[ home / board list / faq / random / create / bans / search / manage / irc ] [ ]

/lit/ - Literature

Discussion of Literature

Catalog

The next generation of Infinity is here (discussion) (contribute)
A message from @CodeMonkeyZ, 2ch lead developer: "How Hiroyuki Nishimura will sell 4chan data"
Advertise on this site
Name
Email
Subject
Comment *
File
* = required field[▶ Show post options & limits]
Confused? See the FAQ.
Embed
(replaces files and can be used instead)
Options
Password (For file and post deletion.)

Allowed file types:jpg, jpeg, gif, png, webm, mp4
Max filesize is 8 MB.
Max image dimensions are 10000 x 10000.
You may upload 1 per post.


Liberate tuteme ex Excelsior!

File: 1440791480057.jpg (213.37 KB, 335x500, 67:100, 4044220395_855c64a499.jpg)

 No.6338

hey /lit/

how would one try to represent and fuse the coming world war with older epic depictions of combat?

more specifically, in homer and virgil there's always a bit of shittalking before people toss spears and kill someone.

how would this basic dynamic be represented in a conflict between russian hackers and american hackers, or rogue north koreans and the nsa?

i know very little about actual hacking and computers and networking, and so maybe some basic explanation of how cyberwarfare works would also be useful.

i'm gonna crosspost this to halfchan but expect the better answers here.

 No.6354

>>6338

If I were writing this story, I would focus on the element of posturing before battle rather than on the actual interaction, and probably have the hackers make blog posts that never actually get read. The blog posts would also be a way to bring in the common epic theme of man against fate, with the wastelands of the internet standing in for Olympian cruelty.


 No.6359

"Red Storm Rising," by Tom Clancy.

What Clancy does here is give us plenty of shop talk between various intelligence officers, mid to high level commissioned officers, and senior politicians during the buildup before the conflict. That would be the modern representation of "shittalking before the spear tossing."

A serious problem with this approach is representing the contrasting cultures and characterization of the organizations involved in cyberwar. How do you portray the people involved in the American militarized commercial security trade with their fading vestiges of eighties hacker culture, verses the state guided gangster gangland of the Russians, verses the loyalty first groomed infowar elites of the North Koreans?

You have your work cut out for you.

As far as technique itself, you should hang around /tech/ a bit. See what they recommend for online safety. The trick - the research - here is to understand why they make those recommendations. What are they defending against?

You might try to dig up some of what our own Fredrick Brennan has to say with his own attempts to administrate this site. The things he had to face. Some big issues today are client / server source masking. The Hola VPN (ie botnet) on the client end verses CloudFlare (ie The Grand NSA Honeypot) on the server end. That sort of thing. Pay attention to the services you use and why they do things the way they do. You already may know more than you think, and enough to woo the general public with a novel suggestive of such techniques being used in the background.


 No.6393

Op here.

Glad to see two good posts.

I'm trying to setup basically an opposition between a russia/china bloc against a us-nato bloc, which means each has news and finance but also it's underground and chan//black internet aspect.

More specifically, it would take place semi - operatically, that is flying across a broad spectrum of platforms, the first orchestrated response to a 'dubious'/false flag' geographic terror incident. It would be a sort of broadside all hands on deck ddos//dox of the enemy with a huge barbarossa-panzer sized invasion.

There are plenty of images and metaphors to blur, especially because it is meant to take place across a solar system with a few budding off earth colonies.

Do you guys have any info on how the internet/hacking would interfere with a primitive-solar level human technology?

>>6359

I think there is one method - in the Iliad it's one tongued Greeks with a common positive goal - conquest - as against the trojans and their many/polyglot allies who defend the city with various motives, but motives less severe than conquest/annihilation

But I also think there needs to be a sort of way of portraying the respective 'chans' as a sort of tribal people's - how would literature represent chan-hivemind thinking as an actor in ww3 fiction?

What would be good parallels for say philoctetes and his arrow?

The temple of minerva in the top of priams temple?

The Trojan horse image too also finds renewed freshness in this light.


 No.6882

>>6393

In general, you could represent chan culture similar to a multi-cultural casual get together, with all sides grouping together and shit-talking, joking and not anyone having a problem with anyone but their own governments actions.

Think of the times our sites have come together, organised raids, how many times /pol/ made assertions that came true, etc.


 No.6934

>>6882

Agree with this.

>>6393

Not going to pretend to be a /tech/ guy but like the guy said before, how about having both groups of hackers leave a trail of bread-crumbs for the other to find which then leads them to a chat-room forum. This is where whoever left the breadcrumbs basically shit-talks eachother, joking etc and the reader realises that they are all the same; betas who are doing this for fun / pressured iinto doing this / love their country. Either way they have something in common. Would be interested to read this, anon.




[Return][Go to top][Catalog][Post a Reply]
Delete Post [ ]
[]
[ home / board list / faq / random / create / bans / search / manage / irc ] [ ]