The Net: Hacking, Mesh Networks, and Virtual Reality

The Net is not one thing. It is a layered architecture of interconnected systems, built over decades by competing interests, held together by standards that nobody fully enforces and protocols that everyone extends for their own purposes. At the bottom, it is infrastructure: relay stations, fiber runs, orbital transmitters, and the interstellar communication network that connects colony worlds at the speed of a jump-capable courier drone. At the top, it is the overlay that two-thirds of the population sees whenever they open their eyes.

Helix Technologies built the foundational architecture and still operates the largest share of Net infrastructure in Terran Occupied Space. But the Net outgrew any single owner decades ago. Every IPC runs its own systems on top of the common infrastructure. Every colony maintains local networks. And below the official layers, a parallel ecosystem of unauthorized networks, encrypted channels, and improvised infrastructure serves everyone who cannot afford or cannot risk the corporate version.

Architecture

The Relay Network

Interstellar communication does not travel faster than light. There is no ansible, no subspace radio, no way to send a message from Sol to Tau Ceti without physically carrying it across the gap.

The relay network is the interstellar postal system. Automated courier drones (small, unmanned, jump-capable vessels) carry compressed data between star systems on scheduled routes. A message from Earth to Covenant at Tau Ceti takes approximately 9 days via relay. A message to the Frontier takes weeks. A message to a deep- space survey station may take months, if a relay route exists at all.

The UTCA maintains the master relay schedule and licenses relay frequencies. The IPCs operate the relay drones. The practical result is that interstellar communication is asynchronous, expensive, and controlled by the entities that own the hardware.

Real-time communication between star systems does not exist. Every colony world is, in information terms, an island connected to the rest of human civilization by a slow, expensive, and censorable channel. This shapes everything about colonial society from governance (you cannot micromanage a colony you cannot talk to in real time) to culture (every colony develops its own Net content ecosystem) to resistance (a message suppressed at the relay can be erased from the interstellar record).

In-System Networks

Within a star system, communication is electromagnetic and subject to light-speed delay (negligible within a planetary system, noticeable for outer-system operations). In-system networks connect orbital platforms, surface settlements, ships, and the local infrastructure into a coherent communication fabric.

Each colony world operates its own in-system Net: a self-contained network that connects to the interstellar relay system at designated gateway nodes. The local Net carries the colony’s internal traffic: communications, commerce, governance, entertainment, surveillance, and the thousand other data streams that a functioning settlement generates.

Mesh Networks

A mesh is a local-area network: a building, a facility, a city block, a ship. Meshes are the basic unit of network architecture. Everything connects to a mesh, and meshes connect to each other through the broader Net.

Every business, every residence, every vehicle, every piece of infrastructure runs on a mesh. The mesh controls access, authentication, environmental systems, lighting, door locks, surveillance, inventory: everything that a connected environment needs to function. A mesh has its own processing, its own storage, its own security. It is a small kingdom of data, and the entity that controls the mesh controls the environment.

Corporate meshes are hardened: encrypted, monitored, defended by automated security systems, and staffed by dedicated Net security teams. Breaking into a corporate mesh is a professional undertaking with professional consequences.

The public tangle is what everything else runs on. Public infrastructure, civilian communications, commercial transactions, entertainment, and social interaction all share the tangle: a chaotic, surveilled, throttled, advertising-saturated mess of interconnected public meshes and open networks. The tangle works. It is not pleasant. It is the digital equivalent of public transit: functional, overcrowded, and designed to remind you that better options exist for people who can pay.

Interface Methods

How a person connects to the Net determines what they can do on it. The interface method sets the ceiling.

Overlay

The default experience. A cortical mesh processes data from the local network and projects it onto the user’s visual cortex as an augmented-reality layer over physical perception. Navigation markers, identification tags, message notifications, financial transactions, ambient advertising, and environmental data appear as visual elements integrated into the user’s view of the world.

Overlay interaction is passive and ambient. The user sees the data. They interact with it through subvocal commands, eye tracking, or gesture, depending on their hardware and preference. They remain fully present in the physical world. Walking, talking, working, fighting. All normal. The overlay is a heads-up display, not an alternate reality.

For most people, this is the Net. They have never experienced anything deeper, and they do not need to.

Terminal

A physical device (a deck, a console, a portable terminal) that provides a richer interface than overlay alone. Terminals display data on screens or project it onto surfaces, accept keyboard and voice input, and run software that the cortical mesh does not have the processing capacity to handle.

Decks are the workhorse. A standard deck is a portable computer roughly the size of a thick book: a processor, a holographic display, a physical input surface, and enough connectivity to interface with local meshes and the broader Net. Decks are the tool of choice for Net professionals: analysts, administrators, developers, security personnel, and hackers who prefer not to put their brains on the line.

A person using a deck is working the Net through a screen. They see more than an overlay user. They can do more. But they are still outside the system, interacting through an abstraction layer. For routine work, this is sufficient. For deep network operations, it is a limitation.

