• 2 Posts
  • 604 Comments
Joined 11 months ago
cake
Cake day: June 30th, 2023

help-circle


  • The black guy is Yasuke, a historical figure who fought as a samurai for Oda Nobunaga. While it’s pretty stereotypical, it’s also accurate to have Yasuke as the combat character if they’re splitting combat and stealth. I mean, it’s also pretty stereotypical to have a woman as the stealth character, which they’ve basically already done twice. Elise in Unity, while non-playable, was decidedly less combat focused and more stealthy and diplomatic while Arno fought. In Syndicate, Elise was the stealth character and Jacob was the combat character.

    In short, it’s probably less that he’s black and more that the formula has the man be the combat character and the woman be the stealth character.


  • They did that in the first game, actually. The apple and other artifacts were always tech left behind by an extinct “first civilization,” later named the Isu. Part of the series’ problem is that the actually interesting ideological conflict between the Assassins and the Templars was put on hold to explore increasingly elaborate Isu junk after Desmond was killed off.











  • The limit is c because you have to use cables, radio, or other traditional methods to send the key. The data in the entangled pair would also have to be set at the time the two devices are constructed, so that’s not super useful. It might be useful for single use authentication, but that’s about it.

    Don’t think of entanglement as being like one object in two spots. Think of it like identical twins. One twin getting a hair cut does nothing to the other twin’s hair. Similarly, altering a property of one entangled particle does nothing to the other and actually means they are no longer entangled or identical.


  • Quantum entanglement communications also have fundamental problems that will likely render them effectively unusable. You need a key to decrypt anything you send, and the key has to travel no faster than c. It’s impossible to tell the data from the noise without the key. Attempting to read the data or to change the data being sent also collapses the effect, which can only be fixed by bringing the two systems together. In short, you can only send a single packet of data and you can’t use it without a key transmitted using traditional methods.