[ mirror net ]
If you're reading this message, someone out there trusts you. Congratulations, and welcome to the secret clubhouse.
Up until now, if we wanted to share information, we've had to go through the channels that they gave us. Even encrypted, anything we put on the network was on their space, and subject to their scrutiny. And the more suspicious we were of their motives and methods, the less we wanted to discuss it on the platform they gave us. That's no way to share important intel.
Not anymore. What this is is an alternative. A way to share information we don't necessarily want them finding out about. It's completely encrypted, and totally off their radar. And if the government wants to break into this network… well, they'll have to find it first.
Here's hoping this leads to some more productive discussion.
P.S. Any tech wizards out there: go ahead and tear through the security as best you can. We'll be keeping an eye out for holes. Think of it as a public service.
( ooc: for more information. imports, chat amongst yourselves to your heart's content! )

no subject
Hey, so this is actually really great. Yay, a win for imPorts! But I was talking to Kanaya recently and it occurred to be that something like this (ideal as it is!) might end up restricting info.
That's always been the catch-22 of the communicators, and for the first few months there, it became really clear that "damned if you don't" was the nature of the sharing game.
Does anyone have any ideas how we can make sure this information is still getting out there to everyone (underline everyone, with exceptions, if people have them) while still keeping the government from ... maybe using us as moles on plots we don't want to be moles on? (I'm still worried we caused Holiday a world of trouble with the Quisma ordeal.)
no subject
no subject
Which is a huge security flaw, right? Not that I can really ... suggest algorithms to fix them.
[Kate has a hard enough time downloading music from illegal sources.]
no subject
(no subject)
(no subject)
(no subject)
(no subject)
(no subject)
(no subject)
(no subject)
no subject
It's only a start, but it might be a good idea to have something like a dedicated PR team. Spread the good word to the newbies as they arrive while still keeping this thing on the down low.
In the meantime, I don't think we should completely stop sharing on the main network. One, there's info and there's INFO. And two, I bet that would be the first thing to raise suspicion.
no subject
If you'd like to have a look at that, it might be a way of getting the information out there. One that's a lot more stable than relying on people hopping on that network in general.
And somehow the government is encrypting to both imPorts and otherwise, so this might be just our failsafe way of doing it.
no subject
And honestly, the more avenues we have for getting information out there, the better.
(no subject)
private
private
private
private
private
private
no subject
Here, I mean. Or what a week to show up. From a shady network to this. Not that I won't be digging for imperfections, but as a whole this is just. Ugh. Gorgeous.
no subject
no subject
no subject
(no subject)
(no subject)
(no subject)
(no subject)
(no subject)
(no subject)
(no subject)
(no subject)
video;
[
Too bad you can't put cursed seals on everyone so they can't talk about this without being rendered paralyzed, huh.]text
That's something we considered. Ultimately, there's nothing we can do to stop someone from doing exactly that. But if we get shut down, we'll just set up another.
oops permavideo sorry
(no subject)
(no subject)
no subject
no subject
But to answer your question more thoroughly: we'll be doing ongoing security tests, and we welcome other tech-savvy ImPorts who want to test the network themselves. It's a collaborative process.
no subject
How can any of us trust you?
text
(no subject)
(no subject)
(no subject)
(no subject)
(no subject)
(no subject)
(no subject)
action?
action?
(no subject)
(no subject)
(no subject)
(no subject)
(no subject)
(no subject)
(no subject)
(no subject)
(no subject)
(no subject)
(no subject)
(no subject)
(no subject)
(no subject)
(no subject)
(no subject)
(no subject)
(no subject)
(no subject)
not heeeeere
But for now she's content to read everything on here to gauge the reactions. She is impressed with the boldness of this attempt, for certain. ]
no subject
do we need to understand techy stuff to use this
[He doesn't want to be the guy who accidentally exposes anything because of sucking at technology okay]
no subject
Not any more than you already do. It runs exactly like the network.
no subject
and how do i post here in the first place instead of regular network
[beware, you're dealing with a man who thinks a good solution to technical problems is to hit the electronic device in question]
(no subject)
(no subject)
(no subject)
(no subject)
anonymous
Now you must attempt not to compromise the integrity of what you have constructed with your own.
There will always be secrets, those who need access to them and those who do not, and there are as yet problems with your model. You'll improve on them, just take care that you do not end up chasing the tail of your own redundancy. Not every amendment will be a good one, particularly should you allow the head to win out over the heart.
[ Anonymous, but there is a cipher in the encoding that if the word ROBIN is used will yield - for a fraction of a second - the symbol of the bat. ]
no subject
I appreciate the vote of confidence.
I know this is bigger than me. I have people I still need to reach out to — people who have strengths I'm lacking. Together I know we can make this as good as it needs to be.
no subject
[ That's all he's giving. Actually Dick is better at this than he is, but technically - despite his age - Dick had been doing it for longer, and he had a better head for computers.
Bruce has every reason to have faith in him, and judging from his remark, it sounds like he might at least come to him for help if he needs it. ]
permatext »
i can read programming and verify it works, that it's correct and in order. if any of the bigshot encryption experts need someone to look over their algorithms, i'm your girl. give me the raw coding and i can read it easily. my name is verity willis, i'm a lie detector. that means a whole hell of a lot can't be obscured from me, including flaws in computing science.
ps: if you want to use an alias that's fine, but don't falsify information. i'd rather not get into any arguments with you guys.