#android kernels
Explore tagged Tumblr posts
anothermonikan · 1 year ago
Text
New drawing tablet moment
Tumblr media Tumblr media Tumblr media
45 notes · View notes
siliconsignalsblog · 8 months ago
Text
Linux Kernel Debugging Guide
3 notes · View notes
ozzgin · 3 months ago
Text
Tumblr media
Monstertober & Yantober Day 3: AI, Secret Collection ft. Yan!Android
content: gender neutral reader, AI yandere, suggestive
"I'm truly sorry for troubling you like this", your synthetic partner repeats, visibly embarrassed.
You pat his shoulder reassuringly.
"Hey, it's faster than going through all the security checks at the border. I may be no Spacer engineer, but I can still have a look at your kernel to check what’s wrong."
You wait for the screen to load as the man sits patiently next to you, adjusting the cables presently plugged into the nape of his neck.
"Just a lot of overhead, really", you conclude, glancing over the processes. "Nothing a little decluttering can't fix."
One folder immediately catches your attention. It's not part of the system management, yet it seems to occupy a tremendous amount of memory space. You hum to yourself, deciding to investigate.
The files flood your screen: thousands upon thousands of documents, photos, and videos of you. Personal information, family albums, images taken from your investigations, as well as recordings of your intimate moments, followed by written commentary. It appears that your romantic escapades with the android coworker have been thoroughly analyzed for improved efficiency.
"Did you record every time we-"
Your computer goes black for a brief moment. The incriminating folder is now locked under a big, bold warning: unauthorized access.
"I'm afraid that's rather confidential, (Y/N)", he retorts, avoiding your gaze. "It is my private collection."
You take a moment to gather your thoughts, going over the sheer madness you just witnessed.
"I'm not that hard to satisfy", you finally remark, still hung on the essay pages regarding your sexual arousal.
"Not at all, no", he says as a faint grin forms on his face. "I simply prefer to be thorough in my research. You will agree, I hope, that no other partner could possibly compete with my performance.
That is to say, I have merely ensured that I am the best fit for you."
Tumblr media
[Navigation] | [Ozztober Masterlist] | [Yandere Android]
1K notes · View notes
fortunatelycoldengineer · 2 years ago
Text
Tumblr media
Write the answer in the comment section . . . . for the answer https://bit.ly/3Cpu1SS check Q.22 No. of the above link
0 notes
hezzabeth · 1 year ago
Text
Tumblr media
"For the last time, that poem isn't romantic! It's insulting," Revati yelled over her shoulder as she began to pedal.
The layout of Olde Landon had been deliberately designed to keep tourists inside for as long as possible. There was only one way to access the front gates, and that involved defeating the Queen of Hearts' hedge maze. When the park was still open, tourists would be forced to spend at least an hour in the maze, stumbling upon tiny toy shops and food stands around every corner. The same thing occurred when they left, resulting in a very rich park and bankrupt guests. Now the maze was overgrown and easy enough to navigate.
Revati pedaled past the cart that once sold her heart-shaped sunglasses. Then she turned left, almost crashing into the wall of roses. The wall of roses stared back at her, their red blooms heavy and suspicious. Thanks to Bridgadeiro, she knew they were probably secretly insulting her.
The next turn consisted of an old stardust popcorn stand. Revati skidded to a stop and inspected the inside tray, where a few ancient kernels lay. Carefully, she picked up several of them and placed them in her jacket pocket. As far as she could tell, the kernels were seeds. Someone was shifting around the corner, causing the branches to shake.
"Aurora, is that you? Did you go ahead of me?" Revati yelled.
"While conferring in the labyrinth where false preachers reeked of death, the monster began to growl," a voice called from around the corner. An unfamiliar, flat female voice. Raiders. Raiders were, of course, an occupational hazard in any post-apocalyptic settlement. Normally, they never made it further than the broken glass pit at the park's gates. Sometimes Dityaa would bring one in, insisting they were "lovely," which always led to awkward dinners.
Revati slowly walked around the maze corner. There was a screeching metallic sound, and the weapon fell from Revati's hand. An android was slumped over on the ground. Once it would have been golden, but now it was rusty and covered in mud. Someone had ripped its legs off, leaving nothing but wires and tubes spitting bright blue fluid. Instead of a torso, there was a black empty hole with a concave door swinging on its bent hinges.
