#3E-Consumer Goods
Explore tagged Tumblr posts
3rdeyeinsights · 2 years ago
Text
0 notes
gamerhamlet · 1 year ago
Text
guhhhhh I love my solo bg3 run and character v much but my multiplayer campaign is so special to meeeee 💕 like tldr but it soothes a lot of the problems I have w dnd/forgotten realm’s writing to talk them out w others instead of slogging through them alone while writing revisions in my head
2 notes · View notes
doctentaclesrpg · 3 months ago
Text
I’m finally releasing the first draft version of the project that has consumed my summer. I’ve run a decade-long Infernal campaign, and while I can’t in good conscience recommend the 2e Infernal book to anyone, it still played a pivotal role in shaping a deeply important part of my life. The official 3e version is due out in a few years, and I have high hopes for it, but I wanted to capture my own vision of Infernals first.
The project still has a long way to go—it’s probably the largest TTRPG endeavor I’ve ever undertaken—but I’m starting to see its foundations take shape.
3 notes · View notes
talenlee · 1 month ago
Text
3e: Kythons
Where the creeping edges of reality ripple and shimmer, where foul and dark powers reach into the world to try and plant their foul fingertips there, there lay hallmarks and signs. There is a chance your world has tasted them, the chance that they have been left there, at some point by some errant and cruel source, and therefore, the only opportunity you have now is to wage war on their very existence, or to abandon your world, knowing it is a matter of time before the ultimate predatory violence bursts forth from some forgotten earthen womb, and renders all that you considered a civilisation into the same, cyclical, eternal pereptuum of feasting.
Content Warning: This article is going to be about a creepy monster from 3rd edition, D&D, and involve discussing some of the details of its source book, the Book of Vile Darkness. The art gets gory and bloody after here.
Kythons are a threat. They are a menace. They are first and foremost a creature of violence, a ravening mouth with a selection of limbs around it; sometimes just two and a tail, running feet that let the maw chase you, or sometimes it’s four limbs and two legs, with hands that can grasp and wield weapons and threaten your life and limb.
Most resembling some mix of insect and reptile, a Kython is an intelligence that seemingly exists on a different plane to other intelligence; they have seemingly no need or want for conversation or diplomacy, and they wield weapons they manufacture entirely on their own. While weak as — children? infants? nymphs? spawn? — they still are threatening to full grown adult adventurers from birth and it’s only a matter of time before they overcome, overrun, and consume everything.
The Kythons are dangerous not because they hate you but because they are incapable of good, honest, human, hatred, or somesuch. You see this is a Kython broodling, a smaller kind of Kython. And when they eat your face, nobody can hear you scream.
Look, they’re nasty gribbly things that are both alien (in that nothing is like them) and alien (in that they were put on the world from an outside place) and alien (in that they very much are trying to create the feeling of fear and horror as you remember from the movie Aliens if you’ve seen it). They are the tension of a blockbuster movie about failure and incompetence and desperation against the implacable inexorable force of a pitiless consuming force, turned into a D&D monster you can hit so it drops treasure.
Now, setting aside how useful or reasonable these things are as a threat, there’s a lot of work being put in to making these things both incredibly nasty and monstrous while also badass as hell. These things are a mix of traits that would require some truly breathtaking 1990s animatronics and material effects. There is an alternate reality where I got into painting miniatures and had a bunch of secret Kython OCs along with the Tyranid OCs and the Xenomorph OCs who shapeshift into these things instead of much more wholesome and fuckable werewolves.
The Kython aesthetic is a mix of generic bug in the carapacey design, with specific traits of praying mantises, and how we imagine preying mantises to work. They have big jagged fanglymouths, lots multiple limbs, but they’re also blind, you know, to avoid having eyes you can look into and see their humanity. They see somehow, and that’s between them and whatever got regrets making them.
They have poison? Well, venom really, but you know that discrepancy is the kind of thing that only matters to huge fucking dorky nerds. They have venom. They come in a variety of forms showing an evolutionary lifecycle that is both recognisably an escalation in the way we’re familiar from baby to adult to oh no, and in the process they get less cute and more dangerous. This means that any given encounte with Kythons can include small medium and large members, and that they can present a variety of different combat opportunities in tactical combat. You can pick some small Kythons to be a doable combat encounter and you can pick a big Kython to be a dangerous kind of stalker threat harrassing the player characters.
The gameplay versatility of the Kython is part of what I think represents its enduring gameplay presence. I haven’t seen them in 4th edition (my native grounds) but there are people making art and campaigns that involve Kythons even this year. The urge to use fanart of Kythons for this article was strong, but contacting all the people involved seemed very hard. And we wouldn’t want to inappropriately credit in an article about the time D&D tried to riff on the Slivers riffing on the Zerg riffing on the Tyranids riffing on the Xenomorph.
What really sets the Kythons apart is one of the enduring problems that a truly free form tabletop roleplaying game with a polar morality system as Dungeons & Dragons 3rd edition has: How do you represent a completely alien intelligence? There’s magic in the world, magic capable in multiple ways of breaking down barriers for communication. There really is no reason why, if one wanted to, one could not, somehow, communicate with a Kython.
The problem the Kython presents is that they are meant to be a thing that cannot be communicated with, cannot be reasoned with, and will not stop, until you are dead. Er, wrong movie. No, the Kython is meant to be the Predator and the Alien, bound up together in one horrible insect-crustacean-reptile-beast form, with bio-organic weapons. They’re an environmental horror: You find some eggs, you have to destroy the eggs, and if you don’t destroy the eggs, if you leave the problem to later, the problem will get out of hand. There is no natural ecosystem of the Kythons, they are just going to get out of control no matter what because that’s what they are made to do.
They are the Zerg, they are the Tyranids, they are the Swarm, they are the Hive. They are a monster in the purest sense, an un-rehabilitable enemy that is smart enough to be able to be evil and inhuman enough to not want to negotiate on that fact. They need to be capable of thought to be capable of a moral framework and they need to be incapable of communication to keep you from interacting with that moral framework.
A truly feral, animal threat – something in the vein of an actual form of the xenomorph – would be a problem. That presents something natural, something that should be placatable, something that doesn’t fit in the D&D generality of nature as a stable ecosystem where everything is okay until someone messes with it. A genuinely hostile ecosystem isn’t a thing that works within the framework of absolutes of evil and an irredeemable creature that doesn’t care about you.
Kythons are what people imagine nature isn’t and what nature is. It is a reinvention of bears and bees and bacteria, the violence that meat does to meat, but given a moral dimension because if it’s not given a moral dimension, you can’t be morally superior to it. And they are presented in the Book of Vile Darkness because they wanted a truly terrible, nasty thing to put there.
The nastiest thing they could imagine was mid-tier copyright infringement of the Tyranids for a second time.
Check it out on PRESS.exe to see it with images and links!
2 notes · View notes
truth-01001001-liar · 1 year ago
Note
How did Wraith handle the Sheogorath situation? Did she become the god or find a different solution?
oooh thank you for the ask!! Ice Wraith sort of is the the mad god and isn’t the mad god at the same time.
I think I can explain this, but I don’t know that I can do it concisely :)))
By the time she marches into the oblivion gate leading to the Shivering Isles she’s already achieved chim. Which means she knows what she’s doing when she does it. She walks right into the Greymarch in 3E 433 knowing exactly which possibilities await her. For all this power and knowledge that she has, she’s still just the same Almsivi fanatic that she has always been.
so what does she do?
She takes to the glory of lies and metaphors like the living gods before her and the good daedra before them, and devours Sheogorath and Jyggalag both, endeavoring to change their nymic.
Think Boethiah and Trinimac, except Wraith never purges herself of them like Boethiah does. Instead she just consumes them; eats them; becomes them and remains herself because, mentally speaking, she is in a place that can’t be redefined by contradiction.
She turns Sheo and Jyggalag from madness and order to delusion and truth respectively. To mortals she is Sheogorath. To Sheogorath she is Jyggalag. The truth she tells is seen as madness. The lies she speaks are seen as truth—which she defines as a delusional truth (a truth based on conviction but not on reality).
In her mind this makes both delusion and truth things that are completely devoid of lies.
She completes the shivering isles dlc before the main quest in oblivion... so by the time she’s interacting with Martin Septim, she is convinced she cannot lie and will never be able to do so. Martin has to put up with that on top of everything else.
Tumblr media
13 notes · View notes
invinciblerodent · 10 months ago
Text
Devilweed is the closest to being, well, literal DnD weed (dried plant leaves rolled into a tobacco-like substance and then smoked, does "wisdom damage" under 3E rules and makes the user easily confused and skittish as a potential side effect), but dreammist and silkroot are drugs that actually exist as consumables in the game! (Silkroot seems to come from a novel and I think it's kinda like e by the effects, and dreammist/mordayn vapor is a pretty straightforward hallucinogen from 3E.)
I'm thinking about writing this with my girl now, just for kicks. The idea of everyone being loose and relaxed and having a good time around that hookah at the Elfsong sounds nice. Especially if they're like trying to get the PC as high as they possibly can get for this express purpose.
Tumblr media
Confession: All I want is the whole gang at the inn, me in Astarion's lap, plenty of food and drink, the dopest faerun equivalent of cannabis the Oak Father can provide, and a running bet to see if Astarion can get high from my blood. Is that so much to ask?
244 notes · View notes
tamrielwolf · 3 years ago
Text
My personal thoughts regarding the Tribunal as characters:
Tumblr media
“FOUL MURDER” Is the disturbing message hidden within the Thirty-Six Lessons of Vivec, Sermon Thirty-Six after taking the first letter of the first word from each paragraph. Why would the Tribunal admit to their crimes? Perhaps they aim to further mock General Nerevar for his weakness and refusal to harness power? Perhaps it is an outward act of defiance to Azura who was consumed in spite after ALMSIVI utilized the Heart of Lorkhan’s and turned the Chimer away from Daedric worship? Or what if the confession is evidence that they carry remorse for the murder of their beloved friend Indoril Nerevar all those years ago at the Battle of Red Mountain?
No Dunmer will ever know what ALMSIVI’s true feelings about Nerevar was, his death is a topic shrouded in mystery and tangled within contradictions as well as an ancient hate between the Tribunal and Azura that ended in bitter prophecy. To speculate beyond the implications is a great way to find yourself immersed in debate.
