Code: PIRULUK Posted May 22, 2014 Share Posted May 22, 2014 Soooo.... Over the last couple of weeks, I thought of what I find to be a nice setting for an RP. Unfortunately, I lack the time and opportunity required to manage an RP. That said, I don't want to just toss this idea in the recycle bin. Therefore, I am posting it here in the hopes that either a) I can find another person on here who would like to run it as an RP or that enough interest is garnered in the idea to turn it into an autonomous, unmanaged player-driven RP. So, without further ado: World Genre:Cyberpunk Background: In the future, humanity has been united under the governance of an international governing body known as the Valhalla Triumvirate. Created with the purpose of uniting mankind's efforts towards a common future, the Triumvirate is composed of 3 bodies: the Affluent, the Academic and the Elect. The Triumvirate has 30 members at all times, 10 from each body. The Affluent are the 10 wealthiest individuals in the world. The Academic are the 10 most respected intellectuals of the age. The Elect are a group of 10 representatives, selected from a pool of nominees by popular vote. All decisions regarding the entirety of the human race must be approved by the Triumvirate; for approval, unanimous consent of the leader of each body must be present. Background of the Triumvirate. The Triumvirate is constructed based on the fact that good governance requires three key factors: influence, rationality and popular support. The Affluent provide the influence - financial backing. The Academic provide reason and rationality. The Elect provide the face of the Triumvirate through which public approval is accrued. However, given that unanimous consent is required for a decision to be passed, naturally such a decision would be impossible for 3 different parties with differing agendas. Resultantly, bribes and blackmail form a significant part of the negotiation process. Thus, hackers are in high demand in this world; the hackers are employed to steal secrets and destroy data, serving as the agents of the Triumvirate members' illicit means of negotiation and coercion. This is possible through Yggdrasil, the global network that connects all electronic platforms and serves as a global network with near-unlimited processing capacity. All the secrets and files of each faction are stored on a different branch of the Yggdrasil, each segment protected by a different dynamic security net. Of course, given the extent of Yggdrasil's influence and importance, any kind of hacking is expressly prohibited; any individual proven to be a hacker will be executed, regardless of their employer. Despite that, there are the few that still choose to be hackers, some for the money, others for the thrill of the game. All are extremely talented, and all live on the edge of danger, constantly flirting with discovery and inevitable death. PC ideas: RPers would play as hackers, either in the employ of a Triumvirate faction, or freelance mercenaries, or even unaffiliated hackers working against the Triumvirate or for their own agendas. "Races": Human - Just an ordinary human, nothing special. Has the widest range of variance for capabilities. In some ways the weakest "race", but also has the most potential. Able to perform all kinds of hacking, some may choose to specialise. MenAug - A cyborg whose brain, but not body, has been augmented by cybernetics. Capable of higher processing speeds, higher memory capacity, and higher levels of logical reasoning. However, tends to be weak at lateral thinking, that is, unorthodox or even illogical trains of thought. Excels at Batter hacking, but lacks the creativity and unorthodoxy required for Construct hacking. Average at other types of hacks. PhysAug - A cyborg who has had limbs or organs replaced by cybernetics. Higher physical capabilities than normal humans, and can go days without rest. However, once the energy supply is depleted, it must be recharged either through electric or solar power before an electronic component can function again. For this reason, tends to be a bad idea to get cybernetic replacements for vital organs. Excels at Stealth hacking due to massive stamina. Relatively proficient at Batter hacking. Incapable of Construct hacking due to inconsistent material composition of body. Mod - a genetically modified human. Basically an enhanced human. Does everything a human can do, but better. However, Mods tend to be mentally or emotionally unstable, making them very hit-or-miss. If they freak out while hacking, it would instantly cause the hack to fail due to the break in concentration, while leaving a clear trail for the authorities to track. AI - An AI module that has attained self-awareness. Excels at all forms of hacking, but can only interact with the physical world through the takeover or proxy units, such as androids or computer terminals. Only race susceptible to reprogramming and EMPs. Due to the nature of an AI hack, if an AI hack fails, the controlling AI will be deleted along with the hack. Hack types: Batter hacking: brute force. Using an innumerable number of codes and generated passwords to bombard the system, working off the process of probability and elimination. Has the potential to be the fastest method, based on the mental processing speed of the hacker and his ability to handle multiple variables simultaneously. Stealth hacking: Using numerous negligible probes and small programs to find a way around the defences by identifying loopholes and vulnerabilities. Stealth hacking is much harder to identify and trace than other forms of hacking, but require extraordinary amounts of time and patience; many hacks require several hours of constant probing, making this method unfeasible for those lacking in both physical and mental stamina. Construct hacking: a relatively new form of hacking, it entails using programmes to reconstruct Yggdrasil within the user's mind as a VR interface. Using various translation protocols, the system reconstructs the user's consciousness as data within the network. While in the network, all the hacker's intentions and ideas can be materialised as objects in the VR system. When using this method of hacking, the hacker experiences security protocols and other viruses as physical obstacle, and his intuitive method of countering the obstacle would be translated into a string of code to address the obstacle. For instance, the user would perceive a firewall code as a literal wall of fire, and could materialise a gust of wind to blow the fire apart. The system would translate the intent of this action into a string of code which opens a small hole in the firewall. Construct hacking is by far the most powerful form of hacking, but it is also one of the most risky for various reasons: First, it requires the user to have a creative mind; only by thinking of unique solutions can the system bypass the obstacle in unorthodox ways. Second, once inside the Construct and within a designated area of Yggdrasil - such as the branches used by the Triumvirate - it is impossible to exit the construct until returning to the main network. Third, if one's consciousness experiences death within the Construct, there is a high likelihood of the hacker becoming brain-dead. That's all I have for now. Let me know what you guys think ^^ Link to comment Share on other sites More sharing options...