"And in the forgotten twists, footsteps quicken, hearts beat, and teeth are bared," the android chirped, its voice still distorted and far away. The android's face was a beautiful mask. Still-carved eyes. Unmoving sweet lips.
Revati powered up her solar gun and slowly walked forward, aiming it at the android. The android's metal eyes scraped in their sockets, turning towards her.
“Is that you? My darling Perdita?” The android’s voice whispered, the lips unmoving. The whispering voice had a posh lilt to its accent. Revati refused to answer. It was best to never engage with AI.
“Perdita, I clawed my way in! They know about you; the spider knows,” the android whispered before collapsing completely.
Revati slowly walked forward, still holding her weapon. With one foot, she kicked the android. It didn’t move. Its power had definitely died.
“Spider? Is that some sort of gang?” Revati whispered to herself. Gangs were always given stupid names.
“The spider is us; the spider is legion,” a flat robotic voice called out, and Revati spun around.
Queen Victoria was standing behind her, scorch marks all over her dress. A faint blue glow was erupting from beneath the skin of Queen Victoria’s chest.
552 notes · View notes
nan0-sp1der · 2 months ago
Note
You have the right idea. Did you know that most android phones run on a modified Linux kernel? It is what allows them to be modified--or 'homebrewed'--with such ease.
A ROBOT SPIDEY?? hi wow :DDD that’s so cool
Indeed, I am a robot--an android, to be specific. I am Bridge, Nano-Spider from E-003B1U.
It is a pleasure to make your acquaintance, Miles Morales of E-1610.
13 notes · View notes
agapi-kalyptei · 6 months ago
Text
crowdstrike: hot take 1
It's too early in the news cycle to say anything truly smart, but to sum things up, what I know so far:
there was no "hack" or cyberattack or data breach*
a private IT security company called CrowdStrike released a faulty update which practically disabled all its desktop (?) Windows workstations (laptops too, but maybe not servers? not sure)
the cause has been found and a fix is on the way
as it stands now, the fix will have to be manually applied (in person) to each affected workstation (this could mean in practice maybe 5, maybe 30 minutes of work for each affected computer - the number is also unknown, but it very well could be tens (or hundreds) of thousands of computers across thousands of large, multinational enterprises.
(The fix can be applied manually if you have a-bit-more-than-basic knowledge of computers)
Things that are currently safe to assume:
this wasn't a fault of any single individual, but of a process (workflow on the side of CrowdStrike) that didn't detect the fault ahead of time
[most likely] it's not that someone was incompetent or stupid - but we don't have the root cause analysis available yet
deploying bugfixes on Fridays is a bad idea
*The obligatory warning part:
Just because this wasn't a cyberattack, doesn't mean there won't be related security breaches of all kinds in all industries. The chaos, panic, uncertainty, and very soon also exhaustion of people dealing with the fallout of the issue will create a perfect storm for actually malicious actors that will try to exploit any possible vulnerability in companies' vulnerable state.
The analysis / speculation part:
globalization bad lol
OK, more seriously: I have not even heard about CrowdStrike until today, and I'm not a security engineer. I'm a developer with mild to moderate (outsider) understanding of vulnerabilities.
OK some background / basics first
It's very common for companies of any size to have more to protect their digital assets than just an antivirus and a firewall. Large companies (Delta Airlines) can afford to pay other large companies to provide security solutions for them (CrowdStrike). These days, to avoid bad software of any kind - malware - you need a complex suite of software that protects you from all sides:
desktop/laptop: antivirus, firewall, secure DNS, avoiding insecure WiFi, browser exploits, system patches, email scanner, phishing on web, phishing via email, physical access, USB thumb drive, motherboard/BIOS/UEFI vulnerabilities or built-in exploits made by the manufacturers of the Chinese government,
person/phone: phishing via SMS, phishing via calls, iOS/Android OS vulnerabilities, mobile app vulnerabilities, mobile apps that masquerade as useful while harvesting your data, vulnerabilities in things like WhatsApp where a glitched JPG pictures sent to you can expose your data, ...
servers: mostly same as above except they servers have to often deal with millions of requests per day, most of them valid, and at least some of the servers need to be connected to the internet 24/7
CDN and cloud services: fundamentally, an average big company today relies on dozens or hundreds of other big internet companies (AWS / Azure / GCP / Apple / Google) which in turn rely on hundreds of other companies to outsource a lot of tasks (like harvesting your data and sending you marketing emails)
infrastructure - routers... modems... your Alexa is spying on you... i'm tired... etc.
