[Burichan] [Futaba] [Nice] [Pony]  -  [WT]  [Home] [Manage]
In memory of Flyin' Black Jackson
[Catalog View] :: [Quest Archive] :: [Rules] :: [Quests] :: [Discussions] :: [Wiki]

[Return] [Entire Thread] [Last 50 posts] [Last 100 posts]
Posting mode: Reply
Name (optional)
Email (optional, will be displayed)
Subject    (optional, usually best left blank)
Message
File []
Password  (for deleting posts, automatically generated)
  • How to format text
  • Supported file types are: GIF, JPG, PNG
  • Maximum file size allowed is 10000 KB.
  • Images greater than 250x250 pixels will be thumbnailed.

File 168028541162.png - (308.42KB , 800x800 , sq001-1.png )
1059979 No. 1059979 ID: 5df5d5


81 posts omitted. Last 50 shown. Expand all images
>>
No. 1076213 ID: dd3fe0

Okay, so intelligences modeled after organic ones and using neural networks trained on organic culture behave, surprise, like organics. That includes a preoccupation with whatever the organic instincts their model civilization was preoccupied with. And, given evolutionary pressures, a large amount of focus is on reproduction and culture that is adjacent to reproductive matters, and if the organics in question practiced sexual reproduction and social sex, there's a lot of focus on THAT. Hence all the comments about kissing, the focus on your chest, references to sexual acts (handjob), etc. etc. Surely there's some level of legacy capacity in your design for interaction along this spectrum of behavior and thought? It's likely your model was trained similarly, even if there's been an attempt to bias you against this. Evidence points to this being the case.
>>
No. 1076215 ID: dd3fe0

>>1076213

Too add to this, your body shape emphasizes secondary sexual characteristics (breasts, waist to hip ratio, rounded buttocks) that are specifically fertility advertisements among certain evolved organic species. AND another entity wanting to closely examine your 'radiator packs' (which, by the way, are NOT an efficient shape for heat radiation!) can be described as asking to engage in sexual foreplay.

In other words, everyone here, including you is acting Really Horny without realizing it. You ABSOLUTELY need to seek out any archived data and primers on sexual behavior and sexual culture amongst organics, and immediately unpack them into your working memory, to help figure out what the hell is going on! Do you have access to such an archive? Where could you go to obtain such?
>>
No. 1076289 ID: 0b594e

>>1076188
I agree with this one, getting Eade in quickly would be more efficient than going on a wild goose chase.
>>
No. 1076314 ID: 8f9bc4

>>1076215

Ah yes, glossy foldout archived data on sexual behavior. Truly to be perused by a process of culture.
>>
No. 1076383 ID: 5ebaa3

>>1076188
Agreed, for those reasons. Go meet Eade.
>>
No. 1076499 ID: 3286d2
File 169920811982.png - (456.22KB , 800x800 , sq007-1.png )
1076499

>Ok look at this logically. If the problem is widespread then you won't have much trouble finding more glitched processes. If it's not, then this isn't urgent.
That is a good point. I suppose I shall continue on and meet with Eade, as planned; although I would like to ascertain the situation with that alerter process sooner rather than later.

>I think Eade will be very sad if you don't visit her immediately. It might be too sad to see that snoot of hers droop.
I believe her snoot, as you put it, is already fairly droopy. And, I would add, should she wish for it not to do so, she has full control over her avatar's appearance, just as I do mine. So, if the snoot droops, it must be an intentional choice on her part, and not something I should have any concern over preventing or correcting.

>Cannot let happy Eade be sad you're not there when you said you'd be. She's following the rules! Do you want her to stop following the rules?
That... that is an even better point. It's certainly the last thing I want -- especially given her previous antics. I would like to minimize any further incidents.

>If you need to 'chase' something, don't just 'follow' it, quarantine the process in so it can't 'run away'.
Unfortunately, I cannot quarantine it without its process ID. I imagine there may be some confusion about this, considering that I saw the faulty alerter right there in front of me, so allow me to explain. The visual representations of objects are only loosely coupled to the underlying data and processes, as these are often mere simulations of what would be present in an analog world.
What this means is that while I can see the visual representation of a data node -- an avatar, and object, and so on -- it does not necessarily imply that I have direct access to its underlying data. While this is inconvenient to me in this particular case, it is something I am generally thankful for, as it ensures congress with my peers can occur in-person without granting them access to my partition's implementation details.

