Episode Transcript
Available transcripts are automatically generated. Complete accuracy is not guaranteed.
Speaker 1 (00:05):
This is data Specialist standards of the Data Redundancy Project
SEP six thirty five. Object class is EUCLID Special containment procedures.
All redacted volumes of SEP six thirty one DASH one
are to be kept in a dedicated library room at
site redacted with a climate controlled environment maintaining a constant
thirteen degrees celsius and a humidity of between thirty five
(00:29):
percent and forty five percent. HVAC systems shall use hepafiltration
to keep atmospheric contaminants to a minimum. Lighting exposure to
contained objects shall be limited to fifty lucks a day.
Experiments on original volumes of SEP six thirty five DASH
one are discouraged due to their fragility and will only
be approved in an attempt at recovery of lost data.
(00:51):
A digital copy of the text of SCP six thirty
five DASH one is available in standard encrypted format for
research purposes with levels three approval. Personnel exposed to SEP
six thirty five DASH one's text must be quarantined on
site until all symptoms of exposure cease, generally seventy two
hours after exposure. Such personnel must only be provided with
(01:14):
tools and or equipment as part of a controlled experiment
in a secure environment. Instances of SCP six thirty five
DASH two and DASH three are to be contained in
secure rooms with armoured walls and disassembled when no longer
being used for testing. Any instance of SEP six thirty
five DASH four or greater is to be treated as
(01:36):
an imminent containment breach and be neutralized immediately via procedure
KPEC OMEGA six thirty five description. SEP six thirty five
DASH one is a set of illuminated manuscripts dating from
the thirteenth century, recovered by doctor Hs of Redacted University
from the ruins of the Redacted Monastery in Ireland in
(01:58):
August of eighteen Redawe. The manuscripts came into Foundation custody
thirty six years later in nineteen Prodacted, a decade after
doctor S's dismissal from the university, four data expunged. Upon
investigating those reports, Foundation agents discovered the main building of
the estate partially disassembled. In addition to SCP six thirty
(02:21):
five DASH one, agents recovered inner instances of DASH two,
inner instances of DASH three, and several rusted pieces of
machinery that may have been an attempt at constructing an
instance of DASH four Sep. Six thirty five. DASH one
is written in a combination of Latin and a previously
unknown script that relies on numerical and logical elements similar
(02:43):
to a modern computer programming language. The first volume is
a primer in Latin introducing the various elements of this script,
and as the text progresses, the Latin is slowly displaced
until the second volume is almost entirely in this novel language.
The volume's increase in complexity until volume redacted. The text
consists of solid blocks of numerical data that has undergone
(03:06):
an extremely efficient compression algorithm. If a subject with a
rudimentary understanding of Latin begins reading volume one of DASH one,
they will experience a growing reluctance to discontinue that is
proportional to their general intelligence, reading comprehension, problem solving aptitude,
and mathematical ability. Those with computer science or engineering degrees
(03:29):
seem most susceptible. If the subject is allowed to continue reading,
they will finish the first redacted volumes of DASH one
in approximately twelve hours. Note. Post exposure interviews reveal that
long term retention of material read during this period is minimal.
When asked to explain what they've read afterward, most subjects
only report a general impression of something really cool. After
(03:52):
completing the first redacted volumes of DASH one, subjects will
enter a fugue state where they will stop reading and
immediately search for tools and material to start construction of
an instance of SCP six thirty five Dash two. Note,
post exposure interviews reveal that subjects are conscious and aware
during this period and report that they felt a strong
desire to try some of this stuff out. Design and
(04:15):
materials used in the construction of DASH too will vary
based on the aptitude of the subject and materials and
tools available. However, a SP six thirty five DASH two
will always be built with a method to input the
text of volume redacted of DASH one. Subject will continue
to construct dash tobs and inputting DASH one's text to
(04:36):
the best of their ability until succumbing to exhaustion. If
appropriate tools and materials are not available, this fugue state subsides,
but the subject will feel a strong compulsion to make
a backup copy of DASH one's text for safe keeping.
Note in this instance, it is recommended to allow subject
to make an archive copy of the digital file to
cite redacted secure on site data warehouse. Failure to do
(05:00):
this may result in a security breach. Instances of dash
too are robots with varying means of manipulation and data storage.
About fifty percent of instances constructed proved to be viable
and autonomous. If a dash tobe built by a subject
proves viable, it will immediately begin construction of another DASH
two based on its own design. Copies tend to be
(05:23):
imperfect and have flaws, and about eighty percent of tests
have ended with less than three viable dash toos before
the machines run down and become inert. In the redacted
percent of cases where more than rected viable dash tobs
have been created, the dash tobs will change behavior and
build an instance of DASH three, a substantially more advanced
(05:43):
robot that will have the capability of retrieving data from
the remaining volumes of DASH one. Once it retrieves what
data it can, a DASH three is able to organize
and direct dash tos and prevent them from prematurely powering down.
Left unchecked, wid will disassemble elements of the surrounding environment
for raw material for more robots. Once two or more
(06:06):
viable Dash threes are active, all robots will begin assembly
of a DASH four. A viable Dash four will data expunged,
and it is unclear if this is due to hostile
intent or from data corruption to the content of Dash
one due to age. You can get all my episodes
(06:29):
add free at patreon dot com slash f f O
d PO d