People downloaded the Watch Dogs ctOS companion app at the same time as they were installing the main game, although some a bit earlier, and it was right from the start that some of you found issues with the app. There have been problems for those installing Watch Dogs on the PS4, which we also encountered, and some of you have also found that the companion app is not going to plan either. The group hacks into the system and misappropriated its abilities to use it for its own purposes, such as invasions of privacy or data collection, simultaneously emphasizing the enormous power and security flaws of CTOS.Today’s release of Watch Dogs has not gone as smoothly as the developer had hoped, as there were a few issues from the start. The fact that control of CTOS could fall into the wrong hands has clearly been brought to the public's attention by a hacking collective known as DedSec.
It has also been noted that control of the system could fall into the wrong hands, like those of hackers such as Damien Brenks, T-Bone, Aiden Pearce and Defalt. One question that is frequently asked about the CTOS is: Who controls the system that controls Chicago? One negative that has been noted about the CTOS is that large businesses could use the data stored by CTOS to maximize profits. Furthermore, by the time Watch Dogs: Legion takes place, CTOS 3.0 had become the dominant CTOS operating system worldwide, with use in major cities across the world, including London. CTOS 2.0 was then installed in several other cities, including San Francisco and Oakland. CTOS is also tied to a space satellite, which functions as a safety measure intended for the remote shutting down of the entire system if deemed necessary.ĬTOS was upgraded to CTOS 2.0 with assumed upgraded security features after Aiden Pearce rebooted it. Although CTOS is successful in reducing the crime rate of Chicago, it does not protect the city as well as Blume claims.
Communication sites are placed between the control centers to promote the effective and efficient transfer of data over large distances. All of the information gathered by CTOS is stored in the control centers (data servers) located throughout Chicago.Īlong with being able to tamper with the CTOS telecommunication towers, Aiden Pearce is able to access the information and the mechanism responsible for accessing and storing it in the control centres. CTOS also manages to obtain and store data of Chicago inhabitants, which it does via various methods, such as by retrieving user information stored on CTOS connected consumer electronics and by using Chicago's mass surveillance system. Unfortunately, the CTOS is also the core weakness of the city, as it can be hacked into using backdoor programs or facial recognition malfunctions, and used as a weapon against the city and its inhabitants. Many systems are connected and controlled by CTOS servers, such as subway lines, traffic lights and surveillance cameras. These electronic systems include computer servers, sensors, technological gadgetry and databases, that interact to manage the city-wide infrastructure of Chicago. The CTOS is highly advanced digital information system which is connected via a very complex interconnection of electronic systems. An introduction to what the CTOS controls