>>
|
c6fa0a.jpg
Mystic Ruby Climber
c6fa0a
>>233728
LYAN HUG SAL.
Also, I think >>233729 is good, but perhaps might be better with slightly changed phrasing, i.e. "If you knew pre-wipe me... do you think I was responsible for creating this thing? Or am I just another victim? And why the hell would I ever create a mem-wiped backup? Do you think that could allow someone to avoid eventual destruction, assuming the mem-wiped section contained the basilisk?"
"... and were you my lover before, too, or were you just taking advantage of the situation to act on an old crush? ;)"
Oh, and realize that you now know exactly why habitat 58 kersploded. There's two ways - first, the back-up you were created from likely housed the basilisk, and got into system storage that way. Second, the Center ran a deep analysis on your code... it probably came across the basilisk during that analysys, too, causing it to be stored in even more locations. The description of the "malicious agent" the Center intelligence(s) discovered seems to match Sal's description of this basilisk.
Speaking of that... are backups usually stored just locally in the habitats, or is there redundant storage in other habitats... or other physical locations entirely? How far distributed could this basilisk already be?
The answer to this question is especially relevant to the proposed solution that the Lethe Center intelligence offered. Remember that its theoretical solution was to restore you to a previous state (presumably w/o basilisk) and merge a delta of... presumably your memories since then. Consider this possibility and whether or not it sounds like a realistic fix, given what you and Sal now know.
Also, take the time to consider the way this thing is interacting with the hardware you run on itself. Is there any alternate hardware you could transfer your, uh, software to that wouldn't suffer from this problem? I'm guessing not, but there could always be some old, less-efficient generation of the hardware that could be used in a pinch. Oh, and how much of this code / in what arrangement is it lethal? Sal should know the answer to this. If the code is harmless when broken apart and only damaging when stored together in a certain pattern, will analyzing fragments yield any interesting information?
|