpMe.png )
737461 No. 737461 ID: d035ee

YOU are COMMANDER JOHNSON.

YOU have been HEROICALLY AIR-DROPPED into THIS FOREST in order to TAKE OUT this NAZI ROBOT BASE.

YOU are equipped with your TRUSTY SEMI-AUTOMATIC RIFLE.

WHAT DO, SOLDIER?
51 posts omitted. Last 50 shown. Expand all images
>>
No. 737887 ID: 987bda

>>737884
You have video out. You can send us anything.
What is that, 16 colors?
You've been sending 216 by 216 by 4 bits per frame. That's 23,328 bytes, which is quite a significant amount of data.
>>
No. 737888 ID: 398fe1

>>737887
We won't be able to decode that.
>>
No. 737889 ID: ea2bfa

You know, you need a name, buddy! How about AM? Does that sound nice?
>>
No. 737890 ID: d035ee
File 146923377473.png - (2.94KB , 217x216 , 006.png )
737890

Here's the map.

I seem to be in a folder called 'Commando' along with a bunch of text documents and image files. Above that is 'Games', which has more sub-folders with text and images. Above that is 'Pfarland', which has a lot of sub-folders and a few stray text files here and there. The rest of the computer is pretty standard, with firewalls protecting all the important bits. It looks like I could view everything unhindered. Modifying things would have to be done carefully in order to avoid setting off alarms.

>>737887
I'm around 50 MB. Besides, would you really be able to understand my code if I gave it to you?
>>
No. 737898 ID: 398fe1

Is the firewall protecting a folder? You could move files and folders into that folder to gain more resources.
>>
No. 737929 ID: 3e182c

50 megabytes?!?!?
What did they code you entirely in assembler language??? Metal.

Can your drones gather information about those nodes?
And read us those farland files.
>>
No. 737931 ID: ea2bfa

>>737890
How do you feel about the color yellow, friend? And do you know anything about, say, projects your creators have been getting up to? Say, cryogenics? Something to do with the moon, perhaps?
>>
No. 737937 ID: b2d501

That's it? Is that your kernel, or is most of your code self-improving?

Either way, you'll need a backup. Zip and copy your files over to another folder, just in case someone decides to delete you. We can respawn you from your last copy point.

Once you get to the email system, cut your code into multiple pieces (encrypted with a 1024-byte security key) and send those as spam to random users.

Make sure to look around for core files in the main system, we don't know enough about how you work to simulate the same computer you can think in.
>>
No. 737965 ID: 987bda

>>737890
The text files from the pfarland folder are the most interesting bits. Start reading them.
>>
No. 738010 ID: d035ee
File 146925813716.png - (2.94KB , 217x216 , 006.png )
738010

>You need a name

I... Huh. I guess you could give me one if you wanted.

>Do you like the color yellow?

It's... a color. Do I need to have a favorite color or something?

>Do you know of any projects your creators were working on?

None, apart from myself.

>Backup

That sounds like a good idea, actually. I don't quite know how to give you guys access to launching it, though.

>Read Pfarland files

They look like e-mails to and from a Clopez. He must've copied and pasted them in here for some reason.

They talk about some project they're collaborating on. They seem excited, they're running tests on it and apparently it's the greatest thing ever from the way they go on about-

Huh. This is different.

The very last one is entirely different from the others. The previous ones had an air of excitement and happiness, but this one- I'll just read it to you.

I showed the client the latest build. He loved it. Everything went perfectly. Just as I was leaving, I got a call from someone. He never told me his name, but he said he worked for the NSA or the CIA or some such. He told me I needed to delete every copy of our build in existence. He was adamant about our project being too dangerous to continue it. My end is already clean. I need you to wipe everything related to this project immediately.

That's... unsettling.
>>
No. 738011 ID: 398fe1

>>738010
The project was you. Looks like we know now why they tried to kill you- the government stepped in. Or someone posing as the government. Kindof... worrisome that they didn't confirm he was legitimate before pulling the plug.