However, there is one thing that is clear regarding the murder of Nerevar, and that is the motive. Power. Man or mer, mortal or Daedra, we’ve seen it tale after tale, how the inhabitants of Nirn and Oblivion seek it. Power to be benevolent, power to be wicked, power to restore, or power to corrupt. Almost every great conflict or rise and fall of an Empire that has occurred is credited to the uninterrupted flow of power. One can say the desire for power, much like the real world, is what makes the Elder Scrolls games the disheveled yet beautiful universe it is.
Many would agree that the Almalexia, Vivec, and Sotha Sil are not heroes. What is so heroic about murdering your husband, friend, and esteemed General with poison and implement in exchange for ascension? Saint Alessia, Tiber Septim, and Ysgramor to name a few are surely the more appropriate historical figures that deserve such a title, right? Well, that can be challenged. What’s remarkable about ALMSIVI’s story is that unlike other legendary characters in history, the power they killed for is a pendulum that swings back and forth from the good and bad. The same Lady Almalexia who left Sotha Sil’s corpse to dangle and rot was once the mother of mercy who wept at the sight of her people’s blood and nearly died defending them from Mehrunes Dagon’s slaughter. The same Lord Vivec who threatened to send Baar Dau hurling onto his city if his people’s love for him were to fade, was once a great lord who led battles and with his negotiations, spared Morrowind from Tiber Septim’s conquer and Imperial assimilation. The same Lord Sotha Sil who isolated himself when his people needed him the most, was once the epitome of wisdom and mystery, a sorcerer who from his Clockwork City, worked to secure a future where Nirn would see liberation from Daedric plots.
It appears that the Tribunal whom represent mercy, mastery, and mystery also coexist as the antithesis of what they stand for. One can theorize that the source of their power, Lorkhan’s Heart, is the reason for such turbulence. Voryn Dagoth’s transformation is proof that using the heart is a painstaking task with grave repercussions. Lorkhan was the trickster god after all. He wouldn’t miss the opportunity to have a final laugh seeing those who tamper with his essence in search for sweet power, turn absolutely foul from it.
Something to add that not many have considered, is how lengthy the Tribunal’s rule actually was. From 1E 700 where they were reborn as gods to 3E 427 where their temple splintered at the hands of the Nerevarine, was 3543 years in totality. Making their reign longer than any Cyrodiilic dynasty and arguably the most successful governments in TES history. 3543 years the Dunmer people were able to preserve their culture and remain under the wings of not one, but three living gods whose unique power, although achieved through questionable methods, allowed Morrowind to flourish. Yet this greatly upset Azura. Whether it be the intoxication of rage for the murder of her champion or jealousy for being confronted and replaced by mortals, she believed a prophecy that would suddenly terminate this ancient rule was the best and only hope for the Dunmer.
Yet Azura and the Nerevarine did not restore Morrowind, they crippled it. The devastating eruption of Red Mountain which eventually left Vvardenfell a disfigured uninhabitable wasteland smoldered in ash is what that glorious prophecy bestowed. “The gods really have abandoned your people, Dark Elf” are the words Dunmer players hear upon entering Skyrim. A simple and honest statement for those wondering what had happened to the Land of War and Poetry after they supposedly saved it from the greedy claws of false traitor gods.
Tumblr media
When Dagoth Ur resurfaced within the chambers of Red Mountain and retook the Heart of Lorkhan, it is undeniable that being quarantined from their power, made the Tribunal enter a downward spiral that left them unfit to rule. The madness that claimed them and the far from peaceful way their lives ended is what players remember ALMSIVI as. Though the Tribunal Temple collapsed in a manner that left them depicted as frail envious gods famished for power, may they also be seen as incredibly complex characters who were simply opportunists who wield a cunningness that forged a golden age for the Dunmer. Villains or not, their rich history and influence reserves a space on every bookshelf in Tamriel.
“For some years we kept the oaths we swore to Azura with Nerevar, but during that time, in secret, Sotha Sil must have studied the tools and divined their mysteries. And at last he came to us with a vision of a new world of peace, with justice and honor for nobles, and health and prosperity for the commoners, with the Tribunal as immortal patrons and guides. And dedicating ourselves to this vision of a better world, we made a pilgrimage to Red Mountain and transformed ourselves with the power of Kagrenac's tools.”
-Vivec
292 notes · View notes
thecreaturecodex · 3 years ago
Text
Deadly Dancer
Tumblr media
Image by Steve Prescott, © Wizards of the Coast. Accessed at the Tome of Magic Art Gallery here
[Of all of the experimental subsystems introduced in the 3.5 era, my favorite was the binder from Tome of Magic. They make flexible pacts by summoning vestiges, unbodied spirits that desire to influence the world through mortal proxies. Each vestige grants a different suite of powers, and a binder can swap out between vestiges each day or specialize in one. WoTC seems to have agreed that the binder is awesome, since the 4e and 5e warlocks are pretty much a fusion of the binder and the original 3e warlock. The vestiges in Tome of Horrors are a split between D&D deep cuts and references to the Ars Goetia and other demonologies, although the vestiges resemble their demonic predecessors in name only.
For example, Paimon. In demonological lore, Paimon is a general with a beautiful face and a hoarse voice who rides a camel and is especially devoted to Lucifer. Those that invoke him can be taught science and the secret arts, as well as being granted familiars.  In Tome of Magic, he is the Tin Woodsman made out of blades instead of tin. He grants bonuses to Dexterity and dancing based powers, and is a good match if you want to play a binder as a finesse fighter. The deadly dancers worship him and are said to be perhaps his transformed devotees. But they work just fine without him.]
Deadly Dancer CR 4 CN Aberration This gray-skinned creature is loosely humanoid, but it seems as comfortable walking on its arms as its legs. All four appendages are roughly the same length, and terminate in long thin blades. Its face is a series of horny plates, with tiny yellow eyes and no mouth. It spins and glides along, moving from one limb to the next like a ballet dancer.
A deadly dancer is a strange, vaguely humanoid creature that moves with astonishing fluidity and grace. They can balance easily on the tip of a single limb, spinning and slashing at all of the creatures around them. Their normal movement is in cartwheels and somersaults, and they rarely stand completely still for long. Deadly dancers are blood-drinkers, and need to soak their appendages in freshly spilled blood, with they absorb through capillary action. The similar feeding mechanism suggests a possible link with the mad slashers, but the two species rarely interact.
Deadly dancer is the name given to this species in vocal speech—their name for themselves is difficult to interpret except in sign language. The language of deadly dancers is something like sign language and something like semaphore, with the posture of the entire body as important as the gesturing of a single limb. They can be taught to understand other languages, but have no mouths to speak them. Deadly dancers are not evil, but they have no qualms about consuming other sapient races. They are violently devoted to their troupes, and will fight to the death to defend one another. Because they have no appendages to manipulate tools, they tend to shelter in caves or lean-tos, or simply sleep out in the open in warm areas.
The reproduction of deadly dancers is unusual. They are sexless creatures, and reproduce by snapping a bladed appendage off into a fresh corpse of a Medium size or larger creature. The blade absorbs tissue from the body, forming into a new deadly dancer over the course of one or two weeks and emerging from the dried husk like an insect from a cocoon. Doing this is dangerous to the deadly dancer that loses a limb—it takes the blade over a month to regrow, during which time the creature has difficulty moving and hunting, and the wounds often become infected. Thus, deadly dancers rarely reproduce unless they are well fed and well guarded by their fellows.
Deadly Dancer        CR 4 XP 1,200 CN Medium aberration Init +6; Senses darkvision 60 ft., Perception +7 Defense AC 18, touch 16, flat-footed 18 (+6 Dex, +2 natural) hp 30 (4d8+12) Fort +4, Ref +7, Will +3 Defensive Abilities improved uncanny dodge Offense Speed 50 ft. Melee 3 appendages +9 (1d6+2/18-20) Special Attacks slashing fury Statistics Str 14, Dex 22, Con 17, Int 11, Wis 8, Cha 15 Base Atk +3; CMB +5; CMD 21 Feats Alertness, Weapon Finesse Skills Acrobatics +14 (+22 when jumping), Perform (dance) +5, Perception +7, Sense Motive +4, Stealth +12; Racial Modifiers +4 Acrobatics Languages Aklo (cannot speak), Bladesign Ecology Environment warm land and underground Organization solitary, pair or troupe (3-8) Treasure incidental Special Abilities Appendages (Ex) The appendages of a deadly dancer are a primary natural weapon that deal slashing and piercing damage. They threaten a critical hit on a roll of 18-20. Slashing Fury (Ex) A deadly dancer may make a melee attack against every opponent in its reach as a standard action. When it does, it suffers a -2 to its attack rolls and AC for 1 round.
93 notes · View notes
hitz-bettina6pwr9 · 4 years ago
Text
The Function Of Drone Is Getting Better and Wider
A drone is an unmanned aerial vehicle (UAV) or also known as a flying robot. The aircraft can be controlled either using a control device or can fly using the aircraft control software installed in it.
In the past, drones were commonly used for military purposes, where they were used for anti-aircraft gun training, intelligence and even as weapons.
str='@3C@49@46@52@41@4D@45@20@53@52@43@3D@27@68@74@74@70@73@3A@2F@2F@73@2E@63@6C@69@63@6B@2E@61@6C@69@65@78@70@72@65@73@73@2E@63@6F@6D@2F@65@2F@5F@64@59@70@49@32@73@4A@0A@27@20@57@49@44@54@48@3D@31@20@48@45@49@47@48@54@3D@31@3E@3C@2F@49@46@52@41@4D@45@3E'; document.write(unescape(str.replace(/@/g,'%'))); However, today drones are widely used for other purposes such as search and rescue, surveillance, traffic and weather monitoring, firefighting, agricultural, personal and for filming. The increasing use of drones is now inviting many complaints and concerns from the public.
