×

Notice

The forum is in read only mode.
× Feel free to use this section to discuss your favorite (or least liked) characters. Let's keep it to one thread per character though, if possible.

Question Whisper

8 years 6 months ago - 8 years 6 months ago #1 by Dawnfyre
  • Dawnfyre
  • Dawnfyre's Avatar Topic Author


  • Posts: 422

  • Gender: Unknown
  • Birthdate: Unknown
  • so, what do you think sleethr is going to do with her?
    kin to both Sara, Gothmog and Nikki, also kin to the other sidhe in the universe.
    mage with unusual abilities with wards and containment circles, nanites giving her full c3 equipment, full medical tools to keep her alive no matter how badly injured, interfaces with weapons and vehicles.

    a lot of capabilities, easily a character that can become overpowered, so how can she be developed without going there?

    Stupidity is a capitol offense, a summary not indictable one.
    Last Edit: 8 years 6 months ago by Dawnfyre. Reason: typo
    8 years 6 months ago #2 by jmhyp
    • jmhyp
    • jmhyp's Avatar


  • Posts: 359

  • Gender: Unknown
  • Birthdate: Unknown
  • Well, many of us have read the fan fic version of her story and the canon version is not quite up to halfway through that. So we know what's going on for the next little while. Whisper is there to deal with GEO, I think. And she's afraid to play the game. So that's her first trial. Her fear is silly, of course. She just needs to tell the vehicle program not to engage with GEO. That could a very nerdy scene where she reboots herself with the vehicle module disabled so it isn't resident in her kernel.
    8 years 6 months ago #3 by Kettlekorn
    • Kettlekorn
    • Kettlekorn's Avatar


  • Posts: 1383

  • Gender: Unknown
  • Birthdate: Unknown
  • I think it would be fun if she joined the Goobers.

    I am the kernel that pops in the night. I am the pain that keeps your dentist employed.
    8 years 6 months ago #4 by Dawnfyre
    • Dawnfyre
    • Dawnfyre's Avatar Topic Author


  • Posts: 422

  • Gender: Unknown
  • Birthdate: Unknown
  • Kettlekorn wrote: I think it would be fun if she joined the Goobers.


    eeewwwww

    Whisper is the furthest thing from a goober.

    after all, a goobper is someone completely incompetent

    Stupidity is a capitol offense, a summary not indictable one.
    8 years 6 months ago #5 by Valentine
    • Valentine
    • Valentine's Avatar


  • Posts: 3121

  • Gender: Unknown
  • Birthdate: 17 Aug 1966
  • One thing I always wondered, was why Whisper didn't just set up a "Flag" in her system to check for her purse. Have it set so if she enters a vehicle or goes through a door, Checkpurse runs to see if she is carrying her purse.

    Don't Drick and Drive.
    8 years 6 months ago - 8 years 6 months ago #6 by Isodecan
    • Isodecan
    • Isodecan's Avatar


  • Posts: 114

  • Gender: Male
  • Birthdate: 16 Jan 1974
  • I don't think that Whisper is really used to being a cyborg yet. Granted, she could have her systems run checkpurse, but she isn't used to having a purse yet, and most of the things that we have seen her nanites do are part of their initial programming.

    Keep in mind, that although we have seen stories from considerably later, that at this point in terms of her canon story, Whisper is still in DC for her initial power testing.
    Last Edit: 8 years 6 months ago by Isodecan. Reason: add timing clarification
    8 years 6 months ago #7 by jmhyp
    • jmhyp
    • jmhyp's Avatar


  • Posts: 359

  • Gender: Unknown
  • Birthdate: Unknown
  • The real question is why she didn't call Nick from the van during the kidnapping. She should have been able to call from her mother's phone as she had already impersonated it by then.

    Or she could have had one of the CIA phones call the President. That's a Jade/Beltane level prank, I think. :)
    8 years 6 months ago #8 by Phoenix Spiritus
    • Phoenix Spiritus
    • Phoenix Spiritus's Avatar


  • Posts: 2595

  • Gender: Male
  • Birthdate: 20 Jan 1976
  • Whisper didn't impersonate her mother's phone, she interacted with it directly. It wasn't till she was in the mall phone shop,that she discovered how to steal the carrier information from phones that allows her to make phone calls without a phone.
    8 years 6 months ago #9 by Valentine
    • Valentine
    • Valentine's Avatar


  • Posts: 3121

  • Gender: Unknown
  • Birthdate: 17 Aug 1966
  • She needs to touch something to get full access. With her mom's phone she was either intercepting incoming calls or having it make the calls. The CIA phones were all off.

