I'm pretty curious as to what the 'win' conditions are for the baddies, and if they're all on one team (which people have said is unlikely).
Is this the sort of thing we can get clairification on, or is it hidden for good reason?
I wonder.
I mean, with power deflection and whatnot, I wonder if they automatically win via the usual "reduce the village to a number equal to less than our own group." Because powers can be deflected and redirected and whatnot so it may not be possible for them to swarm us with larger numbers.
You may have just answered for me why there are 12 of them; they may have to kill everyone else, or the percentage may be lower, like...twice as many malware files as other files may have to exist.
Drez on
Switch: SW-7690-2320-9238Steam/PSN/Xbox: Drezdar
0
thorgotthere is special providencein the fall of a sparrowRegistered Userregular
Still overly complex. Can you elaborate on what Write Access Denial prevents?
Clarification
Write Access Denial: Protects self being deleted by target file's group's private runtime.
The documentation was unintentionally ambiguous.
Aha! Now see, if I'm reading this right, this confirms what I was thinking earlier.
There's more than one group of bad guys.
I don't think thorgot would let any one person be totally immune to being killed by the baddies. But he would let a person be immune to attack from one group of bad guys.
Wow...That was a random collection of delete commands
Clarification: If a public power targets a person who ends up deleted that night via the main vote does the power still go off? I understand if this is something we are not supposed to know but I wanted to make sure.
Also, I suspect their are both hidden and public death commands(Aka vigilantes and Monster kills). That way we will notice that their are people always targeting someone that dies but we may also blame someone for something they didn't do.
Good morning fellow binary digit blocks. Hopefully we've all been backed-up onto magnetic tape if this doesn't go well.
It's going to be hard to read the public run-times for a while. Malware can use it to implicate a non-malicious file as well, so be cautious my brothers of the bit!
Clarification: If a public power targets a person who ends up deleted that night via the main vote does the power still go off? I understand if this is something we are not supposed to know but I wanted to make sure.
Also, I suspect their are both hidden and public death commands(Aka vigilantes and Monster kills). That way we will notice that their are people always targeting someone that dies but we may also blame someone for something they didn't do.
There are definately hidden death commands, aka: private runtimes (as opposed to public runtimes, which are activated via the 'target: player' command in the general forum).
The malware will definately have them, the vigilante probably will.
What if there's a malware vigilante that can assimilate other runtimes? I hope not...
Considering the amount of starting malware that would seem unlikly.
I thought that too, but if there are, say, multiple malware groups that are working against each other and not in tandem, then maybe they can assimilate each other's abilities if they kill each other off.
It's a plausible mechanic. I'm not sure this speculation is terribly helpful until we get our first narration, but it's interesting anyway.
What if there's a malware vigilante that can assimilate other runtimes? I hope not...
I hope so.
Really though, there is no conversion. Multiple bad guy groups? Yes, pretty certain. The trojans, the virii, and the worms, or something like that.
Threelemmings on
0
Hi I'm Vee!Formerly VH; She/Her; Is an E X P E R I E N C ERegistered Userregular
What if there's a malware vigilante that can assimilate other runtimes? I hope not...
Considering the amount of starting malware that would seem unlikly.
I thought that too, but if there are, say, multiple malware groups that are working against each other and not in tandem, then maybe they can assimilate each other's abilities if they kill each other off.
It's a plausible mechanic. I'm not sure this speculation is terribly helpful until we get our first narration, but it's interesting anyway.
DFS: There is no conversion, resurrection, or randomness, and every rule (except the order of powers) is known by at least one program.
Conversion isn't the same thing as assimilation. Nobody's talking about conversion.
Let's say there are two malware groups of six each, and their jobs are to kill each other off and a whole bunch of us as well.
Let's say Group A has a certain set of abilities and Group B has a certain different set. Maybe one of them is a vigilante ability.
