Star Wars Roleplay: Chaos

Register a free account today to become a member! Once signed in, you'll be able to participate on this site by adding your own topics and posts, as well as connect with other members through your own private inbox!

Approved Tech Droid Augmentation I-01 "The Bentley Protocol"

Status
Not open for further replies.

Vigil

Orwell, The Librarian
OUT OF CHARACTER INFORMATION

  • Intent: To create an advanced hacking tool for applicable KEE droid models.
  • Image Source: N/A
  • Canon Link: N/A
  • Restricted Missions: N/A
  • Primary Source: N/A
PRODUCTION INFORMATION
  • Manufacturer: Keen-Eye Electronics
  • Model: N/A
  • Affiliation: Closed-Market
  • Modularity: No
  • Production: Minor
  • Material: Electronic Components
SPECIAL FEATURES
  • The Bentley Program: Advanced hacking protocols
Strengths:
  • The Bentley Program: Advanced hacking protocols that drastically improve a droid's ability to push itself into systems it does not have the authorization for. The program is roughly the equivalent of a high class, quality hacker with extensive experience.
Weaknesses:
  • A Mind of their Own: Droids upgraded with this protocol almost universally develop some sort of personality quirk, not unlike a droid that has gone for a lengthy time without a memory wipe.
  • Memory Wipes: Due to the design, a memory wipe will inhibit or negate the upgrade's purpose, causing it to be a waste of credits.
  • Restricted Models: Due to the design, this upgrade can only be put on class II applicable droids, such as KEE astromech droids.
  • Military Encryption: Due to the nature of security, while capable of slicing through military security systems the upgrade does not ensure success. Military grade encryption can pose a problem.
DESCRIPTION

The Bentley Protocol, named so for the disabled programmer who designed it, is an advanced slicing protocol that can transform a standard astromech droid into a high-quality slicing machine. By overwriting 'unnecessary' code, the Bentley Protocol enhances a droid's capability in finding loopholes within code and accessing higher and higher security. In a rough estimation of capability, a droid upgraded with this protocol will be capable of slicing through most civilian, non-military security with greater ease. Most criminal elements, such as small-time gangs, will also be within reasonable capability, though big time crime empires will pose difficulty in the same way military installations will. Though capable of slicing through, the Bentley Protocol is not designed to be the top-of-the-line slicing protocol, but a protocol to upgrade the standard ability of an astromech droid to become a valuable espionage tool.

A noticeable flaw, however, is the development of personalities and quirks. For reasons KEE assures are unintentional, the protocol accelerates the development of droid personalities, a common flaw with lacking memory wipes. This would not be a problem if the protocol was not dangerously susceptible to memory wipes, making memory wipes a poor option to solve a droid with this upgrade developing a.. problematic personality. In extended operations this is a liability, as the droid's protocols will be wiped should the droid be taken in for a routine memory wipe to fix the noticed eccentric personality development.
 
Status
Not open for further replies.

Users who are viewing this thread

Top Bottom