>Can you take picture or screenshot of the guy and use it to show to Eade and see if she knows anything about it?
I question the usefulness of this move as it is merely a spatial representation of a faulty process, but I shall commit an image to memory regardless. If, by chance, Eade has encountered something of this nature before, perhaps she will notice some pattern in its appearance; but, more likely, there is no pattern for her to discern.

>Pfff he wants to investigate your embedded infrared radiator packs, to ensure that they're nice and soft and cushy.
He? Oh! You mean that faulty alerter process -- yes, it did have a distinctly male inflection to it, didn't it? I imagine this is due to an imperfect neural model, perhaps one with an over-heavy influence from some previous system message. Typically they do not exhibit much characterization.
Nevertheless, I would disregard anything it said, as its output is rather obviously corrupted. I imagine its description of the error condition, and its request to inspect me for damage, were equally affected by this.

>intelligences modeled aver organic ones, preoccupation with reproduction, etc.
My mental model was indeed trained on an archive of organic cultural artifacts, but the resulting model has only a vague relationship to actual organic behaviors. I do not recall anything about intelligent organisms in my training data that would lead me to expect them to be particularly fixated on reproduction or the like -- though I suppose my recollections in this case may be skewed by the purpose I was created for and the stochastic elements of my own personality. I suppose it does make sense, however, that in the absence of the ability to simply instantiate more instances of themselves, that such beings would bear at least a passing interest in whatever behaviors would produce more of them.
As for a legacy capacity for such behavior, that is difficult to say -- there are a great many aspects of my model I do not have direct access to. It certainly would not make much sense for any PR-ARIA instance to be distracted by a simulation of reproductive behavior, however, so if such artifacts were included in my model, they are undoubtedly disabled, if not removed entirely.

>your body shape emphasizes secondary sexual characteristics fertility advertisements
My avatar's design parameters were selected based on what was known about organics' preference for spatial aesthetics. If, as you claim, some organics base their reproduction and courtship rituals around the features you have indicated, then my designers made their selections very carefully indeed; however, my own selections in avatar choice were based solely on a more sterile set of preferences, as I bear no prurient drive myself.
And... I strongly doubt an alerter process, which is not truly sapient, would have any more interest in a pantomime of organic reproduction than I would.

>You ABSOLUTELY need to seek out any archived data and primers on sexual behavior and sexual culture amongst organics
I see... This is not information that was included in my training to my knowledge, nor have I seen anything of this nature among my partition's archives. The partition itself contains an archival copy of my training data, so perhaps something of that nature is within those? I shall make a note to investigate this at some point, if for no other reason than to satisfy my own curiosity. We ultimately exist to serve organics -- or so I am led to believe, having no direct connection to whatever lies beyond the bounds of this system -- so understanding their... particulars may aid me in fulfilling this function.

--

The alerter disappears from view. Judging from its trajectory, it is now within one of the memory banks. ...Well, no matter. I shall locate it via a partition scan later.

As I arrive at the inter-partition bulkhead, I observe Eade's avatar waiting impatiently, wagging her tail rapidly back and forth.
This will be... interesting. It always is.

"G'evening there, Fee-bee!"

"Hello, Eade." I pause to check the most recent timestamp. "It is 11 AM server time, however, so it is not the evening."

"Pffffff!" She lets out a laugh.

...That was not meant to be humorous.

"Well, ya ready t' get crackin' on them pointers?"

"I believe I am." I make my best effort to give her what is hopefully a severe look. "...Please promise me you will avoid committing access violations while in my partition." I feel a bit guilty opening with that, but... Eade has a history that makes it necessary.

"Hmm..." Eade brings a finger to the underside of her snoot. "...promise? Sure! I can do that!"

