Jump to content

Restless Souls/Technology: Difference between revisions

m
"Uh-oh, looks like someone's got a case of the 'the the's"
m ("Uh-oh, looks like someone's got a case of the 'the the's")
Line 348: Line 348:
: The division grew huge, and soon demanded a proper location for training and everything else that shouldn't be interrupted by random TCTF visits.
: The division grew huge, and soon demanded a proper location for training and everything else that shouldn't be interrupted by random TCTF visits.


: During the the Great Uprising, the Network took the opportunity to spread influence on the African continent.
: During the Great Uprising, the Network took the opportunity to spread influence on the African continent.


: They supported countries that didn't want to get annexed by the WCG.
: They supported countries that didn't want to get annexed by the WCG.
Line 366: Line 366:
: They use drones to transport legal and illegal goods and attack drones owned by the TCTF. (See [https://phys.org/news/2015-05-cicadas-military-swarm-mini-drones.html HERE] for RL mini drones.) Those became reprogrammed to have ''[[Quotes/Diary#CHAPTER_06_._COUNTERATTACK|blind spots]]''. The TCTF tried to locate the servers the Network used. They forced telecommunication companies to give them full access to all their data. But the Network anticipated this, and took preparations. The TCTF is using the long-established spyware of intelligence agencies, even more powerful than [[wp:Regin_(malware)|Regin.]]
: They use drones to transport legal and illegal goods and attack drones owned by the TCTF. (See [https://phys.org/news/2015-05-cicadas-military-swarm-mini-drones.html HERE] for RL mini drones.) Those became reprogrammed to have ''[[Quotes/Diary#CHAPTER_06_._COUNTERATTACK|blind spots]]''. The TCTF tried to locate the servers the Network used. They forced telecommunication companies to give them full access to all their data. But the Network anticipated this, and took preparations. The TCTF is using the long-established spyware of intelligence agencies, even more powerful than [[wp:Regin_(malware)|Regin.]]


: Since the the Network always had a close eye on TCTF operations, they developed a virus-infecting virus/spyware codenamed [https://phys.org/news/2011-03-virus-eating-virus-antarctic-lake.html Sputnik].
: Since the Network always had a close eye on TCTF operations, they developed a virus-infecting virus/spyware codenamed [https://phys.org/news/2011-03-virus-eating-virus-antarctic-lake.html Sputnik].


: The sputnik viruses are part of the Fat Loot project. It was developed as a two-track strategy. Intelligence agencies have already the capacity to monitor all relevant electronic communication. So the Network took the dangerous but most rewarding course of action, infecting these agencies in one way or another. At the same time, they took over telecommunication companies either by buying the whole companies or placing employees in key positions. This way the Network has a double check on all data which allows them to react to situations where the counter-intelligence gets suspicious. Every data stream is a trace. With growing monitoring, they expand their grip on the companies and place their programs at the agencies into hibernation, only using them when it's absolutely necessary.
: The sputnik viruses are part of the Fat Loot project. It was developed as a two-track strategy. Intelligence agencies have already the capacity to monitor all relevant electronic communication. So the Network took the dangerous but most rewarding course of action, infecting these agencies in one way or another. At the same time, they took over telecommunication companies either by buying the whole companies or placing employees in key positions. This way the Network has a double check on all data which allows them to react to situations where the counter-intelligence gets suspicious. Every data stream is a trace. With growing monitoring, they expand their grip on the companies and place their programs at the agencies into hibernation, only using them when it's absolutely necessary.
Line 988: Line 988:
----
----


Solid Chrysalis tissue grows with static metamorphosis. Imagos can also utilize that graphene-based protection. However it's more flexible and uses electric energy to increase strength. Basically, AVATARA ported the graphene shield technology to an all-bio framework making Daodan host also more resistant to physical dangers. Muro experienced so often static metamorphosis that the shield code became part of his Imago form. - Breathing continues through tracheae (fine ''pipes'' that transport air from skin to the interior areas). Since the the tracheae aren't very effective, metabolism is slowed down and the developing organism appears lifeless. In extreme conditions, e.g. when buried, the Daodan can switch to [[wp:Anaerobic_respiration#Examples_of_respiration|anaerobic respiration]]. These pathways are either acquired from existing symbiotic species in the human flora or the Daodan reach out to species that lives nearby in the ground. (This holds also a possible chance to utilize Bioc organelles/structures to get energy. It should help Daya's effort to establish a three-way symbiosis.)
Solid Chrysalis tissue grows with static metamorphosis. Imagos can also utilize that graphene-based protection. However it's more flexible and uses electric energy to increase strength. Basically, AVATARA ported the graphene shield technology to an all-bio framework making Daodan host also more resistant to physical dangers. Muro experienced so often static metamorphosis that the shield code became part of his Imago form. - Breathing continues through tracheae (fine ''pipes'' that transport air from skin to the interior areas). Since the tracheae aren't very effective, metabolism is slowed down and the developing organism appears lifeless. In extreme conditions, e.g. when buried, the Daodan can switch to [[wp:Anaerobic_respiration#Examples_of_respiration|anaerobic respiration]]. These pathways are either acquired from existing symbiotic species in the human flora or the Daodan reach out to species that lives nearby in the ground. (This holds also a possible chance to utilize Bioc organelles/structures to get energy. It should help Daya's effort to establish a three-way symbiosis.)


{{divhide|German translation ...}}
{{divhide|German translation ...}}