Delete archive/Firewatch-Guide-5-31-21/ProjectFirewatch-7-31-21 directory

This commit is contained in:
Sophia Atkinson 2021-08-01 01:58:21 -04:00 committed by GitHub
parent b002a1a167
commit 0b0c403043
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
90 changed files with 0 additions and 3328 deletions

View File

@ -1,12 +0,0 @@
# Error 404
---
## Even with my orienteering skills I could not find this page.
---
## Go [Home](/)
---

View File

@ -1 +0,0 @@
projectfirewatch.com

View File

@ -1,674 +0,0 @@
GNU GENERAL PUBLIC LICENSE
Version 3, 29 June 2007
Copyright (C) 2007 Free Software Foundation, Inc. <https://fsf.org/>
Everyone is permitted to copy and distribute verbatim copies
of this license document, but changing it is not allowed.
Preamble
The GNU General Public License is a free, copyleft license for
software and other kinds of works.
The licenses for most software and other practical works are designed
to take away your freedom to share and change the works. By contrast,
the GNU General Public License is intended to guarantee your freedom to
share and change all versions of a program--to make sure it remains free
software for all its users. We, the Free Software Foundation, use the
GNU General Public License for most of our software; it applies also to
any other work released this way by its authors. You can apply it to
your programs, too.
When we speak of free software, we are referring to freedom, not
price. Our General Public Licenses are designed to make sure that you
have the freedom to distribute copies of free software (and charge for
them if you wish), that you receive source code or can get it if you
want it, that you can change the software or use pieces of it in new
free programs, and that you know you can do these things.
To protect your rights, we need to prevent others from denying you
these rights or asking you to surrender the rights. Therefore, you have
certain responsibilities if you distribute copies of the software, or if
you modify it: responsibilities to respect the freedom of others.
For example, if you distribute copies of such a program, whether
gratis or for a fee, you must pass on to the recipients the same
freedoms that you received. You must make sure that they, too, receive
or can get the source code. And you must show them these terms so they
know their rights.
Developers that use the GNU GPL protect your rights with two steps:
(1) assert copyright on the software, and (2) offer you this License
giving you legal permission to copy, distribute and/or modify it.
For the developers' and authors' protection, the GPL clearly explains
that there is no warranty for this free software. For both users' and
authors' sake, the GPL requires that modified versions be marked as
changed, so that their problems will not be attributed erroneously to
authors of previous versions.
Some devices are designed to deny users access to install or run
modified versions of the software inside them, although the manufacturer
can do so. This is fundamentally incompatible with the aim of
protecting users' freedom to change the software. The systematic
pattern of such abuse occurs in the area of products for individuals to
use, which is precisely where it is most unacceptable. Therefore, we
have designed this version of the GPL to prohibit the practice for those
products. If such problems arise substantially in other domains, we
stand ready to extend this provision to those domains in future versions
of the GPL, as needed to protect the freedom of users.
Finally, every program is threatened constantly by software patents.
States should not allow patents to restrict development and use of
software on general-purpose computers, but in those that do, we wish to
avoid the special danger that patents applied to a free program could
make it effectively proprietary. To prevent this, the GPL assures that
patents cannot be used to render the program non-free.
The precise terms and conditions for copying, distribution and
modification follow.
TERMS AND CONDITIONS
0. Definitions.
"This License" refers to version 3 of the GNU General Public License.
"Copyright" also means copyright-like laws that apply to other kinds of
works, such as semiconductor masks.
"The Program" refers to any copyrightable work licensed under this
License. Each licensee is addressed as "you". "Licensees" and
"recipients" may be individuals or organizations.
To "modify" a work means to copy from or adapt all or part of the work
in a fashion requiring copyright permission, other than the making of an
exact copy. The resulting work is called a "modified version" of the
earlier work or a work "based on" the earlier work.
A "covered work" means either the unmodified Program or a work based
on the Program.
To "propagate" a work means to do anything with it that, without
permission, would make you directly or secondarily liable for
infringement under applicable copyright law, except executing it on a
computer or modifying a private copy. Propagation includes copying,
distribution (with or without modification), making available to the
public, and in some countries other activities as well.
To "convey" a work means any kind of propagation that enables other
parties to make or receive copies. Mere interaction with a user through
a computer network, with no transfer of a copy, is not conveying.
An interactive user interface displays "Appropriate Legal Notices"
to the extent that it includes a convenient and prominently visible
feature that (1) displays an appropriate copyright notice, and (2)
tells the user that there is no warranty for the work (except to the
