CHRONOS

207 Views
Published

CHRONOS pt.1
In a close future, technology has reached a point where it is possible to study the subconscious mind with high precision. Phenomenon's like precognitive dreaming become a sensitive case study, and people that are sensitive to these experiences become highly prestiged.
Big corporations step in, they come up with a way of monetizing these precognitive experiences, things that could not be predicted before (such as unanticipated events, stock prices and company profits) can now be sold to the highest bid as confidential "tickets", these tickets can only be decoded by the buying entity.
The machine searches the subject's brain activity for these signals and can tag a date from that read, after decoded the owner gets a brief depiction of the event, depending on how strong the read was .
On the other hand, hackers develop a way to read these subjects minds by developing a similar hardware that serves as proxy from the original.
The signals captured from the original user are sent to this new headset via wireless connection, the user of this new headset suffers a significant change in brain activity so it can translate the data received, from there the new user's mind is scanned in search for the hijacked "ticket". Unfortunately the reader's mind becomes unstable after the hacking, so these "test subjects" are commonly used as disposable. - https://www.artstation.com/artwork/WKDBqE

CHRONOS pt.2
In a close future, technology has reached a point where it is possible to study the subconscious mind with high precision. Phenomenon's like precognitive dreaming become a sensitive case study, and people that are sensitive to these experiences become highly prestiged.
Big corporations step in, they come up with a way of monetizing these precognitive experiences, things that could not be predicted before (such as unanticipated events, stock prices and company profits) can now be sold to the highest bid as confidential "tickets", these tickets can only be decoded by the buying entity.
The machine searches the subject's brain activity for these signals and can tag a date from that read, after decoded the owner gets a brief depiction of the event, depending on how strong the read was .
On the other hand, hackers develop a way to read these subjects minds by developing a similar hardware that serves as proxy from the original.
The signals captured from the original user are sent to this new headset via wireless connection, the user of this new headset suffers a significant change in brain activity so it can translate the data received, from there the new user's mind is scanned in search for the hijacked "ticket". Unfortunately the reader's mind becomes unstable after the hacking, so these "test subjects" are commonly used as disposable. - https://www.artstation.com/artwork/eaLlnb

Track by: https://rodolfosobral.bandcamp.com/

Category
CG Short