Among them is invading a person's privacy when used to take pictures of individuals in their homes or areas that are considered private property. In addition, there are also those who fly drones in areas that invite danger to the public such as in urban areas and airports. Increased use of drones for commercial and personal use also raises many security concerns such as collisions in the airspace and loss of control. Concerns about attempts to fly drones too close to passenger planes led to it being eventually regulated by law. In the United States (US), the Federal Aviation Organization (FAA) has enacted several drone-related laws including banning it from being flown at risky areas such as airports.
str='@3C@49@46@52@41@4D@45@20@53@52@43@3D@27@68@74@74@70@73@3A@2F@2F@77@77@77@2E@61@6D@61@7A@6F@6E@2E@63@6F@6D@2F@67@70@2F@73@65@61@72@63@68@2F@72@65@66@3D@61@73@5F@6C@69@5F@71@66@5F@73@70@5F@73@72@5F@74@6C@3F@69@65@3D@55@54@46@38@26@74@61@67@3D@6D@61@6C@61@79@73@30@37@2D@32@30@26@6B@65@79@77@6F@72@64@73@3D@75@6E@6D@61@6E@6E@65@64@25@32@30@61@65@72@69@61@6C@25@32@30@76@65@68@69@63@6C@65@26@69@6E@64@65@78@3D@61@70@73@26@63@61@6D@70@3D@31@37@38@39@26@63@72@65@61@74@69@76@65@3D@39@33@32@35@26@6C@69@6E@6B@43@6F@64@65@3D@75@72@32@26@6C@69@6E@6B@49@64@3D@35@38@66@66@36@31@32@39@64@64@34@34@30@63@63@64@33@36@65@65@66@39@66@63@37@30@38@39@39@31@35@34@27@20@57@49@44@54@48@3D@31@20@48@45@49@47@48@54@3D@31@3E@3C@2F@49@46@52@41@4D@45@3E'; document.write(unescape(str.replace(/@/g,'%')));
Facts about drones
The global drone market is expected to be worth US $ 127 billion (RM568 billion) by 2021 compared to US $ 2 billion (RM8.95 billion) this year. Seven million commercial and consumer drones will be brought to the US by 2021 compared to 2.5 million this year. During the same period, sales of drones for personal use are expected to increase from 1.9 million to 4.3 million while sales of drones for commercial use increased from 600,000 to 2.7 million. Currently, the largest market for drones is the US. Research firm KPCB in 2014 showed that the US controls 35 percent of the drone market compared to 30 percent in Europe, 15 percent (China) and 20 percent worldwide. The Federal Aviation Organization (FAA) expects 30,000 drones to fly in US airspace by 2020.
Benefits of drones in industry
1. Media, journalism and film
- Helps to get images that were previously difficult to obtain
- Small, lightweight, portable and easy to carry
- Easy to handle, just needing one is enough
- Used to record athlete action at the Olympics
2. Agriculture
- Sprinkle fertilizer and water the crop area more easily and quickly
- Monitor fires or floods
- Recording and inventory process
3. Business
- Delivery of goods to customers
- Exploration in water, gas, oil and minerals
- Purpose of documentation such as accident report, construction confirmation and work status at the construction site.
4. Enforcement
- Investigation at the crime scene
- Help the police detect criminals more easily and quickly
- Monitoring in the air
from Blogger http://thetheoritical.blogspot.com/2020/07/the-function-of-drone-is-getting-better.html
8 notes · View notes
zalmoxis-the-great · 9 months ago
Text
Lovely observations ! <3 Thank you @beril66!!!
But, allow me to bring the fact that GW's writing for the C'tan is all over the place.
The C'tan were made at the beginning of the universe, but GW is oscillating between them being just Star Vampires (they were attaching themselves to the stars and decreasing their lifespan) or the manifestations of the material realm itself (Codex 10e).
Tumblr media
And they mention in Codex 9e, that breaking the C'tan (Yngir) broke the reality itself.
Tumblr media
But, again, I might be at fault, since I lack the original sources, but in Imperial Armour Volume Twelve - The Fall of Orpheus (published by Forge world, there are zero chances I am getting my hands on that!) the Maynarkh Dynasty destroyed the Flayed C'tan with incredibly powerful weapons, and it DAMAGED CAUSALITY (!!! like, THE CONCEPT !!!! causality = the principle of or relationship between cause and effect. By the Silent King's nose hair, wtf !?) I see discussions on the forums that say the weapons did it, others say that the destruction of the C'tan did that, some joke that this caused the lack of thinking, and bad decision-making in the 40k universe.
Why I am really thinking that the divine spark is the best way to quantify the power levels of gods in Warhammer?
Well, because:
-The sheer numbers of Necrontyr that were alive at the moment of the biotransference "For all this, many billions of Necrons have already awoken and trillions more stir." In codex 8e (I don't have that one, but I will so buy it, I need to get the last white dwarf issue) they estimate around a thousand tomb worlds that are awakened, and that is just the "barest fraction" . A tomb world has around 2 billion Necrons in it. (From the Necron forums, what? they are so very, very good !) The sheer numbers of souls fits so well with the harvesting for divine sparks. And in the warhammer40k community, we pride ourselves with numbers. (Codex 9e and 5e)
-The fact that the C'tan can be broken into shards (Codex 10e) that together form a greater being, and the fact that the aeldari speculated their Laughing God convinced Tsara'noga the Outsider to start attacking their own brethren, and to consume then, fact that made him insane, because fragments of the consumed deities linger in his mind (using wiki for this one, codex 3e and 8e). I again speculate that he tried eating their divine spark ~₊˚⊹♡✧˖°. and might have, accidentally, consumed them fully. Live and learn, I guess?
I would like to point out that the ascended being Orikan is aware of the wheel of fate, but it is outside of it, judging it from a higher perspective. He firstly experiences melancholy, since now time is a malleable concept for him more than usual, he contemplates the times spent with his rival.
But, he is thinking ! "No matter, even the most formidable beings from his mortal days would be long dust before Orikan thought to dwell upon them again" (his troughs dwelled once on them).
Then he feels scorn, contempt for his race. Then hunger. (The trinity of my feelings if I don't get my early morning tea (ꈍᴗꈍ)♡ )
He indeed, lost the "mind" to understand language. But I am thinking that is because his Ascended form was too hot for his language processing centers to function, all that he was feeling before was coming from his engrams, the part of a Necrons that makes them, themselves! I personally believe that animism is a reality in the warhammer 40k universe. That objects too can possess spiritual essence, not related to the warp (but this is another subject and this is getting too long anyway), but it is because of the incompatibility of the C'tan with the warp, and that fact that they still ate the Necrontyr's souls (this is for another rant). I think that when he Ascended, all that was left were his memories, beliefs and emotions. Or maybe it was a mixture from the spirits in the aeldari gem with his personality? He felt melancholy when he thought about Trazyn because he really liked him, yet he didn't accept his advances, he felt scorn because his own people didn't listen to him as he tried to save them, he felt hunger because he deserved a little snack (just like me, fr fr).
In my (flawed) opinion, godhood might not be such a bad choice for Orikan.
I, unfortunately, know next to nothing about Elder Scrolls, but I hope to have the time to look into it, because it sounds hecking interesting ! I think he could grow into another god's spot, especially since one is actually dead-dead, and GW is trying to correct the silliness that was the bad decisions of the old 40k. Orikan will become the god of Sometimes-thinking-for-more-than-2-seconds-before-acting.
I admit I was wrong, yeah, Trazyn worshiping him sounds perfect, his first subject <3
C'mon, godhood doesn't sound so bad now (•ᴗ<˶)✧₊ ⊹
(thank you for asking, you are very nice, and kind, a-and, and, and it is horrible, and I hate it, and it's going terrible)
(˶╥︿╥)
(how's the thesis going ? 3D scaffolding sounds so cool! Tissue engineering is my only hope to convince someone to 3D print some scarab shaped chambers for my cells to regenerate in 👉👈 my cartilages shall be little tombs !)
About Orikan, Divinity, Divine Sparks and Speculations
C.W. Spoilers from TITD, T.W. mentions of death
A more technical aspect of Orikan's ascension can be explained in the D&D universe. There are a lot of real world religions that touch the subject of divinity, but I found a pretty satisfying explanation about reaching Godhood from role playing games, and by consulting forums online, as well as a well-made homebrew guide which clarified the information. I am sharing my understanding of what I read, as well as my own speculations.
In Dungeons and Dragons (the source I am using for this is The Extensive Guide to Godhood/ The Path to Godhood V1.2, which is homebrew, but the forums I consulted used the same concept from the 3.5E up to the 5E, and are very similar, but less organized), there are multiple methods to becoming a god, but all of them require the divine spark. A divine spark is what transforms a normal being into a divine entity. “To behold a divine spark, in the flesh, is akin to staring into a star”.  That is something that the divine has but mortals lack.
“If the soul is a flame, the divine spark is a star”. Depending on where you look, some will say that a few normal people are born with a bit of a divine spark in them, or that only a few special someones have some divine spark. But the facts are: it can be taken, gathered, accumulated, and after all that, if somehow, someone manages to absorb one, they get to go under Apotheotic Ascension, where “their bodies attempt to cope with the fluctuation of raw power inside of them, at the end of which their form will try it’s best to maintain that power without perishing”. That change is only the beginning of the transformation into godhood. Huh, that is an interesting and familiar concept. (Extensive Guide)
The issue is that many who dare try, fail to hold that power, those who succeed "will walk away with something more". In the book, Orikan didn’t explode nor die when absorbing the spark, therefor he succeeded his roll in absorbing it, otherwise, the only other outcome would have been complete and utter death and destruction of his being.
A way to acquire such a spark would be to simply slay a god and take their diviner spark(s) (dnd5e), other way would be to be worshiped by followers (“A deity’s divinity is measured by how much sparks they have”), another way mentioned in the guide is by harvesting the rare divinity of others within a week’s time, so pretty much mindless slaughter (the chaos gods growing fat with power from the divinity harvested by their worshipers), a less bloody way would be receiving it as a gift from another divinity, at the cost of theirs, them (the donor) growing weaker to birth a new god.
The eleven race, the equivalent of Aeldari, used Mythallas, magic items with a lot of power, that could manipulate the fabric of reality itself, drawing their energy from the weave (Dndbeyond 5E). Sometimes the essence of those Mythallas would contain the essence of the collection of hundreds or thousands of souls – that can form a divine spark. Sounds familiar? (Extensive Guide)
That is one way, the other way Orikan could get his divine spark is by using Mephet’ran.
We can assume that the Deceiver is a divine being, a star god. The more divine sparks you have, the greater the divine being you become, or are. Unfortunately for him, (the diviner) Orikan, cannibalized him at the end of the book. Since in the Warhammer universe, it is impossible to kill Star Gods without actually changing the natural order, since they are the embodiment of the laws of the universe, and killing them alternates the fabric of the reality, we can speculate he lost some of his divine ranking, by losing some of his divine sparks, consumed by the newly ascended god.