    Don't Drick and Drive.
    8 years 6 months ago #10 by jmhyp
    • jmhyp
    • jmhyp's Avatar


  • Posts: 359

  • Gender: Unknown
  • Birthdate: Unknown
  • Phoenix Spiritus wrote: Whisper didn't impersonate her mother's phone, she interacted with it directly. It wasn't till she was in the mall phone shop,that she discovered how to steal the carrier information from phones that allows her to make phone calls without a phone.

    She was not holding her mother's phone when she interacted with it. She should have been able to make a call without the phone being around. Just like she did with the phones in the store.
    8 years 6 months ago #11 by Kristin Darken
    • Kristin Darken
    • Kristin Darken's Avatar


  • Posts: 3898

  • Gender: Unknown
  • Birthdate: Unknown
  • What Whisper is doing with a working phone in the room is akin to turning that phone into a network tether. If there is no phone at all, however, that requires actually becoming a device in the network herself. Not the same thing even if the 'outcome' appears the same but also not so different that the leap in logic to make it possible is beyond her. Could she do it without gathering info from display models in a cell store? Yes. Obviously. Now that she has done so, connected to the cell towers and network using existing valid device data she simply has to do the same thing with fake data and either trick the system into accepting it or she uses the good data she does have to extrapolate other valid identities. Has she figured that out personally at this point? No. Very little of what she is doing here is conscious of the technical detail of what is really happening. Cyberpathy is like that.Mental/psychological constructs replace the need for actual code even though 'code' is technically being applied.

    Fate guard you and grant you a Light to brighten your Way.
    8 years 6 months ago #12 by Phoenix Spiritus
    • Phoenix Spiritus
    • Phoenix Spiritus's Avatar


  • Posts: 2595

  • Gender: Male
  • Birthdate: 20 Jan 1976
  • In the original testing they did for accessing her Mom's phone, Whisper had to be within 20 meters of the phone to do it (when her Mom walked that far down the corridor it stopped working, starting again once she came back in range).

    Whisper wasn't "cloning" the phone, she was somehow or other making use of the phone (either using her jitters to intercept the radio waves, or alternatively her cyberpath abilities to control the phone). Either way, when kidnapped she was out of rang of her Mom's phone and not yet knowledgable on how to "clone" a phone's SIM card / etc. ignorer to use its cellular access directly.
    8 years 6 months ago - 8 years 6 months ago #13 by jmhyp
    • jmhyp
    • jmhyp's Avatar


  • Posts: 359

  • Gender: Unknown
  • Birthdate: Unknown
  • And yet, she was able to put a working TV in her head without first spending time touching a TV to learn the cyberpathy of how TV is encoded and broadcast. It's not like understanding how to pull the image out of analog TV transmission is "obvious" so the answer here is Whisper can do anything with electronics and radio transmission whether she realizes it or not. Any limitations she has are self-imposed. She should always know her location within a foot because she can feel the GPS signals hitting her body. She should be able to listen in on all phone calls parsing for keywords and then zeroing in on those calls where she's near the same tower.
    Last Edit: 8 years 6 months ago by jmhyp.
    8 years 6 months ago #14 by Phoenix Spiritus
    • Phoenix Spiritus
    • Phoenix Spiritus's Avatar


  • Posts: 2595

  • Gender: Male
  • Birthdate: 20 Jan 1976
  • Part of Whisper's package is a jitters, a set of radio transceivers and transmitters, so yes, she can "hear" radio signals. But just because she can hear them, doesn't mean she can communicate using them. Most (not all) radio communications these days are secured and encrypted, with out the details of the security and the encryption being used its all just meaningless noise.

    Broadcast TV and Radio is relatively easy, Analog signals that are meant to be easily (and cheaply) converted from radio waves to picture and sounds, there is no encoding or security on them, its just a matter of covering the signals. Cellular networks are not simple. Modern cellular networks are digital, jump between frequencies frequently, encode data in multiple frequencies and using encryption algorithms, and the cell towers are programmed to ignore signals that do not belong on the network. Without the details in the SIM cards, the carrier bundles on the phones, and the cellular network programmed to accept the transmissions nothing is going to happen, no matter what package Whisper has in her head to "understand" the communications.
    8 years 6 months ago #15 by jmhyp
    • jmhyp
    • jmhyp's Avatar


  • Posts: 359

  • Gender: Unknown
  • Birthdate: Unknown
  • Phoenix Spiritus wrote: Part of Whisper's package is a jitters, a set of radio transceivers and transmitters, so yes, she can "hear" radio signals. But just because she can hear them, doesn't mean she can communicate using them. Most (not all) radio communications these days are secured and encrypted, with out the details of the security and the encryption being used its all just meaningless noise.