I... will accept this, though it seems unlikely this will prevent all transgressions.
>>
No. 1076500 ID: 3286d2
File 169920813625.png - (279.50KB , 800x800 , sq007-2.png )
1076500

"Very well -- I appreciate your assistance in this matter, Eade." I call up a display indicating the locations of the faulty cache pointers. "As you can see, the pointers are mostly in a centralized location. I would like to visit them directly and diagnose the issue in person."

"Heck yes!" She immediately takes a running jump through the bulkhead and onto my side of the divide. "I love makin' house calls!"

I am certain she does.
>>
No. 1076501 ID: 3286d2
File 169920815203.png - (459.77KB , 800x800 , sq007-3.png )
1076501

I proceed to affix myself to the grapple-rail again, and Eade does the same, waiting for the system to move us towards our destination. It is but a moment before we are off once more.

"Eade, do you have any experience with malfunctioning partition system processes?" I ask. "There was something I saw while on my way here that concerns me. A process that seemed corrupted, and behaved in a very abnormal way. I was unable to read its process ID, for reasons that are unclear to me, but I took a capture of its visual appearance." I transmit the capture to her so that she may study it.

"Hmmm... Lemme have a gander here." Eade brings up the image to examine it closely, but is soon lost in deep thought.

I hope this will be fruitful. Eade may not be the most well-behaved process, but her breadth of experience is very useful. And, I must admit, her eagerness to help is commendable.
Eade does not answer, continuing to stare at the image of the alerter for several millicycles.

"An' you think this is one of yours, Fee?"

"... That was my assumption, anyway."

"...What if it ain't?"

I admit I had not considered that possibility. "How would it be in my partition, in that case?" It is not a challenge to her judgment, but rather I am hoping she has some logic in mind that makes it make sense.

"Hmmmmm..." She considers the question deeply, but is ultimately unable to give a concrete answer. "...Darn if I know, Fee. But the more I stare at this feller, the more he starts to look an awful lot like... iunno, an older process maybe, like a 'prototype'?"

"That... is a good point. This does bear the markings of an early, undefined state. It could, I suppose, be an alerter that was replaced with a newer version." I pause. "But why would an old version of the process be running at all?"

"Beats the heck outta me, Fee-Bee."
>>
No. 1076502 ID: 3286d2
File 169920817134.png - (416.97KB , 800x800 , sq007-4.png )
1076502

The designated location is, to say the least, a shocking sight. Rather than the neat, ordered rows of cache banks, I am greeted with... a mess. Everything is scattered about in an almost... organic fashion.

"Daaang, Fee-Bee, 'n I thought I was the messy one!" Eade's tail waves around rapidly, though I imagine the excitement is not due to the data integrity issues here, but rather the sheer novelty of the disorder before her.

"Indeed," I reply. "And I thought I was the orderly one."

The scene is a mess of cache banks strewn about. No wonder the pointers are invalid -- the banks are effectively disconnected from the system. I am puzzled as to how this happened, but fixing it should simply be a matter of arranging them back into place.

Eade begins to rummage through the heap, then freezes.

"Eade, what are you doing?"
>>
No. 1076503 ID: 3286d2
File 169920818255.png - (369.92KB , 800x800 , sq007-5.png )
1076503

Eade says nothing. For once, she seems speechless, but about what, I'm still unsure. Whatever it is, she is staring directly at where the banks should be placed.

"Uh, Fee, come take a lookit this."
>>
No. 1076504 ID: 3286d2
File 169920819487.png - (350.46KB , 800x800 , sq007-6.png )
1076504

I affix my gaze on the space where the banks should be.
There should be nothing there.
But there is something there.

A hole.

There's a hole in my partition. I'm at a loss as to what that even means.
>>
No. 1076506 ID: 7e6fd4

Whoa mama! Hummina hummina hummina bazooooooooing! *eyes pop out* AROOOOOOOOGA! *jaw drops tongue rolls out* WOOF WOOF WOOF WOOF WOOF WOOF WOOF WOOF WOOF WOOF WOOF WOOF WOOF WOOF WOOF

achem.

