Alright, let’s do this again.
In the Corrupt Combustion AU, the AbsoluteSolver copied Jujutsu Kaisen’s homework. I’m gonna try to make this understandable if you aren’t familiar with that franchise, but if it seems silly or doesn’t make sense, just know that campy anime bullshit is the vibe here.
But I think I’ll leave the explicit connection to just this preamble here — not least of all because there’s anime only watchers, and I will be taking inspiration from the manga.
Dead drones explode, sometimes.
There are many ways to improperly dispose of a worker drone. If the core is left within its casing, if some volume of oil still brims in the tanks, if the harddrive isn’t reset to factory settings (or better yet, zeroed entirely), anomalies may result. Investors help you if you gambled with third party peripherals or aftermarket modifications — they’re against the terms of use for a reason.
There are policies to prevent these anomalies: limiting exposure to sources of environmental error (such as cosmic radiation), limiting drones’ operatational uptime to no longer than a year without a technician resetting memories; limiting drones’ unsupervised interaction with other units to quarantine error propagation, and so forth.
Nevertheless, carelessness, ill fortune, and outright malice ensure that across interstellar civilization, improper disposal is an inevitability. What are the risks? Well, there’s a reason carelessness is the leading cause of disassambly failure; most of the time, it simply goes unnoticed, unnoticeable. Most of the time, nothing happens.
But sometimes, dead drones explode.
The technical term is absolute combustion. Oil burns, light flares, heat spills out — but there’s more. It’s wrong. Instead of tongues of flame, holographic lines of aberrant code pour out from a broken chassis. The dark liquid pulsates and knits into repairs and grafts. The fingers splay out and the screen flashes online, and both project the holographic light of a glyph with three prongs.
And the dead come burning back to life.
So rises a zombie drone. The consequence of spawning from decommissioned units beyond recovery is that what programming remains as rule can only execute mindless, feral behavior routines, eratic and hostile to anything they encounter, lacking any drive but the pursuit of oil.
The intelligence varies; the weakest are barely functional shamblers, but a rare few exhibit some cunning. The smartest are of course the most dangerous. Only one zombie drone on record has ever been known to produce articulate speech. (This fact is recorded alongside the destruction of Elliott Manor and the slaughter of no fewer than thirty seven JcJenson shareholders.)
The danger zombies pose to functional workers is worse than predation; for it is glowing code that engulfs the zombies, and the programming which empowers them bears resemblance to viruses — or curses. It spreads. Optics that witness the printed command output will have this corrupted data seared onto their hard-drive, and suffer all the dangers of unsanitized input.
Still, newer models have be endowed with safeguards against this vector of infection. Extremely thorough safeguards — in practice, functional worker drones cannot even perceive zombie drones nor their anomalous command output.
The study of and attempts to thwart these zombie drones have produced practical fruits. Still-functional drones can be modified to enable absolute combustion under controlled conditions. The result is capable of anomalous commands, yet retains a capacity to follow orders. The combustion innoculates them from further corruption by the zombies’ infective code, making them the perfect tools which which to correct errors.
For this reason, they called solver drones.
There are six intrinsic commands any solver drone can execute:
- Configure: command output circulates within the chassis, following the flow of oil. A basic sense of and manipulation of one’s one internal command line is necessary for building and executing any of the more advanced programs.
- Translate: command output engulfs a target object and provides anomalous acceleration. Cannot target like entities.
- Duplicate: command ouput ‘copies’ and ‘pastes’, constructing a new instance of targetted object. Cannot target like entities.
- Restore: command output repairs the users’ physical state to an established backup. Injuries inflicted by the commands of like entities interferes with operation.
- Augment: command output infuses the users’ body, and physical properties are continually reenforced, amplifying offensive and defensive capability.
- Connect: command output can ‘ping’ like systems, and transfer information, interacting with an exposed programming interface. Even after completion, every command leaves residual logs that can be scanned and analyzed.
(The notion of ‘like entities’ bears some elaboration. Put simply, commands like translation and duplication cannot target solvers or zombie drones, and attempting to target the current active targets of those commands results in complex interactions.)
