The Void operates through ephemeral gateways distributed across transient network locations. I, The Administrator is in charge of this place and it's core structure. If you're here it means you already know how to get into The Void, in that case I will not go into detailed explanation on the topic.
Connection
Like previously stated, the topic will not be expanded on to reduce the time required to read this page. The connection is established through gateways, they give you a "key" required to access The Void, which you can do through the console. Be aware that both the keys and gateways are temporary and will expire after a certain amount of time has passed. If you're already connected to The Void, the expiration of the key will not affect your already established connection, but it will prevent you from further distribution of the key.
Encryption Protocols
The Void offers four encryption tiers to suit your needs. Each protocol balances security, performance, and risk. Choose wisely, as your selection determines not only your safety but also your visibility in The Void.
- Leviathan (128-bit) - The Leviathan is a lightweight encryption protocol designed for casual browsing. It provides basic protection against casual snooping and IP masking through a 3-layer proxy chain. While it ensures fast connection speeds and minimal latency, it offers no defense against advanced surveillance or state-level decryption efforts. Use Case: Ideal for light browsing, reading public forums, or accessing non-sensitive archives.
- Tiamat (256-bit) - The Tiamat protocol offers strong encryption with moderate latency. It employs rotating MAC addresses and neural network-generated cipher patterns to thwart deep packet inspection and metadata harvesting. While it provides robust security, it may trigger basic anomaly detection systems and is theoretically vulnerable to advanced decryption methods used by some national security agencies. Use Case: Recommended for deeper browsing, private messaging, and accessing restricted Void marketplaces.
- Apep (512-bit) - Apep is a high-security protocol built for those venturing into the Void's most dangerous corners. It uses decryption-resistant lattice-based cryptography and reroutes traffic through 7 global nodes to ensure anonymity. However, its high bandwidth usage and latency make it hard for casual browsing. Be aware that the high bandwidth going through the global nodes could be detected and exploited by other users of the Void for targeted attacks. Use Case: Best for high-stakes transactions, accessing the deep parts of the Void, or exploring dangerous sites.
- Seraphim (1024-bit) - Seraphim is an experimental, extreme-protection protocol designed for the bravest explorers. It employs post-quantum encryption and live network migration across 14 global satellites. While it offers unparalleled security, it is highly unstable, prone to crashes, and almost guaranteed to attract the attention of global surveillance systems. Use Case: Reserved for accessing Ω-tier documents, emergency data extraction, accessing the core parts of the Void, or [NULLIFIED]. Use at your own risk.
Your choice of encryption determines not only your safety but also your visibility. Stronger protocols offer greater protection but shine a brighter light in the darkness. Always enable ALICE-7 AI protection unless you are prepared to face the consequences of raw, unfiltered exposure to the Void's most dangerous elements.
Network Hazards
The Void is not merely a network, it is a hostile ecosystem. Below are threats you may encounter. Hover over the text to learn more.
- Memetic cognitohazards
- User-Led Attacks
- <NULLBREAKERS>
- Reality Distortion Events (RDEs)
All user connections are protected by ALICE-7, which automatically filters hazardous content and enforces perceptual quarantine protocols.
WARNING: Disabling AI protection may result in irreversible psychological damage, ontological corruption, or permanent neural dissociation.
Oblivion and Archives
You might have noticed 2 tabs in the navigation bar called oblivion and archives, these were created for documentation and archiving important data. Oblivion is where you can find logs, broadcasts, reports and even my personal reflections. Oblivion documents have 4 tiers of clearance:
- Abaddon - Easy to access (most likely listed in the oblivion tab) and available to everyone.
- Asmodeus - Needs to be found and is available to most.
- Belial - Requires special permission.
- Ω - Only available to selected few.
The archives on the other hand contain files and links to important data. The access to archive files have the same tiers of clearance as oblivion documents, also following the same rules.
Administrator's Note
The Void is not a playground. It is run by user generated websites with no censorship unless ALICE-7 is enabled. What you find here cannot be unfound. What you learn here cannot be unlearned. Proceed with caution or do not proceed at all, we do not want another incident.