{"id":274,"date":"2023-08-05T19:23:22","date_gmt":"2023-08-05T19:23:22","guid":{"rendered":"https:\/\/www.hexkey.co.uk\/lee\/?p=274"},"modified":"2023-08-05T20:11:24","modified_gmt":"2023-08-05T20:11:24","slug":"person-of-interest-s3e17","status":"publish","type":"post","link":"https:\/\/www.hexkey.co.uk\/lee\/log\/2023\/08\/person-of-interest-s3e17\/","title":{"rendered":"Person of Interest S3E17"},"content":{"rendered":"\n<p>Notes for season 3 episode 17, &#8220;<a href=\"https:\/\/personofinterest.fandom.com\/wiki\/Root_Path_(\/)\" data-type=\"URL\" data-id=\"https:\/\/personofinterest.fandom.com\/wiki\/Root_Path_(\/)\">Root<\/a>&#8220;<\/p>\n\n\n\n<p>0:42 The Machine notes the Samaritan backup as being on LTO-4 \/ 256-bit AES-GCM (even though, as established, the props aren&#8217;t LTO).<\/p>\n\n\n\n<p>03:00 While we imagine Reese&#8217;s off-screen activities might involve walking the dog, cleaning his guns, and developing a &#8220;tier list&#8221; of New York bakeries, it&#8217;s clear that Root&#8217;s been doing something between a gig-app job and video game speed-run for a while now. Working to avert the deployment of an unconstrained ASI&#8230; the opposite of her motivation in the second season.<\/p>\n\n\n\n<p>03:12 Root recovers a discarded sales receipt with a signature, but presumably it could have been found online by the Machine?<\/p>\n\n\n\n<p>04:00 NCSA is most famous internationally for the HTTPd web server (a precursor to Apache) and Mosaic web browser (a precursor to Netscape, although not in terms of actual code).<\/p>\n\n\n\n<p>11:56 Root airdrops an erectile disfunction pill spam image to Finch&#8217;s phone. An unsolicited dick-pill pic.<\/p>\n\n\n\n<p>14:55 Finch has determined that the pharma-spam image included a hidden message (likely using least-significant bit steganography) by comparing it to other examples of the image online. But that the message is encrypted&#8230; although <em>somehow<\/em> he knows it&#8217;s a running key cypher. (Encryption works very much according to the needs of the plot in the PoI universe.)<\/p>\n\n\n\n<p>15:10 The Machine&#8217;s cryptic message prompts Finch to realises it&#8217;s a book-code referencing&nbsp;<a href=\"https:\/\/en.wikipedia.org\/wiki\/Democracy_in_America\" data-type=\"URL\" data-id=\"https:\/\/en.wikipedia.org\/wiki\/Democracy_in_America\">de Tocqueville<\/a>. At this point you&#8217;d think he&#8217;d bulk check anything related to the American Revolution.<\/p>\n\n\n\n<p>18:38 &#8220;What kind of janitor needs a background check?&#8221; asks the former CIA operative. Uh, is it any janitor with physical access to commercially sensitive, valuable, dangerous, or classified material?<\/p>\n\n\n\n<p>18:54 The Machine notes the voiceprint source as &#8220;MIL-SPRC MITBR&#8221;, which I assume is a typo for MBITR &#8211; ie the AN\/PRC-148 radio featured in a season one episode. The <a href=\"https:\/\/www.urbandictionary.com\/define.php?term=mitbr\" data-type=\"URL\" data-id=\"https:\/\/www.urbandictionary.com\/define.php?term=mitbr\">search engine result I got for MIRBR<\/a> was unhelpful.<\/p>\n\n\n\n<p>21:27 Root&#8217;s FBI agent alias is &#8220;Augusta A King&#8221; (the married name of Ada Lovelace).<\/p>\n\n\n\n<p>25:37 The Decima agent is holding a prop that looks like a handheld RF jammer, but usually you&#8217;d expect it to have more than one antenna to cover different frequency ranges. So it&#8217;s probably a specific-use jammer &#8211; for GPS or wifi.<\/p>\n\n\n\n<p>27:17 It&#8217;s reasonable, if not a bit ironic, for Collier to complain about the use of drones for assassination and the imprisonment of people without due process.<\/p>\n\n\n\n<p>30:09 Presumably Root is requesting that Finch adds a custom RF receiver into a cochlear implant (presumably the external part).<\/p>\n\n\n\n<p>35:54 Seems like a poor design for a retinal scanner lock if you have to mash your face up against it.<\/p>\n\n\n\n<p>37:51 I guess Decima&#8217;s single antenna jammer doesn&#8217;t cover the Machine&#8217;s frequency. Should&#8217;ve sprung for the multi-antenna multi-frequency setup?<\/p>\n\n\n\n<p>38:00 The prototype NSA computer hangs like a chandelier or stalactite. You actually see this in quantum computers like the IBM Q. The reason, beyond anime aesthetics, is that they often operate inside <a href=\"https:\/\/arstechnica.com\/science\/2018\/03\/ars-visits-ibms-quantum-computing-lab-but-finds-no-cats-trapped-in-boxes\/\" data-type=\"URL\" data-id=\"https:\/\/arstechnica.com\/science\/2018\/03\/ars-visits-ibms-quantum-computing-lab-but-finds-no-cats-trapped-in-boxes\/\">cooled metal cylinders<\/a>, and it&#8217;s apparently easier\/safer to lower the cylinders to access the machinery than it would be to raise it.<\/p>\n\n\n\n<p>39:30 Decima&#8217;s anti-forensics efforts amount to just setting fire to their computers.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Notes for season 3 episode 17, &#8220;Root&#8220; 0:42 The Machine notes the Samaritan backup as being on LTO-4 \/ 256-bit AES-GCM (even though, as established, the props aren&#8217;t LTO). 03:00 While we imagine Reese&#8217;s off-screen activities might involve walking the dog, cleaning his guns, and developing a &#8220;tier list&#8221; of New York bakeries, it&#8217;s clear [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[6],"tags":[7],"class_list":["post-274","post","type-post","status-publish","format-standard","hentry","category-notes","tag-person-of-interest"],"_links":{"self":[{"href":"https:\/\/www.hexkey.co.uk\/lee\/wp-json\/wp\/v2\/posts\/274","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.hexkey.co.uk\/lee\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.hexkey.co.uk\/lee\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.hexkey.co.uk\/lee\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.hexkey.co.uk\/lee\/wp-json\/wp\/v2\/comments?post=274"}],"version-history":[{"count":2,"href":"https:\/\/www.hexkey.co.uk\/lee\/wp-json\/wp\/v2\/posts\/274\/revisions"}],"predecessor-version":[{"id":276,"href":"https:\/\/www.hexkey.co.uk\/lee\/wp-json\/wp\/v2\/posts\/274\/revisions\/276"}],"wp:attachment":[{"href":"https:\/\/www.hexkey.co.uk\/lee\/wp-json\/wp\/v2\/media?parent=274"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.hexkey.co.uk\/lee\/wp-json\/wp\/v2\/categories?post=274"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.hexkey.co.uk\/lee\/wp-json\/wp\/v2\/tags?post=274"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}