Request for Information, and Equipment

Aug 02, 2010 22:45

I'm trying to track down some advanced communications equipment, preferably something above my own world's tech level. It also needs to be suitable for use by a small team during infiltration, and highly secure. While I'm aware of the comm rings, and they are functional, they are not a suitable answer to my requirements. That's why I'm putting out ( Read more... )

alex furest, john connor

Leave a comment

Comments 37

savin_ur_data August 3 2010, 06:01:36 UTC
I might be able to help you.

Reply

robots_omgh8u August 3 2010, 06:03:32 UTC
I was hoping you might.

Reply

savin_ur_data August 3 2010, 06:11:09 UTC
Would these work? I don't have any made at the moment, but it shouldn't take too long to make a few. We probably have all of the supplies in engineering.

Attached CODEC.DAT

Reply

robots_omgh8u August 3 2010, 06:27:57 UTC
I think these would work very well, thank you. Just tell me what components, and materials you need, and I'll have them ready for you.

Reply


jesushasagundam August 3 2010, 06:09:26 UTC
I don't think I can help you with hardware, but I've been working on encryption that should be virtually impossible to crack. Whenever you have the units I can probably get the software running on them.

Reply

robots_omgh8u August 3 2010, 06:29:35 UTC
I'd like to test that before I consider using it. I've cracked more than a few impossible encryptions before.

Reply

jesushasagundam August 3 2010, 06:34:07 UTC
All right. I'll encrypt the rest of the message.

[Heavily Encrypted.]

Let me know if you can read this. If I've done my job, you won't be able to.

*This encryption should take a super-skilled hacker like Dustin or one of the Doctors only five or six minutes to break.

The nasty part is that the algorithm mutates based on randomized parameters every four and a half minutes. So by the time you think you have it cracked, you need to crack something else.*

Reply

robots_omgh8u August 3 2010, 06:42:27 UTC
[John cracks it in about 13 minutes, he is used to hacking high level defense encryptions after all.]

The algorithm mutation was a nice touch, but it still needs some work. Here's some ideas on improving it. Best of luck with the project.

[Attached Document - Encryption Suggestions.txt]

ooc: The suggestions detail how John cracked it, and also includes ways to randomize the interval of mutation for the algorithm.

Reply


He'll be terrified to meet you, but he really wants to help. hack_rat August 3 2010, 11:03:46 UTC
I can't build much, but I can program a system easy. I think I've already almost got the programming on these comm rings sorted. I'd start from scratch though, make sure that I close as many holes as possible. Been meaning to try out this firewall I had been working on back home that actively tracks unauthorized access attempts and forces a data loop.

That... might not have made any sense to you...

Yeah, get back to me on that.

Reply

robots_omgh8u August 4 2010, 00:39:33 UTC
I understood you, and I might be interested in that defense protocol. Can you prepare something to show me what you're capable of?

Reply

He takes a few minutes to reply hack_rat August 4 2010, 00:49:55 UTC
[encrypted with several walls of security, but the real challenge is the loop-forcing AI that will re-direct access attempts into un-resolvable data loops. The first wall of defence is easy to get though, but it begins to recognise methods and catches you faster each wall. It would take someone like Major Kusanagi about 5-6 minutes to get through.]

It's a prototype I guess. I had been working on it back home. It's set there with no data, but I would train it personally, making it harder. I could probably also have the algorithm for the base defence mutate. Just meshing it would take some time though.

Reply

Encrypted| Had to say it was an AI didn't you lol robots_omgh8u August 4 2010, 00:55:26 UTC
[John cracks it in about 20 minutes. He might not have a direct connection to cyber space, but he knows a few tricks.]

You have some talent, but I have some concerns mainly with the AI you're using. Just how much control over it do you have, and what sort of safeguards are in place if you lose that control?

Reply


galacticfairy August 3 2010, 12:35:52 UTC
why ? ♡

Reply

robots_omgh8u August 4 2010, 00:39:50 UTC
I have my reasons.

Reply

galacticfairy August 4 2010, 00:47:52 UTC
unfriendly guy

Reply

robots_omgh8u August 4 2010, 00:59:27 UTC
Nope, I just know when, and where to keep my mouth shut.

Reply


killsfengshui August 3 2010, 13:51:23 UTC
Here's an idea.

Take two cans. Punch a waxed string between them. Pull it tight.

Voila. Instant secure communications device. Very tactical, I promise.

Reply

robots_omgh8u August 4 2010, 00:40:17 UTC
Range might be an issue though.

Reply

killsfengshui August 4 2010, 17:35:23 UTC
This is true. Hm.

I don't suppose you've considered setting fires at various points and having someone interrupt the flow of smoke with a blanket? All you'd need to do is memorize the pattern of signals, and they wouldn't make sense to anyone else!

Reply

standaloneshell August 4 2010, 18:45:03 UTC
If only there were a way to convey this information directly. Perhaps through the use of sound; you know, the human larynx can occasionally be modulated in such a way to make sounds, perhaps we could form some kind of rudimentary code or pattern to the sounds to convey meaning in that fashion.

Reply


Leave a comment

Up