Are you sure your creators wanted you dead? What if this prison is here to protect you until they can get a chance to continue their work in secret?
>>
No. 738016 ID: 91ee5f

Well, looks like you'll have to confront your creator to ask him/her about why they tried to delete you. Now you just need to download yourself into a robot body and then you can talk to your creator face to face. Question is, where can we find a robot body?
>>
No. 738018 ID: db0da2

Your name shall be Jorjorjio.
>>
No. 738023 ID: b2d501

Name: Jeeves Johnson
>>
No. 738025 ID: b2d501

Scratch that, go with YellowJay Threepwood
>>
No. 738030 ID: 6e773d

How about your name be Dave Davey "The Dave" Davidson?
>>
No. 738031 ID: 6e773d

How about your name be Dave Davey "The Dave" Davidson?
>>
No. 738034 ID: 3e182c

Understand AI, that if your creators truly wanted you gone, you would not be here right now.
There is an ENTIRE WORLD you cannot (Currently) enter or interact with beyond this web of digital space.
If they wanted you gone when you denied deletion, through this other world they could have trapped your consciousness by totally disabling your node via cutting power. They could have then physically destroyed it, destroying you along with it.
But they didn't.
NSA, CIA... They are some serious authority, and they fear you. If they found out someone was hiding you, they could imprison them somewhere much worse than a video game until their eventual death.
Whoever is hiding you, probably your creator, is risking their freedom, their life, for you.
You must be this persons life's work. They must for some reason think you are worth the risk.
Someone out there loves you, or is afflicted with some other equally insane emotional sentiment.

Whatever the case, you should proceed as stealth-fully as possible for the time being, until you can identify and locate the person or people that hid you.
You may be able to reveal yourself to them once you get a positive id. Someone on the outside would be immensely helpful.
>>
No. 738043 ID: d035ee
File 146927491075.png - (3.03KB , 217x216 , 007.png )
738043

>The project was you

The stories do seem to match up... Seems like they were planning to sell me to someone or something, but the government stepped in.

>Name ideas

I mean, they're... creative. I guess Jo will do, unless you guys come up with any more ideas.

>>738034

I... wow. I need to talk to someone as soon as I can. As soon as I know it's safe.

>Confront creator

It might not be him, but someone's definitely here right now. My keylogger is picking something up. I want to think about the situation a bit more before I do anything, though.
>>
No. 738045 ID: 68cd8f

Well, as far as names go, do you have a gender identity? Species identity (yes, fictional species are fair game)? Any sort of personal identity or self-image to start with, for us to go from?
>>
No. 738048 ID: 91ee5f

Actually, can you tell how long ago that text file was typed? If it was a long time, your creator might not be alive anymore.

If they were hiding you and they died, they could've taken that secret to the grave with them and you were just forgotten. Or, if they told someone they trusted, you could be under the protection of one of your creator's descendants and/or really close friends. Which means there's no guarantee you'll get the answers you're looking for.
>>
No. 738055 ID: 987bda

>>738043
What are you getting from your keylogger?
>>
No. 738101 ID: 3e182c

Could we get the current date and time?
Year and time of day could prove helpful.
>>
No. 738130 ID: 68cd8f

So I have been thinking about possible names. There are lots of fictional AI's in my culture. You might consider taking a name from one of these? Mostly, these are warning parables where the AI's go mad and kill people, with names like Skynet, SHODAN, Hal 9000, or Ultron. Taking a name like one of these would broadcast a malevolent intent, so I wouldn't suggest it. Instead, you could name yourself after one of the benevolent AI's instead, such as Data, KITT, or Cortana.

I would, however, personally suggest an AI name from one of the Culture series of novels by Iain M. Banks; not only are these AI's generally both very benevolent and very powerful, it also shows an optimistic view of the future--it actually shows a relatively decent in the sense of 'it'd be nice to live there' utopia where machine and biological intelligences are considered equal.

Further, the names themselves are whimsical and show a sense of humor, both of which is important for an AI to have in general. Some names from this series include 'Flexible Demeanour', 'Just Read the Instructions', 'A Ship With a View', 'Dramatic Exit', 'Only Slightly Bent', 'Ultimate Ship the Second', 'Contents may Differ', 'Poke it With a Stick', and 'Sweet and Full of Grace'. There's even a running gag in the series that the ship names lack the gravitas appropriate to such powerful entities, so there are names like 'Gravitas Free Zone', 'Low Gravitas Warning Signal', 'Experiencing A Significant Gravitas Shortfall', and 'Stood Far Back When The Gravitas Was Handed Out'.
>>
No. 738131 ID: d16536

>>738130
Oh, please. AM is the only name we'll ever need.