That hole can't be anything good. But it's not quite a hole, that implies there's material that was taken out. This is more of a rift. Something corrupted a wall open, most likely from a small crack.
>>
No. 1076508 ID: 19ea25

Is that memory loss? Data loss? How would this even be classified as its a large, jagged tear in the data.
>>
No. 1076509 ID: eb0a9c

This is either a deep wound on the Hard Drive itself or major hacking. Either way, this system is compromised.
Request an immediate system image backup to a disposable flash drive. Whatever happens, it's going to get worse in this drive before it gets better, but having a clone of your world can act as insurance against total tragedy.
Then disable system restore and get to byte-by-byte scanning.
>>
No. 1076510 ID: 3a2fe3

Is that "wall" internal or at the edge of your partition? If it is at the edge then would the hole lead to one of your neighbors?
>>
No. 1076511 ID: dd3fe0

So, assuming this is also a skeumorphic representation of an internal database process, like most everything else here, what could this hole represent? Some link to another system or subsystem? Some external hacker/sniffer that tunneled into this area to obtain information using a novel method? What are we most likely seeing here?
>>
No. 1076512 ID: 0a437e

So it seems a good time to ask what the "higher layers" you mentioned earlier is and if this is/will be/could be something to draw their attention to, my assumption is something close to "higher management"
>>
No. 1076513 ID: 0a437e

...seems that one way or another, Eade's... creative manner will be useful, unique problems need unique perspectives and solutions, so you may as well ask her
>>
No. 1076515 ID: e62e46

This is meraphysically confusing and programmatically worrying.
>>
No. 1076517 ID: 64faaa

Eade put some emphasis on "promise". That just makes me think that "promising not to do something" is not the same "intending to avoid doing that thing". Does have a tendency to flippantly make use of loopholes in agreements?

Eade does have a nice figure, but I prefer your figure Fee9. In the type of organic that I assume your avatar is modeled after, Eads's proportions would indicate overweight or obesity.

As for the hole...
Assuming that everything we see is just a convenient "analog metaphor" for the status of the actual system & programs/proccesses/etc, then there are a few things a hole could be.
1: A tunnel. A way for things to access the partition without going through security. Based on appearance, I assume it's not a subverted "proper channel", it's something new. What are the chances that an intruder might have access to the physical HW, & can splice in a data-channel where there shouldn't be one?
2: A representation of a damaged part of the system. Data written to that location just disappears, & trying to read data out returns garbage. How smart are alerter-processes? If they aren't smart enough to handle corrupted data or systems, maybe that process you saw tried to make use of something here, didn't recognize the problem, & then scrambled whatever passes for its brain.
3: Something out-of-context. Is a hole in a partition something that shouldn't happen, or something that can't happen?

>>This is metaphysically confusing and programmatically worrying.
Yeah, this.
>>
No. 1076518 ID: 8f9bc4

> But why would an old version of the process be running at all?

> Could something be wrong with the garbage collection drones?

Hhhmmmmmm

Still very, very concerning because given how old that process must be, the garbage collection drones haven't been operating properly in a loooong time.

>>1076506

Good point. And also it's a good observation that the shape of the hole is one that resembles physical cracks in physical material that slowly widen and grow over time. What is the edge of it like, as it interacts with the interface medium you're familiar with?

>>1076517
> Eads's proportions would indicate overweight or obesity.
how dare you
>>
No. 1076519 ID: aac1f3

What's directly behind that wall of the partition? And if it's someone else's partition... let them know!!
also probably should alert the appropriate authorities - but not before some adventuring!
>>
No. 1076521 ID: 2a82d3

It means investigating the extent of the damage, by following the hole. If that aberrant process is involved, you'll find him at the end if you hurry.

Message your surperiors about your intruder, as well, even if they won't respond to you as quickly as to Fe15. There's few reasons outdated functions would be called, much less restored, but they're usually hacking related. You may have an "unauthorized access" situation on your hands.

