Devious16 wondered why time existed…. if time existed at all.

He attached the power pack to the modified rotary assault rifle. He switched it on, pressed the trigger and the disk above the weapon hissed, spinning at two thousand and a half meters per second. He saw intense yellows and reds swirling across his blurred vision. He saw blues and greens turn to grey.

Continue reading “Devious16”



This old internet that we are currently using is a dysfunctional mess that has been held together by various patches and updates over the years. Despite being a vital part of our daily lives, it is plagued by numerous issues such as slow loading times, security vulnerabilities, and rampant misinformation. Since its inception in the twentieth century, this outdated and clunky internet still exists, but it will be viewed as an antiquated relic of the past. No one in their right mind would choose to use it when faster, safer, and more efficient alternatives are readily available.


Meganat‘s private internet, which was designed and deployed by Jim Dochersky, is a revolutionary service that utilises low-earth-orbit satellites to connect paying customers. This technology allows for unprecedented speed and reliability, making it an ideal solution for individuals and businesses that require high-speed internet access in remote areas or regions with limited infrastructure.

Unlike traditional internet providers, Meganat’s private internet is not dependent on terrestrial infrastructure, which can often be costly and difficult to maintain. Instead, the service uses a network of satellites to deliver high-speed internet directly to customers’ homes or offices. This means that even those living in rural areas or regions with limited infrastructure can enjoy fast and reliable internet access, making it easier to work, study, and stay connected with friends and family.

The low-earth-orbit satellites used by Meganat’s private internet are positioned much closer to the earth than traditional satellites, which makes them faster and more efficient. This means that customers can enjoy faster download and upload speeds, as well as a more stable connection, even during peak usage times. Meganat’s private internet is a game-changer for those who require high-speed internet access in remote areas or regions with limited infrastructure. With its innovative use of low-earth-orbit satellites, the service provides fast and reliable internet access that is unmatched by traditional providers.


This closed Wide-Area Network (WAN) is a highly secure and private internet network that is exclusively used by governments and corporations for their internal communication needs. This network is designed to provide a high level of security and privacy to ensure that sensitive information and data are not leaked or compromised in any way. One of the key features of a closed WAN is that it is a closed system that is not connected to any public internet and every user is authenticated. This means that it is not accessible to the general public, and only authorized personnel within the government or corporation or domestic premises can access it. This ensures that the network is not vulnerable to external threats such as cyber-attacks, which are becoming increasingly common in today’s quantum age.

Ambercast is also designed to be highly scalable, meaning that it can handle large volumes of data traffic with ease. This is essential for governments and corporations that need to transfer large amounts of data quickly and efficiently. A closed private WAN is an essential tool for any government or corporation that needs to communicate sensitive information and data securely and privately. It is the first line of defence against external threats and provides a reliable and efficient means of communication within the organization.


A peer-to-peer, NearMe-Area-Network is a cutting-edge technology that enables seamless communication between devices in close proximity. This open internet technology utilizes handsets that act as relay mesh stations for communication traffic, allowing for the creation of a highly efficient network that can transmit data at lightning-fast speeds. The beauty of this technology lies in its ability to harness the power of nearby devices to enhance network coverage and speed. The more devices in the vicinity, the faster and deeper the coverage, making it an ideal solution for densely populated areas such as cities.

This technology is particularly useful in situations where traditional network infrastructure is unavailable or unreliable. For example, in the aftermath of a natural disaster or during a large-scale event, communication networks may become overwhelmed or even fail completely. In these situations, a peer-to-peer, NearMe-Area-Network can provide a reliable means of communication, allowing people to stay connected even when traditional networks are down.

One of the greatest benefits of this technology is that it is highly scalable. As more devices are added to the network, the coverage and speed of communication increase proportionally. This makes it an ideal solution for businesses or organizations that require a flexible and adaptable communication system.
Episoft represents a significant step forward in the world of communication technology. Its ability to provide reliable, high-speed communication in even the most challenging environments makes it a valuable tool for anyone looking to stay connected in an increasingly connected world.


