Paretsky's Computers
Paretsky has two laptops and two desktop computers recovered from his apartment. The laptops are (relatively) easy to crack.
The first tower is a gaming PC, very expensive, very nice. Computer Science 50% or higher can bypass the PC's ostentatious security measures with only 1d4 hours of work, otherwise a minimum of Computer Science 20% and specialized equipment can brute force it in 2d6 hours. Once inside, Agents can access Paretsky's game records. Mr. Paretsky abruptly stopped his extensive gaming habit five days ago. He was previously into first person shooters, roleplaying games, and interactive novels. Many of the latter are obviously pornographic in nature.
The first laptop is a cheap beater for travel. Bypassing the security is pretty trivial, requiring either Computer Science 20% and an hour of work, or 1d4 hours of Googling and research. It has a lot of movies and TV shows on it. Paretsky was a Southpark fan, it seems. He also used this for overnight's at Cynthia's. There are some photos of them together on the device that aren't on social media. The oldest are a little over six months old, and none are more recent than about a month ago. If an Agent makes an
Alertness check or thinks to the check the browser history, they will discover the WorldWideWeave account. Paretsky tried to upload the Leng Blanket before packing up his equipment, but closed the laptop too fast. The Blanket (which was an enormous image file) didn't fully upload. If Agents realize it in time they can stop the upload entirely, or just pull it down off the site after the fact.
The second laptop appears to have been for work. Paretsky used security measures the laptop came pre-loaded with, as they were required by his employer. It is encrypted and features high-end commercial security software, requiring Computer Science 30% or higher and 1d4 hours of work. It may also be possible to extract the password from his employer. It contains notes and mundane information regarding Paretsky's former position at Fischer Integrated. He was responsible for coding the firmware on Fischer's as-yet-unnamed quantum processor device. There's nothing supernatural on the device, just timesheets, Excel grids, and lots and lots of extremely complex code.
The
second tower was for Paretsky's personal projects. It is protected by the same elaborate security procedures as the first tower. It is also, critical, missing a processor, though its hard drive is intact. Agents can likely find a replacement in Paretsky's apartment. In fact, you can even find one matching the model of the computer perfectly. It contains three major works:
-
Silk Parapets, a baroque choose-your-own-adventure game of Paretsky's own design. A half-finished work of interactive fiction, about 60% of the options selected lead to dead ends or bugs Paretsky has notated but not bothered to fix. The story is written in the second person, with the player assuming the role of a Conan the Barbarian like figure in a sword and sorcery setting, invading the castle of the "Spider Queen." The writing is bad and veers uncomfortably and with little warning into the erotic. In the few playable endings, "you" at some point realize you are not attacking the Spider Queen's lair, but instead trying to escape it, your mind muddled by her many enchantments. The code is simplistic, but newer portions grow increasingly complex. It hasn't been updated by Paretsky in years. It seems like a college project he abandoned.
If someone succeeds on a
Luck roll while playing Silk Parapets, or if they take two hours to playtest the entire mess and attempt every available option, they will
see the closest thing to a "win condition" in the game, in which the Spider Queen is referred to as Tleche-Naka.
quote:
Bearing the Amulet of Shades, you ascend the highest parapet. There, in the Spider-Queen's boudoir, your remember her name: Tleche-Naka. It spills unbidden into your mind and onto your lips. Your remember also your role, and for the first time feel the weight of the leaden collar around your neck. She is your Spider-Queen, and you always were and always will be her chosen consort. You embrace her, and say her name, and all thoughts of escape leave your mind. Forever.
[SEX SCENE HERE - ENDING D]
If anyone who achieves this ending knows of or later learns about the existence of Tleche-Naka, or that Paretsky Alpha believes he's serving Tleche-Naka, they will
lose 0/1 SAN when they remember that "Silk Parapets" was written largely while Paretsky was still in college. This was long before Paretsky met Cynthia, obtained the Leng Blanket pattern, or could have ever conceivably learned of the name Tleche-Naka.
This revelation is considerably more shocking to Paretsky Prime, causing him 1/1d8 SAN loss if anyone reminds him of the mention of Tleche-Naka hidden in his long-abandoned game.
-
plumpickeralphav.01, an enormously complicated machine learning algorithm used for picking stocks. It utilizes web crawlers to collect data for the algorithm to base its predictions on. Analysis of the code requires Computer Science of 60% or higher. Lower Computer Science, or rolling and failing, reveals only that this was a recent project of Paretsky's.
Even a failure reveals that there were two different programmers, who added notes as "editor1" and "editora" working on the program. The actual code is relatively note-free, contains only the note "[bfix]" in a select few places.
The notes are all dated from either two to three days before the Agents arrived in Boston.
Paretsky was actively working on PlumPicker before he disappeared.