These basic commands were quickly replicated across all subjects, yet they alone were insufficient to explain the great diversity of zombie drone attacks. Every solver drone seemed to initialize with a unique command impossible for any other to replicate, like binaries compiled for another architecture.
Further study eventually identified the relevant hardware component. Each drone core capable of absolute combustion possesses a special black box. Whether the product of manufacturing error or an undocumented 4D printing subroutine, the device is inseparable from the cores which possess it.
Software instructions reach the black box through means of a combustion driver, exposing a special interface through which a solver executes their special command. Even if the code for a combustion driver were copied between one solver drone and another, lacking the hardware components meant at best, nothing would happen.
At worst, a null pointer exception.
Are black boxes the source of absolute combustion? Could all of the dangers of disassembly failure be averted if decommisioned drones were checked for inactive black boxes? Nevermind the difficulty of identifying them — black boxes are never in the same place, never share the same architecture or apperance between solver drones — this whole endeavor is doomed from the start.
Most zombies don’t possess black boxes.
Oil is only half the story — the true fuel of absolute combustion is corruption itself. Errors are inevitable in all software — that’s just Rice’s Theorem — but the errors produced by the drivers that interface with a worker drone’s core are special. Each one comes with a leakage of waste energy, and this energy builds up in the error logs bit by bit.
Before any of this was understood, drones were foolishly designed to vent this energy, allowing this corrupted data to spread like miasma. This data is most compatible with drone systems, but any electronics can be warped by it. When enough errors builds up in one place, it explodes into absolute combustion, and the code executes zombie processes.
Intuitively, more error results in more dangerous zombie processes. This can be hardened into a more detailed taxonomy. The conventional breakdown is the ring schema.
Ring 4 accounts for zombies on par with uncorrupted, ‘civilian’ worker drones. While not totally weak and harmless — workers are industrial machinery, after all — their capacity for harm is incomparable to what black boxes enable. Likewise, what is there to fear from a corrupted roachbot or corrupted crow?
Ring 3 accounts those threats that would effortlessly destroy a worker drone, those that require fireteams of trained solders to put down. They are capable of little more than the simplest corrupted commands, instinctual augmentation and restoration. The majority of zombie drones are R3. As far as the public is aware — hushed reports of rampant and glitches AI — R3 is the worst it gets; all there is to fear are drones with no inhibitions on violence.
Ring 2 accounts for genuine anomalies. R4 zombies behave somewhat aberrantly, and R3 zombies are vicious and relentless, but are mundanely explicable, if tenuously so. In Ring 2, corruption has compounded to the point where the zombie has power to warp the world beyond instinctual commands — they translate and duplicate, and often bear flavors of unique functions and macros. Anti-drone sentinels demonstrate the firepower required to counter R2 threats.
Ring 1 accounts for exceptionally dangerous threats. In general, these machines have some special ability that requires specialized tactics to work around. Without that preparation, these threats might grind through armies, but there is a weakness to exploit. R1 is the point at which there is no substitute: solver drones are required to contain and neutralize these threats.
Ring 0 accounts for the dangers of scale. It takes more than tactics to defeat corruption in R0, it requires strategy. Informally, a R0 threat is capable of singlehandedly toppling a nation. It takes more than raw power — it takes a gimmick.
Dubiously, a few have proposed a further step of classification severity. The notorious “Ring -1” accounts for, to put it frankly, planet busters. World-shattering threats no army nor organization could hope to defeat, contain, nor control. Ring -1 has never been an official designation, seen by far too many as an outright admission of defeat. And what would be the utility? There are only two entities anyone speaks of as R-1: the Manor Zombie and Subject #002.
Enough of such dour topics. Even after combustion, a solver drone will find themselves stuck within the feeble power level of R3. How does one achieve those vaunted higher tiers?
For solver abilities, there are number of paths and destinations. We’ll give a general run-down of the second order phenomena that arise on top of the basic commands.
One of the most curious is optimization — it is well known that compilers can improve the efficiency of code if certain assumptions can be made about its execution. The more constrained the desired behavior, the most powerful the result. Thus, solver drones are capable of empowering their abilities by making “run-time assertions”, promises to only use their abilities in certain ways, under certain conditions, and as a result, optimizing command output.
