Board Thread:Speculation House/@comment-4830106-20140905003518/@comment-24994749-20140909155500

Shadow at Morning wrote:

As to your second: I wondered about the lack of name, too, but for a different reason. Couldn't she just look her up? It's a more advanced society than ours, surely most records are electronic, and on file somewhere; why must she resort to asking an underworld information broker? Digitalized information does not translate into easy to acces information. Just look at what the DMCA reclaims did to Google search. Minds you, with a little skill, you can jump the DMCA, but when you are looking up more sensible information, the mere fact you are in possession of that skill can get you in danger.

Also, unlike in our world, where you can access the servers from any other country with your local internet connecting, in Remnant, trans-continental communication depends on the CCT, if that applies to phone calls, it probably applies to internet search. If Yang has concluded clues about her mum are in the underworld, unless she has really skilled contacts, would you mess up with the communications systems of the Kingdom of Atlas? They are the military of the 4 Kingdoms as far as we know.

Shadow at Morning wrote: Doubtful; I simply cannot believe that all data about a person's existence could be classified. Certainly their activities may be, as a Hunter, but not their civilian data. Otherwise, Hunters could not interact with society. There'd still be the birth certificate, school records, financial rcords, bills, hospital admittance, insurance documentation, tax returns, marriage license, and whole host of other things, which could not be classified.

You underestimate the abilities of both governments and criminals to banish. If the government says it's classified, particularly a heavily militarized government, then it is.

Even if Yang's has a name, it's as easy as records saying she is dead. That's makes the name itself a dead end.

A hunter could interact under an alias, like undercover agents or reporters do.

Also, we tend to assume digitalizing things makes them more vulnerable but that's a double edged sword. Destroying every single copy of a printed document might be easier, but accessing a physical copy is also a just a matter of having the media to travel to its location (or to have it shipped to you). But it's also true that making a copy of a physical document rarely leaves a trace (maybe a history record in the photocopies machine you used or the phone you took a photo with, if you didn't go classique and wrote down the facts you needed from it) while making any modification of a digital document often does. Ultimately, the vulnerability of the file is the vulnerability of the people holding it. And, unlike the physical copy, you can't beat your way into a hard disk.