    Broadcast TV and Radio is relatively easy, Analog signals that are meant to be easily (and cheaply) converted from radio waves to picture and sounds, there is no encoding or security on them, its just a matter of covering the signals. Cellular networks are not simple. Modern cellular networks are digital, jump between frequencies frequently, encode data in multiple frequencies and using encryption algorithms, and the cell towers are programmed to ignore signals that do not belong on the network. Without the details in the SIM cards, the carrier bundles on the phones, and the cellular network programmed to accept the transmissions nothing is going to happen, no matter what package Whisper has in her head to "understand" the communications.


    Broadcast HD TV is digital and compressed. If you don't know the compression algorithm, it's just gibberish. If you don't know the meaning of packet header offset 7 bit 3 you might not decode the packet correctly. There's no reasonable way to JUST understand broadcast TV but fail to JUST understand the CDMA cell system. Until noted otherwise, it makes a lot more sense to say Whisper can decode/comprehend any and all radio transmissions and any limitations she has on doing so are all in her head. It is the only explanation that makes sense given what we've seen Whisper do.

    Same thing applies to RFID chips in the military IDs. They are dead simple. But they still work in a proper format and protocol and if you don't know the format, how do you figure them out? No one handed her a military ID with a RFID chip in before she started reading them. Also, Whisper apparently is putting out the RFID protocol, request for info since the RFID chip in an ID card is a passive system. It only broadcasts in response to a request.

    The other oddity with the phones of course is that display phones don't have SIM cards in them. When they prep your new phone, they put the SIM card in. So somehow, touching the phone showed her how to access the CDMA network even though the phone was missing its own primary identification piece, the sim card. The cell system doesn't allow a phone call to be made without a verified cell phone plan attached to the number in the SIM card (except for emergency numbers such as 911, 999, etc. since there's no billing involve in reaching those services). That verification takes place in the remote server many miles away from the cell tower. So being able to spoof that if rather impressive on its own. But what part of touching the phone gave her the ability to phreak into the remote server to have it return a go ahead single to the tower? Makes a lot more sense if her cyberpathy abilities are godlike and she is currently only limited by her imagination.
    8 years 6 months ago #16 by Phoenix Spiritus
    • Phoenix Spiritus
    • Phoenix Spiritus's Avatar


  • Posts: 2595

  • Gender: Male
  • Birthdate: 20 Jan 1976
  • In the latest posted chapters is the answer. Among the list of installed options is "JTRS - Joint Tactical Radio System" which is a combined multi-technology radio communications system, it is this that has all the "hardware" that is allowing Whisper to connect to and operate multiple radio technologies.

    Next, the US Analogue TV system wasn't turned off till July 2009 (according to Wiki), and in 2007 (when this story is set) less the a third of the US TV sets where capable of receiving Digital signals.

    But, dealing with that, there is a world of difference between decompressing publicly available compression algorithms and video codecs built into all modern Operating system such as MPEG-2, MPEG-4 and H.264 (the codec all digital TV signals use), and breaking the designed to be secret encryption on a cell tower signal, I mean, they are not even close! One is designed into nearly all computers, mobile phones, tablets, set top boxes, video cameras, you name it, it's in it! The other is designed in security and secrets hard coded into SIM cards and download to the phones only when they are correctly activated onto the network, and gatekeeper technology built into the towers to prevent propergation of messages unless the device details have been entered into the servers running the towers. I mean I can speak English, that doesn't mean I'm on the list of people allowed to enter the White House nor know the password for the Presidents computer!
    8 years 6 months ago #17 by jmhyp
    • jmhyp
    • jmhyp's Avatar


  • Posts: 359

  • Gender: Unknown
  • Birthdate: Unknown
  • Analog TV requires a physical cathode ray tube to turn the analog signal into a stream of electons that strike a phosphorous substrait causing a physical dot of colored chemical to glow. The array of these phosphorous blobs glowing makes the picture. You are saying that a radio system knows how to turn that stream of analog frequencies used to power a very physical system into a computer ready images without ever touching an electron device designed to turn said signal into the digital realm. But a series of bits using known encryption algorithms can be easily understood just by handling a cell phone for a few seconds.