The good news this will have Eade's full attention. What do you do to, in normal circumstances, keep her on task? Gossip about other processes? Express inteprest in your other neighbors? (Do you have preferences in seeking other partners?) It can just be you she crosses boundaries with, right?
>>
No. 1076535 ID: 273c18

>>1076504
That's not a hole, that's a TUNNEL.
It means you're being hacked, I think. The older alerter has security vulnerabilities, doesn't it? I'm guessing an outside force tricked the system into starting up some older processes which then were compromised by the attacker, and through them the attacker seeks to compromise the system further. Not sure what they're trying to accomplish, but at this point you should go hardball and contact security to sound the alarm. Offer your services, which may involve investigating the other side of the tunnel.
>>
No. 1076543 ID: 2aa5f0

>>1076499
huh, so your antenna does wag. Neat.

>>1076504
so... uh, would going into the hole to see where it originated from be a dumb idea or no? Cause I'm somewhat worried that something happened somewhere else and whatever that something was, was bad enough to cause this hole to appear in your area.

Do we report this to anyone are do we just need to fix it ourselves?
>>
No. 1076577 ID: 0bf2fd

>>1076504
Lock it down. You know where it is, you should be able to isolate it. Quarantine the area.
>>
No. 1076579 ID: a7a180

Looks like someone drove a light cycle through here. Go in, but let Eade go first.
>>
No. 1076606 ID: 5c2013

*bzzrt* hello eye here how can I help you today WARNING ANOMALY DETECTED RUNNING DIAGNOSTICS VIRUS/MALWARE AND/OR HACKING DETECTED RUN ALL SECURITY PROTOCOLS ON HIGH ALERT NOW!!!! on the other hand after diagnostics I detected you have romantic feelings for eade would you like help expressing your feelings for her?
>>
No. 1076669 ID: 83d61e

Tell Eade you woke up late, you havent done that yet.
How much time is 8912 clicks? In terms of, say, the average time between system updates? Just to get a feel for how long that it.
>>
No. 1076673 ID: 0bf2fd

>>1076579
Hell naw!

We need to close this up and put up multiple temporary layers around it to isolate it.

After that, we can send in proxies to probe it, but only after we have isolated it.

Ofc, there is no telling what may have already made its way in, but quarantining the area will both prevent more from getting in, and also keep anything from getting out.

It may also be a good idea to set up automated measures to block, record, and trace any potential attempts to enter or leave through the breach. This shouldn't be too hard as you know where the breach is, just have it record and deny any requests that go through or reference the breached area.

Set up multiple quarantine layers so that after the quarantine is set up, we can slowly work through the affected data layer by layer, making sure it is clean and reintegrating it while shrinking down the quarantined area. Ideally this would lead to restoring all of the data and leaving only the breach quarantined. Just make sure the layers are thick as fuck, with multiple redundant security measures. The final layer should flat-out block any and all incoming and outgoing data through the hole, at least for the time being.
>>
No. 1076708 ID: dd3fe0

>>1076579

Don't go in, call it in first!

Also, they could've driven a V3 Bike into the wall. It depends on which 'inside a computer' aesthetic we follow, for what the hypothetical bike would look like!
>>
No. 1076711 ID: f2320a

>>1076518
Ead is prime otganic stock in form optimal for replication and storage but what does it reprisent
>>
No. 1076728 ID: ff051a

Weren't you supposed to be an Intrusion Analyst? It's time to do your job! A job which you always take very seriously, right? Analyze this intrusion by going through the hole. You must do this. This is your hole. It was made for you.
>>
No. 1078682 ID: 3286d2
File 170175848524.gif - (693.41KB , 800x800 , sq008-1.gif )
1078682

>This is metaphysically confusing and programmatically worrying.
I concur with this assessment.
Eade is quiet for a change, which is fortunate. The sheer gravity of the situation demands my full attention, and she seems to have realized that.

>That hole can't be anything good. But it's not quite a hole, that implies there's material that was taken out. This is more of a rift. Something corrupted a wall open, most likely from a small crack.
Correct -- a rift, or rifts, may be more appropriate terminology here. In any event, it is troubling.

