HACKERS.CHATROOM
SYSTEM
Attempting connection to irc.secret.n𝘦t (Standalone Servers) on port 1314
Looking up server host name (irc.secret.n𝘦t)...
Server has 16 IP addresses, random address selected
Server host name resolved to 289.45.21O.21
Contacting IRC server irc.secret.n𝘦t (289.45.21O.21) on port 1314
Connection established [irc.secret.n𝘦t (289.45.21O.21:1314)]
Local host address is 192.168.1.7
Login operations initiated
Input value for username: ▂
CHATROOM_3
User <Traps> has joined #Chatroom_3
<Keeper_3> Welcome, Traps.
<Traps> Hi
<Keeper_3> Before you start, some simple questions to make sure that you are okay with the channel. Standard procedure, I hope that you understand.
<Traps> Go ahead
<Keeper_3> Excellent. First, are you in any way affiliated with government bodies?
<Traps> Not at all
<Keeper_3> Do you agree to discuss the contents of the channel with no one, and refrain from storing logs?
<Traps> Okay. I make deleting browser history a habit.
<Keeper_3> Nice...
<Keeper_3> That's actually all. You're good to go.
<Keeper_3> Finally, do you have any questions for me?
<Traps> Yes, a serious one. About the server...
<Keeper_3> I will see if I can answer that.
<Keeper_3> Do note that some of the information are confidential for security purposes.
<Traps> So why is my name pink?
<Keeper_3> ...
User <Keeper_3> has logged off
<Traps> Can you help me change it to something coo▂
METAGAME
The Roleplay will be about a secret chatroom on the internet only accessible to those talented in hacking. All kinds of anonymous hackers congregate here to discuss about hacking, form alliances, or sell and buy "services". There are a total of 16 chatrooms (Chatroom_0 to Chatroom_15) but this role play will take place mainly in Chatroom_3. Each chat room has a keeper that takes care and manages the channel to prevent leakage of information. The origin of the Hacker's Chatroom is a mystery.
RPers post in the form of chat logs, hacking behaviors (for example if you hack into a bank there will be codes; you don’t need to understand programming, just be creative), and a bit of actions in roleplay characters’ life. It can be a role play ranging from free jump-in or casual apply depending on RPers' interests. :)
WORLD SETTING
The role play is set in a universe very similar to ours.
World events tie loosely to real world events.
The date is Sunday, 24th December 2017 (GMT) and it is Christmas Eve.
THE CHATROOM
The Secret Net was an open-sourced software designed for traceless communications between criminals and people intending to keep their identities anonymous. Just like many other open-sourced codes before it, its origin was largely a mystery with its creator unknown. The Secret Net did not catch the public eye, until five years ago when a notorious group of seventeen hackers calling themselves "The Keepers" decided to alter the software's source code and designed it in a way that they have full control on the traffic of the Secret Net. The new software then became a popular social platform among hackers well-known for its impenetrable security, and hence the origin of what you know today as the Hackers' Chatroom.
The main server of the Hackers' Chatroom does not occupy a specific physical location. In fact, every user device acts as a server to the chatroom upon first connection, making it near impossible to DDoS or shut down as long as any one of the users are still connected to it. Depending on individual chatroom keepers, some may host the channel's database in a well-maintained server room for additional security measures. Each keeper has a unique way of defending and managing their own channels.
ROLEPLAY PLATFORMS
Discord
*Discord Logs will be posted regularly by GM to the IC post.
1. Chatroom_3: Public Channel
2. Chatroom_3: Users PM Channel
3. Chatroom_3: System Channel
Forum IC Posts
4. Personal Device Interface (hacking jobs, notes keeping, program creations, etc.)
5. External Systems (Bank security servers for example)
6. Character Real Life (thought processes and real life behaviors)
USERS
1. The Keepers
The infamous hacker group consists of 17 team members each skilled in executing different types of hacks. Throughout the last decade, large-scale hacks have been performed by the group, inflicting widespread financial damage to the world. Nobody knows their exact identity, and what is the organization's ultimate intentions. The Keepers are the main managers of the 16 channels of the Hackers' Chatroom.
