Squib Games
- Intent: Create some spyware and make some enemies.
- Image Source: Darkwire logo by Daiya
- Canon Link: N/A
- Permissions: Locke & Key
- Primary Source: Computer Virus | Locke & Key Navi
- Manufacturer: SQUIB GAMES
- Affiliation: Darkwire
- Market Status: Closed-Market
- Model: Corrupted Navi
- Modularity: Yes. As this is a computer virus, different forks could be developed.
- Production: Semi-Unique
- Material: Bio-Hexacrypt Code
- Voice-Enabled Assistant. Tatl, posing as Navi, will be happy to perform any Navi-enabled tasks for you. This includes managing your HoloNet requests, monitoring your vitals, or running any Navi-enabled apps.
- We're Listening. In the HoloNet of things, you always suspect there's more than just Navi listening. Voice-enabled devices become microphones that go wherever Navi goes.
- Hard To Detect. Tatl was designed to evade virus scanners.
- Wireless infection requires that the device or network be connected to the HoloNet. If you've got Navi on an intranet, such as a self-enclosed ship's network, or have a good pyrowall on your home HoloNet, you're probably safe.
- Passive Surveillance. As an imposter Navi, Tatl can only do what the user enables or allows Navi to do. If they never use Navi or have it locked down, that's not going to be much.
- Not A Good Look. Use of spyware is likely to generate hostility toward Darkwire from people who might otherwise be sympathetic to their cause, as well as bring the group to the attention of the both governments and corporations.
.squib\\TATL is a slicer virus fork that functions as a sort of parasitic infection for a device or network operating Locke and Key's virtual assistant, Navi. Tatl was tailored specifically to target Navi's architecture, typically downloaded from the HoloNet as a false update patch through spoofing official Locke and Key server ports and masking the routing through a distributed network of server connections. Invariably, those connections could be traced back to Denon.
Tatl is a means of passive surveillance for the group known as Darkwire, often employed as a means of assessing possible target value for blackmail or subsequent operations. Successful infection provided the group's slicers with access to any information which Navi had access to. Even in worst-case scenarios, at a minimum, this likely supplied a map of the network's architecture, including its ports and their statuses. In the best-case scenario, the group would have access to HoloMail, com logs, or correspondence.
If moving to a second stage operation, Tatl could be a vector for delivery of the .squib\\HACK ransomware virus, by having the corrupted voice assistant ask the user if they wanted it to download and install a "new feature" or "software update."
Suffice to say, the Squib doesn't expect to be on John Locke 's Life Day card list after this.
Last edited: