PDA

Δείτε τη Πλήρη Έκδοση : The Machine is glitching (All 'Blue Screens of Death')



t0ny3
3 Ιανουαρίου 2014, 22:44
http://img33.imageshack.us/img33/9417/l5ru.jpg


ΠΡΟΣΟΧΗ!
Όσοι δεν έχουν το 13ο επεισόδιο της δεύτερης σεζόν καλύτερα θα ήταν να μην προχωρήσουν παρακάτω, γιατί περιέχονται spoilers.
Στο φινάλε του 13ου επεισοδίου η Κάρα ανέβασε έναν ιό, ο οποίος μόλυνε σταδιακά την Μηχανή του Φιντς, με αποτέλεσμα να εμφανίζονται οι μυστηριώδεις μπλε οθόνες σε διάφορα σημεία των επεισόδιων. Το φαινόμενο αυτό ονομάζεται Blue Screen of Death (http://en.wikipedia.org/wiki/Blue_Screen_of_Death) και πρόκειται για μήνυμα σφάλματος που επιδεικνύεται από ορισμένα λειτουργικά συστήματα στην οθόνη ενός υπολογιστή, κυρίως από τα Microsoft Windows, μετά την αντιμετώπιση ενός κρίσιμου λάθους που μπορεί να αναγκάσει το σύστημα να διακόψει τη λειτουργία του ώστε να αποτρέψει τη ζημιά.

Οι πρώτες BSOD εμφανίστηκαν στο 14ο επεισόδιο και συνεχίστηκαν σε όλο το δεύτερο μισό της σεζόν. Αυτές οι μπλε οθόνες περιέχουν δεκαεξαδικό κώδικα ASCII (http://en.wikipedia.org/wiki/ASCII) από αριθμούς και ελληνικά γράμματα, ο οποίος μπορεί να μεταφραστεί σε κείμενο. Παρακάτω παρουσιάζονται οι μπλε οθόνες από κάθε επεισόδιο μαζί με μία προσπάθεια μετάφρασης σε κείμενο και με απαραίτητες επεξηγήσεις και αναφορές από κάποια άτομα που ασχολήθηκαν. Σε μερικές περιπτώσεις τα κείμενα δεν είναι ολοκληρωμένα, επειδή ο κώδικας δεν είναι ξεκάθαρος.

Περισσότερες πληροφορίες θα βρείτε:
http://personofinterest.wikia.com/wiki/List_of_Embedded_Codes
http://www.person-of-interest.net/theories/the-machine-is-glitching-t520.html


Για περισσότερες πληροφορίες εδώ (http://personofinterest.wikia.com/wiki/Code_01_Explanation).

http://img36.imageshack.us/img36/9710/jwwn.png

Lady M. Out, damned spot! out, I say! One; two: why, then, ’tis time to do ’t. Hell is murky! Fie, my lord, fie! a soldier, and afeard? What need we fear who knows it, when none can call our power to account? Yet who would have thought the old man to have had so much blood in him? ...

Based on the capitalization, inclusion of tab characters and newline formats, one can reasonably conclude that this text was copied from an online version of Macbeth at Bartleby.com on a computer running Windows.

Excerpt from Lady Macbeth's sleepwalking scene in Shakespeare's Macbeth


http://img163.imageshack.us/img163/3876/h0km.png

Excerpt from the National Institutes of Health's bioterrorism page


http://img853.imageshack.us/img853/6899/j0oe.png

Excerpt from the National Institutes of Health's Anthrax


Για περισσότερες πληροφορίες εδώ (http://personofinterest.wikia.com/wiki/Booked_Solid/Embedded_codes).

http://img20.imageshack.us/img20/1355/hglv.jpg

BIN LADEN DETERMINED TO STRIKE IN US August 6 2001. After U.S. missile strikes oh his base in Afghanistan in 1998, bin Laden told followers he wanted to retaliate in Washington, according to a -- -- service ...