I wouldn't think of it as a conversion if one malware group could target a specific file in the other and steal that file's power.
edit: Nevermind. :P
edit2: Man, threelemmings thought I meant "conversion" too. By assimilation, I meant "power-stealing." Assimilating a runtime means taking that runtime from the file.
Another question: Does thorgot's wording mean that at least one program understands every runtime rule except order of operations? Or just that all the rules are known, but by different files?
Another question: Does thorgot's wording mean that at least one program understands every runtime rule except order of operations? Or just that all the rules are known, but by different files?
Write Access Denial: Protects self from being deleted by target file's group's private runtime.
--Limited self guardian
--Probably a bad guy or two has it.
Sweeper: Query whether or not target is malware.
--Seer nuff said
--Hopefully the bad guys don't have this power
Runtime Suppressor: Temporarily shuts down target's public runtime until the start of the next cycle.
--Fairly useless power, since if you think somebody is a bad guy you should be voting them out rather than blocking there runtimes.
--Probably a premium power for the bad guys to have
Filename Swapper: If target file is to be deleted, this file is deleted instead.
--Patriot, in other words a guardian who dies after a succesful guard
--Doubt the bad guys have this.
System Deletion Protocol: If this file is deleted, target is deleted as well.
--Retributive vigilante
--Less likely the bad guys have this
Runtime Redirector: Target's public runtime protocol is run on this file, instead.
--Another premium power for the bad guys, especially if they figure out who the guardians are.
Public Runtime Logger: Query target's public runtime program.
--limited seer
--Another premium power for the bad guys
My best guess is that most bad guys have some combination of runtime suppresor, runtime redirector and public runtime logger, with maybe one or two per team having some other kind of public runtime.
I doubt there is assimilation, since I expect the bad guys don't have any extra powers other than there public runtimes (which may be unique and not on the above list) and there private kills.
Ironically, I was a good special last game, but I'm the one being bandwagoned. Isn't it supposed to work the opposite way?
I think your getting bandwagoned because of your grudge kill against gnasty.
Anyway I would rather see robothero go he only makes posts that consist of nothing but votes or nothing but roleplaying and thus is very hard to identify whether he is a bad guy or not.
edit: If we are going to kill someone when we have nothing to go on I would rather take out a person who we will never really have anything to go on. (there is a reason that robothero usually survives to the final day).
Ironically, I was a good special last game, but I'm the one being bandwagoned. Isn't it supposed to work the opposite way?
I think your getting bandwagoned because of your grudge kill against gnasty.
Anyway I would rather see robothero go he only makes posts that consist of nothing but votes or nothing but roleplaying and thus is very hard to identify whether he is a bad guy or not.
Ironically, I have no grudge against Gnasty at all. I'd go so far to say I'm one of the few people who don't carry grudges game-to-game.
Posts
!lai -> Trashbin
!run FunkyWaltDogg.exe
target: Gnasty
This game is weird. In a good way.
Is this the sort of thing we can get clairification on, or is it hidden for good reason?
I wonder.
I mean, with power deflection and whatnot, I wonder if they automatically win via the usual "reduce the village to a number equal to less than our own group." Because powers can be deflected and redirected and whatnot so it may not be possible for them to swarm us with larger numbers.
You may have just answered for me why there are 12 of them; they may have to kill everyone else, or the percentage may be lower, like...twice as many malware files as other files may have to exist.
- Write Access Denial: Protects self being deleted by target file's group's private runtime.
The documentation was unintentionally ambiguous.Aha! Now see, if I'm reading this right, this confirms what I was thinking earlier.
There's more than one group of bad guys.
I don't think thorgot would let any one person be totally immune to being killed by the baddies. But he would let a person be immune to attack from one group of bad guys.
Clarification: If a public power targets a person who ends up deleted that night via the main vote does the power still go off? I understand if this is something we are not supposed to know but I wanted to make sure.
