Hopefully not a dull bit.
TCMC equipped slaves donât want to escape, though. Thatâs the whole point of using them in the first place!
More relevant to your claims, though, just because you can remove an unsecured TCMC, that doesnât mean any of the medtechs installing them leave them unsecured. And while youâre a capsuleer, and can train up a skill CONCORD calls âCyberneticsâ, that skill actually covers the electronic/biological interface, not electronic security. And while the âHackingâ skill claims to cover that, itâs in regard to ship-borne analyzer modules.
So, maybe you can crack a TCMCâs security, but to do it, youâll need to be in your pod, connected via your own interface to an external security system that as far as I know doesnât currently exist. ie: in-facility analysis and decryption systems with a capsuleer interface for use on implanted cyberneticsâusually the work on such implants is done before theyâre implanted, or by dedicated systems with severe access controls that most certainly do not include âany ridiculously rich mass-murdering egger who manages to waltz in hereâ.
Now, sure, you can probably get something like that made, but then you have to deal with the consequences of people knowing you have such a thingâwhich they will, unless you make the entire thing yourself, because unless you kill all the techs involved (in which case, HOPE IT NEVER BREAKS!), someone is going to brag to someone about the cool thing they did this one time, in some bar somewhere. And if people know youâve got a thing like thatâor, you know, start worrying that the Sansha have a thing like that, then they start building subroutines into the TCMC that induce lethal biofeedback to each and every external connection point made.
After all, that kind of signal wouldnât have any effect whatsoever on a system that doesnât include a direct TCMP connection to a living organism.
Bottom line: You do a hundred different things as a capsuleer. Many of them are things normal humans canât even do. Donât make the mistake of assuming that just because CONCORD slaps a catchy label like âCyberneticsâ on a âskillâ that could just as easily be labelled âMan/Machine Interface Toleranceâ that youâre better than the guys who are probably more heavily augmented than you are toward this one task, at their job.
Cracking a Transcranial Microcontroller isnât any harder than a Transintestinal Programmable Logical Controller once you have hard physical access to it.
A Microcontroller is still a Microcontroller - even one transplanted into a cranium. If the CPU was as complex as you think - itâs classification would be upgraded to Microprocessor.
Itâs the the sophisticated I/O and peripherals nessesary for interfacing with a nervous system that make it more âspecialâ (expensive) than the Microcontroller that controls the windows of my hover car.
Take one not in somebodyâs skull to any tech repair shop and have it reprogrammed in an hour by a guy who took a two week virtual course from a Science and Trade Institute community college subsidiary.
The only tricky part is the brain surgery - but honestly who in this thread doesnât do a little DiY neuropsy from time to time?
A blank one, sure. Itâs not about the sophistication of the individual chip, though. Itâs about whatâs between you and it. And if you think there arenât security systems in place to prevent exactly what youâre talking about, youâre insane. Every single device in existence that can be remotely connected to can and has been hacked. Defensive measures are constantly being improved to combat the constant improvements in offensive measures. Frankly, itâs kind of shocking that there hasnât been a widespread malicious infection of capsuleers⌠but then, maybe there has, and itâs just waiting to go active, a ticking bomb in some percentage of us.
This is a never-ending arms race, a war between intrusion and security being waged by interests even more wealthy than we are, wielding minds at least as augmented as ours, and all of their augmentation is aimed at their job, instead of our generalist capabilities.
Your comparison point is effectively saying âlook, anyone can put out a match, so defusing an anti-matter bomb while it detonates is just as easy!â
I wasnât supposed to say anything but I can confirm there was a massive breech of Capsuleer implant security years ago. Nation won the war and you just think youâre still living out your free lives. Your minds are ours and we can make you think reality is however we wish.
Arrendis. You right now are part of a worker amalgamation designated #66023G on a fungal farm on an Ocean planet in Stain. Enjoy.
Perpetually riding that bleeding edge where a tiny misstep either leaves vulnerabilities, or triggers false positives that blow my implants and brain into tiny bits and pieces if intrusion is attempted, checking in.
