[i]Premise: Some secrets (or treasure) needs to be safe until its retrievable by the correct recipients. In additions to other security measures. Sender thinking that its better to provide the recipient a loyal reliable guide, than a sheet of paper.[/i]
Perhaps this could have been better done as a skill soft. But the paranoid "mapmaker" choose to use forks. . The idea is to create several Incomplete forks that hides a complete ego.
For now Ill call the method & the forks as "ciphered forks". Each is a bit of the puzzle thats scattered to evade capture. For additional safety additional copies & red hearings. The method can also be a elaborate hibernation attempt against a perceived threat.
Whats separating the ciphered forks from regular incomplete forks? Perhaps nothing, I imagine it difficult to differentiate ciphered forks from gamma forks, especially by outsiders. But ciphered forks could also exist as ego backups, beta & delta .
Because the complete ego could be jeopardized if the fragments diverge to much(or live an active life & die). These forks may not be intended to be active. Created to remain inactive, -until the recipient have all needed puzzle pieces merged.
Even if this Fork type or practice doesn't exist & never has. Crazies & scam-artists could claim that it does & they are this type (crazies even believing it). Hoping to coax the "lucky" into assisting them -with the promise of treasure!
[b]Active cipher forks[/b]
Perhaps some cipher forks are crafted that the kept secret is safe against possible corruption/divergence. Thus allowing such cipher forks to be active, maintain a identity & verify the recipient.
Another idea. Using Active Cipher Forks as a contest. Having the participants (perhaps the forks themselves) hunt down the needed ciphered forks.
[b]Adventure seed[/b] Sent out on a "easy" assignment & mostly a courtesy call, The operatives are to meet up with a visiting ally (non-local). Acquire some information, receive better details regarding the visit and report back. If needed assist the visitor as locals. Arriving instead is a corpse, lacking its cortical stack. This development was unexpected to say the least. The culprits for the theft are of the "deceased", Its delta forks have acted on a pre-set instructions, ciphered the ego & scattered it. [i]Edited: Corrected some grammar and wording[/i] There can only be one -Highlander
—
[img]http://boxall.no-ip.org/img/tc_userbar.jpg[/img]
[img]http://boxall.no-ip.org/img/exh_userbar.jpg[/img]
[img]http://boxall.no-ip.org/img/argo_userbar.jpg[/img]
[i]"To find fault is easy; to do better may be difficult."[/i]
Plutarch
+1 r-Rep , +1 @-rep