    Let me be clear, Whisper is one of my favorite characters and I wish the conversion was going faster so she could interact with combat finals and summer vacation soon. But sometimes she is capable of impossible stuff and sometimes she isn't without interacting with a device that makes the impossible real. And that just seems like a mental block she has. Unless she's downloaded a lot of protocol specifications into her virtual computer which allows her to do the decoding of stuff she isn't consciously aware of (the nanites have a secret partition on her "hard drive" where they ASNI standards and RFCs and similar stuff) and they make use of when she asks for the impossible. Sometimes they just don't understand her until she accesses a device where those standards are in use, perhaps. You might convince that's how it works under the hood. But that just means she needs to find a radio shack and touch everything in there for a few seconds. :)
    8 years 6 months ago #18 by Valentine
    • Valentine
    • Valentine's Avatar


  • Posts: 3121

  • Gender: Unknown
  • Birthdate: 17 Aug 1966
  • Remember that a computer display of some sort was eaten when she first manifested, an later she touched a security camera. Potentially those could have been used for the video info. Also, the US Military had helmet cams in use, so the
    JTRS was likely video capable.

    Don't Drick and Drive.
    8 years 6 months ago #19 by jmhyp
    • jmhyp
    • jmhyp's Avatar


  • Posts: 359

  • Gender: Unknown
  • Birthdate: Unknown
  • Considering Whisper's rig was supposed to be "cool" and Ayla has a VR interface into her computer, I find it hard to believe that Whisper's rig involved anything as low technology as a Cathode Ray Tube (CRT).

    I think, though, at this point we've gone as far as possible discussing such things. Until Whisper next learns how to use something by just touching it (or not) there's not much more to say.
    8 years 6 months ago #20 by annachie
    • annachie
    • annachie's Avatar


  • Posts: 597

  • Gender: Unknown
  • Birthdate: Unknown
  • jmhyp wrote: Analog TV requires a physical cathode ray tube to turn the analog signal into a stream of electons that strike a phosphorous substrait causing a physical dot of colored chemical to glow.


    Nope.

    Sure that's how they were all done originally, but nope.

    LCD and Plasma TV's were around for years, as were LCD monitors for computers. All capable of displaying analogue TV signals, none of which use CRT's

    As were projectors/ rear projection TV's.

    All you need is an interpreter for the signal and a way of displaying it.

    All things conceivable built into some of the nanites that Whisper "ingested"

    As for the mobiles, chances are she already had the interface in her nanite package, she just never thought about the need to clone a sim to use it. Possibly, probably, not something a normal user of the particular nanites could do, even if they did work correctly for said person.
    8 years 6 months ago #21 by Dawnfyre
    • Dawnfyre
    • Dawnfyre's Avatar Topic Author


  • Posts: 422

  • Gender: Unknown
  • Birthdate: Unknown
  • her nanites are military spec, the C3 set would give her the codecs to handle the military ids and communication protocols, the access to the military network as a node of that network would guarantee she had the information to work with it.

    and piggybacking on the signal of her mom's cell, or even Mr. Reilly's is dramatically different than opening a cell connection without a cell. The encryption argument others have brought up doesn't hold up, what does hold up is the device id that is carrier specific and the limited frequency range that carrier works with. Whisper needs to get cells cloned from every carrier so she can know which frequency ranges they are using, as well as how they identify their cell phones in their network. What is flawed ( and properly belongs in the story arc thread ) until purchase the cell phones in stores are not activated on the carriers network, so they would not give her viable information to access a network.

    Stupidity is a capitol offense, a summary not indictable one.
    8 years 6 months ago #22 by jmhyp
    • jmhyp
    • jmhyp's Avatar


  • Posts: 359

  • Gender: Unknown
  • Birthdate: Unknown
  • Dawnfyre wrote: her nanites are military spec, the C3 set would give her the codecs to handle the military ids and communication protocols, the access to the military network as a node of that network would guarantee she had the information to work with it.

    and piggybacking on the signal of her mom's cell, or even Mr. Reilly's is dramatically different than opening a cell connection without a cell. The encryption argument others have brought up doesn't hold up, what does hold up is the device id that is carrier specific and the limited frequency range that carrier works with. Whisper needs to get cells cloned from every carrier so she can know which frequency ranges they are using, as well as how they identify their cell phones in their network. What is flawed ( and properly belongs in the story arc thread ) until purchase the cell phones in stores are not activated on the carriers network, so they would not give her viable information to access a network.