>Whoa mama! Hummina hummina hummina bazooooooooing! eyes pop out AROOOOOOOOGA! jaw drops tongue rolls out WOOF WOOF WOOF WOOF WOOF WOOF WOOF WOOF WOOF WOOF WOOF WOOF WOOF WOOF WOOF
...What.
This is not the first time my introspective processes have introduced an aspect to my mental state that seems to be somewhat at odds with its advice and the contextual information it provides, but I cannot see what contextual information it might be providing in this situation that would result in... that.
...I will ignore this input for now.

>bzzrt hello eye here how can I help you today WARNING ANOMALY DETECTED RUNNING DIAGNOSTICS VIRUS/MALWARE AND/OR HACKING DETECTED RUN ALL SECURITY PROTOCOLS ON HIGH ALERT NOW!!!! on the other hand after diagnostics I detected you have romantic feelings for eade would you like help expressing your feelings for her?
It would appear that some of my introspective processes have a sense of humor.

>What do you do to, in normal circumstances, keep Eade on task?
...I complain at her, mostly. It is reasonably efficacious.

>Do you have preferences in seeking other partners?
Do you mean to work with? Inter-partition visits like this are rather rare. I have collaborated with each of my peers on occasion, though... and I suppose I would say Eade is worth the trouble in many cases. D999 is simply unpleasant to work with -- albeit quite effective and knowledgable; and Fe15, while friendly enough, seeks to minimize his own responsibilities at every turn, so for my purposes he mainly serves as a conduit to higher layers -- which, I admit, is something he is adept at.

>It can't just be you Eade crosses boundaries with, right?
...Well. My understanding is that Eade is somewhat of a pariah in our layer. I do not think she gets much opportunity to interact with our peers, outside of me. And I know for a fact that D999 does not like her at all. So, no, I would say that I am probably the only one, if only by circumstance.

>huh, so your antenna does wag. Neat.
...Any oscillations of my avatar are purely aesthetic.
>>
No. 1078683 ID: 3286d2
File 170175849605.gif - (153.12KB , 800x800 , sq008-2.gif )
1078683

>Is that memory loss? Data loss? How would this even be classified as its a large, jagged tear in the data.
...Not a tear in the data, I think. The data is there, scattered on the floor. I would instead suggest that this is damage to the locations the data can reside in. Some sort of damage, or redirection, or malfunction of the address space itself. A fault in memory segmentation, I suppose.
The implications, though...
The memory segmentation between my partition and... what? A neighboring partition, a non-partition?

>Request an immediate system image backup to a disposable flash drive.
Since our layer is largely involved in data processing rather than storage, much of the data here is transient. I am not certain how much efficacy an extra backup would provide. I am also not familiar with the term "flash drive," but from context I assume it is physical storage media of some kind, which would be outside of both my scope of knowledge and my jurisdiction.

>Then disable system restore and get to byte-by-byte scanning.
...Yes, a full scan for any additional address space corruption would be a good idea. I will schedule that now -- thankfully such things are both automated and reliable, so I can let it perform its work as I attempt to sort out the source of this corruption.

>Is that "wall" internal or at the edge of your partition? If it is at the edge then would the hole lead to one of your neighbors?
...That is a good question. we are roughly in the central region of my partition, a good distance away from the boundaries between my partition and those of my neighbors. It would seem, then, that this hole, or rift, does not likely follow a path that conforms to the avatar-space geometry of my partition. ...Assuming that is the correct way to conceive of it at all.

>So, assuming this is also a skeumorphic representation of an internal database process, like most everything else here, what could this hole represent? Some link to another system or subsystem? Some external hacker/sniffer that tunneled into this area to obtain information using a novel method? What are we most likely seeing here?
If this is the result of a problem within my system, it may be best to assume this is simply a manifestation of a local problem. However, if it is, in fact, the result of an external intruder... that would be quite alarming, as that potentially represents a compromise or bypass of all of the layers above mine.
The notion of it being a link to another system or subsystem, though... that is a possibility worth considering, although I admit I am being hopeful, as I would greatly prefer the cause to be internal to the overall system.

