Containment Protocols: I/O RODGER I think you should specify that this is an Authority webcrawler, like putting something like "An Authority webcrawler by the name of" at the start of the sentence. was developed for the sole purpose of tracking and the censorship of materials pertaining to RPC-X on video sharing and hosting websites, though specific subroutines and weights must be updated manually, as to incorporate radically divergent styles in instances of filmography. The algorithm's current list of key-search Remove hyphen terms includes:
- blogs
- transmedia
- amateur documentaries
- exploitation films
- livestreams
- indie art projects
- internet hoaxes/viral marketing
- dream journals
- deep web search engines and extensions such as onion links
You should capitalize the first letter of each key search term.
Following identification of an RPC-X-Ω instance, an Authority field agent is to liaise with law enforcement appropriate to the instance's last-known Remove hyphen state and address. Internal missing person lists on Authority databases are to be updated accordingly. Catatonic individuals who fall outside of RPC-X-Ω instantiation are to be monitored and amnesticized should they recover.
Due to the minuscule participation of anonymous users on media related to targetted targeted ARGs, RPC-X is considered either self-containing or highly manageable for data redaction algorithms.
Description: RPC-X denotes a series of livestreams that occurred on various video streaming platforms, each done by an account under the moniker "how2c&rvEN1gg3rz." The entity primarily targets abandoned or inactive ARGs (alternate reality games) via highly advanced hacking software, which masks itself anonymously from the host websites, wireless encryption protocols, and antivirus networks. All known cases reveal that the affected ARG(s) will have their narratives "hijacked" and repurposed to fulfill interjected storylines. Multiple proxies have been traced to the proliferation of new content; information regarding the whereabouts of the entity have been inconclusive.
The selection process for web content pertaining to an ARG is unknown. By contrast, a pattern of non-anomalous rootkits consistently appears prior to RPC-X exposure. Technical audits reveal comparative behaviors, such as similar methods of self-injection into CPU pipelines, and the removal of evidence on process and execution lists. Inconsistencies within operating systems, such as unexplained changes in target systems and improper diagnostic routines, are oft often indistinguishable from malicious attacks unrelated to RPC-X. Given current technological restrictions, it is impossible to definitively prevent RPC-X incursions.
Should individuals view RPC-X directly, they will become catatonic after 10-15 minutes. If the individual had been an active participant or "player" in the ARG, they will instantaneously vanish from their location, save for articles of clothing or objects left behind. Instantiation causes a virulent, infohazardous, antimeme to spread to witnesses of said displacement. Thus, cognition of their last-known location is forgotten, as witnesses will attest to these events as being "gaps" or "blanks" left within their memory. Therein, a simulacrum or approximation of the individual (hereby designated RPC-X-Ω) is found within the instigating livestream. If multiple individuals view the livestream, they will experience the same phenomena.
NOTE: For the purposes of examination and peer review, all RPC-X live streams livestreams were recorded on video formats, thus, rendering the anomalous effects impotent. More information on practical safety measures is found in the attached Psychotronic Conversion Templates Manual.
Original Title: "Babyfurs 2009"
Previous Summary: The narrative of this ARG pertained to Youtube comments made by accounts with some variation of the name "babyfurs". These accounts would present startling discussions are as fairly innocuous DIY videos on Youtube in 2009. Reoccurring sample comments include:
Each linked to a white page with a singular media player. On 2015/06/06, the media player flipped to an RPC-X live stream livestream.
Previous Summary: An incomplete Adobe Flash Game puzzle was to present links to several static html files regarding the "Murder of Junko Furuta". A heavily obscured photo was designed to pop-up on the user's browser had they achieved the right configuration within the game.
Current Summary: A complete Adobe Flash Game puzzle with hidden artifacts in the form of image macros. These lead to various onion links; individual links presented Junko Furuta in increasingly distorted images. Malware would infect audio devices on the user's computer configuration and would output humming and vocalizations. These sounds would increase should the user see "DEEPDREAMING" become more apparent on the websites crosslinked, which is presumed to be an indicator by the entity that the user was on the right path. Sections of the final-end Remove hyphen leading to RPC-X exposure were blocked from users without headsets detected on their OS. After receiving an instruction to plug in headphones, earbuds, or earphones, a prompt called "PROCEED" would be displayed. Afterward, all websites would link to unpublicized files of Junko Furuta in various states of undress and decomposition. Inaudible assemblages of Russian, Japanese, and a hitherto unknown language were sung in binaural frequencies.
RPC-X Viewing: RPC-X-Ω-01 to RPC-X-Ω-17 instances manifested within a large, dark tunnel set-piece; the archways, pillars, and paper walls are draped with viscera and fecal sludge. Spotlight rays shoot out from an unknown source beyond ceiling cracks and illuminate surfaces. As the camera operator moves forward a flowing stream from is heard. Eventually, the view shifts to naked -01 to -16 instances that stand erect next to red pillars. They hold large loudspeakers that obscure their chest and genitals. Their faces resemble the distortions and lacerations used on Junko Furuta.
Low-pitched and muffled screams are heard. From the foreground, a placard written in Kanji is zoomed-in Remove hyphen which translates to, "Low is the dream, sleep is the key." As depicted by spurious and sometimes panicked flash-cuts backward, instances of RPC-X-Ω trail behind the camera operator. Rhymic Rhythmic chanting is heard in Balachkan (an old Cossack dialect); "the mouth of the river, the scream from the mouth, the door is Cheremosh, the Cicadas sing from the Other."
At the end of the tunnel is an open doorway that leads to a highway intersection. Notably, all cars are immobile as the operator jaywalks to the other end and continues down a dirt road for 29 minutes before it stops at a campfire. RPC-X-Α is depicted on a gurney giving birth. A burning man appears from off-screen beside the fire and attempts to open RPC-X-A's cervix. A plastic doll head sprouts from her swollen labia and the camera zooms in, centering on the doll's eyes. Then, the live stream livestream ends.
Second addendum; upon further viewing, me and my associates marked that the burning man resembled one of the instances used in the first excerpt. Indeed, facial recognition algorithms presented a 91% comparison rating. It had been a role reprisal. The agenda, whilst unclear, presents a startling notion: instances can be used freely by the entity due to an unclear anomalous capabilities. Furthermore, it presents itself as a continuous question into the unknown. From where do these live streams take place? From where are the actors stored?"
On 2019/05/29, a widescale RPC-X showing was launched on the rabb.it web sharing platform. Over 1,516 laptops, home computers, phones, and servers were seized by the MST Foxtrot-88 ("Drag-n-Drop"). Reports indicate that more than 589 online users were affected and rendered catatonic from the event. MST Foxtrot-88 launched widespread investigations, liaising with law enforcement, medical staff at clinics or hospitals, I think you should maybe replace the "or" in this with a slash. and network administrators from internet providers. The following chat logs are archived for posterity. You should specify what application or website these chat logs were retrieved from.
Users in the aforementioned chat log became unresponsive after several minutes and were confirmed to be newly spawned RPC-X-Ω instances. However, an account belonging to "UwUAdministration" was hacked by an untraceable proxy IP and subsequently changed its name to "how2c&rvEN1gg3rz." The following details the interaction between the hacked account and the server it had newly joined.
Last known voice recording by Katie Ammes after relocation to a safehouse: I am glad the request to reexamine the potential for anomalous interference of secondary media containing RPC-X content was approved. I am on the road. I am in a black van. My husband holds my right hand and I'm here with my sweethearts, cradling them with the left. I'm watching the heart monitor. I know its it's watching. I know it's here.
All in all, that was a great article. I loved the whole ARG theme, and how you explored it. The chat logs really captured the feel of being in a chatroom full of 4chan trolls and people like that. The horror in the article was pretty good as well.
HowEVER, I do think you could change up the formatting of the final audio recording. The big bold text in the exact same paragraph as the normal text is a little jarring. Maybe add "The following document is the last known voice recording by Katie Ammes after relocation to a safehouse" as the last sentence of the previous paragraph.
I would give this 5 stars if you fixed up the issues I pointed out. Amazing work.