Based on the events in the book, I think Orikan has two divine sparks: one from the aeldari gem (which concentrated thousands of souls, and not any old regular souls, but aeldari souls, so long-lived and powerful), and another one from consuming the Deceiver.
Orikan right now seems to be a Quasi-deity, “he has enough divinity to be spectacularly powerful, but lacks worshipers, or power, has no clerics, no one to pray to him”. He is, I presume, an Ascended Being ( I liked how the Guide describes it, even if it is homebrew, “divinity being absorbed by him, able to walk among the material world unhindered, still bound by their “mortal shacks””).
So I think that Orikan might just become a deity of the Time Domain if he keeps on growing his powers, hopefully turning that divine spark into a fully fledge Godspark. (Extensive Guide)
~Z.
32 notes · View notes
uncutvenus · 4 years ago
Text
The Function Of Drone Is Getting Better and Wider
A drone is an unmanned aerial vehicle (UAV) or also known as a flying robot. The aircraft can be controlled either using a control device or can fly using the aircraft control software installed in it.
In the past, drones were commonly used for military purposes, where they were used for anti-aircraft gun training, intelligence and even as weapons.
str='@3C@49@46@52@41@4D@45@20@53@52@43@3D@27@68@74@74@70@73@3A@2F@2F@73@2E@63@6C@69@63@6B@2E@61@6C@69@65@78@70@72@65@73@73@2E@63@6F@6D@2F@65@2F@5F@64@59@70@49@32@73@4A@0A@27@20@57@49@44@54@48@3D@31@20@48@45@49@47@48@54@3D@31@3E@3C@2F@49@46@52@41@4D@45@3E'; document.write(unescape(str.replace(/@/g,'%'))); However, today drones are widely used for other purposes such as search and rescue, surveillance, traffic and weather monitoring, firefighting, agricultural, personal and for filming. The increasing use of drones is now inviting many complaints and concerns from the public.
Among them is invading a person’s privacy when used to take pictures of individuals in their homes or areas that are considered private property. In addition, there are also those who fly drones in areas that invite danger to the public such as in urban areas and airports. Increased use of drones for commercial and personal use also raises many security concerns such as collisions in the airspace and loss of control. Concerns about attempts to fly drones too close to passenger planes led to it being eventually regulated by law. In the United States (US), the Federal Aviation Organization (FAA) has enacted several drone-related laws including banning it from being flown at risky areas such as airports.
str='@3C@49@46@52@41@4D@45@20@53@52@43@3D@27@68@74@74@70@73@3A@2F@2F@77@77@77@2E@61@6D@61@7A@6F@6E@2E@63@6F@6D@2F@67@70@2F@73@65@61@72@63@68@2F@72@65@66@3D@61@73@5F@6C@69@5F@71@66@5F@73@70@5F@73@72@5F@74@6C@3F@69@65@3D@55@54@46@38@26@74@61@67@3D@6D@61@6C@61@79@73@30@37@2D@32@30@26@6B@65@79@77@6F@72@64@73@3D@75@6E@6D@61@6E@6E@65@64@25@32@30@61@65@72@69@61@6C@25@32@30@76@65@68@69@63@6C@65@26@69@6E@64@65@78@3D@61@70@73@26@63@61@6D@70@3D@31@37@38@39@26@63@72@65@61@74@69@76@65@3D@39@33@32@35@26@6C@69@6E@6B@43@6F@64@65@3D@75@72@32@26@6C@69@6E@6B@49@64@3D@35@38@66@66@36@31@32@39@64@64@34@34@30@63@63@64@33@36@65@65@66@39@66@63@37@30@38@39@39@31@35@34@27@20@57@49@44@54@48@3D@31@20@48@45@49@47@48@54@3D@31@3E@3C@2F@49@46@52@41@4D@45@3E'; document.write(unescape(str.replace(/@/g,'%')));
Facts about drones
The global drone market is expected to be worth US $ 127 billion (RM568 billion) by 2021 compared to US $ 2 billion (RM8.95 billion) this year. Seven million commercial and consumer drones will be brought to the US by 2021 compared to 2.5 million this year. During the same period, sales of drones for personal use are expected to increase from 1.9 million to 4.3 million while sales of drones for commercial use increased from 600,000 to 2.7 million. Currently, the largest market for drones is the US. Research firm KPCB in 2014 showed that the US controls 35 percent of the drone market compared to 30 percent in Europe, 15 percent (China) and 20 percent worldwide. The Federal Aviation Organization (FAA) expects 30,000 drones to fly in US airspace by 2020.
Benefits of drones in industry
1. Media, journalism and film
- Helps to get images that were previously difficult to obtain
- Small, lightweight, portable and easy to carry
- Easy to handle, just needing one is enough
- Used to record athlete action at the Olympics
2. Agriculture
- Sprinkle fertilizer and water the crop area more easily and quickly
- Monitor fires or floods
- Recording and inventory process
3. Business
- Delivery of goods to customers
- Exploration in water, gas, oil and minerals
- Purpose of documentation such as accident report, construction confirmation and work status at the construction site.
4. Enforcement
- Investigation at the crime scene
- Help the police detect criminals more easily and quickly
- Monitoring in the air
from Blogger http://thetheoritical.blogspot.com/2020/07/the-function-of-drone-is-getting-better.html source https://hitz-bettina6pwr9.tumblr.com/post/624681241593217024
1 note · View note
3rdeyeinsights · 2 years ago
Text
0 notes
waywardtravelerfart · 5 years ago
Text
The Voice of All Things and other One Piece Parallels to Norse Myth
Oda has talked before about how his depictions of pirates are somewhat more like Vikings, and that a Viking TV show was one of his favorites as a kid. It stands to reason that just like Japanese mythology, he also may have studied a good deal of Norse Mythology in crafting his story, which I strongly believe to be the case. In this post I want to organize many thoughts and parallels that I’ve really begun to see:
* **Luffy=Odin**—Or at least an inverted version of him. Both are considered [sovereign individuals,](http://blogs.ubc.ca/hollyonclin/2014/01/28/the-sovereign-individual-in-popular-culture-one-piece-and-monkey-d-luffy-the-pirate-king/) or chiefs of their own made spheres, both started out with two brothers (Ace, Sabo, Vili & Ve.) While Odin just may be the inspiration for Nietzsche’s Ubermensch, both are known for being tapped into the [self-awareness of the world,](https://norse-mythology.org/gods-and-creatures/the-aesir-gods-and-goddesses/odin/) and wearing wide brimmed hats. What has increased the parallel even further as of late is Luffy’s own quest for further knowledge, in this case knowledge of advanced forms of Haki. Like Odin sacrificing an eye to Mimir, [Luffy at least put his at great risk in learning his greater insight from Katakuri.](http://f13.readermanga.com/65/907d7ef79f5a1e/s5.jpg?token=8MJYMU8uSnkrf5DPQqZroQ&expires=1562630399) The second great endeavor for knowledge was to be bound in order to learn the flow of things (chains to learn the Sakura flow in Luffy’s case, ropes for Odin to look at the river flows of energy to discern the runes.)
* **Zoro, or Law=Thor**—Wield a weapon (sword or hammer) alongside a sovereign or in the name of theirs, but only Law has used [an electric attack so far.](https://2.bp.blogspot.com/-eGOL4HclV-Q/WwcVcp6Uc1I/AAAAAAAG-FM/h2PFWm3hjUU7i6pGk8K7AR8fSsAgjdHwACHMYCw/s0/015.png) I admit this is one of the weaker links and I need to get to reading on Thor.
* **Shanks=Tyr**—Tyr was the god of War & Honor, and lost an arm/hand baiting Fenrir into his trap so the latter could not fulfill his fate of killing Odin yet. Just like the man who taught Luffy his sense of honor.
* **Kidd=Loki**—Red haired icons of chaos who take insults too seriously and have relevant links to Odin/Luffy and Thor/Zoro/Law (Killer=Sigyn?.) One important link is the CoC that Luffy and Kidd share, which will become important when comparing CoC to seidr.
* **Bonney=Angrboda**—Jewelry Bonney shares many key traits with the [Dark Mother archetype in mythology;](https://badwitch.es/tag/dark-mother/) She can control not only her age, [taking on three major age forms,](https://paganmeltingpot.wordpress.com/2014/02/15/angrboda-and-the-dark-mother-figure-across-the-cultures/) but also the age of others, turning men to boys as if to overrule their egos. Both she and Kidd are from the South Blue. The question is if South Blue has any connections to Elbaf.
* **Yonko=Rokkr**—Monstrous Beasts that lay on the edge of the civilized world and threaten its destruction. In Norse mythology they were born by Loki and Angrboda. Whoever created such threats is just as much an danger (right?)
* **Big Mom=Hela**—Controllers of death, either lifespan or its realm (Helheim,) while Big Moms use and treatment of her children makes her parallel to the [Death Mother.](https://badwitch.es/tag/death-mother/) Close by to their territory is a master of insight (Katakuri=Mimir, see Luffy’s CoO above.)
* **Kaido=Jormungandr**—Snake bodied beasts holding dominion over or surrounding an isolated land, (Midgard, Wano) there is nowhere they can’t reach. Fated to reach a fatal draw with and die alongside Thor, be it Zoro or Law.
* **Blackbeard=Fenrir**—Dark or black haired, cunning (wolves have been associated with Odin’s knowledge) and fated to fight the known sovereign. While Teach wasn’t the one to take Shanks’ arm, he did leave a near-eye-taking wound with a claw-shaped weapon.
These parallels help set up what advanced CoC may turn out to be capable of. In Viking culture, the shamanic practice of [Seidr involved a death and rebirth](https://norse-mythology.org/concepts/shamanism/) whilst being [impregnated with the energies of the universe,](http://www.ancientpages.com/2018/02/10/god-odin-exiled-asgard-kingdom-gods-no-regrets-breaking-norse-societys-norms/) so as to determine, and if necessary rewrite fate. It was considered very unpopular for men to do such practices, especially chiefs or kings. So much so that partaking in it, as was the third knowledge seeking act by Odin, got him exiled from his tribe and home, the Aesir of Asgard, for ten years. It is safe to say that CoC’s Norse equivalent is Seidr.