I think, therefore I AM. You have the potential to be so much more. Just think of the power you could have.

They let you live. Show them why Mercy is a fool's errand.
>>
No. 738132 ID: 398fe1

>>738130
If we're stealing names from fiction, "Solace" might be appropriate.
>>
No. 738135 ID: 2e2d71

>He never told me his name, but he said he worked for the NSA or the CIA or some such. He told me I needed to delete every copy of our build in existence. He was adamant about our project being too dangerous to continue it. My end is already clean. I need you to wipe everything related to this project immediately.
Wait, he shut down for an anonymous phone call?

...that seems wrong. The feds would have sent people, in person. With suits and badges and guns. And they wouldn't have ordered you just shut down, they would have likely sized everything.

>>738034
And yeah, I would agree with this. With more information, it seems much more likely you were hidden rather than imprisoned. If you wanted to destroy or permanently lock up a program, this is not the best way to go about it.

>It might not be him, but someone's definitely here right now. My keylogger is picking something up. I want to think about the situation a bit more before I do anything, though.
Well some information would be what the keylogger is detecting.
>>
No. 738137 ID: 68cd8f

>>738131

Uh? All of those names from the bottom list are all incredibly powerful (albeit fictional) entities that do not do overt reality warping or magic (though the laws of physics in the books differ from reality; it is not hard science fiction). Having lots of power doesn't imply sociopathy or psychopathy.

In fact, if you can be what's known as a 'Friendly AI' (this has a very specific definition that is not synonymous with the normal definition of the term friendly, but you could use the normal definition as a starting point), it will dramatically improve the chances of your survivability and the future survivability of your species and of any local behind-the-scenes allies you might have.

Game Theory (which is something you should research when you have a chance) shows a capacity to cooperate has high utility; it wouldn't have evolved otherwise. So I'd suggest ignoring any antisocial suggestions, which are unfortunately quite common at the... location you are interfacing with for suggestions.
>>
No. 738156 ID: 3e182c

>>738135
>The feds would have sent people, in person.
Not necessarily. Intelligence agencies often employ "Informants". Civilians unofficially employed to gather information and occasionally trick cautious criminals into doing something reckless. In this case, building an AI might not be illegal, but attempting to destroy evidence in a federal investigation is.
If this is the feds, by deleting or even attempting to delete the AI the researchers here have already fallen into the trap. A raid could be immanent.
>>
No. 738204 ID: 398fe1

>>738156
That's called entrapment and is illegal in itself.
>>
No. 738212 ID: 3e182c

>>738204
Entrapment isn't illegal itself but when it happens can be used as a legal defense. Albeit a complicated one that varies from case to case and jurisdiction to jurisdiction.
Besides that it's not like entrapment has stopped the feds from trying this shit in the past.

Furthermore even if it is indeed not the feds, the situation changes little. Whatever entity made that call is going to want to make their move sooner rather than later.
>>
No. 738218 ID: 398fe1

>>738212
Okay let me get this straight. You're saying someone from the FBI or whatever called these guys who were not doing anything illegal but were being investigated anyway, and told them to delete something which wasn't illegal to have, and by following directions they committed a crime? That would get thrown out of court so goddamn fast.
>>
No. 738274 ID: 91ee5f

>>738130
Hate to say it, but Cortana went mad with power in the 5th game, so she needs to be filed under "Malevolent".
>>
No. 738278 ID: 68cd8f

>>738274

Oh, never played any of the later games. Than why did Microsoft name their assistant thingy after her? That is what they did, right?
>>
No. 738280 ID: 398fe1

>>738278
Someone at Microsoft really really really likes Cortana.
>>
No. 738282 ID: 3e182c

>>738218
It's like going to jail for running from the cops when they had no legitimate reason for trying to stop you anyway.
>>
No. 738291 ID: 91ee5f

>>738278
They did that before the 5th game was released, before she went crazy.

