So lets say I'm a state-sponsored terrorist (so I have some resources to call on) and I want to knock off a major political figure in 10 AF. It seems exceedingly difficult. If I slip a bomb into an embassy party of something all I do is wipe out a bunch of morphs. Security teams recover the cortical stacks and load the despised oligarch into a new morph. I can use a big enough bomb to smash the stacks, but the the DO (despised oligarch) loads from a backup. If I really want to off the DO, I need to hit his secure backup site at the same time, or roughly the same time. This assumes I can figure out where the backup site is and that there is only one backup site. A smart DO might make some reserve copies of those backups and ship them off to alternate sites.
All of these conditions seem to make it very unlikely that I would be able to deflect blame from my nefarious sponsors. It does occur to me that if I can knock out the stack, its possible that a particularly busy DO might be so far behind in his backups that he can no longer function in his present position. If a DO has to rewind to six months or a year, s/he might find themselves unable to function effectively and be forced out by internal factions. That's a lot of ifs but could provide some rational for bothering to assassinate somebody.
So how would you go about killing a DO?
Welcome! These forums will be deactivated by the end of this year. The conversation continues in a new morph over on Discord! Please join us there for a more active conversation and the occasional opportunity to ask developers questions directly! Go to the PS+ Discord Server.
Assassinations
Thu, 2010-08-12 21:14
#1
Assassinations
root@Assassinations
"I usually have to infiltrate the DO's computer systems over a decently long period of time and gather enough intel on backup schedules and backup security. It can take quite a long time in the case of some more paranoid DOs, but transhuman security always gets sloppy. You'd be surprised how much a suggestions from a muse can get someone to do, and what you can get them to forget. "So anyway, after I've located all of his backups, I need to trigger a backup situation, so I activate one of the security guards I've programmed to kill him. The "emergency only" backups are usually the first ones they use, (I have to decide if that's true based on their psychological profile, which I've drawn up by now) so anything I couldn't find previously I know about now. "From there it's just a matter of exploiting all the vulnerabilities I've worked up and get a clean wipe all at once. "Alternately, I've programmed the DO to really think about themselves, who they truly are, and drive them to suicide. People are very thorough when they kill themselves."@-rep +1
|c-rep +1
|g-rep +1
|r-rep +1
]root@Assassinations
"It occurs to me that corrupting a backup doesn't need to be that thorough. If you flip a single bit, the checksum will comeback as a non-match, and then the backup is useless. Hell, you don't even need to do that, just leave a record in the logs of the backup being accessed by an unauthorized party, and they can't use it. "Even better, have one of their backups return a profile indicating a possible Exsurgent contamination. Firewall or it's h-corp counterpart won't take any chances, and will solve your problem for you."@-rep +1
|c-rep +1
|g-rep +1
|r-rep +1
]