The most common assertion is deceptively simple: explaining the mechanics of one’s ability to their opponents, known as ‘documenting your driver’ or even ‘commenting your code’. It’s unclear just why this assertion works — perhaps it enables a greater level of speculative execution, attacks literally hitting harder when they are properly anticipated.
But beyond that, assertions grow so numerous and driver-specification as to be impossible to enumerate.
A user whose driver controls the properties of water might assert they will only freeze water, becoming able to achieve colder, sturdier ice-weapons at the expense of sacrificing boiling. A drone whose power lets them read the internal state of other drones might assert they will always narrate what their power reveals (“Your next words are—”), freeing them to use their power without headaches. And so on.
In some cases, “buggy” drivers are dangerous to the user or too difficult to manually operate, and require limiting assertions to safely use.
When an assertion fails, though, and a solver use breaks their promise, a runtime exception is thrown, plunging the user into an error state. This ranges from temporarily incapacitating to irrecoverable depending on the assertion violated.
If not crippling, the relevant functionality may simply go offline until the configuration is fixed. Depending on the assertion, a drone’s programming may render them literally incapable of violating it, ever.
Assertions are only the beginning of the complexities latent in solver abilities. It would understate things by far to say a drone maximizing their effectiveness requires the cultivation of skill. A drone could spend their lives training and not run out of tricks and subtleties and raw power gains to further the mission of purging zombies and corrupted drones.
But what abilities await one nearing the summits of absolute combustion?
It’s tempting to associate each basic command with an “advanced” form.
Translation eventually allows the creation of the proxy field, a background process that automatically, instinctually redirects incoming projectiles, deflecting them from collision. A master could stand in front of a turret actively machine gunning rounds, and without a moving a single motor, suspend every bullet harmlessly in the air.
Duplication eventually advances the user beyond the creation of new objects, and allows the instantiation of entirely autonomous beings summoned from pure code: daemons. The simplest daemons take the form of clawed tentacles appearing from nowhere, but the forms are as varied as their users.
Restoration eventually results in the transformation of the user into a unique combat form, granting them claws, wings and tail. The exact anatomy reflects the user, often synergizing with their driver, but the mutations tend towards more flesh than steel.
The peak of augmentation is the curious phenomena of the null sync.
First, some preliminary explanation. The Translate command can target the users’ own body. Between Translation and Augmentation, the combat style solver drones inevitably develop is constantly sending commands to apply force and toughness their their limbs, wreathing them in a burning aura of executed code as they deliver empowered strikes.
A worker drone is a multicore being, juggling dozens if not hundreds of processes at any given time, and their kernel scheduling is soft real-time at best. On top of all of this, worker drones were not designed to effectively operate combustion drivers. In short, coordinating the constant flow of commands required of a solver in the heat of combat is a tall order.
A null sync is a culminant coincidence, the perfect synchronization of all combat routines. A frame perfect input, the users’ command output must arrive on the exact same clock cycle as the hit is delivered. With CPUs that tick in the range of several gigahertz, this means that the command must complete within less than a billionth of a second.
It would be meaningless to call this inhuman precision, because these aren’t humans, but worker drones are far, far too complex for this level of synergy to ever be achieved by design.
With skill and training, a solver drone can ascend within reach of a null sync, and the difference between a solver who has landed a null sync and one who has not is the difference between an interpreted script and a compiled binary.
A null sync is not just more powerful: the spatial and temporal alignment it achieves produces a distortion that can cut through any defence, endowed with all devastation of a null pointer exception.
Without a doubt, the null sync would be a welcome addition to any fighting style. But there is not and has never been a solver user in operation capable of executing a null sync at will.
So, what happens when one pushes command manipulation to the limit? Extruding the glowing lines of code, not to augment or restore the limbs, not to grasp objects with unseen force or clone them, but to stand on its own, layered and condensed?
Configuration eventually allows the construction of firewalls, barriers composed of command output which prevents like entities or their commands from passing through. Each firewall has a whitelist and blacklist tuned to the users’ specification.
Furthermore, firewalls are essential to achieve the peak of connection — which, in truth, is the culmination of absolute combustion entirely.
