http://robots-omgh8u.livejournal.com/ ([identity profile] robots-omgh8u.livejournal.com) wrote in [community profile] trans_channel2010-08-02 10:45 pm

Request for Information, and Equipment

I'm trying to track down some advanced communications equipment, preferably something above my own world's tech level. It also needs to be suitable for use by a small team during infiltration, and highly secure. While I'm aware of the comm rings, and they are functional, they are not a suitable answer to my requirements. That's why I'm putting out this request. If any of you are capable of helping me with this either through information, or by building the units yourself, I would appreciate it if you would contact me.

[identity profile] savin-ur-data.livejournal.com 2010-08-03 06:01 am (UTC)(link)
I might be able to help you.

[identity profile] savin-ur-data.livejournal.com 2010-08-03 06:11 am (UTC)(link)
Would these work? I don't have any made at the moment, but it shouldn't take too long to make a few. We probably have all of the supplies in engineering.

Attached CODEC.DAT

[identity profile] savin-ur-data.livejournal.com 2010-08-03 06:39 am (UTC)(link)
Alright! Let me see what we have in engineering and I'll get back to you.
jesushasagundam: (What's going on?)

[personal profile] jesushasagundam 2010-08-03 06:09 am (UTC)(link)
I don't think I can help you with hardware, but I've been working on encryption that should be virtually impossible to crack. Whenever you have the units I can probably get the software running on them.
jesushasagundam: (Why do I have a bird on my head?)

[personal profile] jesushasagundam 2010-08-03 06:34 am (UTC)(link)
All right. I'll encrypt the rest of the message.

[Heavily Encrypted.]

Let me know if you can read this. If I've done my job, you won't be able to.

*This encryption should take a super-skilled hacker like Dustin or one of the Doctors only five or six minutes to break.

The nasty part is that the algorithm mutates based on randomized parameters every four and a half minutes. So by the time you think you have it cracked, you need to crack something else.*
jesushasagundam: (Skyward)

[personal profile] jesushasagundam 2010-08-03 07:04 am (UTC)(link)
All right. It's a work in progress; I'll hopefully have something more final by the time you get the hardware.

Thanks for the suggestions.
jesushasagundam: (Okay ZAFT uniforms look cool)

[personal profile] jesushasagundam 2010-08-04 01:38 am (UTC)(link)
I will. Good luck with what you need.

He'll be terrified to meet you, but he really wants to help.

[identity profile] hack-rat.livejournal.com 2010-08-03 11:03 am (UTC)(link)
I can't build much, but I can program a system easy. I think I've already almost got the programming on these comm rings sorted. I'd start from scratch though, make sure that I close as many holes as possible. Been meaning to try out this firewall I had been working on back home that actively tracks unauthorized access attempts and forces a data loop.

That... might not have made any sense to you...

Yeah, get back to me on that.

He takes a few minutes to reply

[identity profile] hack-rat.livejournal.com 2010-08-04 12:49 am (UTC)(link)
[encrypted with several walls of security, but the real challenge is the loop-forcing AI that will re-direct access attempts into un-resolvable data loops. The first wall of defence is easy to get though, but it begins to recognise methods and catches you faster each wall. It would take someone like Major Kusanagi about 5-6 minutes to get through.]

It's a prototype I guess. I had been working on it back home. It's set there with no data, but I would train it personally, making it harder. I could probably also have the algorithm for the base defence mutate. Just meshing it would take some time though.

Encrypted| His speciality is AIs!

[identity profile] hack-rat.livejournal.com 2010-08-04 02:02 am (UTC)(link)
Well, I have a code that I put in every AI to prevent self-awareness first of all. Not to mention I have a hard-wired code that makes it recognize that my interference is always to maximize it's chances of success. It'll recognize me through a specific string of binary that only I know and would take anyone else multiple attempts to guess. Also, I have a parameter limit so that it does not learn anything aside from how to keep unauthorised access to a communication system.

I may love writing AIs, but I'm sorta scared of the idea of them gaining self-awareness.

Re: Encrypted|

[identity profile] hack-rat.livejournal.com 2010-08-04 03:58 am (UTC)(link)
Oh... god.

I am so glad I put in fail-safes for my AIs... Also, I have a rule against programming in personality.

We've never had an AI that's achieved self-awareness in our world, but the programmers that are capable of maybe making an AI capable of that are like me, and put in fail-safes.

Re: Encrypted

[identity profile] hack-rat.livejournal.com 2010-08-05 09:31 pm (UTC)(link)
It's a rather terrifying thought. We've never had an AI become self-aware in my world, and all the programmers who might be capable of making a self-aware AI have these fail-safes on their programming.

It seems a shame not to use AIs, with all their capabilities, but I can get where you're coming from. It sounds like all sorts of terrifying sci-fi stories from my world.

Well, there is the parameter limit, which it shouldn't be able to find a way around. Not to mention it's limited function- all it can do is loop data.

I developed the AI so that it learns via unsupervised learning with a multi-agent planning. If I re-work it so that it relies on supervised learning, you'll loose out on its ability to predict more skilled hackers, but it means that it will not achieve self awareness unless we train it too much. Essentially it will have the ability to reason within given parameters only.

If you would rather just a mutating firewall with a few other non-AI bells and whistles, I can do that too, but it'll be less secure.

Encrypted

[identity profile] hack-rat.livejournal.com 2010-08-06 03:03 am (UTC)(link)
You got it!

[identity profile] galacticfairy.livejournal.com 2010-08-04 01:09 am (UTC)(link)
you're typing. of course your mouth is shut.

[identity profile] galacticfairy.livejournal.com 2010-08-04 01:38 am (UTC)(link)
bye bye ♡

[identity profile] killsfengshui.livejournal.com 2010-08-03 01:51 pm (UTC)(link)
Here's an idea.

Take two cans. Punch a waxed string between them. Pull it tight.

Voila. Instant secure communications device. Very tactical, I promise.

[identity profile] killsfengshui.livejournal.com 2010-08-04 05:35 pm (UTC)(link)
This is true. Hm.

I don't suppose you've considered setting fires at various points and having someone interrupt the flow of smoke with a blanket? All you'd need to do is memorize the pattern of signals, and they wouldn't make sense to anyone else!

[identity profile] standaloneshell.livejournal.com 2010-08-04 06:45 pm (UTC)(link)
If only there were a way to convey this information directly. Perhaps through the use of sound; you know, the human larynx can occasionally be modulated in such a way to make sounds, perhaps we could form some kind of rudimentary code or pattern to the sounds to convey meaning in that fashion.

[identity profile] killsfengshui.livejournal.com 2010-08-04 06:48 pm (UTC)(link)
If wishes were horses, beggars would eat.

[identity profile] celery-brooch.livejournal.com 2010-08-04 08:33 pm (UTC)(link)
Image

That sounds like something I could make. I can start working on it as soon as you’re more specific on the requirements and functions.