Follow TV Tropes

Following

Context Literature / TrueNames

Go To

1[[quoteright:350:https://static.tvtropes.org/pmwiki/pub/images/true_names.png]]
2->''"...once an enemy, even a weak unskilled enemy, [[IKnowYourTrueName learned the sorcerer's true name]], then routine and widely known spells could destroy or enslave even the most powerful."''
3
4''True Names'' is an influential 1981 ScienceFiction {{Novella}} by Creator/VernorVinge about computer hackers who regularly meet in an open-ended on-line game called "The Other Plane". The hackers must keep their True Names--their "real world" identities--hidden, like wizards of lore, both to avoid detection by law enforcement ("the Great Enemy"), and to protect themselves from being hacked or blackmailed by others in the game.
5
6The story starts when Mr. Slippery, a member of an elite hacker SIG[[note]] (Special Interest Group)[[/note]] called the Coven, is visited by Federal agents, who know his True Name. But they don't want to arrest him--they're after a much bigger threat, and they want his help. They ''need'' to find a hacker known only as "The Mailman". When he returns to The Other Plane to begin his investigation, he's approached by Erythrina the Red Witch, one of the senior members of The Cabal, who is also worried about The Mailman, and would like his help. Together, Mr. Slippery and Erythrina begin a very dangerous investigation.
7
8The story presaged ideas that later became staples of the not-yet-born {{Cyberpunk}} genre, like {{Cyberspace}} and {{Digital Avatar}}s. But while it was nominated for both the [[UsefulNotes/HugoAward Hugo]] and [[UsefulNotes/NebulaAward Nebula]] awards, it remained a bit of a cult classic, and credit for many of its ideas are often mistakenly attributed to later but better-known works by Creator/WilliamGibson or Creator/NealStephenson.
9
10It was first collected in ''True Names...and Other Dangers''. It was later republished, along with a series of non-fiction essays about the ideas in the story, written by various authors and industry experts, in ''True Names and the Opening of the Cyberspace Frontier''.
11
12!! This work provides examples of:
13* AIIsACrapshoot: Discussed as one possible explanation for The Mailman's peculiar methods of communication with The Other Plane, and other eccentricities. See also AlienInvasion below.
14* AlienInvasion: Discussed as one possible explanation for The Mailman's peculiar methods of communication with The Other Plane, especially the time-lag. See also AIIsACrapshoot above.
15* {{Blackmail}}: A major danger of having your True Name discovered by another player is that you can be blackmailed with the threat of releasing your identity to The Great Enemy (the cops). To keep the proper game atmosphere, this is referred to as being "in thrall" to another player.
16* CapitalLettersAreMagic: Used frequently for things like True Name (a real world identity), The Great Enemy (the cops), and The True Death (the actual death of a player, rather than his character).
17* {{Cyberspace}}: One of the earliest, and still one of the most realistic versions. Complete with travel time. All justified, as it's part of the game.
18* DeityOfHumanOrigin: When Mr. Slippery and Erythrina forcibly multiplex their consciousness, it gives them the power to take over more machines almost without thinking. Repeat until they (and the BigBad) have total control over and knowledge of anything connected to any computer ever. The BigBad detonates several nukes in their silos ''to make a point in discussion'', and it's not a big deal to any of them. At one point, Mr. Slippery is frustrating and rerouting the soldiers sent to kill his real body as a side process while concentrating on something different.
19* DigitalAvatar: All the game players have them. Most are fairly human, but the "werebots" go for more creative possibilities.
20* DuelingHackers: The climax, with Mr. Slippery and Erythrina fighting the BigBad for control of the world's computer systems, including missile launch codes and military satellites.
21* {{Familiar}}: The "wizards" of The Other Plane often have specialized programs that they cause to appear in animal form, which they refer to as their familiars. When Virginia, the federal officer in charge of Mr. Slippery's case, meets up with him in frog form on The Other Plane, she pretends to be his familiar.
22* HackerCollective: The Mailman initially seems to be trying to recruit other members of the Coven into a collective so they can tackle hacks they wouldn't dare try on their own.
23* IKnowYourTrueName: The work is named for the trope, although it's about a modern, computer-age version rather than the classic magical version.
24* InsideAComputerSystem: Most of the action of the story takes place on The Other Plane.
25* JustLikeRobinHood: How some members of the Cabal like to view themselves. One even uses Robin Hood as his Nym. How accurate this self-assessment is may be subject to question, but there's no question that some of them play with the trope.
26* KillSat: The "Eye of God" satellites are the first military installations taken over and used during the climactic battle scene.
27* LizardFolk: Alan Turing, the guardian of the Coven's castle, is depicted as a lizard man, named after a great computer pioneer from WWII.
28* MassivelyMultiplayerOnlineRolePlayingGame: The Other Plane, one of the earliest fictional examples.
29* NoManShouldHaveThisPower: After the big battle, Slip and Ery realize they're pretty much in control of the world's computing resources, and can not only protect themselves, but can fix whatever they want. They quickly realize that they could be the worst dictators the world has ever seen, and reluctantly abandon the control.
30* ObfuscatedInterface: The Portals used to access The Other Plane use low-bandwidth communications (to help avoid detection). The interface uses EEG, and simply learning to see The Other Plane properly, let alone manipulate it, requires training and practice.
31* OnlineAlias: What you use instead of your True Name. Referred to as a Nym.
32* PlayfulHacker / TheCracker: Members of the Coven tend to fall into both these categories. Most are primarily interested in hacking for the fun of it, but all of them are wanted criminals.
33* ReadingTheEnemysMail: Mr. Slippery discovers that Erythrina has one of The Mailman's associates in thrall, and is able to decrypt communications between the two.
34* RecruitingTheCriminal: The Feds' view of their relationship with Mr. Slippery.
35* SecretUndergroundPassage: The castle in the Other Plane where the Coven meet is well-guarded and difficult to enter, but Erythina reveals that there are secret passages you can use to ''leave''. This being virtual reality, making them one-way is not difficult.
36* ShownTheirWork: Vinge did such a good job at creating a plausible extrapolation of existing technology that Marvin Minsky, head of the AI Labs at MIT, made it the basis of a keynote speech he delivered at the UsefulNotes/{{Nebula Award}}s ceremony that year.
37* {{Transhuman}}: Discussed towards the end of the story, when Slip and Ery finally meet face-to-face.
38* TheTrickster: Most of the Coven. In their spare time, they compare and rate each others' pranks.
39* TwentyMinutesIntoTheFuture: The interface used by the gamers was simple, but powerful, and close to what could have been built in 1981. No complicated, speculative neural plugs required. Just a fancy headset, powerful processors, and the skill to learn to interpret subtle clues and hints correctly. If written today, this story would be NextSundayAD.
40* UnscrupulousHero: Mr. Slippery. To say the least. Though a very sympathetic one.
41* ViewerFriendlyInterface: The Other Plane tends to use this, but ''only because it's fun!'' Of course, you can ''try'' to cheat and use a more ''sensible'' interface, but it's risky, because The Other Plane is built and maintained by elite hackers who don't like that sort of thing, and the results may not be what you expect.

Top