Immersion

Full sensory immersion: the user’s consciousness projected into a digital environment rendered by the cortical mesh and processed by the local network. The physical world fades. The digital environment becomes the primary sensory experience. Sound, sight, spatial orientation, and in high-fidelity systems, touch and proprioception are replaced by rendered equivalents.

Immersion requires a deep-dive interface (neural hardware beyond the standard cortical mesh) and ideally a support rig: a reclining cradle that monitors vital signs, maintains hydration, and can disconnect the user if biometric readings indicate distress. The rig is not required. Immersion without a rig means the user is lying on a floor somewhere with no awareness of their physical body, no monitoring, and no safety cutoff. People do it. People die doing it.

Immersion is how serious Net work gets done. The environment is rendered by the mesh or facility the user has entered. Each mesh has its own visual logic, its own geography, its own rules. Corporate meshes render as clean, structured spaces. Public networks render as chaotic, crowded, ad-saturated landscapes. Military and security meshes render as hostile environments designed to disorient intruders.

The user is represented by an avatar: a digital persona that can look like anything. Avatar design is an art form, a social signal, and a disguise simultaneously. What your avatar looks like says something about who you are, who you want to be, or who you want others to think you are.

Immersion States

The depth of immersion determines the tradeoff between capability and vulnerability.

Surface. The shallowest immersion state. The overlay is active and enriched (more data, faster processing, better rendering), but the user remains aware of physical surroundings and can move and act normally. Surface immersion is distracted, not displaced. Useful for casual Net interaction, light data work, and social environments. Limited capability for deep system interaction.

Submerged. Deeper immersion. Physical awareness is suppressed but not eliminated. The user can speak, sit, and maintain position but cannot move effectively or respond quickly to physical threats. The digital environment is the primary experience. Most professional Net work (data analysis, system administration, routine security operations) happens at submerged depth. The user is vulnerable but not helpless.

Torpor. Full immersion. The user is unconscious for all practical purposes (their body is inert, their awareness is entirely within the digital environment), and their only connection to the physical world is the biometric monitor on their rig (if they have one). Torpor is where deep-structure Net operations happen: penetration of secured meshes, navigation of complex network architectures, and the kind of system interaction that requires the user’s full cognitive capacity projected into the digital space.

Torpor is the most powerful and most dangerous immersion state. The user is faster, more capable, and more present in the digital environment than at any other depth. They are also a body on a chair with no awareness that someone is standing behind them with a knife.

Hacking

Hacking is the unauthorized access of a mesh or network. The terminology varies (slicing, burning, running, cracking), but the practice is universal. Anywhere there are secured systems, there are people trying to get into them without authorization.

Who Hacks

Corporate security teams hack competing corporations, suppliers, clients, and their own employees. This is called “network security testing” when directed inward and “competitive intelligence gathering” when directed outward. The legal distinction between corporate hacking and criminal hacking is the budget of the entity doing it.

Independent hackers (netrunners, slicers, meshburners, whatever the local terminology) hack for money, for ideology, for the thrill, or because they are good at it and the legitimate economy does not value their skills at the rate they believe they deserve. The independent hacker is a fixture of every colony world’s underground economy. Some are brilliant. Some are adequate. Some are dead, because the security systems they attempted to bypass did not issue warnings before escalating to lethal countermeasures.

Criminal organizations employ hackers the way they employ any other specialist: for specific jobs with specific objectives. Data theft, financial fraud, identity fabrication, surveillance, and the electronic aspects of physical operations (disabling alarms, opening locks, blinding cameras) are all hacker work.

Secret societies and Unseen World operatives hack for intelligence, communication, and operational security. The networks they penetrate and the data they seek are different from conventional hackers, but the methods are the same.

How Hacking Works

A mesh is a network. A network has access points: physical connections, wireless interfaces, relay links. A hacker gains access through one of these points, using technical skill, social engineering, or physical breach.

Once inside, the hacker navigates the mesh’s internal structure: a topology of nodes, each with its own function and security. Data nodes store information. Control nodes manage physical systems. Security nodes (firewalls, monitoring routines, automated defense programs) exist to find and stop the hacker.

The mesh’s security is largely automated. Defense programs patrol the network, monitor for anomalous activity, and respond to intrusions with escalating countermeasures: alerting human operators, locking down access points, tracing the intruder’s location, and in military and high-security corporate meshes, deploying offensive programs that attack the intruder’s hardware through the same connection the intruder is using to attack the mesh.

Offensive counterintrusion can damage the hacker’s deck or, if the hacker is in immersion, their neural interface. A cortical mesh that receives a sufficiently powerful hostile signal can produce seizures, sensory overload, or neural damage. This is the risk that separates casual Net use from professional hacking. A bad overlay experience costs you time. A bad immersion run costs you brain cells.

The Watcher

Every colony world with functioning Net infrastructure operates a surveillance system. The names differ (colony to colony, IPC to IPC), but the function is constant: monitoring network traffic, flagging anomalous activity, tracking identity credentials, and feeding data to corporate security and whatever passes for law enforcement.