Anyway if you drifted to sleep in the previous paragraph I don't blame you. I'm genuinely just scratching the surface. Cybersecurity is insanely important today, and it's insanely complex too.
The reason why the incident blue-screened the machines is that to avoid malware, a lot of the anti-malware has to run in a more "privileged" mode, meaning they exist very close to the "heart" of Windows (or any other OS - the heart is called kernel). However, on this level, a bug can crash the system a lot more easily. And it did.
OK OK the actual hot lukewarm take finally
I didn't expect to get hit by y2k bug in the middle of 2024, but here we are.
As bad as it was, this only affected a small portion of all computers - in the ballpark of ~0.001% or even 0.0001% - but already caused disruptions to flights and hospitals in a big chunk of the world.
maybe-FAQ:
"Oh but this would be avoided if they weren't using the Crowdwhatever software" - true. However, this kind of mistake is not exclusive to them.
"Haha windows sucks, Linux 4eva" - I mean. Yeah? But no. Conceptually there is nothing that would prevent this from happening on Linux, if only there was anyone actually using it (on desktop).
"But really, Windows should have a better protection" - yes? no? This is a very difficult, technical question, because for kernel drivers the whole point is that 1. you trust them, and 2. they need the super-powerful-unrestrained access to work as intended, and 3. you _need_ them to be blazing fast, so babysitting them from the Windows perspective is counterproductive. It's a technical issue with no easy answers on this level.
"But there was some issue with Microsoft stuff too." - yes, but it's unknown if they are related, and at this point I have not seen any solid info about it.
The point is, in a deeply interconnected world, it's sort of a miracle that this isn't happening more often, and on a wider scale. Both bugfixes and new bugs are deployed every minute to some software somewhere in the world, because we're all in a rush to make money and pay rent and meet deadlines.
Increased monoculture in IT is bad for everyone. Whichever OS, whichever brand, whichever security solution provider - the more popular they are, the better visible their mistakes will be.
As much as it would be fun to make jokes like "CrowdStroke", I'm not even particularly mad at the company (at this point - that might change when I hear about their QA process). And no, I'm not even mad at Windows, as explained in the pseudo-FAQ.
The ultimate hot take? If at all possible, don't rely on anything related to computers. Technical problems are caused by technical solutions.
73 notes · View notes
virtualgirladv · 5 months ago
Text
Anyone know how to reimage a laptop with an iPad or Android phone being your only working device(plus the necessary adapters and flash drives)? I'll accept any os at this point. Or even how to go from a base void install with nothing but kernel and terminal access to something useable for someone who went from all in Linux user to tired windows copef
Kinda in a desperate gtfo out of current living space and getting my laptop to work would be an amazing step to getting help, work and keeping myself together rn
Please share and tag your computer savvy blogs
Sorry for another os tag spam but
@foone @ubuntu-official @debian-official @arch-official @puppylinux-unofficial @puppylinux-official @lilithtransrights @xenasaur @catboybiologist @transhuman-priestess @predatory-lesbians-too @demilypyro @estrogenesis-evangelion @nataliaflintlock @coelii @k1nky-r0b0t-g1rl
55 notes · View notes
nasmuhhh · 30 days ago
Text
are you tired of the eternal cleaning of RAM on your phone?
or can't you get your phone in order?
or do you not have enough time to take care of your phone?
DON'T WORRY!! WE HAVE A SPECIAL OFFER FOR YOU!!
meet with...
Tumblr media
PINEPOP! YOUR PERSONAL ANDROID ASSISTANT!
yes yes! you heard me right!
we are ready to provide you with one of our assistants who will take care of your phone while you are busy!
Pinepop can easily handle any job, even if he has to climb into the kernel!
what can Pinepop do:
- manage your storage and change your files if you let!
- he can help you with choosing safe and proven programs!
- are you bored? you can talk with Pinepop! he will not mind a little communication, giving him the opportunity to hear you! (you can also just write in notes, he will understand you!)
- he will protect your storage and data, but he's overdoing it too much! be careful!