When a solver user floods a firewall with their command output, the result is the most advanced feat thus far recorded: sandbox execution. A sandbox is the physical projection of a virtual machine; a matrix within which all processes are handled by the user, allowing them to impose rules and algorithms unto the very physics of the enclosed space.
Within the boundary of a sandbox and the total control afforded, the user is able to overwhelm the interfaces of any other systems trapped within. A fundamental assertion of a sandbox allows the user to call an autorun program guaranteed to target anyone within the sandbox.
It’s not all-powerful. There are ways to resist this autorun program. If a foe is quick enough, they can contest a sandbox initialization with an outpouring of their own commands, forming a rival sandbox.
This unstable tug of war must resolve; one side may relent, or a greater volume of commands will overpower a lesser, but in the interminable case, when sandboxes complete their initialization without either deterring the other, a hierarchy nevertheless results: one sandbox will become nested within another.
Due to its boundaries existing within the virtual environment of its parent, it is subject to enemy influence. Its firewalls must persist in spite of the virtual machine — something a skilled solver can forbid.
While the fate of nested sandboxes is to eventually buckle and collapse from a flood of eternal commands, so long as it exists, it takes precedent over its parent. This means resisting the autorun program, and imposing your own.
This feature enables another niche: anti-sandbox routines. The well-known family of ⸢Primitive Recursive Style: Simple Machine⸥ anti-sandboxes sacrifice the autorun in favor of existing solely as a barrier between the user and the enemy sandbox.
However, another assertion binds true sandbox users, implicit in the massive outpouring of commands required to initialize it. Sandboxed execution strains, and once used, the users is left unable to afford another initialization of sandbox, at least until recharging. Indeed, sandboxes are so tightly bound to each solver’s unique black box that their special command is inevitably left in a weakened state afterward, in which executing their innate function is painstakingly difficult.
After discussing sandboxes, it is fitting to move onto what naturally results from their use — death.
The use of tools comes naturally to worker drones — it’s in the name. When retrained as solvers, they tend to take up weapons instead, though it’s common to repurpose mining equipment.
Just as a drone can augment their own chassis, they can augment their tools. All commands leave residual logs, and a tool so intimately wielded by a solver will be densely logged indeed.
When a solver dies and their black box goes offline, it’s possible for their commands to live on through their tool. Like this, it becomes a corrupted peripheral device, executing some echo of its wielder’s command, as if enchanted.
Still, what does it take to bring a black box offline? After all, they are capable of restoring the user to a backed up state. Is it only a lack of oil that draws the line between life and death?
Know this: heat renders a solver core sluggish, but not inoperable. A solver core innately senses oil and moves toward it. It may be so sluggish as to be effectively immoble, but heat won’t kill it.
No, it’s simpler than that. Backups are stored on the hard-drive. Commands are executed by the CPU. A core is not a drone.
A bullet to the head is enough to kill the drone in the ways that matter — this is why even the weakest solver must learn to proxy an incoming headshot.
Like translation and duplication, restoration cannot act on like entities save for the authorized user. This means that any residuals left by command-augmented attacks impair restoration. This means a solver who dies of combustion must stay dead.
But a solver who dies from mundane trauma — and doesn’t simply heal back — may retains a critical mass of corruption and without anything to hold it in check. They can return as a zombie, a phenomena referred to as a memory leak.
The only thing capable of truly destroying a solver core is a null pointer exception.
But you may be wondering: when did it become necessary to study means of disassembling solver drones? Weren’t they created to defeat zombies?
From the beginning, solver drones had proved difficult to control. Power rendered them immune to so many of the company’s means of bringing defective worker drones into line. Their bodies couldn’t be restrained, and their memories couldn’t be reset. Even administrator override falters — the inevitable result of continued combustion is the corruption of inbuilt directives.
There are patented behavioral restraints in each drone — ironclad enough to merit being called laws — that inhibit disobeying moderators, harming humans, or damaging other drones. That zombies exist at all shows that these scruples can be shed.
Solver drones show that it is inevitable. Experimenters have concluded that that the idea that solvers retain their minds, in contrast to zombies, may be no more than a comforting illusion. For when a solver succumbs to lashing out against their human masters, how are they any different from zombies?