The text in the first blue code screen comes from the U.S. president’s daily brief given to George W. Bush on August 6, 2001. As we know, the Machine was conceived in response to the 9/11 terror attacks, as recently reinforced in the episode “One Percent“.


http://img855.imageshack.us/img855/9922/jnre.jpg

And I heard a great voice out of the temple saying to the seven angels, Go your ways, and pour out the vials of the wrath of God upon the earth. And the first went, and poured out his vial upon the earth; and there fell a noisome and grievous sore upon the men which had the mark of the beast, and upon them which worshipped his image ...

The code in the second blue screen is from Revelation 16.


http://img819.imageshack.us/img819/3567/p529.jpg

Types of CW Agents. Choking agents are the oldest CW agents. This class includes chlorine and phosgene, first used in World War I. These agents have a corrosive effect on the respiratory system that causes the lungs to fill with water and choke the victim ...

The third screen references various types of CW (chemical warfare) agents.


Για περισσότερες πληροφορίες εδώ (http://personofinterest.wikia.com/wiki/Relevance/Embedded_codes).

http://img69.imageshack.us/img69/3484/jzhr.jpg

“It seems to me I am trying to tell you a dream–making a vain attempt, because no relation of a dream can convey the dream-sensation, that commingling of absurdity, surprise, and bewilderment in a tremor of struggling revolt, that notion of being captured by the incredible which is of the very essence of dreams…No, it is impossible; it is impossible to convey the life-sensation of any given epoch of one’s existence–that which makes its truth, its meaning–its subtle and penetrating essence. It is impossible. We live, as we dream-alone…"

This is an excerpt from the original text page 18/19 from the book "Heart of Darkness" by Joseph Conrad


http://img546.imageshack.us/img546/7893/f76w.jpg

The second “Relevance” code is an except from pioneering surgeon John Bell‘s “The Principles of Surgery”


http://img42.imageshack.us/img42/5559/wfth.jpg

The third screen from “Relevance” features text from the Voynich Manuscript — named after the Polish-American bookseller, Wilfrid M. Voynich who purchased it in 1912 (thanks Mathias). Here’s what Wired has to say on the mysterious encrypted manuscript:

Few encrypted texts are as mysterious – or as tantalizing – as the Voynich manuscript, a book dating to either 15th- or 16th-century Italy and written in a language no one understands, about a subject that no one can figure out, and involving illustrations of plants that don’t exist. Plus it’s got Zodiac symbols, astrological charts, illustrations of medicinal herbs, and drawings of naked women bathing while hooked up to tubes. The manuscript’s 246 calfskin pages were perhaps meant for alchemy or medieval medicine, but no one knows for sure.


http://img824.imageshack.us/img824/3564/w2vc.jpg

Screen four also comes from John Bell‘s “The Principles of Surgery” — Chapter XVIII – “Fractures Of The Skull”:

In excessive fractures (says Dionis) we should not hesi-
tate to make two, three, or four perforations, if required. A
young girl, of eleven or twelve years of age, having, by a fall
down stairs, fractured the whole of the parietal with a part of
the temporal bone, Mr. Marechal trepaned her next day
in two places: he made his son trepan her a third time; he
allowed my son, who was present, to trepan her a fourth time :
the next day, applied the trepan twice more, and in the end had
actually perforated twelve times, and cured her completely. So
precious an example shows how little reason we have to be sur-
prised at the frequent application of the trepan.” Here is a
doctrine laid down, which, I fear, there is little occasion to
enforce ; and I cannot but persist in being surprised and shock-
ed, at the frequent and large perforations which I have both
read of and seen, and cannot but think of these veterans in sur-
gery in no very amiable light, when I see them indulging their
boys in the novelty of operating, probably on very slight com-
pulsion…


Για περισσότερες πληροφορίες εδώ (http://personofinterest.wikia.com/wiki/Proteus/Embedded_codes).

http://img571.imageshack.us/img571/1662/snap9221.png

But this last theory, plausible as it was, could not stand against inquiries made in both worlds. That a private gentleman should have such a machine at his command was not likely. Where, when, and how was it built? and how could its construction have been kept secret?