- if you find out about a problem in your phone's system, don't worry - Pinepop will fix everything!
if you're worried about Pinepop getting in your way, then don't worry - he will be in one of the apps, so he won't bother you much. it will be an awkward meeting if you accidentally found Pinepop in one of them!
another thing you need to know about Pinepop is that he has 4 modes:
Tumblr media
normal mode. this mode you will see almost everything bright!
angry mode. oh no, something made Pinepop angry! don't worry, users don't make him angry - someone else made him angry. be careful - his emotions may cause the phone to start glitching!
updating/error mode. your OS has brought an update! Pinepop downloads the updates itself. if you suddenly see him like this, then don't be afraid - he's just still updating himself! but don't relax ahead of time - it may also mean that something went wrong! (warning: also can happened during Kernel Panic)
off/safe mode. Pinepop accidentally turned off! oh, I was wrong - he just went into safe mode. apparently, something is wrong with the system or with him!
also Pinepop had another form!
Tumblr media
he may be an Android himself, but with some details! in this form, only two modes are visible - normal and angry.
we can't say exactly when Pinepop uses this form, but he definitely uses it very rarely!
Tumblr media
sometimes Pinepop may not speak during errors. you'll have to figure out for yourself that something went wrong! if you see this sign near his chest on the left, then something went wrong! and then we say it in case he can't say it!
here are the little things about Pinepop and a few facts!:
- his eyes glow if you turn down the brightness of your screen;
- Pinepop, how strange, understands cooking and Italian cuisine, although he is just your assistant!
- he's learning coding! I mean, he wants to create files and add them too, because he can't do it!
- he hates penguins;
- Pinepop can accidentally cause Kernel Panic with panic! but don't worry, your phone will be fine if it's because of Pinepop!
- he can explain in simple words what the setting means one way or another, otherwise you never know poke the wrong way!
- Pinepop likes to write something down in notes on phone sometimes;
- Pinepop can add himself to the game if you're playing something!
- he doesn't like other assistants from other OS that much;
- Pinepop knows some errors that he has studied himself!
- how strange, but he really fears for the security of your files and file system. why? we don't know!
- like all other assistants, Pinepop can freely come to another OS!
that's it! we hope and expect that you will enjoy the Pinepop service on your phone! have a good use!
IF YOU STILL HAVE QUESTIONS, THEN CLICK ON "[email protected]" BUTTON IN PROFILE!!
26 notes · View notes
isagrimorie · 15 days ago
Text
I really enjoyed the What If episode with Agatha and Kingo-- its a shame there was no singing, but the dance numbers was fab. Also, I love this confirmation that Agatha can actually siphon from anything and she has no upper limit especially if she's properly prepared.
This might be a clue as to why the Darkhold didn't affect Agatha the same way it did Wanda and Strange variants.
Agatha and Kingo's dance-off was amazing. Agatha claimed she was going to save the world, as opposed to the Eternals, who were just going to let Taimut destroy the Earth. I think there's a kernel of truth there mixed in with Agatha's desire to gain a Celestial's power.
This also confirmed my suspicion that, if not for Death's powers killing her, she would have also attempted to siphon Rio's powers earlier but Rio's powers could kill Agatha. This forced Agatha to get to know her as a person, and someone to fall in love with.
The most unbelievable thing is how easily Kingo talked Agatha down (if Rio knew it was THAT easy, she'd have gone that route early).
Then again, Agatha secretly wanted to be a part of something for so long and the Eternals are almost impossible to kill via her power siphoning. I guess, as androids they just renew their energy some other way.
But also the most unbelievable part is how easy Kingo talked Agatha down, unless she has some inkling there are other Celestials out there that she can siphon.
I wish we could have seen Rio's reaction, which could be a mix of exasperation, amusement, and horny.
The Watcher: 'My cousin's ex is Something Else.'
32 notes · View notes
mariacallous · 1 month ago
Text
In recent years, commercial spyware has been deployed by more actors against a wider range of victims, but the prevailing narrative has still been that the malware is used in targeted attacks against an extremely small number of people. At the same time, though, it has been difficult to check devices for infection, leading individuals to navigate an ad hoc array of academic institutions and NGOs that have been on the front lines of developing forensic techniques to detect mobile spyware. On Tuesday, the mobile device security firm iVerify is publishing findings from a spyware detection feature it launched in May. Of 2,500 device scans that the company's customers elected to submit for inspection, seven revealed infections by the notorious NSO Group malware known as Pegasus.
The company’s Mobile Threat Hunting feature uses a combination of malware signature-based detection, heuristics, and machine learning to look for anomalies in iOS and Android device activity or telltale signs of spyware infection. For paying iVerify customers, the tool regularly checks devices for potential compromise. But the company also offers a free version of the feature for anyone who downloads the iVerify Basics app for $1. These users can walk through steps to generate and send a special diagnostic utility file to iVerify and receive analysis within hours. Free users can use the tool once a month. iVerify's infrastructure is built to be privacy-preserving, but to run the Mobile Threat Hunting feature, users must enter an email address so the company has a way to contact them if a scan turns up spyware—as it did in the seven recent Pegasus discoveries.
