The Powers That Be ([personal profile] powersthatbe) wrote in [community profile] synodiporia_ooc2015-03-29 01:58 pm

The Digital Frontier.

THE DIGITAL FRONTIER
April 5th-May 17th


Welcome to the Grid. Many cycles ago, the Grid was inhabited by Cryptos, a set of programs which lived in isolation, developing their own strange system architecture, rumors of which were the wonder of the Network. But something the Cryptos built took on a life of its own: a digital cancer, a virus which purged the Grid of all recognizable digital life-forms, leaving only ruins and terrifying monsters called Automata. For the good of the Network, the Grid was sealed off, locked away behind many firewalls.

But time went on, and other programs developed more advanced protocols. Curious about the knowledge of the Cryptos, they sent two groups of programs to try and recover any data they could from the Grid. The first group formed The Partition - a secure area, reformatted and isolated from the rest of the Grid by the finest security the Network can offer. The Partition guards all port access to the rest of the Network. If there’s a security risk, the programs there - Defenders - won’t hesitate to purge the whole Grid, no matter what data would be lost.

Outside the Partition, on the edge of the corrupted Waste Lands, are the recovery programs - Miners. They sift the code of the old Grid, looking for valuable data artifacts and reconstructing them, fighting Automata, risking the corrupting of their own data, or even de-resolution, in order to restore what the Cryptos lost.

Every program on the Grid has both Purpose and Priority - a function it’s meant to execute, and the authority to do it. But as the Miners working the Frontier recover more and more code, their Purpose - discovery - and the Defenders’ - protection - come into conflict. And the Defenders have the Priority - their root administrator has Priority 0, where the leader of the Miners has only Priority 1. A program of lower station is unable to deny or resist direct orders from a superior, and that’s where the trouble starts.

The paranoid Defenders have begun to refuse access to the network, except to those programs willing to risk the integrity of their code and show their ability to defend themselves in the ancient Games - lethal gladiatorial combat which tests the parameters of a program to destruction. The Defenders reason that any Miner who can defeat their security could stand firm against Automata intrusions as well… but although this keeps things secure, it also leaves the Miners trapped on the edge of the Waste Lands, and lately, a rebellion has been brewing, low-Priority programs willing to defy authority and take over the Partition themselves. Some say that attitude itself is proof of Automata corruption…

But then, at last, there’s a breakthrough. The Miners have found an intact data structure, unmistakably the system architecture of the Cryptos, hidden beneath loads of random junk data. And when they restored it, they found Cryptos waiting within, waiting in stasis for the chance to reclaim their system for themselves… and another group of programs, mysterious Variables without Purpose or Priority, totally unrecognized by the system. Even the Cryptos aren’t sure what they are…

The Partition claims they’re disguised Automata, and the rebel programs believe the Variables are free algorithms who might be the best hope to liberate the Miners from the Defenders’ restrictions. The future of everything the Miners have worked for hangs in the balance…

Exploration Mechanics | Glossary | Casting Call | Skills | Map | Calendar | Player Resources | Questions | Plotting
leftbehindagain: (that's really stupid)

[personal profile] leftbehindagain 2015-03-30 01:23 am (UTC)(link)
Not sure if this will be a thing, but: For Investigators who have them, do Personas work and if so how much?
bemyangel: (tolerating)

[personal profile] bemyangel 2015-03-30 02:26 am (UTC)(link)
Annabel is brand new and she's going to be an investigator/Variable and generally be fascinated by all this. They don't really have computers where she's from, but she likes science and this is all interesting.

Ky (if he doesn't get the plot-important infiltrator role I put him in for) is going to be a Defender of priority 15 whose purpose is to guard. He's a very by-the-book sort of program who believes in adherence to higher duty, who sees things in black-and-white, right-or-wrong.
thirdarrow: (Default)

[personal profile] thirdarrow 2015-03-30 04:28 am (UTC)(link)
Adding on to this, can infiltrating Persona users have their Personas changed to AI assistants? Kind of like Bits but more intelligent.
darkhourdear: (Pharos [Hi c:])

[personal profile] darkhourdear 2015-03-30 08:40 am (UTC)(link)
HI DAD so phillip's going to make friends with a bunch of Variables probably this is ok right?
detectivewonder: (Default)

[personal profile] detectivewonder 2015-03-30 08:41 am (UTC)(link)

He will be very dubious. Introduce them first.

darkhourdear: (Pharos [Hi c:])

[personal profile] darkhourdear 2015-03-30 08:42 am (UTC)(link)
HELLO SMALL VARIABLE are you in alpha too let's be friends.

also read as no you're never getting away from phillip.