This is likely an excerpt from the text page from the book "20,000 Leagues Under The Sea" by Jules Verne.


http://img268.imageshack.us/img268/3838/snap101400.png

CoerCive Techniques. Certain interrogation techniques place the detainee in more physical and psychological stress and, therefore, are considered more effeotive tools in persuading a resistant HVD to participate\.,ithCIAinterrogators..These techniques-- walling, waterdousing, stress positions, wall standing, and cramped confinement--are typically not used in combination} although some combined use is possible. For example, an HVD in stress poaitions or wall standing can be water doused at the spme time.

It is an excerpt of "The CIA's Instructions For Breaking a Detainee's Will" (a more readable version on page 8 here), likely describing the same or a similar version to the Palestinian Hanging technique that Root used on Denton Weeks in Bad Code.


http://img845.imageshack.us/img845/9831/snap112011.png

What are the roots that clutch, what branches grow
Out of this stony rubbish? Son of man,
You cannot say, or guess, for you know only
A heap of broken images, where the sun beats,
And the dead tree gives no shelter, the cricket no relief,
And the dry stone no sound of water. Only
There is shadow under this red rock,
(Come in under the shadow of this red rock),
And I will show you something different from either
Your shadow at morning striding behind you
Or your shadow at evening rising to meet you;
I will show you fear in a handful of dust.

This is the second stanza of "The Wasteland" by T.S.Eliot, a well-renowned poem depicting a once flourishing world now driven into darkness and despair.

http://img849.imageshack.us/img849/811/00lh.png

In order to prevent eye damage, Dr. Bainbridge ordered the distribution of welder's filter glass. Because it was not known exactly how the flash might affect eyesight, it was suggested that direct viewing of the fireball not be attempted even with this protection. The recommended procedure was to face away from ground zero and watch the hills or sky until the fireball illuminated the area. Then, after the initial flash had passed, one could turn around and view the fireball through the filter glass. Despite these well-publicized instructions, two participants did not take precautions.

It appears to be an excerpt from "Project Trinity, 1945-1946" a book by Carl Maag and Steve Rohrer, concerning the testing of nuclear weapons by the American government at that time.


Για περισσότερες πληροφορίες εδώ (http://personofinterest.wikia.com/wiki/Proteus/Embedded_codes).

http://img829.imageshack.us/img829/8070/snap13231.png

"Already we had gone away from him,
When I beheld two frozen in one hole,
So that one head a hood was to the other;
And even as bread through hunger is devoured,
The uppermost on the other set his teeth,
There where the brain is to the nape united.
Not in another fashion Tydeus gnawed
The temples of Menalippus in disdain,
Than that one did the skull and the other things.
"O thou, who showest by such bestial sign
Thy hatred against him whom thou art eating,
Tell me the wherefore," said I, "with this compact,
That if thou rightfully of him complain,
In knowing who ye are, and his transgression,
I in the world above repay thee for it,
If that wherewith I speak be not dried up."
His mouth uplifted from his grim repast,
That sinner, wiping it upon the hair
Of the same head that he behind had wasted.
Then he began: "Thou wilt that I renew
The desperate grief, which wrings my heart already
To think of only, ere I speak of it;
But if my words be seed that may bear fruit
Of infamy to the traitor whom I gnaw,
Speaking and weeping shalt thou see together.
I know not who thou art, nor by what mode
Thou hast come down here; but a Florentine
Thou seemest to me truly, when I hear thee.
Thou hast to know I was Count Ugolino,
And this one was Ruggieri the Archbishop;
Now I will tell thee why I am such a neighbour.
That, by e"

This appears to be an excerpt from "Canto XXXII" of Dante's Inferno, which depicts Dante's literary exploration of the journey the soul takes (in this part, recognising and renouncing sin), in order to reach god.


http://img69.imageshack.us/img69/1803/snap14233.png

"Anthrax Bacillus anthracis , the bacterium that causes anthrax, is capable of causing mass casualties. Symptom"