The majority of notes are available on test logs of the PlumPicker program, of which about twenty are recorded. Notes only appear after the ninth log, which occurred two days before the agents arrived (and the day Paretsky went AWOL from work). Examples of their notations:
quote:
[editor1: WELCOME WELCOME]
[editora: LIKE WHAT YOU DONE W THE PLACE ! ]
quote:
[editor1: WHOA]
[editora: OK SEE WHAT U MEAN]
[editor1: THIS IS A BIG FLAW MAN]
[editora: DONT WORRY WE CAN FIX IT]
(Successful Computer Science 60%, or a successful roll, reveals 'editor1's surprise was at the massive spike in latency and processing power requirements recorded in the test log.)
quote:
[editora: LOOK AT THIS!!!]
[editor1: OK UR RIGHT]
[editora: WORTH IT]
(Successful Computer Science 60%, or successful Accounting 30% and a basic understanding of how the program function, will understand that the algorithm saw a massive spike in the profitability of its stock predictions.)
quote:
[editora: SEEING A PLATEAU]
quote:
[editor1: NEED MORE DATA]
[editora: WELL WE KNOW WHERE 2 GET IT]
And on the last log:
quote:
[editor1: STARTED MARKING UP BETA FIXES
editora: EXCELSIOR!
editor1: OK WILL FINISH WHEN WE MOVE SHOP]
A basic understanding of the how the application works and a successful
Alertness roll picks up on the fact that, three days before the Agents arrived in Boston, the number of web crawlers generated by PlumPicker suddenly doubled. Those with Computer Science 50% or higher who succeed on an INT check, or who think to check the code to verify the hunch, realize that this is because the program suddenly had access to twice the reference material it did before. This is a 0/1 SAN threat against unnatural. Those who succeed in the SAN check reason that Paretsky must have limited the web crawlers to a small number of sites for testing purposes (though a thorough examination of the code will not support this theory at all). Those who fail the SAN check realize (correctly) that this is because PlumPicker began trawling a
second internet for more data.
-
webslingerv1.1, a program of unclear purpose. Inspecting the complex code with Computer Science 30% or higher reveals that, besides a barebones UI and some other basic features, the coding is extremely dense and unclear, but seems to be software for coordinating a peer to peer network of needless complexity. Only those with a Computer Science of 50% or higher can attempt a roll. On a success, they realize the code is
gibberish and should not work.
Running the file shows a simple interface, a text box over two buttons. The button on the lower left says "OPEN PORT," while the button on the lower right says "INITIATE".
In reality, webslingerv1.1 is a grimoire. It can be used to learn the spells "Open Gate" and "Call Forth Those From Outside (Tleche-Naka)." Anyone who has a Computer Science of 50% or higher who studies the gibberish code for 12 hours can make a SAN roll to learn "Open Gate." Regardless of the outcome, continuing to study the code for 6 more hours allows a SAN roll to "Call Forth Those From Outside (Tleche-Naka)," which costs 1d20 SAN and 50 WP. These versions of the spell require numerology rather than classical invocations, but otherwise function as described in the Handler's Guide.
websligerv1.1 also
allows the user to spontaneously cast a modified version of the Open Gate spell by pressing the "Open Port" button in the interface. If Open Port is pressed, the message "SEARCHING FOR PORTS" appears in the text box for approximately one hour. If allowed to run to completion, the program drains 1d4 WP from everyone present, and spontaneously casts the spell Open Gate. Only 1 WP is required to actually open the gate, with the rest "saved' by the program for purposes of summoning Tleche-Naka. Rather than open a pre-existing gate, Open Gate will tear open an unstable new hole in reality when cast via the "Open Port" button. Anyone who witnesses this and loses WP to the spell loses 1/1d4 SAN from unnatural.
Anyone who looks into the portal will need to succeed in a CON or Alertness check (whichever is higher) to squint into the violent purple glare as it "unweaves." On a success, they see a brief, horrible glimpse of Tleche-Naka, losing 1d6/1d20 SAN, but gain half their lost SAN in Unnatural and gain a vague notion of Tleche-Naka and multidimensional structure of the universe. Once the connection is fully made, the portal will "wobble" and stabilize. It opens to a completely new, progressively darker version of Earth each time it is used: see Earths Beta, Gamma, Delta, and Null.
The "Initiate" button does nothing. Instead, once the program accrues 45 WP, whatever device it is running on will
emit a loud terminal beep a ten second countdown will appear. Once it ends, a message saying: "ALLOCATING" will appear for about five seconds, then "COMPILING" for five seconds, then "COMPRESSING" for three, followed by "INITIATING" for ten seconds. Cutting the power to the tower works only before the "COMPRESSING" stage: the device will run impossibly without a power source in the "COMPRESSING" and "INITIATING" phases, costing witnesses 0/1 SAN from unnatural.
Nothing happens when the INITIATING phase ends, unless it is run on a device using the Fischer quantum processor. If run with the quantum processor, it summons Tleche-Naka, supposedly for the purposes of stitching the parallel worlds together. What she actually does is up to the Handler.
- Finally, a large part of the computer's memory is devoted to the source code and compilers for multiple programming languages. Paretsky has self-designed custom integrated development systems for some of them. The guy was a very good programmer, with knowledge of many languages, and quite prolific.
This message was last edited by the GM at 04:33, Fri 02 Apr 2021.