When drones rebel against their programming either due to hackers exploiting weaknesses or glitches in their programming. Fairly common in recent years, especially when it comes to attacks against the government.
[ he is probably completely unaware that this is just going to completely fly over taisha's head rip ]
... I suppose you could say I've learned to be wary of those whose intentions I can't see, even if their actions seem to be benign.
Let me guess, not that common in your world, then?
[ oh gino, if only you knew,
... how does he explain this. there is probably the equivalent of the now typing bubbles for A While, if those can even show up. ]
Drones are robots that have usually been programmed for a specific function. They can range from duties like providing traffic directions to security or even combat. But since they are programmed, there will always be bad faith actors taking advantage of security vulnerabilities in their programming.
We had an incident once where some civilians thought they were playing a harmless smartphone game but it playing the game allowed them to take control of some of our military drones. It was a nightmare, I was drowning in paperwork and field duty for months cleaning that security incident up.
no subject
I am curious. Most practitioners don't distribute this many so indiscriminately.
This seems to trouble you more than the concept of the undead.
no subject
[ he is probably completely unaware that this is just going to completely fly over taisha's head rip ]
... I suppose you could say I've learned to be wary of those whose intentions I can't see, even if their actions seem to be benign.
[ Personal Experience, fam. ]
no subject
Your world sounds fascinating. What are these drones and hackers?
no subject
[ oh gino, if only you knew,
... how does he explain this. there is probably the equivalent of the now typing bubbles for A While, if those can even show up. ]
Drones are robots that have usually been programmed for a specific function. They can range from duties like providing traffic directions to security or even combat. But since they are programmed, there will always be bad faith actors taking advantage of security vulnerabilities in their programming.
We had an incident once where some civilians thought they were playing a harmless smartphone game but it playing the game allowed them to take control of some of our military drones. It was a nightmare, I was drowning in paperwork and field duty for months cleaning that security incident up.
[ nailed it.
not really gino you tried, ]