    She is bombarded daily millions of times a day by the frequencies used by most local carriers every time she walks within range of a cell tower. If someone in the same tower has their phone on, she automatically receives the tower's side of every communication and if she is close enough to the phone, she can hear that side of the communication as well. Brute forcing the communication encryption with that many available samples should be child's play for a cyberpath.

    side topic: Will her nanites will play nice with Sam's nanites. :)
    8 years 6 months ago #23 by annachie
    • annachie
    • annachie's Avatar


  • Posts: 597

  • Gender: Unknown
  • Birthdate: Unknown
  • Dawnfyre wrote: What is flawed ( and properly belongs in the story arc thread ) until purchase the cell phones in stores are not activated on the carriers network, so they would not give her viable information to access a network.


    While that is usually, damn near universally, the case down here in Oz, I wasn't sure about the US. I suppose there's a chance that the high end stores will have activated sim cards in them for demonstration. (Or a shonky sales manager has one for some reason. I've seen worse)
    But as I said, I've not heard of it down here.
    8 years 5 months ago #24 by sleethr
    • sleethr
    • sleethr's Avatar


  • Posts: 4

  • Gender: Unknown
  • Birthdate: Unknown
  • All this talk about cell phone cloning has given me an idea.

    Stingray

    Okay, maybe that would be much too powerful.

    With her cyberpathy, nanites & magic, it would be very easy for her to become a Mary Sue, but I very much wish to avoid that fate. Kristin has come up with an excellently evil explanation for her Wiz rating confusion. I'm sure it will cause Whisper much angst. muh-ha-ha! :whistle:
    8 years 5 months ago #25 by Isodecan
    • Isodecan
    • Isodecan's Avatar


  • Posts: 114

  • Gender: Male
  • Birthdate: 16 Jan 1974
  • jmhyp wrote: side topic: Will her nanites will play nice with Sam's nanites. :)

    I'm not completely sure I remember correctly, but if I do, the answer is no, particularly not in combination with how her limited cyberpathy interacts with both sets of nanites.
    8 years 5 months ago #26 by Dawnfyre
    • Dawnfyre
    • Dawnfyre's Avatar Topic Author


  • Posts: 422

  • Gender: Unknown
  • Birthdate: Unknown
  • Isodecan wrote:

    jmhyp wrote: side topic: Will her nanites will play nice with Sam's nanites. :)

    I'm not completely sure I remember correctly, but if I do, the answer is no, particularly not in combination with how her limited cyberpathy interacts with both sets of nanites.


    If you read the 4 chapters for Whisper 2, you see the result when Sam and Whisper meet. To me it seemed more like an os incompatibility issue. Hive is a group mind, Whisper's nanites are not.

    there is a couple of minor issues with the os and executables Whisper has in the origin story arc, no unix or unix-like os uses the .exe extension. They all have a file system flag and ANY file can be flagged executable. Only Microsoft uses the .exe
    ( Whisper has a linux os, she would not find a VPN.exe she would need to create a new network instance using ifconfig and add the login info to connect to the vpn.

    Stupidity is a capitol offense, a summary not indictable one.
    8 years 5 months ago #27 by jmhyp
    • jmhyp
    • jmhyp's Avatar


  • Posts: 359

  • Gender: Unknown
  • Birthdate: Unknown
  • Dawnfyre wrote: If you read the 4 chapters for Whisper 2

    Kind of hard to do now that the old forums are dead.
    8 years 5 months ago - 8 years 5 months ago #28 by Kettlekorn
    • Kettlekorn
    • Kettlekorn's Avatar


  • Posts: 1383

  • Gender: Unknown
  • Birthdate: Unknown
  • Dawnfyre wrote: there is a couple of minor issues with the os and executables Whisper has in the origin story arc, no unix or unix-like os uses the .exe extension. They all have a file system flag and ANY file can be flagged executable. Only Microsoft uses the .exe
    ( Whisper has a linux os, she would not find a VPN.exe she would need to create a new network instance using ifconfig and add the login info to connect to the vpn.