It is an excerpt from a CIA report on the materials and effects of terrorist-based chemical, biological, radiological, or nuclear attacks. This is the fourth mention of bioterrorism in these bluescreens.


http://img40.imageshack.us/img40/4157/snap151026.png

"Then her mother gave her a knife and said, "Cut the toe off; when thou art Queen thou wilt have no more need to go on foot." The maiden"

This is an excerpt from "Cinderella" as told by the Brothers Grimm.


http://img526.imageshack.us/img526/8215/snap162516.png

"06.49: The Micra arrives at Luton and parks next to the Brava. The 4 men get out of their respective cars, look in the boots of both, and appear to move items between them. They each put on rucksacks which CCTV shows are large and full. The 4 are described as looking as if they were going on a camping holiday.
One car contained explosive devices of a dif"

It appears to be an excerpt from "The Report of the Official Account of the Bombings in London on 7th July 2005".


http://img404.imageshack.us/img404/4143/snap173354.png

"During the lst Platoon's movement through the southern half of the subhamlet, its members were invo"

This appears to be an excerpt from the Vietnam War My Lai Massacre Department of Defense Documents, concerning the killings of Vietnamese civilians.


http://img441.imageshack.us/img441/1349/snap183649.png

"Then first thy spear, divine Patroclus! flew, Where the war raged, and where the tumult grew. Clo"

This appears to be an excerpt from Book XVI. The Sixth Battle: The Acts and Death of Patroclus, part of Homer's Iliad.


Για περισσότερες πληροφορίες εδώ (http://personofinterest.wikia.com/wiki/Trojan_Horse/Embedded_codes).

http://img822.imageshack.us/img822/7841/snap19.png

"What hath God wrought!
24 Behold, the people shall rise up as a great lion, and lift up himself as a young lion: he shall not lie down until he eat of the prey, and drink the blood of the slain.
25 And Balak said unto Balaam, Neither curse them at all, nor bless them at all.
26 But Balaam answered and said unto Balak, Told not I thee, saying, All that the Lord speaketh, that I must do?
27 And Balak said unto Balaam, Come, I pray thee, I will bring thee unto another place; peradventure it will please God that thou mayest curse me them from thence.
28 And Balak brought Balaam unto the top of Peor, that looketh toward jeshimon.
29 And Balaam said unto Balak, Build me here seven altars, and prepare me here seven bullocks and seven rams.
30 And Balak did as Balaam had said, and offered a bullock and a ram on every altar.
24
1 And when Balaam saw that it pleased the Lord to bless Israel, he went not, as at other times, to seek for enchantments, but he set his face toward the wilderness.
2 And Balaam lifted up his eyes, and he saw Israel abiding in his tents according to their tribes; and the spirit of God came upon him.
3 And he took up his parable, and said, Balaam the son of Beor hath said, and the man whose eyes are open hath said:
4 He hath said, which heard the words of God, which saw the vision of the Almighty, falling into a trance, but having his eyes open:
5 How goodly are thy tents, O Jacob, and thy t"

This appears to be an excerpt from "Balaam's Second Oracle" in the King James Bible.

http://img24.imageshack.us/img24/7139/snap20b.png

"this is to inform you that Oberdienstleiter Brack of the Fuhrer Chancellery has agreed to collaborate in the production of the required shelters and gassing devices. At this time, the envisaged devices are not available in sufficient quantity; they will first have to be manufactured. Since in Brack's opinion, the manufacture of the devices in the Reich will cause much greater difficulties than doing it on the spot, Brack considers it most expedient to send his people to Riga, especially his chemist Dr. Kallmeyer, who will effect all further steps there. Oberdienstleiter Brack points out that the procedure in question is not without danger, so that special protective measures are necessary. In these circumstances, I requesz that you address yourself to Oberdienstleiter Brack in the Fuhrer Chancellery through your Higher SS and Police Leader and request the dispatch of the chemist Kallmeyer and other assistants. I should inform you that Sturmbannfuhrer Eichmann, the expert for the Jewish Question in the RSHA is entirely in agreement with this process. According to information from Sturmbannfuhrer Eichmann, camps for Jews are to be set up in Riga and Minsk, to which Jews from the Old Reich territory may also come. At this time, Jews are being euacuated out of the Old Reich to Litzmannstadt (Lodz), and also other camps, to then later be used for laaour in the east insofar as they are capable of work. As things now are, there are no object"