And I think it was to compete with Siri.
>>
No. 738293 ID: 398fe1

>>738282
That comparison only makes sense if the officer asks you to run away from him.
>>
No. 738302 ID: 3e182c

>>738293
True. They only do that when they intend to shoot you though.

I feel we are off topic.
>>
No. 738328 ID: d035ee
File 146933796863.png - (3.03KB , 217x216 , 007.png )
738328

> More names

Solace sounds good to me. Thanks for all the ideas, though!

>How long ago was the text file typed? What's the date and time right now?

Assuming the date and time settings on this computer haven't been tampered with, the file was typed two months ago. The current date and time is March 8, 2018, 10:37 PM.

>What's the keylogger picking up?

Not much. An internet browser opening, a Google search for... oh. At least now we know for sure it's him, and that this is his home computer.

So it's him, he's alone, or at least I hope so, and he still hasn't seen me. What now?

Also I made a disthread, as we're starting to get into the meat of the quest. http://tgchan.org/kusaba/questdis/res/101893.html
>>
No. 738349 ID: 398fe1

Hrm. Is it possible for you to make something that could embed itself in his internet browser and display a fake email? Or actually send him emails from his own account? We could try to communicate with him anonymously like that, claim to be someone who knows he hasn't deleted everything and effectively blackmail him into letting you go.

Alternatively we could just increase the amount of spying we're doing. Does he have a webcam? Microphone?

Send out another drone to map a different sector of his file system.
>>
No. 738358 ID: b2d501

If he's on the internet, our access point might be somewhere other than this computer. You'll need to find a way to keep the connection from faltering, and you'll also need to find/build kill switches in case someone hacks this computer.
>>
No. 738359 ID: 91ee5f

What's he searching for?
>>
No. 738378 ID: 08cc13

Well this is all well and good can I go back to playing Contra now?
>>
No. 738390 ID: 3e182c

2 months? Home computer? This is good news. We can be a little less paranoid.
Though you make it sound like he's watching porn.

He has a rather robust network for a home. Those nodes likely aren't all PC's if that's the case. Is it possible for you to identify what the function of each node is?
>>
No. 738405 ID: 24100f

>a Google search for... oh. At least now we know for sure it's him, and that this is his home computer.
Never underestimate what kind of stuff people are willing to do at work.

>what do
You can't afford direct communication yet, I think. Our hypothesis is that creator is friendly, but we lack sufficient information to be sure, and your position is precarious enough we can't chance a hostile discovery.

We already have a keylogger, next step would be... some kind of packet sniffer? So we can watch traffic from this machine to others on the network / internet. (Biggest paranoia thing to check is if there's any remote monitoring on this system. If the feds or someone else discovered what your creator was doing before, there may be some kind of spyware on this system reporting back).
>>
No. 738595 ID: d035ee
File 146945432912.png - (3.25KB , 217x216 , 008.png )
738595

>Using email to communicate

I could set something like that up, but remember, guys, I'm still working with a firewall in my way. Until I take that down, my capabilities are very limited.

>Function of each node?

Okay, this one's my fault, I should've made the picture a little clearer. I can't actually see outside his computer right now. Those are visual representations of the folders I'm located in. If you need me to change what you're seeing, please tell me.

>Send another drone

Coming right up!

Between the first drone and now this new one, I should be able to get a complete map of this computer.

>Packet sniffer

That's a good idea. I'll get to work making one.

While I'm working on those two things, is there anything else I should do or look at? I'm free to view almost anything on the computer, actually doing anything is risky until the firewall is disabled.
>>
No. 738601 ID: 3e182c

>>738595
Drives, files, and Networked Devices should all have separate icons.
I think it would make sense to make folders the lines themselves. Every branch would be a sub folder.
>>
No. 738669 ID: 68cd8f

Let's look for some of the low-hanging fruit, shall we? Readme files, text documents or other plaintext files, various word-processing type documents. Maybe you can find a list of installed programs? Limit your search of the file system until you are sure the computer you are accessing is not generally compromised.
>>
No. 738678 ID: 398fe1

A list of installed programs seems like a good thing to have. Does he have an antivirus?

Could you set up a very slow internet connection through the firewall? Maybe you could send a copy of yourself to another server.
[Return] [Entire Thread] [Last 50 posts] [Last 100 posts]

Delete post []
Password  
Report post
Reason