This skilled hacker has a unique way of navigating the internet. They have mastered the art of using internet funnels, which allows them to navigate through existing communication networks seamlessly. By employing a sophisticated dryware system, they are able to create multiple branches between different communication networks, making it easier for them to access the information they need.

The use of dryware technology is crucial to this hacker’s success. It allows them to create a virtual web of connections that can quickly and efficiently link different networks together. This technology is also highly secure, ensuring that the hacker’s identity and location remain hidden at all times. The branches created by hackers between different communication networks establish connections between disparate systems, allowing them to access information that would otherwise be difficult to obtain. This is particularly useful when the hacker is trying to gain access to sensitive information, such as financial data or classified government documents.

Despite the challenges posed by the ever-evolving landscape of cybersecurity, The Agree Tree remains at the forefront of pirate and free access to information. Their ability to create complex networks of communication channels and navigate through them with ease is truly remarkable. With the continued development of dryware technology and other advanced tools, hackers are sure to remain a force to be reckoned with in the world of cybersecurity.

Black Market

*first published on writerscafe

“I am pleased to announce that we have slain the dragon.”

All the enthusiastic MercurEx employees gathered around the trading oval and cheered. James Tucker had hoped for this type of reaction.

He needed them to know how much he valued their support.

He wanted them to trust him again.

He wanted to trust them back.

“The hypergoblin incursion has been neutralized. It seems we have become experts at killing these things.”

Continue reading “Black Market”

Supernations, Mega City-States and Virtual Countries

Writing science fiction gives an author the opportunity to have a go at predicting the future. For me, the best tool I always find useful is this; in order to build a world in which to set the novel, you start by going back into history. ‘To see the future, one must look into the past’ and follow the trends. In the case of ‘A Hostile Takeover,’ I began by asking ‘What is a nation? A state? A country?’ and then went on to research different types of sovereign nations throughout history. I followed the trends and discovered the future of the world’s political landscape is obvious and surprising. The one prediction that seems most definite among all the others is that the nation-states we live in today are not static, rigid institutions, but evolving, changing political creatures.

Continue reading “Supernations, Mega City-States and Virtual Countries”

Why we have the Five Internets

“This is why we have five internet platforms right now. When hacker/pirates created the Angry Tree Protocol it hamstrung the original Cobweb. Two secure, private networks emerged from the anarchy. One using optical technology, the other satellite based, they tried to monetise information to the point of squeezing the average citizen out of the educational loop. Next thing you know, Episoft’s peer to peer system gives free access back to the people. Not as good as Definition+ as provided by Satnet and Ambercast, but I invested my clients money in them anyway. Look at them now.”

James Tucker, CEO of MercurEx


Superzoids die Superquick

“As a new generation adapts to the new oral technology, literacy rates are set to plunge within the next two decades. Already the cheaper manifestations of zoids have made it unnecessary for a vast number of humans to read or write. With the cost of education skyrocketing, the use of language will inevitably devolved into what it was millennia ago.”



Reform or Die

“I think we in the Old West had a few decades to improve the economic model and failed to do so, so now we have lost the game.” – zassygirl19

“All of the end of the world scenarios such as economic collapse will be in response to the government’s actions. The government is the biggest threat to the city-state especially when you have people like Edwards and Dochersky in positions of power with virtually no oversight. The Senate would not dare challenge Dochersky.” – 060Prepper090

“If we don’t do something soon, the shit will be over for the type of social-capitalism that many of us have lived through and thought was the best type of capitalism.” – zanzara2141 



When the acquisition is a new appendage to your existing company… Run it in person! Put your own people in there! Weaken the stronger powers within the firm! Keep the weak powers weak.

James Tucker – CEO of MercurEx, 25 RULES FOR THE MODERN UBERMAN


To ensure that the acquisition is successful, it’s important to run the business in person. Putting your own executive team in the new company will allow you to maintain control and create a stronger bond between the two organisations.

Additionally, it’s important to weaken the stronger powers within the firm and keep the weaker powers weak. Doing so will prevent any single legacy group from gaining too much control, allowing the company to remain secure and successful.