Story/Deep Dive/1-2 (Part1)/Script
[15 minutes later, the electronic warfare simulation training ends and the operation begins.]
UMP9: Ahem, alright. After this, I’ll be explaining how to move through the Zener network, so please pay attention, you two.
HK416: ...
G11: ...
UMP9: Actually...
It’s not much different from the real world!
HK416: ...Can I go now?
UMP9: Wait, wait! I just said that to get you guys to relax!
UMP45: The two of you, please listen carefully.
The reason why you’re not feeling much strain is because 9 has carefully and lovingly synced your visual systems with your command systems in reality.
That’s why you can move and fight like you were in the real world.
G11: So that means… we still have to fight in the Net...
UMP9: Of course, otherwise I wouldn’t be involved.
SF will use hostile VR signals to attack us. If we want to launch an attack, we also have to be mindful of their offensive barriers.
HK416: By that, do you mean those… weird things over there?
UMP9: Yup yup. Those things overload any targets they get their hands on, and if things get really bad they can directly burn up a doll’s processor and core.
So it’s best to stay away from them unless you have a reason not to.
G11: For some reason… this place seems more dangerous than the real world...
UMP9: Also, in the Net we’ll also encounter lots of firewalls and pathways that can only be opened by people with very high access authorization.
While you can force your way through them… outsmarting them is more our style.
Therefore, at times like this-
Ta-dah! The counterfeit encryption key I made comes into play!
In order to make it easy to understand, I speeeecially made it to resemble 416!
HK416: You did that on purpose, didn’t you!?
G11: Heehee, it really does look like 416.
HK416: Cheh… so simply put, as long as we have this counterfeit encryption key, we can forcibly gain access to circuits which we would normally be unable to access?
UMP9: Mmm, mm! That’s 416 for you, you got it right away!
When you install the counterfeit encryption key into someone else’s circuit, our signals are disguised as privileged accounts.
THis way, nobody will find us, and we can surf to our heart’s content through their network without a care in the world!
HK416: What do you mean by surfing, isn’t this the same as what we usually do...
G11: Uuu… I don’t get it, I wanna sleep...
UMP9: Hehe, that’s just like 404’s style!
In any case, once we do a simulated run, we’ll all know what to do!
I’ll fire up the training simulation now so we can all get used to electronic warfare!