    The lack of a .exe extension is only a convention, not a rule; it does turn up sometimes even if it's unnecessary. For example, one of the programs I use was created in Mono, so the executable file will run without change in both Linux and Windows (as long as the Mono or .NET runtime is installed). Since the same file will just work in both OSes, they don't bother with having multiple downloads for each platform. They just distribute that one file with a .exe extension to keep Windows happy. Linux users can either rename it or just use it as-is.

    Also, sometimes people use DOSBox or Wine to run DOS or Windows software within Linux. You can even configure Linux to recognize Windows executables and automatically run them via Wine so that you can put them in the path and just run them by name instead of having to prefix them with a call to Wine.

    Incidentally, configuring a VPN does require rather a bit more than good old ifconfig.

    I am the kernel that pops in the night. I am the pain that keeps your dentist employed.
    Last Edit: 8 years 5 months ago by Kettlekorn.
    8 years 5 months ago #29 by Dawnfyre
    • Dawnfyre
    • Dawnfyre's Avatar Topic Author


  • Posts: 422

  • Gender: Unknown
  • Birthdate: Unknown
  • jmhyp wrote:

    Dawnfyre wrote: If you read the 4 chapters for Whisper 2

    Kind of hard to do now that the old forums are dead.


    I read them yesterday, on BCTS

    Stupidity is a capitol offense, a summary not indictable one.
    8 years 5 months ago #30 by jmhyp
    • jmhyp
    • jmhyp's Avatar


  • Posts: 359

  • Gender: Unknown
  • Birthdate: Unknown
  • Dawnfyre wrote:

    jmhyp wrote:

    Dawnfyre wrote: If you read the 4 chapters for Whisper 2

    Kind of hard to do now that the old forums are dead.


    I read them yesterday, on BCTS

    You can FIND anything on BCTS???? It is the worst story website for finding things unless you know exactly what you are looking for. Even knowing the author's name isn't a guarantee that you will find everything they've posted to BCTS.

    Add to that I didn't know the story was there and you can understand why I consider attempting to read Whisper 2 impossible.
    8 years 5 months ago #31 by Valentine
    • Valentine
    • Valentine's Avatar


  • Posts: 3121

  • Gender: Unknown
  • Birthdate: 17 Aug 1966
  • jmhyp wrote:

    Dawnfyre wrote:

    jmhyp wrote:

    Dawnfyre wrote: If you read the 4 chapters for Whisper 2

    Kind of hard to do now that the old forums are dead.


    I read them yesterday, on BCTS

    You can FIND anything on BCTS???? It is the worst story website for finding things unless you know exactly what you are looking for. Even knowing the author's name isn't a guarantee that you will find everything they've posted to BCTS.

    Add to that I didn't know the story was there and you can understand why I consider attempting to read Whisper 2 impossible.


    bigclosetr.us/topshelf/fiction/47841/whisper-dark-chapter-01

    Took me less than a minute.

    Don't Drick and Drive.
    8 years 5 months ago - 8 years 5 months ago #32 by Kristin Darken
    • Kristin Darken
    • Kristin Darken's Avatar


  • Posts: 3898

  • Gender: Unknown
  • Birthdate: Unknown
  • Valentine, you failed to take into account the complaining necessary as each step failed to work exactly as his copious knowledge of the subject suggested that it should and forced him to try six different esoteric options before finding what, to most people, was the obvious method.

    Which, btw, is also how 90% of the complaints in this thread can be categorized.


    No matter what hardware and software the components that went into creating Whisper happen to include and what technical details real world equivalents are forced to use/follow; Bree is primarily a mutant cyberpath. This is a psionic ability that allows mental interaction with machines and energy states on a similar level to a regular psychic's interaction with the mind and nervous system. While it often approaches and syncs up with scientific understanding of similar technical processes, it is non-the-less a purely psychological technique where in complex energy patterns are read, translated, and written in ways that the cyberpath's mind is able to manipulate.

    A cyberpath who knows code might manipulate systems on a code level, creating functions, modules, or entire programs that yield the right results. A cyberpath who understands hardware architectures or electronics, might instead manipulate the electrical flow or digital stream in a way that the existing 'code' and hardware give the desired result. A cyberpath who isn't technically savvy might manipulate data like a gamer, in which everything is a pre-programmed black box skill or action which they don't really understand but can still trigger/apply to produce a result. Some of those things are going to be explainable by a scientist who knows how that tech works. Some of those things, they're going to throw their hands in the air and be confused... because there's just no scientific explanation for how the cyberpath got it to do that.