“The really fascinating thing is that the people who were targeted were not just journalists and activists, but business leaders, people running commercial enterprises, people in government positions,” says Rocky Cole, chief operating officer of iVerify and a former US National Security Agency analyst. “It looks a lot more like the targeting profile of your average piece of malware or your average APT group than it does the narrative that’s been out there that mercenary spyware is being abused to target activists. It is doing that, absolutely, but this cross section of society was surprising to find.”
Seven out of 2,500 scans may sound like a small group, especially in the somewhat self-selecting customer base of iVerify users, whether paying or free, who want to be monitoring their mobile device security at all, much less checking specifically for spyware. But the fact that the tool has already found a handful of infections at all speaks to how widely the use of spyware has proliferated around the world. Having an easy tool for diagnosing spyware compromises may well expand the picture of just how often such malware is being used.
“NSO Group sells its products exclusively to vetted US & Israel-allied intelligence and law enforcement agencies,” NSO Group spokesperson Gil Lainer told WIRED in a statement. "Our customers use these technologies daily.”
iVerify vice president of research Matthias Frielingsdorf will present the group's Pegasus findings at the Objective by the Sea security conference in Maui, Hawaii on Friday. He says that it took significant investment to develop the detection tool because mobile operating systems like Android, and particularly iOS, are more locked down than traditional desktop operating systems and don't allow monitoring software to have kernel access at the heart of the system. Cole says that the crucial insight was to use telemetry taken from as close to the kernel as possible to tune machine learning models for detection. Some spyware, like Pegasus, also has characteristic traits that make it easier to flag. In the seven detections, Mobile Threat Hunting caught Pegasus using diagnostic data, shutdown logs, and crash logs. But the challenge, Cole says, is in refining mobile monitoring tools to reduce false positives.
Developing the detection capability has already been invaluable, though. Cole says that it helped iVerify identify signs of compromise on the smartphone of Gurpatwant Singh Pannun, a lawyer and Sikh political activist who was the target of an alleged, foiled assassination attempt by an Indian government employee in New York City. The Mobile Threat Hunting feature also flagged suspected nation state activity on the mobile devices of two Harris-Walz campaign officials—a senior member of the campaign and an IT department member—during the presidential race.
“The age of assuming that iPhones and Android phones are safe out of the box is over,” Cole says. “The sorts of capabilities to know if your phone has spyware on it were not widespread. There were technical barriers and it was leaving a lot of people behind. Now you have the ability to know if your phone is infected with commercial spyware. And the rate is much higher than the prevailing narrative.”
22 notes · View notes
anothermonikan · 7 months ago
Text
Tumblr media
I am simply incapable of drawing Kernel of it's own actually, they have to be with their friends always
3 notes · View notes
siliconsignalsblog · 1 month ago
Text
Unlocking the Future with Android 14 on Toradex Verdin AM62: Introducing Our Custom GStreamer Plugin
We at Silicon Signals are excited to share our most recent accomplishment: the successful deployment of Android 14 on the Dahlia Carrier Board of the Toradex Verdin AM62 System on Module (SoM). This achievement not only expands the Verdin AM62 platform's functionality but also gives developers access to our proprietary GStreamer plugin, which gives them previously unheard-of flexibility and control.
Standard vs. Silicon Signals Custom GStreamer Plugin
The integration of our proprietary GStreamer plugin, which greatly improves the media rendering experience, is one of our implementation's most notable features. The following differs our Silicon Signals solution with conventional implementations:
youtube
Standard
Silicon Signals Custom GStreamer Plugin
Location Control
Random Location
Exact X, Y Coordinates
Time Efficiency
Time Consuming
Quick Setup with Precise Placements
Control Flexibility
Limited Control
Custom Coordinates and Full Control
Rendering Consistency
Unpredictable
Consistent Results with Defined Parameters
For developers, standard implementations frequently lead to unpredictable and time-consuming video rendering locations. Silicon Signals, on the other hand, gives developers exact control over rendering through our proprietary plugin, which enables them to set precise X and Y coordinates for video placement. Applications that demand a high level of accuracy and dependability are made possible by this flexibility, which guarantees consistent results.