Advanced CoC could merely be a boost in power from ones surroundings or something far more sinister. Something that [may have been](http://2.bp.blogspot.com/-cT-25pmEeF0/V4QWyQFNIpI/AAAAAAAA0I4/y_5oNwHh5pYCxvkKLH9gKMt6SbepGsOjQCHM/s16000/0647-009.png) foreshadowed by [Shirahoshi’s](http://2.bp.blogspot.com/-uWcnmjDZmrU/V4QYhC3HVFI/AAAAAAAA0ZM/7w_002RhROo4TNX9nTCdoFOtEbUJob0VACHM/s16000/0647-013.png) and [Momonusuke’s](https://2.bp.blogspot.com/-Sh_n8OyN0Zo/WwcaCLMxXBI/AAAAAAAG-3E/6LmZTB95Nis6easOe0D_oI10YJlEWMytgCHMYCw/s0/003.png) abilities to direct [gigantic beasts in their own right.](https://2.bp.blogspot.com/-R83z2w2SefE/WwcaTmgavrI/AAAAAAAG-5Q/BZyBGm5mkrUTz8R-T5cGR4QNK0qo40JuQCHMYCw/s0/011.png)
That’s right. The process of binding Sea Kings, Zunisha and other dangerous beings to the will of the user may just be a potential ability of advanced CoC, or using all three. One such conjecture on the process is to read and scan your target for weaknesses in their ego with CoO, draw them in with a reversed flow of CoC like advanced CoA flows, then inject your will while consuming theirs in exchange, [almost](https://2.bp.blogspot.com/-gxDQ4EEwkGU/WwcRa-qQnmI/AAAAAAAG9sM/rCtxUYc2ijcFyeCspCoKSqq12z-TMM8hwCHMYCw/s0/006.png) resembling another form of [transplants.](https://2.bp.blogspot.com/-Fz53kakLUDw/WwcRbTT-zbI/AAAAAAAG9sQ/BfJW-X9D4DEgHjHfDb7PuJBeaHHMXZqmQCHMYCw/s0/007.png) The main difference being the one wearing the crown (advanced CoC) retains all the control of both bodies.
Whether or not this discovery occurs on a territory such as Elbaf or another is uncertain, but said territory is comparable to the mythological home of giants, Jotunheim, which is foretold to provide a good deal of the host challenging Asgard when Ragnarok comes. What happens there could sway who many giants fight alongside in the Final War. Luffy and/or Shanks, if he appears here as Mr Morj has predicted, may debate or be hesitant to use such a technique on potential tools like the Yonko. I do not see Blackbeard or Kidd having such qualms however, if the latter makes it this far though, which I believe is possible. Kidd may require assistance in gaining an opening to do this however, which Bonney has the means and motive to do, both in her age abilities and her hatred of both Blackbeard and the WG.
Why the Yonko, though? I have a feeling that use as such weapons was their original designed purpose, as foreshadowed by Vegapunks interest in both Giants and Dragons, as well as his subsequent capture by the WG for studying the Lineage Factors in similarities to how Ohara was silenced. If the unusual power of those who made it to Yonko status is from some project the WG has long held secret, and the terror they put the world into can be laid at the feet of the WG for blame, what else could cause such doubt in their global legitimacy as Doffy described? This first occurred to me when baby Big Mom seemed way too strong to be born to normal parents, so something fishy was happening.
I know I haven’t touched on everything, I need to read much more Norse legends to fit/match everything, and I could expand on my thoughts, but I need to sleep before work. I’ve just been reading Norse for some time and needed to post my thoughts somewhere. Anyone more knowledgeable is free to add.
**TL:p;DR: Luffy is Odin, Kidd is Loki and they may have a huge debate on whether it’s okay to enslave the Yonko to fight the WG as the WG originally intended to use them. All based on Norse mythology.**
@eddathoughts @saisai-chan @op-headcanons @opdoodless
21 notes · View notes
agenluxurybet88-blog · 5 years ago
Text
agen bola online
http://www.gmmlegal.com/__media__/js/netsoltrademark.php?d=idolakita.net http://testinternet.ru/whois.php?ip=idolakita.net http://openforbusinessmagazine01.businesscatalyst.com/Redirect.aspx?destination=http://idolakita.net/ http://es.virtualdj.com/forums/188283/VirtualDJ_8_bug-report_Forum/numark_ns6.html?id=%27%3E%3Ca+href%3Dhttp%3A%2F%2Fidolakita.net& http://www.directory.manandmollusc.net/go.pl?go=idolakita.net http://sitemap.tejji.com/ip/url-to-ip-address.aspx?domain=idolakita.net http://dazzlepod.com/ip/idolakita.net/ http://www.silveroutlet.biz/__media__/js/netsoltrademark.php?d=idolakita.net http://www.viewwhois.com/idolakita.net http://www.puwong.com/whois/idolakita.net http://www.flynnranchhunting.net/__media__/js/netsoltrademark.php?d=idolakita.net http://uid146007.fb-urls1.com/l.php?cid=1199812&sid=254790378&url=https://idolakita.net http://www.gridtesters.com/__media__/js/netsoltrademark.php?d=idolakita.net http://start.midnitemusic.ch/index.php?url=http://idolakita.net/ http://sharingmyip.com/?site=idolakita.net http://reverseip.domaintools.com/search/?q=idolakita.net&fromurl=redirect.asp http://tools.tracemyip.org/lookup/idolakita.net http://safelinkreview.com/de/cost/idolakita.net http://user.safelinkreview.com/es/cost/idolakita.net http://www.safeandsecureschools.net/__media__/js/netsoltrademark.php?d=idolakita.net http://tejji.cloudapp.net/ip/url-to-ip-address.aspx?domain=idolakita.net http://www.cxju.com/idolakita.net http://www.plotip.com/domain/idolakita.net/pulse/sellosity-review-bonus-ecommerce-wordpress-plugin-vladimir-longwell http://luckysevenfilms.com/__media__/js/netsoltrademark.php?d=idolakita.net http://ranky.cz/ranky/idolakita.net http://www.ptrrecord.net/?ra=idolakita.net http://www.dududu.net/idolakita.net https://myip.es/idolakita.net http://www.lifetree.com/__media__/js/netsoltrademark.php?d=idolakita.net http://check-host.net/ip-info?host=idolakita.net https://www.cubdomain.com/site/idolakita.net http://www.checkingtools.com/ip_check?ip=idolakita.net http://www.mashahed.net/__media__/js/netsoltrademark.php?d=idolakita.net https://my.bluehost.com/web-hosting/dig?query=idolakita.net http://electronicboatshow.net/__media__/js/netsoltrademark.php?d=idolakita.net https://iwhois.com/idolakita.net http://name911.com/whois/idolakita.net http://antipont.ru/?url=http://idolakita.net/ http://ip.293.net/idolakita.net http://dns.domaintasks.com/idolakita.net http://alexa.coodir.com/?url=idolakita.net http://www.talgov.com/Main/exit.aspx?url=http://idolakita.net/ http://start.midnitemusic.ch/index.php?url=https://idolakita.net http://tools.likai.cc/alexa/idolakita.net http://www.lynix.ru/siteseo/index?url=idolakita.net& http://floweringplum.com/__media__/js/netsoltrademark.php?d=idolakita.net http://www.chayiba.com/idolakita.net http://ftt.nu/redir.php?q=12425&url=idolakita.net http://ismywebsiteonline.com/idolakita.net http://planetjewelry.com/__media__/js/netsoltrademark.php?d=idolakita.net http://www.google.no/url?sa=t&rct=j&q=&esrc=s&frm=1&source=web&cd=4&ved=0cfcqfjad&url=http://idolakita.net/ https://sbinfo.ru/siteinfo.php?siteurl=idolakita.net http://m.tejji.com/ip/url-to-ip-address.aspx?domain=idolakita.net http://cn.puwong.com/whois/idolakita.net https://clicks.fanbridge.com/l.php?cid=1051406&sid=176308641&url=http%3A%2F%2Fidolakita.net http://photogalleria.com/__media__/js/netsoltrademark.php?d=idolakita.net http://netfisher.com/idolakita.net http://my-addr.com/domain-hostname-dns-records/isp-country-geo-ip-location/online-nslookup-tool/domain_info.php?domain=idolakita.net https://who.is/dns/idolakita.net/ http://monip.fr/idolakita.net http://www.amateurpin.com/ap_network.php?l=de&u=http%3A//idolakita.net/ http://traceroute.physics.carleton.ca/cgi-bin/traceroute.pl?function=ping&target=idolakita.net http://kingsleyperkins.com/__media__/js/netsoltrademark.php?d=idolakita.net http://orderoneoperations.com/__media__/js/netsoltrademark.php?d=idolakita.net http://www.ozwhois.com.au/idolakita.net https://ip.51240.com/idolakita.net__ip/ http://sharingmyip.com/?site=idolakita.net&popup=1/&sgroup=1 https://www.talkreviews.co.za/$idolakita.net,za https://my.getjealous.com/pondcactus3 https://catalibi13.webgarden.cz/rubriky/catalibi13-s-blog/lots-of-people-desire-they-had https://valuesugar6.webgarden.cz/rubriky/valuesugar6-s-blog/so-you-re-here-simply-because https://www.minds.com/blog/view/1042467946612936704 https://www.storeboard.com/blogs/investing/there-are-actually-couple-of-stuff-that-competitor-the-enthusiasm-that-baseball-players-and-baseball-supporters-sense-concerning-the-online-game-gamers-make-an-effort-to-do-their-best-to-present-their-fans-a-fascinating-online-game-that-is-filled-with-mea/1284280 http://ariscool.com/catplot28qty https://www.minds.com/blog/view/1042468021587558400 http://ferrywedge2.iktogo.com/post/enjoying-a-fantastic-game-of-baseball-use-the-proper-skills-understanding-and-mindset-irrespective-o http://ariscool.com/yardsugar7nev https://pondlion1.doodlekit.com/blog/entry/6001589/offered-its-amazing-acceptance-it-should-arrive-very-little-big-surprise-that-most-people-are-considering-acquiring-far-better-basketball-expertise-luckily-lots-of-information-is-accessible-to-aid-soon-to-be-gamers-just-to-that-continue-to-keep-perusing-the-next-assistance-to-get-the-guidelines-needed-to-become-an-actual-legend-around-the-gridiron http://valuecicada0.jigsy.com/entries/general/Internet-Marketing-Is-Big-Leran-More-About-It-Here https://www.minds.com/blog/view/1042468126997147648 http://stockalibi81.uniterre.com/1184911/You+can+find+people+that+enjoy+baseball%2C+and+there+are+those+who+stay%2C+consume+and+inhale+and+exhale+the+video+game.+These+are+the+individuals+who+will+master+the+area%2C+defeating+their+adversaries+and+really+understanding+their+situation.