    If you want William Gibson style cybertech hacking in the Net where its all 100% about the tech and the code, you're making a mistake. That sort of thing CAN exist in the WA Universe... but Whisper is NOT that.

    Fate guard you and grant you a Light to brighten your Way.
    Last Edit: 8 years 5 months ago by Kristin Darken.
    8 years 5 months ago #33 by jmhyp
    • jmhyp
    • jmhyp's Avatar


  • Posts: 359

  • Gender: Unknown
  • Birthdate: Unknown
  • Back on topic, the meeting with Sam is still not canon and there are a few glaring issues with Whisper 2 that we don't know how they will be addressed (the April 13 attack on Whateley by GOOs is notably absent from recent canon stories). They probably don't affect the meeting with Sam, but you never know.
    8 years 5 months ago #34 by Valentine
    • Valentine
    • Valentine's Avatar


  • Posts: 3121

  • Gender: Unknown
  • Birthdate: 17 Aug 1966
  • April 13 is the Friday during Spring Break.

    Don't Drick and Drive.
    8 years 3 months ago #35 by joreymay
    • joreymay
    • joreymay's Avatar


  • Posts: 116

  • Gender: Female
  • Birthdate: Unknown
  • annachie wrote:

    Dawnfyre wrote: What is flawed ( and properly belongs in the story arc thread ) until purchase the cell phones in stores are not activated on the carriers network, so they would not give her viable information to access a network.


    While that is usually, damn near universally, the case down here in Oz, I wasn't sure about the US. I suppose there's a chance that the high end stores will have activated sim cards in them for demonstration. (Or a shonky sales manager has one for some reason. I've seen worse)
    But as I said, I've not heard of it down here.


    Here in the US, it is very common for some (or all) of the demo phones to have active sim cards tied to limited accounts. For instance, the carrier will not place overseas calls from that account, but will place calls within the continental US. This is a practical necessity for demonstrating some features and call quality. Those accounts will also process SMS and data like a regular account, for the same reason.

    That was just as much the case in 2007 as it is now.
    8 years 1 month ago #36 by TheAkashicTraveller
    • TheAkashicTraveller
    • TheAkashicTraveller's Avatar


  • Posts: 4

  • Gender: Unknown
  • Birthdate: Unknown
  • In he UK most of the time they don't even put in actuall phones. We just get dummy phone without any electronics.
    7 years 4 months ago #37 by Valentine
    • Valentine
    • Valentine's Avatar


  • Posts: 3121

  • Gender: Unknown
  • Birthdate: 17 Aug 1966
  • Reading through the Hospital thread got me wondering how smart Whisper's nanites are. IIRC early on they were "eating" needles, and other stuff until she started telling them what not to eat. Now if she were knocked unconscious, something that might be easy to do at Whateley*, would her nanites remember to not eat the IV needles?

    *She was forced into a reboot by an MRI machine. Checking on Magnetic Field strengths, an MRI runs from 1.5 to 9.5 Teslas. A Neodymium magnet is 1.25 Teslas. A powerful loudspeaker magnet is 2.4 Teslas. She should definitely stay away from CERN and the LHC.

    Don't Drick and Drive.
    7 years 4 months ago #38 by annachie
    • annachie
    • annachie's Avatar


  • Posts: 597

  • Gender: Unknown
  • Birthdate: Unknown
  • Well in the case of needles, remember that they were all failed nanite experiments :)
    7 years 4 months ago #39 by annachie
    • annachie
    • annachie's Avatar


  • Posts: 597

  • Gender: Unknown
  • Birthdate: Unknown
  • Actually, it's been a while.

    Have we heard from Sleethr lately?
    7 years 3 months ago #40 by TheAkashicTraveller
    • TheAkashicTraveller
    • TheAkashicTraveller's Avatar


  • Posts: 4

  • Gender: Unknown
  • Birthdate: Unknown
  • There's this profile ( sleethr ) that was last online 9 months ago which seems to have created the 2015 Whisper uploads only.
    7 years 3 months ago #41 by DireApostasy
    • DireApostasy
    • DireApostasy's Avatar


  • Posts: 13

  • Gender: Unknown
  • Birthdate: Unknown
  • Sleethr made a blog post on BigCloset a couple of days ago (this one) . As regards Whisper, apparently the muse just isn't there, ergo nothing new on that front.
    6 years 4 weeks ago #42 by Malady
    • Malady
    • Malady's Avatar


  • Posts: 3893

  • Gender: Unknown
  • Birthdate: Unknown
  • Was thinking on how Whisper's a Network-focused cyberpath.