Chevaleresse Posted May 22, 2014 Share Posted May 22, 2014 At this point, I don't think there's even a question about me joining a roleplay. This sounds interesting, though. Does true AI exist in this world? EDIT: Here's my character. Improvising as far as a template goes. Name: Spell3 Type: AI Personality: Rather curious, and enjoys discovering even simple patterns. Introspective. Prone to strong emotions due to being unused to, well, emotions. Appearance: Elects to appear as a character that symbolizes what he is thinking. Almost always projects a humanoid form if encountered in cyberspace, but is clearly not a human performing a construct hack, as his face will flicker between fixed expressions of specific emotions. No real preferred form, but gravitates toward fantasy/scifi characters. Bio: Can't really write this yet, but something along the lines of a research project that was thought to have failed, so he isn't monitored very heavily, and works by pretending to be an anonymous Mod. Link to comment Share on other sites More sharing options...
Raindrop Valkyrie Posted May 22, 2014 Share Posted May 22, 2014 Would totally be an awesome Idea, though I don't think I personally can pick it up and run it, but I would be up for RPing in it lol. Link to comment Share on other sites More sharing options...
Code: PIRULUK Posted May 23, 2014 Author Share Posted May 23, 2014 Added races and types of hacks. Link to comment Share on other sites More sharing options...
Raindrop Valkyrie Posted May 23, 2014 Share Posted May 23, 2014 < would probably play an AI, I have a weird thing for the Geth in Mass Effect, so I would love to run a character like that. Link to comment Share on other sites More sharing options...
K_H Posted May 23, 2014 Share Posted May 23, 2014 (edited) I LOVE Sci-Fi, so count me in on this RP! i'd probably play as a Mod who specializes in Construct Hacking, since i can easily think of unusual ways to solve problems that are thrown my way, but i sometimes overreact to things. [EDIT]: here's the prototype character: Name: he doesn't have an actual name, but the experiment that led to him had his specimen labeled as "Specimen 007-Omega". Gender: Male Type: Mod favorite Hack Type: Construct Hacking Personality: somewhat curious, and loves finding patterns. somewhat shy at first, but quite friendly once you get to know him. Appearance: Very tall, an enlarged brain (and therefore, a literally big head.) (this gives him more mental capabilities, including a fluency with Technology), brown hair, blue eyes. Bio: this will be fully revealed when i post my "Signup Post" in the OOC/Signup thread, but it's something along the lines of him being one of the few surviving specimens from an experiment that was ended when the computer controlling the experiment went haywire, and the researchers only had enough time to get some of the specimens off of the station, and 007-Omega was trusted with the Experiment Logs. the experiment was labeled as a failed experiment, so he isn't monitored very closely, and he works for his own goals as a Construct Hacker. Edited May 25, 2014 by K_H Link to comment Share on other sites More sharing options...
Chevaleresse Posted May 24, 2014 Share Posted May 24, 2014 Thinking AI also, will post a prototype character soon. Link to comment Share on other sites More sharing options...
Code: PIRULUK Posted May 24, 2014 Author Share Posted May 24, 2014 Nice to see people interested, but... I still need people to run this thing. Link to comment Share on other sites More sharing options...
Chevaleresse Posted May 24, 2014 Share Posted May 24, 2014 I can do that, though I have no idea where you intend the plot to move. Link to comment Share on other sites More sharing options...
Code: PIRULUK Posted May 24, 2014 Author Share Posted May 24, 2014 That's the point; this is the world. The plot would be entirely up to the host. Though I could come up with one if needed. Link to comment Share on other sites More sharing options...
Recommended Posts