The first is for the ship diagnostic.
Systems(+5)+Roll(+1) == Result(+6)
Purely narrative response. Did not roll to defend. This is a straight-forward Challenge.
From a software standpoint, there appears to be active interference, despite your userid being granted access. Rayfe has "limited access to files on jump drive and personnel. Read only, no editing" (as per Baylee's direction in
Blackout Message 40) really does mean that any direct changing of data on the Orishi--including new file creation--is prohibited. You might wanna talk to Baylee about that.
Of course, you have the ability to bypass this. You were a
Ice Cold Computer Crook.
Do you wish to bypass the read-only access assignment? I don't see any immediate plus or minus for doing so... so, I'm neither offering nor requiring a fate-point. But the decision might be important in the future.
What you can find out, though:
The Orishi has been in operation for over twenty years, and has passed through six Captain's hands. There is an exhaustive log of repairs and modifications. Of special note is that Eight Sticks (Standard Cycles) ago, it was in space-dock for a full cycle when the Orishi received a
massive refit.
Like, the refit cost almost as much as a new ship would have.
I don't care to itemize the list of what all needs to be repaired. Between you, Gothique and Gilina, though, I'm more than happy to say that you've got a comprehensive list of the hardware that needs to be replaced, the software that may need to be revised. Most important, you have identified the key Consequences that are on the Orishi's Consequence list:
- Minor(2): Dirty Trails
- Moderate(4): Half-Stripped
There
are still areas of the Orishi software landscape that are blocked off from you. The MAIA core, (the Mobile Artificial Intelligence Array), for instance, is one such area that is firewalled off. There are also petabytes of archives referenced in the Orishi's tertiary storage (
tertiary, in this case, typically means not physically connected to the system, but often accessible if someone were to connect the appropriate storage devices).
The second, to crack open the encrypted files on CSX.
Systems(+5)+Roll(+0) == Result(+5) vs Defend(+3) ==> SUCCESS
Some detail provided in a private line. Yours to do with as you wish.
This file is not a comprehensive list--but then,
none of your files are comprehensive.
The third, to burrow into the database and try to find out who, or indeed what, Gothique is.
Systems(+5)+Roll(+1) == Result(+6) vs Defend(-1) ==> Success with Style
Heh. I rolled particularly poorly. Well, I wanted to give you the information anyway, so that Gothique can reveal what she wants.... For now, I'll let her tell you what you found. I have added a couple of other details that might be pertinent and might not be fully known to her, either.
--
OOC: It's always a toss-up whether to make such posts public or private, but I think most of it should be public, as I want y'all to see most of it. But, yeah, there are secrets and, well, misinformation, in the Ptolomen database.
it's a little frustrating because I want to give you this information, but the unasked-for rolls make it feel like I should be offering something more for the success & success with-style. Really, the rolls were pretty unnecessary... it all moves things forward.