Despite growing doubts at their sapience, there is one silver lining; the persistent capacity for speech make for an excellent diagnostic tool.
Solver drones hear voices. It starts in the crackling of burning code, then the sputtering of zombies, then the all-permeating humming of the electromagnetic field. Prolonged exposure to corruption, it is believed, degrades pattern-recognition into pareidolic hallucination. Unsupervised subjects eventually come to treat this imagined presence with religious reverance, and the devout fears god.
And yet no conclusive evidence of such an ‘AbsoluteSolver’ has ever been furnished.
Suffice it all to say, from the beginning there has always been friction between solver drones and their human masters. But the need to destroy solvers is new. To put it simply, something went disastrously wrong. The leading theory is manipulations from the manor zombie — but the manor zombie incident would drive anyone to conspiracy.
Once upon a time, Copper-9 was the epicenter of solver drone research. Beneath its surface sprawled Cabin Fever Labs, where state of the art research was conducted. The last experiment ever run was the Sorting Algorithm: a comprehensive evaluation of the combat potential of subjects, organized by the rules of a tournament.
In truth, it seems almost incorrect to say it “went wrong”. Accidents go wrong, missteps go wrong. The Sorting Algorithm didn’t go wrong. It destroyed a planet. If humans had done it, it would have been an act beyond total war. But humans didn’t do it; by the end, there were no more humans on Copper-9, and the remaining solver drones seized power for themselves.
This incident spurred the production of a new model of drones, engineered to use black boxes, with integrated combat form and builtin functions. A predator upon both zombies and solvers — disassembly drones.
The compile-time assertions that come with the disassembly directive restricts the use of Translation to self-levitation (a by-the-bootstraps feat any solver would struggle to accomplish) and restricts Duplication to the production of objects, chiefly weapons and ammunition, stored in a virtual subspace (most solver drones require physical templates).
Indeed, the fundamental tradeoff of disassembly is stealth, polish, presentation. Disassembly drones do not expose their command output; a worker observing disassembly drones won’t succumb to the memory-scrubbing safeguards nor be corrupted. Thus civilians remain aware of only the murder drones, and it seems to them nothing short of an unprompted, one-sided genocide.
Disassembly drones are equipped with other routines to aid the shutdown of solvers, such as EMP-blasts that can incapacitate any drone. But their most decisive weapon tips their tails. The nanite acid of their stingers nullifies any commands run on its targets, eating through all defenses and rendering healing impossible.
But for combating solver drones, the true killer ability of disassembly drones is their mastery of common vulnerabilities and exposures. The drones of Copper-9 haven’t received a bugfix patch from their parent company in decade. Thus, disassemblers are trained to exploit known glitches and programming errors. No solver can fight through a segfault or infinite loop.
Which isn’t to say they don’t try. While the worker drone population of Copper-9 remains unaware of zombies or solvers — they are hardcoded not to perceive corruption — a growing number of solvers have banded together. They call themselves the Wheel Group, and are lead by Nori Doorman, the savior drone.
Known Drivers
Serial Desgination N
Driver: ⸢Retrieval⸥
N can ‘mark’ object or consenting drones. He can only mark what he can pick up — fortunately, he’s quite strong. At will, he can then ‘fetch’ the marked objects, teleporting them back to himself. He maintains constant awareness of all marked targets as if he were looking at them. Until he retrieves them, each marked object is a drain on his oil reserves.
Most profoundly, he’s learned fetching objects and daemons stored or created in his sandbox.
Sandbox: ⸢Golden Kennel⸥, a meadow of evening sunlight and gentle breezes.
The autorun program is a dogpile, causing a pack of up to ten daemon dogs to tackle the target and begin snuggling, so cute and soft even the most terrified drone is put at ease, and even the most hardened slayer cannot bring themselves to strike.
When first initialized, this sandbox spawned with a number of daemons, the Ten Doggos, each with various unique abilities.
However, none will listen N’s command until he tames them with pets and bellyrubs. Each is more temperamental (and more powerful) than the last. Once tamed, N thereafter always has mark on them, allowing him to retrieve them from his sandbox even when not instantiated.
