Story/Deep Dive/1-2 (Part1)/Script: Difference between revisions

Created page with "'''[15 minutes later, the electronic warfare simulation training ends and the operation begins.]'''<br> <br> UMP9: Ahem, alright. After this, I’ll be explaining how to mov..."
 
Updated with official translation
 
Line 1: Line 1:
'''[15 minutes later, the electronic warfare simulation training ends and the operation begins.]'''<br>
[Fifteen minutes later, electronic warfare simulation training preparations complete. Initiating combat mode.]<br>
<br>
<br>
UMP9: Ahem, alright. After this, I’ll be explaining how to move through the Zener network, so please pay attention, you two.<br>
UMP9: Ahem, right. I'm gonna explain how operations work in the Zener Network. Listen up, you two...<br>
<br>
<br>
HK416: ...<br>
416: ...<br>
<br>
<br>
G11: ...<br>
Gr G11: ...<br>
<br>
<br>
UMP9: Actually...<br>
UMP9: Actually... <br>
It’s not much different from the real world!<br>
It's not so different than operations in reality!<br>
<br>
<br>
HK416: ...Can I go now?<br>
416: ...Can I go now?<br>
<br>
<br>
UMP9: Wait, wait! I just said that to get you guys to relax!<br>
UMP9: W-Wait! I was only throwing in a joke to help you guys relax!<br>
<br>
<br>
UMP45: The two of you, please listen carefully.<br>
UMP45: Seriously, please pay attention to this. <br>
The reason why you’re not feeling much strain is because 9 has carefully and lovingly synced your visual systems with your command systems in reality. <br>
You're not overwhelmed only because 9 has very thoughtfully synced your vision to the command system in reality. <br>
That’s why you can move and fight like you were in the real world.<br>
This makes it possible to move and fight as if we were in real life.<br>
<br>
<br>
G11: So that means… we still have to fight in the Net...<br>
Gr G11: So...we'll have to fight in the network too...<br>
<br>
<br>
UMP9: Of course, otherwise I wouldn’t be involved.<br>
UMP9: Duh, why else would they send us? <br>
SF will use hostile VR signals to attack us. If we want to launch an attack, we also have to be mindful of their offensive barriers. <br>
Sangvis Ferri will attack us with opposing analog signals. If we launch an attack, we'll have to watch out for their offensive firewalls.<br>
<br>
<br>
HK416: By that, do you mean those… weird things over there?<br>
416: Like that weird-looking thingy...over there?<br>
<br>
<br>
UMP9: Yup yup. Those things overload any targets they get their hands on, and if things get really bad they can directly burn up a doll’s processor and core.<br>
UMP9: Exactly. That thing overloads any target it captures. Worst case, it could burn a T-Doll's processor and core to charcoal. <br>
So it’s best to stay away from them unless you have a reason not to.<br>
Best stay away from it unless you wanna die.<br>
<br>
<br>
G11: For some reason… this place seems more dangerous than the real world...<br>
Gr G11: This feels...even more dangerous than reality...<br>
<br>
<br>
UMP9: Also, in the Net we’ll also encounter lots of firewalls and pathways that can only be opened by people with very high access authorization.<br>
UMP9: Now, we could also run into a lot of firewalls and routes that are only accessible to units with high-level authorization in the network. <br>
While you can force your way through them… outsmarting them is more our style.<br>
Of course we could force our way through...but outsmarting them is more of our style. <br>
Therefore, at times like this-<br>
So in such occasions...<br>
Ta-dah! The counterfeit encryption key I made comes into play!<br>
In order to make it easy to understand, I speeeecially made it to resemble 416!<br>
<br>
<br>
HK416: You did that on purpose, didn’t you!?<br>
UMP9: Ta-daa! The camouflage key I made will save the day! <br>
To make it easier to understand, I've especially made it based on 416's appearance!<br>
<br>
<br>
G11: Heehee, it really does look like 416.<br>
416: You're so doing this on purpose!<br>
<br>
<br>
HK416: Cheh… so simply put, as long as we have this counterfeit encryption key, we can forcibly gain access to circuits which we would normally be unable to access?<br>
Gr G11: Haha, it does look like 416.<br>
<br>
<br>
UMP9: Mmm, mm! That’s 416 for you, you got it right away!<br>
416: Tsk... So to put it simply, we can pass through routes that we don't have the authorization for with this camouflage key?<br>
When you install the counterfeit encryption key into someone else’s circuit, our signals are disguised as privileged accounts. <br>
THis way, nobody will find us, and we can surf to our heart’s content through their network without a care in the world!<br>
<br>
<br>
HK416: What do you mean by surfing, isn’t this the same as what we usually do...<br>
UMP9: Yep, yep! As expected of 416. You understood it at once! <br>
Installing this key onto a route will camouflage our signals as authorized users. <br>
With that, no one will find out about us and we can cruise around in the network to our heart's content!<br>
<br>
<br>
G11: Uuu… I don’t get it, I wanna sleep...<br>
416: Cruise around my butt... How is this different than what we usually do...?<br>
<br>
Gr G11: Hmm... I don't get it. I wanna sleep...<br>
<br>
UMP9: Tee-hee, that's how 404 rolls! <br>
Anyhow, we'll just have to sim it once and you'll get the hang of it! <br>
I've set up the simulation training. Let's familiarize ourselves with electronic warfare!<br>
<br>
<br>
UMP9: Hehe, that’s just like 404’s style!<br>
In any case, once we do a simulated run, we’ll all know what to do!<br>
I’ll fire up the training simulation now so we can all get used to electronic warfare!<br>