I keep having a thought about cyberdecks and worldbuilding. Often, they are portrayed as specialized and customized hardware for an individual person to accentuate their abilities.
Which sounds great, and even stylish in that pre-2010s kinda way.
Today when I look around, though, I have the opposite thought. What if it wasn't a quest for more power or features which led to the creation of decks, but rather the attempt to scrounge together *any* tech which is *not* infested with corporate spyware?
We already have microcontrollers powerful enough to do keylogging, limited analytics, and have the ability to autonomously post results back to some remote server.
Imagine that in a keyboard. Typing in a product name sends ads your way. Typing in a place adds your UUID to a location database. Typing in an "illegal" command string calls the cops.
Imagine you *can't* buy a keyboard which *doesn't* do this.
"Why does your 'laptop' look like a broken phone glued to a screen and a keyboard with welded hinges?"
"Because it's a broken phone glued to a screen and keyboard with welded hinges"
@socketwench It's a balancing act. Scrounging enough tech together that will let you do what you need to do, without ending up on an Unregulated Tech registry. So every thing you have is bodged together from junk with the serial numbers digitally filed off
@socketwench Now, suddenly, the whole "deckers build their machines from scratch, down to writing the firmware and OS themselves" in early Shadowrun makes way more sense.
I mean, I got and librebooted my X200 specifically because I didn't want Intel IME on my computer, I ran alpine linux for years because it had the hardened grc security linux fork along with muslc, and I've written custom itch scratching software for things just because the existing things Suck.
@socketwench yes, I really appreciate thought around this that goes beyond making things that look like movie props.
@koz_ross I have often called what we're living now "cyberpunk with wood paneling". So, yes, I totally believe you are.
Not to mention the way the more exotic your hardware, firmware and OS is, the less likely it is your average government actors or high-tech corps have the right combination of zero-days and intrusion code handy.
And, for extra fun, you can go with a layered approach, where each layer has a different CPU architecture. Then it gets like in the cyberpunk stories, where hack-backs take a while as they defeat each layer.
A bunch of technomancers in the fediverse. Keep it fairly clean please. This arcology is for all who wash up upon it's digital shore.