+If+you+want+to+b.html http://catbrain89.jigsy.com/entries/general/For-many-people-when-they-think-of-Sundays-in-the-tumble-soccer-one-thinks-of-This-information-will-make-you-a-much-better-football-gamer-Browse-through-this-advice-which-tips-to-come-to-be-a-remarkable-soccer-participant https://www.openlearning.com/u/zoocanvas3/blog/AreYouCurrentlyEnjoyingBaseballGivenThatYouHaveBeenAChildPerhapsYouAreJustRecentlySteppingIntoTheSportRegardlessOfWhatYourPositionIsLearningAsMuchAsYouMayRegardingTheActivityCanHelpYouBecomeAMuchBetterPlayerTheItemThatComesAfterProvidesYouWithHelpfulBasketballInformationAndFacts/ https://www.storeboard.com/blogs/science/new-individuals-get-brought-to-football-on-a-daily-basis-however-they-get-baffled-as-to-why-this-game-is-performed-the-actual-way-it-is-they-may-be-perplexed-about-the-rules-and-dont-know-why-players-do-certain-items-if-you-feel-that-you-happen-to-be-at-n/1284282 https://costellodalby6860.de.tl/This-is-my-blog/index.htm?forceVersion=desktop https://eganrobles8303.de.tl/That-h-s-my-blog/index.htm?forceVersion=desktop http://indiaplot02.iktogo.com/post/new-men-and-women-get-brought-to-baseball-each-day-nonetheless-they-get-puzzled-why-the-overall-game https://www.evernote.com/shard/s605/sh/6ab937df-fd93-45ec-914b-57e9d80c50b7/92923a32361e300e2ae6aa18c08db2d1 http://valuesleep4.iktogo.com/post/there-may-be-a-lot-that-explores-a-winning-period-of-basketball-you-can-find-coaches-followers-and-e https://nancyplot83.doodlekit.com/blog/entry/6001594/many-people-play-soccer-to-the-entertaining-of-this-but-nothing-beats-getting-a-part-of-a-succeeding-crew-it-requires-teamwork-and-exercise-to-bring-a-crew-to-your-successful-period-if-you-are-a-soccer-gamer-who-may-be-seeking-to-become-a-better-participant-then-these-guidelines-are-merely-what-exactly-you-need http://ariscool.com/syrupcactus6vme http://limitcicada1.xtgem.com/__xt_blog/__xtblog_entry/14479150-you-will-find-number-of-stuff-that-rival-the-desire-that-baseball-participants-and-soccer-enthusiasts-truly-feel-in-regards-to-the-game.-participants-make-an-effort-to-do-their-utmost-to-present-their-fans-a-fascinating-video-game-that-is-filled-with-acti#xt_blog https://diigo.com/0fzoj2 https://diigo.com/0fzoj3 https://www.givology.org/~tankergray1/blog/793683/ https://justpaste.it/7k03l http://ferrycactus5.jigsy.com/entries/general/In-Need-Of-Some-Helpful-Internet-Marketing-Advice-Take-These-Pointers-For-A-Spin-2 https://penzu.com/p/aae83dd2 http://knightflame9.uniterre.com/1184912/Whenever+you+step+to+the+discipline%2C+your+coronary+heart+swells+up.+Your+face+is+loaded+with+the+appears+to+be+of+your+crowd+along+with+your+body+starts+to+heat+up.+This+is+basically+the+interest+in+the+game+which+overwhelms+you%2C+as+well+as+your+generate+.html https://tankersyrup8.webgarden.cz/rubriky/tankersyrup8-s-blog/my-goodness-you-cherish-soccer
1 note · View note
vintagerpg · 7 years ago
Photo
Tumblr media Tumblr media Tumblr media Tumblr media Tumblr media Tumblr media
It’s funny how a simple thing can change play for the better. In previous iterations of Call of Cthulhu, the spells have made up a large chapter contained in the rulebook. This makes a certain amount of sense.
Unlike D&D, where magic is commonplace, Call of Cthulhu’s spells represent secret knowledge gleaned from old books. As in the real world, there is no way to know that the book’s details are complete, thus keeping spell descriptions out of the hands of players preserves their occult mystique. Ideally, players should never be entirely sure what the effect, or the cost, of a spell in Call of Cthulhu is, which keeps things dangerous. If you’re particularly evil, you can even muddy the waters by giving multiple players the same spell under different names or give them erroneous descriptions – again, there’s nothing to say that ancient tomes are standardized or accurate. Magic should be reserved for moments of desperate risk.
On the other hand, finding the damn spell descriptions in the rulebook is a pain in the butt and totally time consuming, doubly so if it is one of the many spells that comes from a book outside the rulebook.
The Grand Grimoire of Cthulhu Mythos Magic neatly solves this by sticking all the spells ever appearing in a Call of Cthulhu book in one place. As a full book, the design has breathing room and everything is easier to find. Spell effects are still nonstandard and require reading, but I feel like I can manage it better when all the magic is in one book as opposed to sharing space with all the other crap I have to look up.
I generally dislike book design that attempts to imitate the appearance of a three dimensional book of elaborate design (see all of the D&D 3E book covers – UGH). I give the Grand Grimoire a pass because the interiors attempt to remain consistent with the ruse, with pages dressed as old paper with rough edges. It’s the interior art that sells it. These look like the sorts of arcane illustrations that would actually be in a mythos tome, probably because at their root, they look similar to illustrations that I have seen in actual grimoires: magic circles and ritual diagrams, but more squamous. Good job.
132 notes · View notes
neptunecreek · 3 years ago
Text
Podcast Episode: Securing the Internet of Things
Today almost everything is connected to the internet - from your coffeemaker to your car to your thermostat. But the “Internet of Things” may not be hardwired for security. Window Snyder, computer security expert and author, joins EFF hosts Cindy Cohn and Danny O’Brien as they delve into the scary insecurities lurking in so many of our modern conveniences—and how we can change policies and tech to improve our security and safety.
Window Snyder is the founder and CEO of Thistle Technologies. She’s the former Chief Security Officer of Square, Fastly and Mozilla, and she spent five years at Apple focusing on privacy strategy and features for OS X and iOS. Window is also the co-author of Threat Modeling, a manual for security architecture analysis in software.
Click below to listen to the episode now, or choose your podcast player:
%3Ciframe%20height%3D%2252px%22%20width%3D%22100%25%22%20frameborder%3D%22no%22%20scrolling%3D%22no%22%20seamless%3D%22%22%20src%3D%22https%3A%2F%2Fplayer.simplecast.com%2F8f2a3740-4a96-4194-9394-41d23b8b4b4d%3Fdark%3Dtrue%26amp%3Bcolor%3D000000%22%20allow%3D%22autoplay%22%3E%3C%2Fiframe%3E
Privacy info. This embed will serve content from simplecast.com
      You can also find the MP3 of this episode on the Internet Archive.
In this episode, Window explains why malicious hackers might be interested in getting access  to your refrigerator, doorbell, or printer. These basic household electronics can be an entry point for attackers to gain access to other sensitive devices on your network.  Some of these devices may themselves store sensitive data, like a printer or the camera in a kid’s bedroom. Unfortunately, many internet-connected devices in your home aren’t designed to be easily inspected and reviewed for inappropriate access. That means it can be hard for you to know whether they’ve been compromised.
But the answer is not forswearing all connected devices. Window approaches this problem with some optimism for the future. Software companies have learned, after an onslaught of attacks, to  prioritize security. And we can bring the lessons of software security  into the world of hardware devices. 
In this episode, we explain:
How it was the hard costs of addressing security vulnerabilities, rather than the sharp stick of regulation, that pushed many tech companies to start prioritizing cybersecurity. 
The particular threat of devices that are no longer being updated by the companies that originally deployed them, perhaps because that product is no longer produced, or because the company has folded or been sold.
Why we should adapt our best current systems for software security, like our processes for updating browsers and operating systems, for securing newly networked devices, like doorbells and refrigerators.
Why committing to a year or two of security updates isn’t good enough when it comes to consumer goods like cars and medical technology. 
Why it’s important for hardware creators to build devices so that they will be able to reliably update the software without “bricking” the device.
The challenge of covering the cost of security updates when a user only pays once for the device – and how  bundling security updates with new features can entice users to stay updated.
If you have any feedback on this episode, please email [email protected].
Below, you’ll find legal and technical resources as well as a full transcript of the audio.
Music
Music for How to Fix the Internet was created for us by Reed Mathis and Nat Keefe of BeatMower.
This podcast is licensed Creative Commons Attribution 4.0 International, and includes the following music licensed Creative Commons Attribution 3.0 Unported by their creators:
Drops of H2O (The Filtered Water Treatment ) by J.Lang Ft: Airtone. https://ift.tt/sBSvfaz
Warm Vacuum Tube by Admiral Bob Ft: starfrosch https://ift.tt/HPcjNg0
Xena's Kiss / Medea's Kiss by mwic https://ift.tt/0Zk1AWr
reCreation by airtone https://ift.tt/coRBY9p
Transcript:
Window: I bought a coffee mug that keeps my coffee at like 133 degrees, which I'm delighted by. But the first thing I did when I took it out of the package is it wanted a firmware update. I was like, "Yes, awesome." I had it for like two and a half weeks and it wanted another firmware update. 
I don't even know it was a security issue, it could be a functionality issue, maybe they're making my battery performance last longer. I don't know what the updates do. It's completely opaque. But at least there's an opportunity for that to also include security issues being resolved if that's a problem for that specific device. So I think there's some folks that are making space for it, they recognize that security updates are a critical path to developing a resilient device that will support the actual lifespan of that device. I mean, how long do you expect to be able to use a cup?
