The Wyr Alternative: Trinary Data Usage
All this data is potentially out of date, and should be taken with a truckload of salt
Drafted by Vanneth Deckard. Updated with contributions by Julianus Soter and Moira.
In the wake of the destruction of the sought-after Trinary Data, it is necessary to explore other avenues of interfacing with Sleeper data systems. The first step to this end is to definitively determine the format that Sleepers encode and process their data.
Sleeper data resources will be acquired and studied to determine the format used, referencing a Jovian Trinary Data stream, provided by Moira. They will be interfaced with analyzers, codebreakers, and VR consoles. It will be noted that the objective is not to access the data, but merely to determine the method of coding.
A research team will be deployed to explore and investigate Sleeper anomaly designation:
The team will gather what relics they can and investigate the orientation of the hub to determine the usage of trinary format in Sleeper data routing.
Hypothesis: Trinary format is prevalent in Sleeper data and processing.
- To determine the prevalence of trinary format in Sleeper data storage and routing.
- To ultimately determine the method of infomorph processing used by Sleepers.
- Arek'Jaalan Mailing List W1: Information Request / CONCORD Kill DB
- Arek'Jaalan Mailing List W1: Trinary Data Stream information
- Arek'Jaalan Mailing List W1: Why we use Binary instead of Trinary
Phase One: Determining Static Data
Trinary usage in various Sleeper relics will be determined using a variety of methods.
Control: Trinary data will be referenced to determine any similarities in formatting and encryption, pending initial assessment of the artifact.
Variable: Experienced hackers and archaeologists will interface their respective tools (codebreaker, analyzer) with various Sleeper data resources. They will also be interfaced with VR consoles to make an attempt at replicating theorized Sleeper interaction.
Hypothesis: Sleepers use trinary format to encode and process their data. Positive confirmation of this assertion will give proof of one aspect of Sleeper technology operation.
Phase Two: Class Four Expedition
The Trinary Hub will be explored using a covert-capable exploratory force escorted by a combat squadron capable of protecting against the reported Sleeper battleship patrols. Databanks will be interfaced by the exploratory force using methods that prove successful in the previous phase to determine trinary format usage. The exploratory force will also examine the orientation of the structure(s) to determine the significance of other Sleeper locations routing through the hub.
Control: Phase One results - Trinary methods in static Sleeper data.
Variable: Contents of Trinary Hub databanks. Magnitude of Sleeper data being routed will be determined, comparing to sensor logs from other relevant Sleeper information sites (Sleeper Data Sanctuary, The Mirror).
Hypothesis: Sleepers rely heavily on trinary format for data routing and processing, possibly with exclusivity.
If methods are successful, the use of trinary format should be apparent in their coding. Further decryption may be required.
- Acquire Sleeper data resources (complete)
- Interface with data resources - in progress
- Determine successful interface
- Locate Trinary Hub
- Assemble expedition and investigate - mid August
- Publish results - late August