But yeah, Near and Melissa will probably be interacting in some capacity. We shall have to wait and see what they wind up with.
darkhourdear: (Pharos [idk my bff Minako?])

[personal profile] darkhourdear 2015-03-30 08:44 am (UTC)(link)
but if they want to be Cryptos then he can let them right

(how everyone knows phillip is not a security program)
detectivewonder: (Default)

[personal profile] detectivewonder 2015-03-30 08:46 am (UTC)(link)

If that is their place in the System. Which is for programs like Leo to judge, and not for us.

darkhourdear: (Pharos [idk my bff Minako?])

[personal profile] darkhourdear 2015-03-30 08:46 am (UTC)(link)
but they're nice.
detectivewonder: (Default)

[personal profile] detectivewonder 2015-03-30 08:47 am (UTC)(link)

Nice is not all that it is in us to be.

darkhourdear: (Pharos [I don't remember])

[personal profile] darkhourdear 2015-03-30 08:49 am (UTC)(link)
Dad can you form sentences like a normal program gosh.
detectivewonder: (Default)

[personal profile] detectivewonder 2015-03-30 08:52 am (UTC)(link)

Do you remember what 'Crypto' means?

darkhourdear: (Pharos [The end is coming])

[personal profile] darkhourdear 2015-03-30 08:53 am (UTC)(link)





no. :|;;;
detectivewonder: (Default)

[personal profile] detectivewonder 2015-03-30 08:53 am (UTC)(link)

'Secret.'

darkhourdear: (Pharos [The end is coming])

[personal profile] darkhourdear 2015-03-30 08:54 am (UTC)(link)
Oh.

So... what does that mean for us?
detectivewonder: (Default)

[personal profile] detectivewonder 2015-03-30 08:56 am (UTC)(link)

To be one of us is to be a holder of obscure data. We should not invite new friends who are unprepared for that privilege.

darkhourdear: (Pharos [The end is coming])

[personal profile] darkhourdear 2015-03-30 08:58 am (UTC)(link)
>: ok...

this is probably a conversation they're going to need in character even though Phillip will be less chatty than normal whoops
detectivewonder: (Default)

[personal profile] detectivewonder 2015-03-30 08:59 am (UTC)(link)

yes good

creativefool: (.13.)

[personal profile] creativefool 2015-03-30 05:01 pm (UTC)(link)
So would this mean that Kanji's been encoded in Shift-JIS or UTF-8? ... Sorry.

In any case! He's a system repair program: KAN-2 (Kinetic Assembler/Navigator Mk. 2), a Miner courier and engineer, to be precise. He runs spare parts and equipment around the frontier via lightcycle and helps keep things (and Programs) operational, damn good at putting things together, with a handful of Private Resource SubNet Allocation defensive and recovery Functions on call. Priority 11, an average working guy.
Edited 2015-04-02 22:25 (UTC)
doctor_connor_graham: (Default)

[personal profile] doctor_connor_graham 2015-03-30 05:27 pm (UTC)(link)
Connor is frazzled from the last Jaunt (the whole being immediately new and thrown into a plot-important infiltrator role), but he will be infiltrating as a Crypto. A wise healer, known for helping those attacked by the Automata while simultaneously learning everything he can about them. A walking encyclopedia of knowledge on these creatures. A priority 2?

Kohlani, if I get a chance to get her app in (*runs around in circles*) will definitely be playing a defender. Priority 3+ (if not higher), and specifically programmed to be a powerful attacker. Dexterity-based fighter, skilled in the use of discs and a regular in the games arena and often taken out on dangerous patrols where violence is heavily possible.
Edited 2015-03-30 19:22 (UTC)
devaluates: (sunshine)

[personal profile] devaluates 2015-03-30 07:49 pm (UTC)(link)
Heisuke is going to be infiltrating this time! He is going to be a miner of about lvl 5 or so if he doesn't get the casting call I signed him up for. He's going to be more of a search function - basically he hits new dangerous areas before the rank and file people.
purseownerisme: (Default)

[personal profile] purseownerisme 2015-03-30 08:11 pm (UTC)(link)
So we talked about a fight between the doppelgangers....

Page 2 of 12