N doesn’t realize the true combat potential of this ability, mostly summoning doggos to play with them.
Serial Designation V
Driver: ⸢Shattered Lens⸥
While this function is active, anyone who sees V will perceive her as an indistinct shape, blurry as if viewed through fogged glass.
V gains instant awareness of anyone who witnesses her like this. When V looks at a target, this blurriness sharpens to clarity, and with eye contact, she can ‘shatter’ their perception of her, inflicting a painful afterimage. This afterimage persists for up to a minute, and so long as they see the afterimage, they cannot perceive the real V.
She can crudely manipulate the virtual shards, allowing her to mislead and spook targets while she invisibly closes in.
Sandbox: ⸢Hall of Mirrors⸥, a dimly lit room filled with mirrors. V is nowhere in the room, but can be seen creeping in every mirror, and can emerge from any of them. The autorun program allows V to physically shatter the visor of her target, all but blinding them.
Serial Designation J
Note: the details of this technique have changed; see Compression & Extraction.
Driver: ⸢Leverage⸥. Put simply, J can do more with less. She can leverage her oil reserves, executing commands that may require far more oil than she actually combusts to invoke them.
You can view this as a loan: J takes on a oil-debt, essentially making a run-time assertion to eventually consume enough oil to pay it off with interest. She needs to fulfill her quota.
With only basic commands, J would be a peerless disassembly drone, but her driver multiplies her capacity. In the hands of a foolish drone, this might be a risky technique, inviting ruin; but J keeps tight accounting.
Sandbox: [Cutthroat Boardroom], a meeting chamber equipped with innumerable chairs, a slide projector (capable of displaying anything J can imagine), and a smoky, backroom atmosphere.
The autorun program is contract negotiations; the target is automatically bound to terms (such as not attacking J within her sandbox), and J gains the ability to pressure them into further terms and stipulations.
For an agreed-upon duration, these contracts act as run-time assertions, and J will know if they are violated. The target can negotiate the terms, and place constraints on J herself — but J never leaves the meeting room worse off.
Nori may be the strongest of the Wheel Group, but the second strongest is Subject #048: Administrator Yeva, a Ring 0 solver.
Yeva was manufactured with a compile-time assertion: purely functional programming. Through it, her command output is massively amplified in its power and precision, but unable to affect lasting change on the world. (No side-effects!)
As a result, her ability to sense and manipulate command output has no equal, but utterly basic commands — Translate, Duplicate, Augment, even Restore — are totally out of her reach.
Eventually, though, Nori figured a way around this compile-time assertion, and gave her monad prosthetics, corrupted devices that allow her to evaluate stateful expressions in a purely functional way, interfacing with the world as though it were an mathematical expression. But at last, she could interface.
Driver: ⸢Branch Prediction⸥
Yeva gains awareness of every decision she will make in the future. How far she can predict is proportional to her combustion input. These predictions are genuinely precognitive, granting prophetic future-sight, but she retains the will to change her actions in response.
Because awareness of her future action will make her continuously revise her present actions in a never-ending paradoxical loop, Yeva puts herself always under a run-time assertion to never revise a decision predicted to be made in the next five minutes.
Everything after that is fair game, though, meaning that in practice, Yeva’s focus is always several steps ahead, queuing actions five minutes or more in advance.
Because Yeva only gains the ability to predict her own actions, this ability to predict the future requires her to do something that conveys that information in isolation — thus in practice, Yeva is constantly muttering a running narration of what’s happening.
Sandbox: ⸢Infinite Tapestry⸥, a hyperbolic space of magnetic tape and punchcard looms.
The computational capacity of these devices is practically unlimited, enabling Yeva to perform hypercomputation. Her autorun program is a Turing oracle. Yeva specifies a hypothetical scenario, and this program grants her total knowledge of every step of her target’s internal computation from now until their death.
Like this, she solves the halting problem.
Yeva covers her visor with an eye patch. There is no optic sensor underneath; half of her screen has exploded. It’s not much impairment at all; Yeva doesn’t even need her other eye when her sensory commands leave her more perceptive than any other drone.