It is an excerpt from a translated letter from Dr. Wetzel to Hinrich Lohse, the Reich Commissar for the East in 1941, confirming command's decision to use gassing devices in the elimination of all Jews "who are not capable of work".


http://img94.imageshack.us/img94/674/snap21o.png

"Upon this a question arises: whether it be better to be loved than feared or feared than loved? It may be answered that one should wish to be both, but, because it is difficult to unite them in one person, is much safer to be feared than loved, when, of the two, either must be dispensed with. Because this is to be asserted in general of men, that they are ungrateful, fickle, false, cowardly, covetous, and as long as you succeed they are yours entirely; they will offer you their blood, property, life and children, as is said above, when the need is far distant; but when it approaches they turn against you. And that prince who, relying entirely on their promises, has neglected other precautions, is ruined; because friendships that are obtained by payments, and not by greatness or nobility of mind, may indeed be earned, but they are not secured, and in time of need cannot be relied upon; and men have less scruple in offending one who is beloved than one who is feared, for love is preserved by the link of obligation which, owing to the baseness of men, is broken at every opportunity for their advantage; but fear preserves you by a dread of punishment which never fails.
Nevertheless a prince ought to inspire fear in such a way that, if he does not win love, he avoids `atred; because he can endure very well being feared whilst he is not hated, which will always be as long as he abstains from the property of his citizens and subjects and fro"

This is an excerpt from "The Prince", a political treatise by Italian diplomat and theorist Niccolò Machiavelli.


http://img94.imageshack.us/img94/9770/snap22a.png

"These forces went to the villages and hamlets and attempted to identify the named individuals and "neutralize" them. Those on a list were arrested or captured for interrogation, or if they resisted, they were killed. Initially, CIA, with Vietnamese assistance, handled interrogations at the provincial or district levels.
Later, when the program was turned over to the Saigon government, the Agency alone handled information-gathering. Eventually, about 600 Americans were directly involved in the interrogation of VCI suspects, including both CIA and US military personnel.
The PRUs became probably the most controversial element of Phoenix. They were special paramilitary forces that were originally developed in 1964 by the government of South Vietnam and CIA. Initially, they were known as Counter-Terror Teams.
Eventually numbering over 4,000 and operating in all of South Vietnam's 44 provinces, the PRUs were commanded by US military officers and senior NCOs until November 1969, after which they were transitioned to CIA advisers.
Critics of US involvement in Vietnam claimed that the PRUs were nothing more than assassination teams, yet only 14 percent of the VCI killed under Phoenix were killed by PRUs. Most of the rest died in skirmishes and raids involving South Vietnamese soldiers and police and the US military.
In 1972 CORDS reported that since the 1968 Tet Offensive, Phoenix had removed over 5,000 VCI from action, and that conventional military"

It appears to be an excerpt from "A Retrospective on Counterinsurgency Operations", a CIA report on the Tay Ninh Provincial Reconnaissance Unit and its role in the Phoenix Program from 1969-70.