Also, I suspect their are both hidden and public death commands(Aka vigilantes and Monster kills). That way we will notice that their are people always targeting someone that dies but we may also blame someone for something they didn't do.
It's going to be hard to read the public run-times for a while. Malware can use it to implicate a non-malicious file as well, so be cautious my brothers of the bit!
There are definately hidden death commands, aka: private runtimes (as opposed to public runtimes, which are activated via the 'target: player' command in the general forum).
The malware will definately have them, the vigilante probably will.
Considering the amount of starting malware that would seem unlikly.
Also, Target Drez
I thought that too, but if there are, say, multiple malware groups that are working against each other and not in tandem, then maybe they can assimilate each other's abilities if they kill each other off.
It's a plausible mechanic. I'm not sure this speculation is terribly helpful until we get our first narration, but it's interesting anyway.
I hope so.
Really though, there is no conversion. Multiple bad guy groups? Yes, pretty certain. The trojans, the virii, and the worms, or something like that.
Oh. Disregard previous post, then.
Conversion isn't the same thing as assimilation. Nobody's talking about conversion.
Let's say there are two malware groups of six each, and their jobs are to kill each other off and a whole bunch of us as well.
Let's say Group A has a certain set of abilities and Group B has a certain different set. Maybe one of them is a vigilante ability.
I wouldn't think of it as a conversion if one malware group could target a specific file in the other and steal that file's power.
edit: Nevermind. :P
edit2: Man, threelemmings thought I meant "conversion" too. By assimilation, I meant "power-stealing." Assimilating a runtime means taking that runtime from the file.
Then... yes. I wouldn't be surprised if there's not a copy or steal ability, since there's a redirect and two types of blocks.
The image stays, however.
Also: Skulk
Write Access Denial: Protects self from being deleted by target file's group's private runtime.
--Limited self guardian
--Probably a bad guy or two has it.
Sweeper: Query whether or not target is malware.
--Seer nuff said
--Hopefully the bad guys don't have this power
Runtime Suppressor: Temporarily shuts down target's public runtime until the start of the next cycle.
--Fairly useless power, since if you think somebody is a bad guy you should be voting them out rather than blocking there runtimes.
--Probably a premium power for the bad guys to have
Filename Swapper: If target file is to be deleted, this file is deleted instead.
--Patriot, in other words a guardian who dies after a succesful guard
--Doubt the bad guys have this.
System Deletion Protocol: If this file is deleted, target is deleted as well.
--Retributive vigilante
--Less likely the bad guys have this
Runtime Redirector: Target's public runtime protocol is run on this file, instead.
--Another premium power for the bad guys, especially if they figure out who the guardians are.
Public Runtime Logger: Query target's public runtime program.
--limited seer
--Another premium power for the bad guys
My best guess is that most bad guys have some combination of runtime suppresor, runtime redirector and public runtime logger, with maybe one or two per team having some other kind of public runtime.
I doubt there is assimilation, since I expect the bad guys don't have any extra powers other than there public runtimes (which may be unique and not on the above list) and there private kills.
Yes you make very good points :P
!retract cheez
!vote robothero
!Target robothero
I think your getting bandwagoned because of your grudge kill against gnasty.
Anyway I would rather see robothero go he only makes posts that consist of nothing but votes or nothing but roleplaying and thus is very hard to identify whether he is a bad guy or not.
edit: If we are going to kill someone when we have nothing to go on I would rather take out a person who we will never really have anything to go on. (there is a reason that robothero usually survives to the final day).
Ironically, I have no grudge against Gnasty at all. I'd go so far to say I'm one of the few people who don't carry grudges game-to-game.
Whatever.
Ironically, we know you said this:
Nice. :^:
del Shamus
I'm not gonna waste my time trying to defend myself, now.
See ya'll next game.
20 goto 10
Wow. That was extremely nostalgic. Thumbs-up.
Games: Ad Astra Per Phalla | Choose Your Own Phalla
http://invisiblecastle.com/rolldice.py