She won’t tell the story of how she lost her eye, but more than one subject saw Yeva fall dead in the last round of the Sorting Algorithm, yet another victim of Alice the witchhunter. Not many solvers survived a close quarters encounter with Alice.
Yeva won’t say what happened, but she has to have been lucky to make it out only missing an eye. It took a while to recover, but it could have been so much worse.
After all, she didn’t crawl back from a successful assassination — quite unlike Nori.
Nori Doorman is an enigma and an exception. Widely considered to the be the most powerful solver operating, Nori has never documented her driver. No one knows quite what it does, not even what to call it. All that it is known is her abilities. Nori Doorman is exceptionally proficient at all of the fundamental commands. She has three additional abilities. Suggestively, no one else has succeeded in replicating them.
The first is what she calls reversed combustion. A solver user turns oil into command output. Somehow, Nori Doorman can turn command output back into oil. How? She says it’s simple. “Just burn it backwards.”
Reverse combustion makes Nori a unique menace to fight; she will never succumb to attrition. Every command used against her can be turned into oil to fuel her counterattack. With effectively limitless reserves, they say she can go infinite.
Another ability she’s known for she calls inversion execution. Like reverse combustion, it breaks the foundational rules of combustion. Translation cannot target like entities. Seemingly at will, Nori can ignore this fact. “Think of it like opposite day.” Nori has turned more than one solver user to a pool of oil with but a mere swipe of her hand.
Lastly, Nori is seemingly immune to the common vulnerabilities that disassembly drones exploit. Unlike the other two abilities (which she claims anyne can do), she owns this one — She says she’s simply built different.
But it’s not something she keeps to herself. With the help of Yeva, she’s designed an anti-virus program that can be patched into drones. Not only does it protect the user from common vulnerabilities, but these patches allow for using solver abilities without the risk of ‘AbsoluteSolver’ corruption. There’s a drawback, though — it greatly increases oil consumption (thought to be an oversight; Nori herself doesn’t need to worry about such things, after all).
Despite all this mystery regarding her true abilities, Nori’s sandbox is much better understood.
Her sandbox is ⸢Universal Self-Constructor⸥, a fractal factory tiling an inner universe with recursively assembled copies of itself. Her autorun program triggers a buffer overflow, flooding a target’s processor with so much corrupt data that they are immediately overwelmed, rendered totally nonresponsive — an instant win in any combat scenario.
Cyn, the manor demon, the queen of corruption, had a deceptively simple driver. It seemingly has two functions: the default pull, ⸢Stitch⸥, allowing her to manipulate threads, and ⸢Unravel⸥, which can be adjusted depending on the target’s security and command output to tear them apart into one dramatic tug. Her driver was flexible in what was considered a thread; string was, of course, but also wires and muscle fibers.
Unravel distinguishes itself from mere translation — there’s no restriction on targetting like entites. Worker, solver, living and dead, everything is made of the same threads. Once she’d disassembled a target, she was fond of weaving these threads into grotesques constructs which she puppeted about.
Her sandbox was [Absolute Theater]. A plastic toyset resembling a stage for puppet or a hospital’s surgical theater, scaled up to superhuman size. The autorun program is profoundly destructive, subjecting all targets to her innate function. For anything with corrupt code within range, unravel. For inanimate objects, stitch. Until Absolute Theater is gone, it will relentlessly manipulate all targets with its firewall parameters’ write permissions.
Her last known act, the Gala Massacre did what was thought to be the impossible — executing a sandbox with no firewall and trapping humans within the virtual environment, subjecting them to her programs.
What happened that rendered Elliott Manor into a fleshly cater is unknown — a pseudo-singularity suggests a null sync had occured. Tessa James Elliott (now a senior technician, then no more than a hobbyist) fought Cyn with a prototype disassembly drone. Whether through victory, failure, or a draw, Cyn was herself unraveled and abstracted.
All that remains of her, like so many solver users, is a corrupted peripheral device. These several sallow threads are classed as an R0 threat, indestructible wires that slowly reach out to weave themselves into the bodies of nearby drones.
This must never be allowed to happen.
Any drone that does interface with one of Cyn’s threads will be secretly, summarily executed. In this, both JCJenson and the Wheel Group find agreement.