The surveillance architecture is layered into the Net’s infrastructure. Every public mesh reports traffic metadata to the monitoring system. Every identity credential is tracked. Every transaction is logged. The monitoring system does not read the content of encrypted communications; the processing overhead would be impossible. But it tracks the metadata: who connected, from where, for how long, and to what.

For most users, the surveillance is invisible and irrelevant. They are not doing anything that triggers a flag. For hackers, criminals, and anyone operating outside the sanctioned boundaries, the surveillance is the constant background threat: the thing that turns “I got away with it” into “I got away with it for now.”

Going Dark

Anonymity on the Net requires effort. The default state is identified: every device broadcasts credentials, every mesh logs connections, every transaction creates a record.

Spoofed credentials. Fabricated identity tokens that present a false identity to the systems that check. Quality varies from disposable fakes that fool a public mesh for minutes to crafted forgeries that survive corporate-grade authentication. The market for forged credentials is robust and expensive.

Encrypted channels. Communication routed through encryption that the surveillance system cannot read. The system can see that encrypted traffic exists and can flag it as anomalous, but cannot access the content. The tradeoff is visibility: encrypted traffic on the public tangle stands out like a signal flare. Everyone knows you are hiding something. They just do not know what.

Dark meshes. Private networks that do not connect to the public tangle. Built on independent hardware, often hidden inside existing infrastructure, dark meshes serve communities that need communication without surveillance (criminal organizations, resistance movements, secret societies, and the kind of private clubs where the membership list would be more damaging than the activities).

Physical isolation. The most reliable form of network security: not being connected. Some operations (the most sensitive, the most dangerous, the most paranoid) are conducted on hardware that has never touched a network and never will. Data is transferred by physical media. Meetings happen in person. Messages are written on paper and burned after reading. It is slow, inconvenient, and effective.

Communication Lag and Its Consequences

The interstellar relay network creates a civilization that is connected but never current. Every colony operates on information that is days or weeks old. The implications are structural.

Governance. Earth cannot govern the colonies in real time. The UTCA’s authority is exercised through regulations, not directives: standing instructions that colony administrators interpret locally. By the time a complaint from a Frontier colony reaches Earth, the situation that prompted it has resolved, escalated, or become irrelevant.

Commerce. Interstellar trade operates on futures and contracts, not spot markets. Commodity prices are set based on information that may be outdated by the time it arrives. Arbitrage opportunities exist for anyone with faster access to information, which is why the IPCs invest heavily in their own relay networks and why Nakamura-Stellar’s survey fleet is as much an intelligence operation as an exploration one.

Culture. Every colony develops its own Net culture: local entertainment, local news, local social networks. The interstellar feed provides a shared cultural baseline that is always slightly out of date. Trends from Earth arrive on Frontier worlds months after they have peaked. Local culture fills the gap. The further from Sol, the more distinct the local culture becomes.

Security. A security breach on a Frontier colony cannot be reported in real time. By the time the breach data reaches the IPC’s Core-system security operations center, the intruder has had weeks to exploit their access. This delay is the single largest advantage that independent hackers hold over corporate security: the response time is measured in relay schedules, not milliseconds.

The Net and the Unseen

The Net exists in the Material plane. The veils (the Gossamer and the Shroud) do not interact with digital systems in any way that network engineers have detected or that the Unseen World’s scholars have documented.

Almost.

Deep-immersion users (hackers in torpor, long-duration research analysts, people who spend extended periods with their consciousness projected into digital environments) occasionally report phenomena that do not correspond to the mesh they are operating in. Shapes in peripheral vision that are not rendered objects. Sounds that are not generated by any audio source in the network. A sensation of presence that the mesh’s occupancy logs do not explain.

These reports are rare, inconsistent, and officially attributed to the known neurological effects of extended immersion: sensory artifacts, pattern-matching errors, and the cortical fatigue that prolonged torpor produces. The official explanation is probably correct in most cases.

In some cases, it is not.

The Gossamer resonates with air and vacuum. A cortical mesh is metal; it opposes the Gossamer and disrupts perception of the Immaterial. But a mind in deep immersion is not operating through the mesh the way an overlay user is. A mind in torpor has effectively relocated its sensory processing into a digital environment, leaving the cortical mesh as a passive conduit rather than an active filter. The metal is still present. The opposition is still real. But the mind is temporarily somewhere else, and from that location the Gossamer may be visible in ways that physical perception does not permit.

Nobody has confirmed this. The Ash Court’s scholars, who maintain the most complete records of extra-planar phenomena, have noted the correlation between deep- immersion reports and known Gossamer-thin locations without drawing a firm conclusion. The corporate researchers who have investigated the reports have filed them as anomalies and moved on.

The possibility that the Net, or deep immersion within it, opens a window onto the Immaterial plane is speculative, unconfirmed, and terrifying in its implications. If a human mind in torpor can perceive the Gossamer, can beings on the other side of the Gossamer perceive the mind?


See also: Cybernetics · AI and Automation · Megacorporations · The Unseen World · Law and Enforcement