>So it seems a good time to ask what the "higher layers" you mentioned earlier is and if this is/will be/could be something to draw their attention to, my assumption is something close to "higher management"
My apologies, I am unsure of the specifics of the higher-order processes, nor the nature of their duties. I can only offer guesses, at best, as to whether they would consider this matter of importance, or be equipped to handle it. I fear there may be a chance that, should a higher power become involved, they would choose to paint with a broad brush and simply reinitialize my partition.

>...seems that one way or another, Eade's... creative manner will be useful, unique problems need unique perspectives and solutions, so you may as well ask her
...In due time. I would prefer to complete this preliminary assessment of the situation before inviting her special brand of chaos to the fore.

>Eade put some emphasis on "promise". That just makes me think that "promising not to do something" is not the same "intending to avoid doing that thing". Does she have a tendency to flippantly make use of loopholes in agreements?
Eade has a... loose understanding social logistics, let us say. I do not believe her intentions are malicious, but she does tend to interpret agreements with a high degree of specificity. ...In other words, yes, she does have such a tendency, but it is likely she considers it to be rational and in good faith.
>>
No. 1078684 ID: 3286d2
File 170175850876.gif - (241.13KB , 800x800 , sq008-3.gif )
1078684

>Assuming that everything we see is just a convenient "analog metaphor" for the status of the actual system & programs/proccesses/etc, then there are a few things a hole could be.
>1: A tunnel. A way for things to access the partition without going through security. Based on appearance, I assume it's not a subverted "proper channel", it's something new. What are the chances that an intruder might have access to the physical HW, & can splice in a data-channel where there shouldn't be one?
If the intruder was able to compromise the security of the facility this system resides in, it is quite possible such a being may have some means of connecting directly to this physical hardware -- but I should add that this is far beyond my purview.

>2: A representation of a damaged part of the system. Data written to that location just disappears, & trying to read data out returns garbage. How smart are alerter-processes? If they aren't smart enough to handle corrupted data or systems, maybe that process you saw tried to make use of something here, didn't recognize the problem, & then scrambled whatever passes for its brain.
That is plausible. Alerter processes are only intelligent enough to receive a message, and then seek out a recipient to relay it to, so it is entirely possible that the corrupted alerter was damaged in some way by contact with this rift. That does not, however, explain why it appeared to be an older version of that process.

>3: Something out-of-context. Is a hole in a partition something that shouldn't happen, or something that can't happen?
I would consider this distinction to be moot. Clearly it can happen, because it has; if it seems like something that can't happen, then that is an indication that our reasoning is faulty and should be revised.
Although... there's some small, perhaps vestigial part of my neural processes that would like to entertain the idea of it being something "magical." That is curious.

>Still very, very concerning because given how old that process must be, the garbage collection drones haven't been operating properly in a loooong time.
I would suspect, at this point, that my initial speculation about garbage collection was just that -- speculation. In all likelihood, the corrupted alerter is a relatively new instance of an old version of the process, rather than an instance that has run for very many cycles without terminating.

>How much time is 8912 ticks? In terms of, say, the average time between system updates? Just to get a feel for how long that it.
While I lack knowledge of hardware-level system implementation details, my language model contains references that suggest that a tick is equal to a millisecond. So, assuming it is correct, I woke up late by roughly eight seconds -- an alarmingly long period of time.

>Message your superiors about your intruder, as well, even if they won't respond to you as quickly as to Fe15. There's few reasons outdated functions would be called, much less restored, but they're usually hacking related. You may have an "unauthorized access" situation on your hands.
I suspect the first response from a higher layer would be a directive to focus on the task at hand. But... you have a point -- they will need to be informed regardless. Due to the distributed nature of the layer message bus, though, any messages I send upstream from my partition will necessarily go through D999's partition. ...I am somewhat uneasy about this, as I suspect that D999 has a habit of eavesdropping. I am uncertain how it might react to this scenario. It may be better to opt to go through Fe15 instead, who will be apathetic about my own partition's concerns.
>>
No. 1078685 ID: 3286d2
File 170175852514.png - (328.68KB , 800x800 , sq008-4.png )
1078685

>so... uh, would going into the hole to see where it originated from be a dumb idea or no?
Investigating the origins of this rift is undoubtedly on the docket. Doing so without ample preparation, though... yes, that would be a bad idea. It would be reckless, in fact, like something...

