José Antonio Rey has bring an interesting question to our chat, that was relay from Linda Besh, I think (correct me...

José Antonio Rey has bring an interesting question to our chat, that was relay from Linda Besh, I think (correct me if i'm wrong),
Why to the act of getting items from the portal is called Hacking?
I think that the origin of the question come from the fact that nowadays, when you speak about hacking you are normally referring to computer, so I can be difficult to picture how you can hack a portal or why that name was chosen.

Truth is that you can hack any network, computerized or not. For example:
Roof and tunnel hacking, is the unauthorized exploration of roof and utility tunnel spaces.

You can also hack a cable signal if you open it and pin to it another cable that would deviate the signal to the place you choose.

On that context, what you are doing when you hack a portal is acceding the portal network and deviating resources from the network to your own scanner.

Another question, taking into account that the work hacking is normally used to enter a network without permission is:
Should we have access to the portal network?
Iif we shouldn't, is everything that has happened since the scanner was released, a consequence of our illegal access to it?

Comments

  1. Indeed. Wasn't the while point of Epiphany Night that OLW crafted a power cube, and that it was a laborious and time consuming process? Now they litter the streets.

    In the Hank novella there was a description of natural resonators made of basic found materials, yet they are now described as xm constructs.

    ReplyDelete
  2. Wait... What about if the scanner does it? Identifies a source of XM, taps (hacks) into the leak, then constructs the items out of the raw material?

    ReplyDelete
  3. Yeah, i think the scanner can reproduce the process but can't initiate it. it's would be more like a printer  that only have a few design available. we can reproduce those design any-time we want to, but we can't introduce new design on the system.

    About what get the corporations, I will say that for what we know, the xm level have increased drastically since the apparition of the scanner, more XM, easier to work with it and create new structures, not all the structures need to be released to the public. only those that could generate even more XM.

    ReplyDelete
  4. And can only make gear according to specs obtained with a given access level? Plus more XM equals a higher level portal, and it obviously takes more XM to construct higher level kit.

    I always thought of portals as being holes in the fabric of space time, letting XM from other (or from between) dimensions seep in, so the more holes we punch, the more porous the boundaries become and the more XM there is.

    ReplyDelete
  5. I think it is because we are using our scanner to decode the ordered data and reorganize it into various constructs. I think because the process involves decrypting encoded data, it is referred to as hacking. It just seems too easy because the scanner does all of the actual hacking, not us. Excellent work, Oliver Lynton-Wolfe​​.

    ReplyDelete
  6. As far as I know, companies are the ones producing the constructs (e.g. IQTech and the Power Cube). Still, question around this. Wouls hacking be a two-way system? For both, introducing and removing stuff from this network?

    ReplyDelete
  7. Hacking in technical terms originally meant to work with or on something at the "bare metal" level and often - but not always - get it to do something more than it was originally designed to do. This was twisted by the media to be more sinister since hijacking usually required more hacking than the average person was able and/or willing to do. For example hijacking a cable feed requires cutting into a cable line - essentially hacking the cable.

    If we extrapolate this to hacking portals, we are accessing the portals at a level that the average person is unable or unwilling to do, and IQ Tech, Hulong, and Visur are enabling that access with technology that deals with XM at a more fundamental level than would be possible otherwise.

    ReplyDelete
  8. Jim Baker​ is right. When I develop some code for a program, I say I'm hacking on the code, but this didn't come to mind when thinking about this.

    ReplyDelete
  9. I imagine that the XM corporations have created the items in a fashion similar to 3d modelling. The scanner receives the information and acts as a slicer program is used for 3d printing. It uses the xm held in the scanner's reservoir as the base material and follows the pattern to create he object.
    If my memory serves me correctly, It was suggested by Oliver Lynton-Wolfe​ that the items almost designed themselves, like the patterns existed before the scanner. Does that mean that we are actually using shaper technology?

    ReplyDelete
  10. José Antonio Rey and the xm that gets put in your reserves. Hmm, I cant explain that one /:

    ReplyDelete
  11. José Antonio Rey I meant the xm from the passcodes. It could be explained if the passcode items were created using the xm in your tank

    ReplyDelete

Post a Comment

Popular posts from this blog

Created a Wiki page for the RPG being played at the MAGNUS Reawakens event - please help add intel and share...