    Could she break into the DARPA Intranet and stuff, bypassing through the logins, etc, and just hasn't due to a tunnel vision of not knowing what her power really is, and thinking its all the nanites' doing??

    What could she do without the nanites??
    6 years 4 weeks ago #43 by Valentine
    • Valentine
    • Valentine's Avatar


  • Posts: 3121

  • Gender: Unknown
  • Birthdate: 17 Aug 1966
  • Malady wrote: Was thinking on how Whisper's a Network-focused cyberpath.

    Could she break into the DARPA Intranet and stuff, bypassing through the logins, etc, and just hasn't due to a tunnel vision of not knowing what her power really is, and thinking its all the nanites' doing??

    What could she do without the nanites??


    Remember she quite easily broke into the Fey's Whateley laptop. She probably wouldn't have a problem getting into a lot of networks.

    Don't Drick and Drive.
    6 years 4 weeks ago #44 by Ametros
    • Ametros
    • Ametros's Avatar


  • Posts: 435

  • Gender: Male
  • Birthdate: Unknown
  • The impression I get from Whisper's character is that she isn't particularly skilled or capable of breaching the digital layers - even with the nanites - but she's far more effective if the target is in physical range of her cyberpathy. That plus her "inherited" skills from GEO make her, in my opinion, uniquely adapted to infiltrating and breaching any network with an air gap as part of the security design.

    Seriously, thank you for your time and effort. It is appreciated.
    3 years 10 months ago #45 by Erianaiel
    • Erianaiel
    • Erianaiel's Avatar


  • Posts: 133

  • Gender: Unknown
  • Birthdate: Unknown
  • Valentine wrote: Reading through the Hospital thread got me wondering how smart Whisper's nanites are. IIRC early on they were "eating" needles, and other stuff until she started telling them what not to eat. Now if she were knocked unconscious, something that might be easy to do at Whateley*, would her nanites remember to not eat the IV needles?

    *She was forced into a reboot by an MRI machine. Checking on Magnetic Field strengths, an MRI runs from 1.5 to 9.5 Teslas. A Neodymium magnet is 1.25 Teslas. A powerful loudspeaker magnet is 2.4 Teslas. She should definitely stay away from CERN and the LHC.


    Front row of a Metallica concert might not be the brightest idea either.
    3 years 10 months ago #46 by lighttech
    • lighttech
    • lighttech's Avatar


  • Posts: 584

  • Gender: Unknown
  • Birthdate: Unknown
  • Erianaiel wrote:

    Valentine wrote: Reading through the Hospital thread got me wondering how smart Whisper's nanites are. IIRC early on they were "eating" needles, and other stuff until she started telling them what not to eat. Now if she were knocked unconscious, something that might be easy to do at Whateley*, would her nanites remember to not eat the IV needles?

    *She was forced into a reboot by an MRI machine. Checking on Magnetic Field strengths, an MRI runs from 1.5 to 9.5 Teslas. A Neodymium magnet is 1.25 Teslas. A powerful loudspeaker magnet is 2.4 Teslas. She should definitely stay away from CERN and the LHC.


    Front row of a Metallica concert might not be the brightest idea either.


    As a guy who set up and ran lots of the touring concerts in orange county California in the 90's
    most of those HUGE speaker stacks on stage are empty shells for show...noise regs/laws and speakers on floors really don't carry well.
    The ones hanging in the air from truss are real!

    now running EFX for films--stay way from the OLD ass lightning machines...those have power!
    and the newer ones...well at power up they are beasts

    Part of the WA Drow clan/ collective
    Author of Vantier and Shadowsblade on Bigcloset
    Moderators: WhateleyAdminKristin DarkenE. E. NalleyelrodwNagrijMageOhkiAstrodragonNeoMagusWarrenMorpheusWasamonsleethrOtherEricBek D CorbinMaLAguASouffle GirlPhoenix SpiritusStarwolfDanZillaKatie_LynMaggie FinsonDrBenderJGBladedancerRenae_Whateley
    Powered by Kunena Forum