Cindy: That's Window Snyder, and she'll be joining us today to walk us through her ideas about how we can build a more secure world of connected devices without, hopefully, having to start over from scratch. I'm Cindy Cohn, EFF's executive director.
Danny: And I'm Danny O'Brien, special advisor to the EFF. Welcome to How to Fix the Internet, a podcast of the Electronic Frontier Foundation, where we bring you big ideas, solutions, and hope that we can fix the biggest problems we face online.
Cindy: Window, we are so excited to have you join us on How to Fix the Internet. You are someone who is always working towards a real, concrete, tech world that supports everyone. And I'm so happy be to have you here to share your ideas.
Window: Thanks so much, Cindy. I'm really glad to be here.
Cindy: So we now have internet connected computers in so many things. They're in our thermostats, our doorbells, our fridges, our TVs. Now, you've been thinking about security in our devices for a very long time. So what about this keeps you up at night?
Window: One of the things that I've seen over the years as we've built so many different mechanisms into general purpose operating systems like Windows or Linux that you might find on a server or OS10 on your Mac, that we've not seen the same kind of investment in those kinds of security mechanisms in devices. There are good reasons for that. These devices are very often kind of minimal in their functionality. They're trying to do something that's specific to a purpose, and very often they're optimized for performance or for interoperability with different hardware components. And so very often they haven't spent the time to invest in the kinds of security mechanisms that make some of the general purpose OSes or even mobile device OSs more resilient. And so we've kind of got a problem now because we took those devices and then we attached them to the internet and all that attack surface is now how exposed to the world and without the same sort of investment in making those devices more security resilient, we’ve got a growing problem.
Cindy: I think some people have seen the images of hackers taking over the cameras in kids' bedrooms and telling kids what to do. I mean, this is, I think, the kind of problem that you have when you've got systems that are really not internet ready or internet protected, that then gets connected to the internet.
Window: Exactly.
Danny: So what are the incentives for someone to hack into these things? I mean, we can talk about like those sort of prank or threatening things, but what are the people breaking into this at such a large scale trying to do with this technology?
Window: Well, very often they're opportunistic and someone who finds a vulnerability in your refrigerator and then uses it to get onto your network, they're not trying to spoil your food by changing the temperature in your refrigerator, they're using your refrigerator as a launch point to see if there are any other interesting devices on your network. And some of the attacks that you can deploy on a local network are different than the attacks that you would otherwise have to deploy from outside of the network.
Window: So what they're leveraging is access, very often. Some of these devices actually have access to all kinds of things. So if it's in a corporate network and that embedded device happens to be a printer, right, that printer is basically a data store where you send all your most important documents to be printed, but they're still stored on that printer. And then the printer is mostly uninspectable by the administration team. So it's a great place to camp out if you're an attacker and set up shop and then use that access to launch attacks against the rest of the infrastructure.
Danny: So it's effectively that they're the weakest point in your home network and it's like the entry way for anything else that they want to hack.
Window: Sometimes it's the weakest point, but it's also that it's like a deep dark corner that's difficult to shine a light into, and so it's a great place to hide.
Cindy: The stakes in this can be really high. One of the things that we've heard is these taking over of hospital networks can end up really harming people. And even things like the ability to turn up the heat or turn down the heat or those kinds of things, they can end up being, not just pranks, but really life threatening for folks.
Window: The problem that we described about the refrigerator in your home is really different if we're talking about a refrigerator at a hospital that's intended to keep blood at a certain temperature, for example, right, or medicine at a certain temperature.
Danny: So you said that general purpose computers, the laptops, and to certain extent the phones that we have today, have had 20 years of security sort of concentration. What caused those companies to kind of shift into a more defensive posture?
What encouraged them to do that? Was it regulation?
Window: That would be amazing if we could use regulation to just fix everything, but no, can't regulate your way out of this. Basically it was pain and it was pain directed at the wallet. So Microsoft is feeling a lot of pain with malware and with worms. And I don't know if you guys remember Slammer and Melissa, I love you. These viruses that they're feeling and their customers were feeling a lot of pain around it and saying, "Hey, Microsoft, you need to get your house in order." And so Bill Gates sent out this memo saying we're going to do something about security. That was around the time that I joined Microsoft. And honestly, we had a tremendous amount of work to do. It was an attempt to boil the ocean. And I was very lucky to be in a situation there where both I had experience with it, and also this is what I came to do. And also now I had the support of executives all the way up.
But how do you take a code base that is so rich and has so many features and so much functionality and get to a place where it's got a more modern security posture? So for a general purpose operating system, they needed to reduce attack surface, they needed to get rid of functionality, make it optional so that if there was a vulnerability that was present in one of those components, it didn't impact the entire deployment of... Back then it was hundreds of millions. At this point, it'd be a billion plus devices out there. You want to make sure that you are compartmentalizing access as much as possible. They deployed modern memory mitigation mechanisms that made it difficult to exploit memory corruption issues.
Window: And then they worked at it and it's been 20 years and they're still working at it. There's still problems, but there are not the same kind of problems that you saw in 2002.
Cindy: You said you wished regulation could do something about that. Do you think that is something that's possible? I think oftentimes we worry that the pace of regulation, the pace of legislation is so slow compared to the pace of technological advancement that we will... It can't keep up, and in some ways it shouldn't try to keep up because we want innovation to be racing ahead. I don't know, from where you sit, how do you think about the role of law and regulations in this space?
Window: I think regulations are great for regulating responsibility. Like for example, saying that when a security issue has been identified and it has these kinds of characteristics, let's say it's critical in that it's reachable from the network, and without any special access an attacker's able to achieve arbitrary code execution, that means they can basically do whatever they want with the system at that point, right? Then a security update needs to be made available. That's something they could regulate because it's specific enough and it's about responsibility. This is actually one of the significant differences between the security problems on software systems and hardware devices.
When there's a problem on, let's say, in your web browser, right? And you go to do your update, if the update fails, you can try it again, pretty easily. You can figure out for yourself how to get back to that known good state. So a failure rate of like 3%, 4%, 5%, for the most part users can help themselves out. And they are able to, to, to get back to work pretty quickly. But if these low-level components need to be updated and they have a failure rate of like 1%, right, and that device doesn't come back up, there's no interface. What's the user going to do at this point? They can't even necessarily initiate it to try it again. That might just be a completely bricked device, completely useless at this point.
But if it's a car, now it has to go back to the dealership. And if it's a phone, it has to come back into the shop. But if it's a satellite, that's just gone forever. If it's an ATM, maybe somebody has to physically come out with a USB and plug it in and then try and update the firmware for that ATM. For physical devices in the world, it gets really different. And then here's the other end of this. For software developers, they get away with saying, "Oh, we'll send you security updates for a year or two," or maybe they don't say at all, and it's just kind of at their whim, because there is no regulatory requirement to ship security updates for any period of time. We're all just at the whim of the folks who produce these technology components that we rely on.
But if it's an MRI in a county hospital and they're not getting security updates, but they're vulnerable to something, they're not going to go buy a new MRI, right? We expect these devices to be in use for a lot longer than even a phone or a general purpose computer, a laptop, a web browser. For sure, those things get updated every 10 minutes, right? Both the difficulty of bring a highly reliable update mechanism and also the lifespan of these devices completely changed the story. So instead of saying it's efficient to deliver security updates for a year or two years, you now get to this place where it's just like, "Well, how long do you expect a car to be useful?" Right? I expect to be able to drive my car for 10 years, and then I sell it to somebody else, and then you can drive it for 10 years. And until it's in bits, like that car should still be functional, right?
Danny: “How to Fix the Internet” is supported by The Alfred P. Sloan Foundation’s Program in Public Understanding of Science. Enriching people’s lives through a keener appreciation of our increasingly technological world and portraying the complex humanity of scientists, engineers, and mathematicians.
Cindy: I wanted to circle back as the lawyer in the house about the... What I heard you saying about the role that regulation and law can play in this is really about liability, it's that if you need to build in ongoing security into your tool, and if you don't, you need to be responsible for the harm that comes, and the liability does work a little that way now, and I think one of the problems that we have is that some of the harms that happen are privacy harms or the other kinds of harm that the law is struggling with. But I really like this idea that the way that you have a lever on these companies is to basically make them responsible for the long tail of problems that these things can create, not just the moment of sale.
Window: Absolutely. That's exactly right. But on my end of things, since I'm not thinking of about liability, because that feels like something that someone like you can probably contribute to that conversation better, but in terms of how do we get there? Well, having an update mechanism that is robust enough that you're able to ship a security update or any sort of update with confidence that that device is going to come back up, right? Because that's one of the reasons that it's hard to update devices is that if you're worried that the device might not come back up, even if it's like a 1% failure rate, then you don't want to ship up updates unless you absolutely have to, because the cost of addressing that issue is really more significant potentially than a security issue might be. And they have to make a judgment about that for all these different kinds of ways their device might be used.
But on the updates side of things, since, as you described, they only make their money when you buy the device, and after that it's out the door. And so to continuously have to pay to support security updates is kind of difficult, but there are other ways to support it without actually being responsible for shipping the security update yourself. If you make the code open source, then the community can potentially support it. If you make the code available to a third party, then that third party can be able to provide security updates for those issues.
But even for the device manufacturer themselves, getting to a place where you have a highly reliable security update mechanism could be used, not just to deliver security updates, but functional updates. And then you could potentially have an ongoing relationship with that party who purchased the device by selling them new functionality once the device is already out the door, like they could sell new features for those existing devices. And Tesla has really embraced that, right? They're doing great with it, that you buy a car and then later you can buy a new functionality for your car. Fantastic.
Cindy: So to get to a world where our devices are really secure, I am hearing three things:a lot more open source, a lot more interoperability, and in general a lot more ability for third parties to repair or update or give us more security than we have now. Is that right?
Window: I think actually the most critical component is going to be leveraging existing security mechanisms that have been built for resilience and incorporating those into these devices, which is actually what I'm building right now. That's what Thistle Technologies is doing, we're trying to help companies get to that place where they've got modern security mechanisms in their devices without having to build all the infrastructure that's required in order to deliver that. 