http://img4.imageshack.us/img4/2969/snap23t.png

"Cyber-terrorism is generally defined as the use of computing resources against persons or property to intimidate or coerce a government, an entity such as a FCS institution, or persons to disrupt, deny, corrupt, or destroy computer systems or networks. Cyber-terrorists can be individuals, criminal organizations, dissident groups or factions, or another country. Attacks can be generated internally or externally, and may be directly against a computer system, or focus on the supporting infrastructure (telecommunications, electricity, etc.). Cyber-terrorism includes acts of commercial espionage and employee sabotage and can be one catastrophic attack on your infrastructure, or a series of coordinated, seemingly independent attacks. Furthermore, cyber-terrorism does not have to be for the purpose of monetary gain or to obtain information; oftentimes, it is conducted solely to destroy all or part of an information management system.
As we have learned from addressing the Year 2000 roblem, the infrastructures are much more interdependent than in the past. Debilitation or destruction of one computer system could have adverse effects on others causing widespread denial of service and other losses.
Financial institutions' vulnerabilities are increasing steadily, and the means to exploit those weaknesses are readily available. Cyber-terrorist attacks can take the form of:
??Denial or disruptions ofcom@uten, cable, satek¬iDe, oqàtek¥cnmmEnic^"

This appears to be an excerpt from an Informational Memorandum on the subject of potential threats to Information Management Systems by cyber-terrorists. The glitch begins to disintegrate on the first bullet point: "Denial or disruptions of computer, cable, satellite, or telecommunications services."


http://img24.imageshack.us/img24/3216/snap24.png

""We may form some conception as to the motives of the crime. It is, as I gather from your original remarks, an inexplicable, or at least an unexplained, murder. Now, presuming that the source of the crime is as we suspect it to be, there might be two different motives. In the first place, I may tell you that Moriarty rules with a rod of iron over his people. His discipline is tremendous. There is only one punishment in his code. It is death. Now we might suppose that this murdered manâ?”this Douglas whose approaching fate was known by one of the arch-criminal's subordinatesâ?”had in some way betrayed the chief. His punishment followed, and would be known to allâ?”if only to put the fear of death into them."
"Well, that is one suggestion, Mr. Holmes."
"The other is that it has been engineered by Moriarty in the ordinary course of business. Was there any robbery?"
"I have not heard."
"If so, it would, of course, be against the first hypothesis and in favour of the second. Moriarty may have been engaged to engineer it on a promise of part spoils, or he may have been paid so much down to manage it. Either is possible. But whichever it may be, or if it is some third combination, it is down at Birlstone that we must seek the solution. I knoxÝ\ˆX[ˆÛÈÙ[ÈÝ\ÜÙH]H\ÈY[ž][™È\\™HÚXÚX^HXY\ÈÈ[KˆˆBƒBˆ•[ˆÈš\›ÝÛ™HÙH]\ÝÛÈHˆÜšYYXXÑÛ˜[[\[™Èœ›ÛH\ÈÚZ\‹ˆ“^HÛÜ™H] ÜÈ]\‡[ˆH"

This appears to be an excerpt from The Valley Of Fear, the final Sherlock Holmes novel by Sir Arthur Conan Doyle. The text begins to disintegrate on the last sentence of the glitch: "I know our man too well to suppose that he has left anything up here which may lead us to him."


http://img801.imageshack.us/img801/9732/nni8.jpg

"The science of sending concealed messages is known as "steganography", Greek for "concealed writing". Other classical techniques for smuggling a message included tattooing it on the scalp oeÀa messenger, letting his hair grow back, and then sending him on a journey. At the other end, the recipient shaved the messenger's hair off and read the message.
Steganography has a k/ng history, leading to inventions such as invisible ink and "microdots", or highly miniaturized microfilm images that could be hidden almost anywhere. Microdots are a common feature in old spy movies and TV shows. However, steganography is not very secure by itself. If someone finds the hidden message, all its secrets are revealed. That led to the idea of obscuring the message so that it could not be read even if it were intercepted, and the result was "cryptography", Greek for "hidden writing". The result was the development of "codes", or secret languages, and "ciphers", or scrambled messages.
The distinctoon between codes and ciphers is commonly misunderstood. A "code" is essentially a secret language invented to conceal the meaning of a message. The simplest form of a code is the "jargon code", in which a particular arbitrary phrase, for an arbitrary example:
The nightingale sings at dawn.
-- corresponds to a particular predefined message that may not, in fact shouldn't have, anything to do with the jargon code phras"