Thereâs more security hardware than aug hardware in my head, and itâll never cease being improved. Iâd rather have a softclone take my place with a bit of memory loss than risk even the most infinitesimal intrusion and corruption.
That there are people who use remote access with their implants will never cease to amaze me. All such features are both air and fleshgapped for me. Worst case scenario, someone might get brief control of my arm prosthetic before it seizes and self-destructs.
Iâm not talking about remote access. Iâm talking about direct physical access to the chip. I.E. you have rescued a slave and spirited them away to a location capable of moderately advanced craniotomy.
Hell, way back in YC 106, during the hieght of the Gallente body modding crazy, every other household in the Caillie suburbs had a drone that could jury rigged by hobbyist to do a type three craniotomy. Nothing impressed a townie girl like a like a backlit transparent carbon polymer skull. Good times.
But I digress.
Crack open the melon of your newly emancipated friend and connect your leads directly to the pins of the chip. Boom. Instant poor manâs cyberknight.
If some Nefarious person wants to undo your efforts its not likely to be remotely. As you pointed out that is not an easy task.
They have to capture your friend alive and unzip his or her noggin one more time and directly fiddle with the chip.
And watch the anti-tampering security measures fry his brain.
Seriously. There are people whose only job is to prevent the kind of tampering your talking about from being possible. And they know a lot more about this stuff than you do. You âlearnedâ a skill by absorbing a pre-set data block from CONCORDâs databases. Theyâre the guys who define the skill youâll learn.
I built my first Microcontroller before I hit puberty. As for SoCT packages, you should probably stop getting yours from a seedy looking Thukker in a back alley.
And since then youâve focused on nothing else, right?
And I have no idea why youâre bringing the Society into this.
I believe he mentions the Society because I think itâs actually Genolution and X-Sense that set the standards that CONCORD uses for those things. And since the Jove âpassedâ, those organizations are under the control of the Society. I could be wrong. But fairly sure thatâs it.
SoCT invented skillbooks.
Now I have a mental picture of Vlad there saying "stop hitting yourself " as your arm slugs you in the stomach.
Funny imagery sure enough, but it seizes and self-destructs a bit too fast for that.
They set the technical standards, but CONCORD ultimately determines whatâs in the skills, just as they ultimately have jurisdiction over most of our specs.
Edit: And before anyone tries claiming CONCORD doesnât have control over that, in order to be sold, Skillbooks have to comply with SCC regulations and restrictions. SCC is CONCORD. If SCC says âin order to be marketed as a skillbook in the Neural Enhancement category, a product must encourage the user to eat only peanut butterâ, then they gotta do it.
The last time I had a conversation with someone as weird as you they would not shut up about memetic contignation vectors.
First, you started by claiming âAny caplsuleer[sic] with a single skill rank in cybernetics should be more than capable of safely removing a Transcranial Microcontroller.â Then you went all the way to âhave it reprogrammed in an hour by a guy who took a two week virtual course from a Science and Trade Institute community college subsidiaryâ. Then when it was again pointed out that thereâs an entire industry of people who specialize in making those statements untrue, bankrolled by megacorporate interests in all of the Empires and more heavily augmented in this field than any of us, you fall back to âI built my first Microcontroller before I hit pubertyâ, as if your claims of doing this werenât built from the beginning on the idea that the CONCORD-approved skillbooks give everyone the ability to do this.
The last time I had a conversation with someone as evasive and unwilling to actually address the points being presented, they knew they were full of crap but just didnât want to admit it.
Betting thatâs the case here, too.
Come now, you should be quite familiar with goalposts with MJDs by now.
Insert some sort of animated depiction of a drive-by mic drop with airhorns and ISK signs etc. My crew chief insists this is a thing.
In the interests of not getting into another lengthy argument where you do the very thing you claim others do, Iâm gonna make this my only response to that statement. Weâve covered that ground more than enough times already, you and I.