WORK IN PROGRESS AMAN0-JAKU


12j0UkZ.png

OUT OF CHARACTER INFORMATION
  • | Image Source |
    • [ x ]

TECHNOLOGY INFORMATION
  • | Item Name | AMAN0-JAKU
  • | Type | Telecommunications
  • | Manufacturer | Y0-KA1
  • | Price | 500 Eddies
  • | Availability | Accessible only to Y0-KA1 members
  • | Legality | Illegal

RATIONALE AND USAGE
  • | Functionality |
    • Y0-KA1's personal network is all connected through AMAN0-JAKU, integrated as a feature that communicates with their databases for information to provide intel on individuals of interest, update any mission lists or active contracts, and can be used to report each member's status to the main hub all through a heavily encrypted network.
    • Killswitch functionality can fry the AMAN0-JAKU and be remotely triggered from Y0-KA1 headquarters in the event that the system it is attached to is compromised to prevent any external intrusion into the network. It can also be locally triggered if it detects that the user has been killed, and automatically locks the system if they are rendered unconscious, requiring a security key to reactivate.
    • AMAN0-JAKU's security protocols regularly update itself frequently, making it extremely difficult to break into. The previous security protocol is turned into a dummy system that traces intrusions into their network from external sources.
  • | Design/Appearance |
    • A small rather unremarkable chipset made from standard materials needed to make them.
  • | Cultural or Economic Impact |
    • This item bears no cultural or economic impact of any kind and used strictly to help facilitate communications.
  • | Usability |
    • The AMAN0-JAKU being a key component to external communication between Y0-KA1 members is rather simple to use. Most often installed into Y0-KA1 member masks or systems, the chip is electronically keyed to the user's biosignature, meaning that it can only be accessed when the appropriate individual's biosignature shows them alive and conscious and accesses Y0-KA1's network when they wear their mask or use their systems. This also allows Y0-KA1 to be able to precisely trace any potential security breaches back to their source.
 
Last edited:
Back
Top