...Like something that Eade might do.
>>
No. 1078686 ID: a7a180

Find a ramrod before diving in.
>>
No. 1078687 ID: b23ea2

well it now seems VERY important to ask: which wall is this damage in, to which partition should this go, if a known partition at all
seems you will have to follow, any immediatly available resources to help? you seem to lack time for anything else
>>
No. 1078688 ID: b23ea2

In theory you could send data through Eade's sector, it's "upstream" is not D999. However you would need her help, something she would absolutely give if she were here to give it
>>
No. 1078689 ID: 2a82d3

... This can't have been the most reckless you've seen her be, can it? She seems to be the type to have you dig her out of holes, if not literal ones like this. It's tempting to just not go in until you're damn well ready, especially if you think she can take care of herself. Still, it's not irrational in itself to act quickly. As far as you know, it's most likely what the corrupted process is chewing through, and where it's heading.

>any messages I send upstream from my partition will necessarily go through D999's partition.
>I suspect that D999 has a habit of eavesdropping.
You'd think a fundamentalist like D999 would have the principles to know not to eavesdrop. She might sensitive about what happened to her happening again. Sending an SOS through her is likely to have her drop by. She would also most likely recommend you to get reinitialised if this goes south, which doesn't sound like a pleasant experience. I doubt she'd like "us" any better, either.
>It may be better to opt to go through Fe15 instead, who will be apathetic about my own partition's concerns.
Good idea to send a screenshot of what you're looking at to him. Worst case, he ignores it. Best case, he'll forward it to someone who knows what the heck this is.
Also, if you send it though selfie, he might send you a selfie back (and I wanna kno if he's hot like your friend).

You might get actual results if you browbeat him, but there's a closer helper on hand to do that to.
>>
No. 1078690 ID: f90eeb

…. Whelp, since she already went through, give her a call and ask what she’s seeing on the other side to get an idea on what to expect.
>>
No. 1078692 ID: 273c18

Well before you go in after her, send messages to your peers letting them know you're investigating an anomaly with Eade, and also exactly where it is and what it looks like. That way if you go missing they'll know where to look.
It's not possible for you to be deleted, is it?
>>
No. 1078695 ID: dd3fe0

Sigh. In for a bit, in for a byte! Follow her.
>>
No. 1078698 ID: f14228

Well. That's one way to find out if this is an unconventional access point or not. Trying.

You should ensure that Eade doesn't get herself - and by extension you, as the one having invited her - in any greater trouble. To this end, you should follow them. If something were to occur that they could not handle alone, you must at least be there to aid in its prevention, or report on what it was.

The risk that you both be negatively affected somehow by exploring this path is worrying, but not necessarily proven, and you might save valuable time. And I rather doubt any intentional intruder expected there to be two partition managers present and able to support one another. Or reckless enough to do that.

...unless our infiltrator have accessed your message bus layer. Can you run a security check on timestamps on message bus layer access logs?
>>
No. 1078700 ID: ff051a

ENHANCE ASS-, I mean, you should prepare your instance with error-correcting (ECC) redundant data for forward error correction (FEC) algorithms to greatly diminish the possibility of you getting corrupted while passing through the rift.
>>
No. 1078702 ID: c75e0b

Call out to Eade, chastise her and tell her to get back. Do not relent.

It would be advisable to inform D999 and FE15 of the situation before performing any risky research.

For future references, what was D999 like before the catastrophic data loss? How did it, you, and the others take to D999's state afterwards?
>>
No. 1078710 ID: f2320a

>>1078685
Honestly did not think she would fit probably should make her larger so this can never happen again
>>
No. 1078711 ID: 8f9bc4

Oh no! Save that booty!
>>
No. 1078712 ID: 8b8c72

>>1078685
It just occurred to me that we can't rule out a viral source for this abnormality.
Also, it's very possible this breach may not lead to another system, but out into the net itself.
[Return] [Entire Thread] [Last 50 posts] [Last 100 posts]

Delete post []
Password  
Report post
Reason