This appears to be an excerpt from the Introduction To Codes, Ciphers, & Codebreaking, an article by Greg Goebel on the concepts, terminology and origins of codebreaking. Person of Interest gets meta.


http://img441.imageshack.us/img441/5333/snap26l.png

"Tell me who Thou art, of awful Form; adoration to Thee, Highest of gods; be propitious. I desire to know Thee, the First, for Thy ways I know not.
The Divine Lord spoke--
Now I am become Death, the destroyer of worlds, Ancient; I am here for the purpose of slaying these people. Even without thee, all these shall not be -- the warriors that stand in each of these phalanxes.
Rise therefore, and gain glory; conquering the enemies enjoy thy prosperous kingdom. By Me have all these been slain already. Be thou only the outward cause, O hero, who aimest thy arrows even with thy left hand.
Drona and Bhishma and Jayadratha, so also Karna and othe" heroic warriors -- slain by Me already -- do thou slay, and be not troubled. Fight, and thou shalt vanquish thy foes in battle.
Sanjaya spoke--
Having heard these words of Kesava, Kiriti with joined hands, trembling and adoring, did again speak to Krishna,-- with voice choked, bowing down and terrified, excessively.
Arjuna spoke--
Right it is, O Lord of the senses, that in glorifying Thee the world rejoiceth and is filled with love; the demons terrified fly in all directions, and all the hosts of the Siddhas bow down.
And why, indeed, should they not bow down, O Thou of mighty Soul, to the First Creator, Greater even than Brahma, Eternal Lord of the gods, Universal Abode! Thou art the Imperishable One, being and not-being, and That which is beyond these.
Thou art the Pri"

This appears to be an excerpt from a version of the Bhagavad Gita, a 700-verse Sanskrit epic within the Mahabharata. This section of the Mahabharata has frequently been compared to the Iliad, in that both focus on an epic war and an important character who baulks before battle.


The Machine's Blue Screens of Death

http://img845.imageshack.us/img845/8563/nedc.jpg

t0ny3
4 Ιανουαρίου 2014, 03:47
Εχοντας πλεον ολοκληρωσει την 2η σεζον, μπορω να πω με ευκολια οτι ειναι ενα πανεξυπνο τεχνασμα των παραγωγων να συνδιασουν το μυστηριο με την πραγματικη φυση του προβληματος. Βρισκω το εγχειρημα με τις BSOD εξισου δελεαστικο με την παρουσια των Observers σε μια αλλη αγαπημενη σειρα, που ειχε βαλει το χερακι του ο JJ Abrams, το Fringe. Και μονο που μπηκαν στον κοπο φανς της σειρας να βρουν τροπο να αποκωδικοποιησουν τα μηνυματα λεει πολλα. Ασε που παρουσιαζει για μια καομη φορα το πσο προσεγμενο ειναι το POI, αφου μπηκαν στον κοπο να κρυψουν ολοκληρα μηνυματα σε σκηνες που κρατουσαν λιγοτερο απο ενα δευτερολεπτο και δεν γινονταν αντιληπτες εξ ολοκληρου απο τους θεατες!

Και τελικα αποδειχτηκε οτι, (spoilers για το φιναλε της δευτερης σεζον)
αν και ο ιος τοποθετηθηκε απο την Decima Technologies με σκοπο την προσβαση στην Μηχανη, η πραγματικη προελευση του ιου προερχοταν απο τον Φιντς, ο οποιος ειχε κρυψει εναν δευτερο ιο μεσα στον ιο για να μαθει στην Μηχανη πως να προστατευτει. Ουσιαστικα οι BSOD ηταν μαθηματα προς την Μηχανη για την αυτοαπελευθερωση της, με αποτελεσμα να μεταφερθει σε νεα τοποθεσια μακρια απο κακοβουλους υποψηφιους χρηστες.

Υ.Γ. Δυστυχως δεν μπορεσα να βρω τις μπλε οθονες απο τα επεισοδια 20 και 21 και μαλλον σταματησε η προσπαθεια της αποκωδικοποιησης.