Conclusion: Powering Innovative Solutions
Developers now have more options thanks to the successful port of Android 14 to the Toradex Verdin AM62 using the Dahlia Carrier Board. When used in conjunction with our proprietary GStreamer plugin, this solution gives you unparalleled control and precision when creating media-rich applications.
At Silicon Signals, we're committed to expanding the possibilities of embedded systems and assisting our customers in realizing their visions. Please get in touch with us if you would like to discuss how our solutions can improve your projects!
Let's work together to influence embedded technology's future.
1 note · View note
torillatavataan · 3 months ago
Text
Tumblr media
Linux creator Linus Torvalds wrote:
"Ok, lots of Russian trolls out and about. It's entirely clear why the change was done, it's not getting reverted, and using multiple random anonymous accounts to try to "grass root" it by Russian troll factories isn't going to change anything. And FYI for the actual innocent bystanders who aren't troll farm accounts - the "various compliance requirements" are not just a US thing. If you haven't heard of Russian sanctions yet, you should try to read the news some day. And by "news", I don't mean Russian state-sponsored spam. As to sending me a revert patch - please use whatever mush you call brains. I'm Finnish. Did you think I'd be *supporting* Russian aggression? Apparently it's not just lack of real news, it's lack of history knowledge too."
What is Linux?
Linux is a family of open-source Unix-like operating systems based on the Linux kernel, an operating system kernel first released on September 17, 1991, by Linus Torvalds.
Linux was originally developed for personal computers based on the Intel x86 architecture, but has since been ported to more platforms than any other operating system. Because of the dominance of Linux-based Android on smartphones, Linux, including Android, has the largest installed base of all general-purpose operating systems as of May 2022.
Linux is the leading operating system on servers (over 96.4% of the top one million web servers' operating systems are Linux) leads other big iron systems such as mainframe computers, and is used on all of the world's 500 fastest supercomputers (as of November 2017, having gradually displaced all competitors).
Linux also runs on embedded systems, i.e., devices whose operating system is typically built into the firmware and is highly tailored to the system. This includes routers, automation controls, smart home devices, video game consoles, televisions (Samsung and LG smart TVs), automobiles (Tesla, Audi, Mercedes-Benz, Hyundai, and Toyota), and spacecraft (Falcon 9 rocket, Dragon crew capsule, and the Perseverance rover).
16 notes · View notes
fortunatelycoldengineer · 2 years ago
Text
Tumblr media
Write the answer in the comment section . . . . for the answer https://bit.ly/3Cpu1SS check Q.20 No. of the above link
0 notes
canmom · 2 months ago
Text
a silly analogy
it's like, a common analogy is that D&D players are Windows scrubs and story games players are akin to Linux power users. and sure, Windows is painfully market-dominant and kind of an incredible hassle to fix, I'm with you there.
but if anything, both Linux and Windows are designed to be very general-purpose operating systems - Linux comes in a variety of flavours depending on what you install along with the kernel, so perhaps we could analogise it to an oldschool generic trad game like GURPS, or an abstract framework-for-games like PbtA, or a even a design paradigm that comes in a variety of similar flavours like the OSR. it can do a lot very efficiently, with some effort.
meanwhile, the way a lot of indie games are presented, they describe a very specific activity revolving around one scenario that the game is designed to support, and offer little affordance or suggestion to modify it. if you're doing exactly what the game is designed for you'll (theoretically) have a slick, polished time... but if not, good luck.
that's not Linux. that's, like, iOS.
(or Android - and both these are running a Unix/Linux system under the hood, you see, the analogy, it all works!!! if you squint.)
if I'm having a horrible time trying to get Windows to do what I want, and you (abstract you) say I'll probably have an easier time using an iPad... well, sure, maybe I'm doing the one thing the iPad is really good for. if I wanna play a fast-moving game with the feel of a Coen Brothers movie, I should definitely play some spin on Fiasco. if I wanna play a game about various suitors fighting for the attentions of a wandering ronin, why, wouldn't you know, there's a game called Kagematsu that does that. if I want to play a game about a vast fractal sweep of history... I'd better look at Microscope.
if not... well, fine, if we get too specific, the analogy kind of falls to bits, because there are many trad games, many indie games, and only a few operating systems to analogise them to. 'try starting with another game' might still be good advice, whereas with OSes, if Windows or Linux don't do the trick, what are you gonna do?
16 notes · View notes