2. Hackers
Those who are talented enough to hack and access the secret net are mostly welcomed to mingle in the chatroom as long as they follow the keepers' rules. Hackers often befriend, chat and share about their hacking experiences with each other, forming a sense of bond within the hacker community.
3. Criminals
Non-hacker criminals may access the net through special means approved by the keepers. They make use of the chatroom to contact with clients that are looking for their special services, or collude with other criminals in performing illegal activities.
4. Clients
Through a cleverly designed security system, clients may be granted temporary restricted access to the Hackers' Chatroom to buy all kinds of services from other criminals.
5. Others
Sometimes secret agents, lost birds, and people who might cause trouble to the chat room may gain access to the platform. The keepers do not welcome this sort of people and will ban their IP address immediately upon exposure.
CHARACTERS
HACKING 101 (OPTIONAL)
On writing professional codes... or how to make up fake convincing onesThe essence about programming is to understand that machines are brainless, and all you are doing when you code is you are ordering it to perform precise tasks for you. There are countless programming languages out there, but the logic is always the same. Here are some simple steps on how to code a program (note the coding terms are not real, I made it more intuitive):
1. Define your goal
Lets say you want to program your robot to move from point A to point B which is 100 meters away, then you have to break down the goal into more objective and precise actions: move the robot forward for 100 meters.
2. Step by step
Every single command needs to be written down. In the previous case, the pseudo-code can look like the following:
Robot
move right_leg forward;
move left_leg forward;
move right_leg forward;
move left_leg forward;
....
3. Group repetitive actions into functions
As you can see, actions can get too repetitive. In coding, you may define functions and loop them. Lets call the function "Walk", and we input "stepsLeft" into the function. The indentation is used to indicate that the coding lines are grouped under the same function.
Robot
define Walk(stepsLeft):if stepsLeft not equal 0:move right_leg forward;
move left_leg forward;
stepsLeft = stepsLeft - 1;
Walk(stepsLeft);
Walk(100);
What the code did there was first it defined a function named "Walk" with the input variable named "stepsLeft". Depending on the steps you input, the robot will walk for that exact amount of steps. Then finally, it calls out the function "Walk(100)" which means the robot will walk for 100 exact steps forward. You can also loop the actions without defining a function:
Robot
loop for 100 times:move right_leg forward;
move left_leg forward;
4. Let your robot make binary decisions
Sometimes a decision cannot be made on the point of writing the software. This calls for decision making by the robot. For example, the distance of point B is undefined. The robot needs to sense whether it has reached the location every time before it makes the next step. Do note that robots can only make binary decisions (Things that are true or false):
Robot
define Walk:move right_leg forward;
move left_leg forward;
loop if sense(location) not equal Point_B:Walk;
5. Be precise
Just remember that every single command needs to be precise and not ambiguous. For example, "walk for a long distance" is not precise enough as the word long is really subjective; "walk for 100 steps" is a better choice.
6. Be consistent and organized
Organize your codes with proper indentations, punctuation, and spaces. Be consistent with the word choices you are using. If you use the term "loop" to repeat your robot's actions, don't change it into words like "repeat" or "again" in the same program. Be consistent with how you organize the code as well.
7. Comments
Sometimes there is a need to put comments in your code so that you (or others) understand what each section of the program means at first glance. Here is one way to do it:
Robot
//This part defines a function to walk forward//
define Walk:move right_leg forward;
move left_leg forward;
//This section senses if the robot has reached its location, and continue moving if it is not//
loop if sense(location) not equal Point_B:Walk;
Comments are invisible to the robot upon execution. They are purely there for clarification purposes to the human programmer.
8. Use your creativity
The beauty of programming is there are always more than one solution to a problem. So use your creativity! As long as it gets the job done, it is a good code. In a role play, if you are creative enough, you may even express your character's personality through your codes. No single hacker approaches a single problem from the same perspective.
9. Extra Resources
Cyber and Information Security