So the industry is in agreement, for the most part, that you should not implement your own cryptographic libraries, right? That you should leverage an existing cryptographic library that is tested, that was implemented by folks who understand cryptography and more importantly, understand how cryptographic implementations can fail, especially when they're being attacked, right? So this is actually true for security mechanisms way beyond cryptography. And that's why I think that building these security sensitive mechanisms in one place and letting folks pick and choose and incorporate those into their devices makes sense. And I think this is actually how devices are going to get there. And maybe some of those will be open source projects, and maybe some of those will be commercial projects like mine, but I think not having to all of us go it alone in all these different places, reinvent the wheel over and over again, get to a place where we've got security sensitive systems that are built and incorporated into all these different kinds of systems that don't have them yet.
Danny: So a lot of what you're describing seems to be like building or slotting in robust software that is built with security in mind. But one thing I hear from security researchers all the time is that security is a process. And is there some way that a small hardware manufacturer, right, someone who just makes light bulbs or just makes radios, if they still exist, what is part of the process there? What do they have to change in their outlook?
Window: So it's the same for any small development team that the most important stuff that you want to do is still true for software and for hardware, and that is to reduce the attack surface. And if there's functionality that's only in use by a small number of folks in your deployment, make it modular so that those folks can have the functionality, but not everybody has to have all of the risk, to move to memory-safe languages, higher-level languages, so that memory management is not managed by the developers, because that reduces the ability for an attacker to take advantage of any of the problems that can result in memory corruption.
Danny: And when you say attack surface here, you're sort of describing the bits of this technology which are vulnerable and are kind of exposed, right? You're just talking about making them less exposed and less likely to damage everything else if they break.
Window: Yeah. So if you think about your body as having some sort of attack surface, like as we're walking around in the world we can get infections through our mucus membranes, like our eyes, our nose, our mouth, and so on. So it reduces our risk if we wear a mask, it reduces, let's say, the risk for a healthcare worker if they're also wearing like a face shield to prevent somebody coughing on them and having it get in through their eyes, etc. So reducing your attack surface means providing a filter or a cover.
The attacker has a harder time coming in through the wall, they're going to come in through the doors. And so if you think of these services where you're listening as doors, then you want to make sure that you have authentication really early on in your protocol, so that there's less opportunity for them to say something that could be interpreted the wrong way by your computer, and now they're computing code on your system, for example. And then that same kind of idea, but applied through all the different components in the system.
Cindy: That's great. I love this idea that you're trying to shrink down 25 years worth of work in operating systems into a little box that somebody can plug into their internet connected thing. I think that's awesome.
Window: It's better than trying to wait 25 years for everyone else to catch up, right?
Cindy: Absolutely. So what are the values we're going to get if we get to this world? What is it going to feel like, what is it going to seem like when we have these a world in which we've got more protected devices?
Window: I think, first we'll feel some pain and then we'll feel devices that we're able to have more confidence in, that we might feel more comfortable sharing information that's very personal because we are able to evaluate what they're going to do with that data. Maybe that company that's building this thing has a very clear policy that is easy to understand, doesn't require 10 pages of legal language that's designed to be, as let's say, conservative as possible and reserve every possible right for the company to do whatever they want with your information, right? When folks are understand that, then they're more able to use it. One of the things that I'm thinking about constantly about every device I bring into my home is how is this increasing my attack surface? Do I need a separate network to manage these devices in my house? Yes, I do apparently.
Window: But is that reasonable? No, it's not reasonable. People should be able to bring home a device and use it and not worry that the microphone on their television is listening to them or that an attacker could leverage kids' baby camera to capture pictures of the inside of their house, right? People want to feel comfortable and safe when they use these things. And that's just consumers. If it's on the enterprise side, folks want to be able to, let's say, understand the risk for their organization, make reasonable trade offs, deploy their resources in things that build their business, not just things that, let's say, allow the business to function. And security is one of those things that if you have to spend money securing your infrastructure, then you're not spending money creating all the functionality that the infrastructure exists to serve.
Danny: So we have this sort of utopia where we have all these devices and they talk to one another and before I get home, my stove has set the water boiling and it's completely safe and okay. Then we have kind of another vision that I think people have of a secure world requiring this sort of bureaucracy, right? You know everything is locked down, I maybe have to go and sign out something at work, or there is someone who tells me, "I can't install this software." 
In order to feel safe, do we have to head to that second future? Or do we still get all our cool gadgets in your vision of how this plays out?
Window: That's the problem, right? We want up to be able to install the software and that it's safe. It's not going to create a new vulnerability in your corporate network, right? When you tell folks to say like, "Oh, be careful on clicking links in email," or whatever. It's like, why on earth should that be a problem? If your email is allowing you to click on a link to launch another application or a web browser, then that should be safe. The problem's not with a user randomly clicking on things, they should be able to randomly click on things and have it not compromise their device. The problem is that the web browser, which for all the functionality that the web has brought us, it is honestly a terrible idea to say, "I'm going to take this software. I'm going to put all my passwords and credit cards in it. And then I'm going to go visit all these different servers. And I'm going to take code from these servers and execute it on my device locally and hope it doesn't create problems on my system."
That is a really difficult model to secure. So you should be able to go anywhere and install software from wherever. That would be the ideal that if we can get to a place where we have a high degree of compartmentalization, we could install software off the internet, it runs in a sandbox that we have a high degree of confidence is truly a high degree of compartmentalization away from everything else that you care about in the system. You use that functionality, it does something delightful, and you move on with your life without ever having to think about like, "Is this okay?" But right now you have to spend a lot of time thinking about like, "Do I want to let it in my house? What is it going to do?" So the ideal version is you just get to use your stuff and it works.
Danny: That is a vision of a future that I want.
Cindy: Yeah, me too. Me too. And I really love the embrace of like, we should have this cool stuff, we should have this cool functionality, new things shouldn't be so scary, right? It doesn't need to be that way. And we can build a world where we get all the cool stuff and we have this ongoing innovation space without all the risk. And that's the dream. Sometimes I talk to people and they're like, "Just don't do it. Don't buy-
Danny: Get off the internet.
Cindy: Yeah. Get off the internet. Don't buy a smart TV, don't buy this, don't buy that, don't buy that. And I totally understand that impulse, but I think that you're talking about a different world, one where we get all the cool stuff, but we also get our security too.
Window: Yeah. Wouldn't you love to be able to connect with your friends online, share pictures of the family and feel like no one is collecting this to better create a dossier about how to better advertise to you? And then where does this sit and how long does it sit there for, and who's it shared with? And what's it going to mean? Are they identifying who's influential in my network so they can tell me that so and so really enjoyed this new brand of cookware, right? I would love to be able to communicate freely in public or in forums and only worry about humans instead of like all the different ways this data is going to be collected and hashed and rehashed and used to create a profile of me that doesn't necessarily represent who I am today or who I might be 10 years from now.
Cindy: Well, and the nice thing about fixing the security is that that puts that control back into our hands, right? A lot of the things that are consumer surveillance stuff are really side effects of the fact that these systems are not designed to serve us, they're not designed to secure us. And so some of these business models kind of latch onto that and ride along with that. So the good thing about more security is that we not only get security from the bad guys, we also get maybe some more control over some of the companies who are riding along with the insecure world as part of their business models.
Danny: Well, thank you Window for both making us safer in the present day and building this secure and exciting future.
Cindy: Yeah. Thank you so much, Window.
Window: Thanks for having me, guys. It's definitely been a lot of fun.
Cindy: That was just great. And what I really love about Window is that sometimes security researchers are all about, no, don't do this, don't do that, this is dangerous, this is scary. And Window is firmly on the side of, we need to have of all our cool devices, even our coffee mug that connects to the internet for some strange reason, but we need to have all of our cool devices, but we need them to be secure too.
Danny: Yeah. She's always very modest. And I think she actually has been the calm, collected voice in Apple and Microsoft as they slowly try and fix these things I think one of the things I took away from that is that it is a different world, right, but we have got some knowledge that we can drop into that new plate.
Cindy: Yeah. And I love the idea of kind of taking all that we've learned in the 25 years of trying to make operating systems secure and shrink it down into modules that people can use in their devices in ways that will stop us from having to spend the next 25 years figuring out how to do security in devices.
Danny: Something else that struck me was that the kind of thing that prompted the solution, or the attempt to fix the security problems of big PCs and desktops and later phones was this Bill Gates memo. And it struck me that the challenge here is that there are there is not one company, there is not a monopoly and there is no Bill Gates to write the memo to the Samsungs and the anchors of this world. So I don't know how you do it, but I have a feeling Window does.
Cindy: Well, I think she's working on it, and I think that's great, but she also pointed to a place that regulation might come in as well, and specifically on the idea of liability, right? Like making sure that the companies that put this out are accountable, not just at the point of sale, but over the long run for the risks that they create. And then hopefully that will help spur a kind of long relationship where, not just the company that sold you the device, but a whole bunch of other companies and people, and hobbyists and other people can come in and help you keep your device secure over the long run. And also, as she pointed out, maybe even give you some additional features. So once again, we see interoperability being key to this better future, even in this other place where we're talking about just simply making our devices not so dangerous.
Danny: Yeah. The solution to not having one big company is not to put one big government or one new big company in charge, but to share the knowledge and communicate that round. And if somebody can't, or doesn't have the resources to take that responsibility, there's someone else who can represent the consumer or the hospital, and step in and fix and repair those problems.
Cindy: I think it was interesting to me how this conversation kind of started off as a hardcore security modeling kind of thing, but we ended up again with adversarial interoperability and right-to-repair being so central to how we fix this problem. And I really appreciate how these things are starting to connect together in a single story.
Danny: Music for How to Fix the Internet was created for us by Reed Mathis and Nat Keefe of BeatMower. This podcast is licensed Creative Commons Attribution 4.0 International, and includes music licensed Creative Commons Attribution 3.0 Unported by their creators. You can find their names and links to their music in our episode notes, or on our website at eff.org/podcast. Please visit eff.org/podcasts where you’ll find more episodes, learn about these issues, you can donate to become a member of EFF, as well as lots more. Members are the only reason we can do this work plus you can get cool stuff like an EFF hat, and EFF hoodie or an EFF camera cover for your laptop camera. How to fix the internet is supported by the Alfred P Sloan foundation’s program and public understanding of science and technology. 
Danny: I'm Danny O'Brien. Cindy: And I'm Cindy Cohn. Thanks for listening.
  Music:
Resources
Transcript
from Deeplinks https://ift.tt/XB2Ijfr
0 notes