extent that warranties are provided), that licensees may convey the
work under this License, and how to view a copy of this License. If
the interface presents a list of user commands or options, such as a
menu, a prominent item in the list meets this criterion.
1. Source Code.
The "source code" for a work means the preferred form of the work
for making modifications to it. "Object code" means any non-source
form of a work.
A "Standard Interface" means an interface that either is an official
standard defined by a recognized standards body, or, in the case of
interfaces specified for a particular programming language, one that
is widely used among developers working in that language.
The "System Libraries" of an executable work include anything, other
than the work as a whole, that (a) is included in the normal form of
packaging a Major Component, but which is not part of that Major
Component, and (b) serves only to enable use of the work with that
Major Component, or to implement a Standard Interface for which an
implementation is available to the public in source code form. A
"Major Component", in this context, means a major essential component
(kernel, window system, and so on) of the specific operating system
(if any) on which the executable work runs, or a compiler used to
produce the work, or an object code interpreter used to run it.
The "Corresponding Source" for a work in object code form means all
the source code needed to generate, install, and (for an executable
work) run the object code and to modify the work, including scripts to
control those activities. However, it does not include the work's
System Libraries, or general-purpose tools or generally available free
programs which are used unmodified in performing those activities but
which are not part of the work. For example, Corresponding Source
includes interface definition files associated with source files for
the work, and the source code for shared libraries and dynamically
linked subprograms that the work is specifically designed to require,
such as by intimate data communication or control flow between those
subprograms and other parts of the work.
The Corresponding Source need not include anything that users
can regenerate automatically from other parts of the Corresponding
Source.
The Corresponding Source for a work in source code form is that
same work.
2. Basic Permissions.
All rights granted under this License are granted for the term of
copyright on the Program, and are irrevocable provided the stated
conditions are met. This License explicitly affirms your unlimited
permission to run the unmodified Program. The output from running a
covered work is covered by this License only if the output, given its
content, constitutes a covered work. This License acknowledges your
rights of fair use or other equivalent, as provided by copyright law.
You may make, run and propagate covered works that you do not
convey, without conditions so long as your license otherwise remains
in force. You may convey covered works to others for the sole purpose
of having them make modifications exclusively for you, or provide you
with facilities for running those works, provided that you comply with
the terms of this License in conveying all material for which you do
not control copyright. Those thus making or running the covered works
for you must do so exclusively on your behalf, under your direction
and control, on terms that prohibit them from making any copies of
your copyrighted material outside their relationship with you.
Conveying under any other circumstances is permitted solely under
the conditions stated below. Sublicensing is not allowed; section 10
makes it unnecessary.
3. Protecting Users' Legal Rights From Anti-Circumvention Law.
No covered work shall be deemed part of an effective technological
measure under any applicable law fulfilling obligations under article
11 of the WIPO copyright treaty adopted on 20 December 1996, or
similar laws prohibiting or restricting circumvention of such
measures.
When you convey a covered work, you waive any legal power to forbid
circumvention of technological measures to the extent such circumvention
is effected by exercising rights under this License with respect to
the covered work, and you disclaim any intention to limit operation or
modification of the work as a means of enforcing, against the work's
users, your or third parties' legal rights to forbid circumvention of
technological measures.
4. Conveying Verbatim Copies.
You may convey verbatim copies of the Program's source code as you
receive it, in any medium, provided that you conspicuously and
appropriately publish on each copy an appropriate copyright notice;
keep intact all notices stating that this License and any
non-permissive terms added in accord with section 7 apply to the code;
keep intact all notices of the absence of any warranty; and give all
recipients a copy of this License along with the Program.
You may charge any price or no price for each copy that you convey,
and you may offer support or warranty protection for a fee.
5. Conveying Modified Source Versions.
You may convey a work based on the Program, or the modifications to
produce it from the Program, in the form of source code under the
terms of section 4, provided that you also meet all of these conditions:
a) The work must carry prominent notices stating that you modified
it, and giving a relevant date.
b) The work must carry prominent notices stating that it is
released under this License and any conditions added under section
7. This requirement modifies the requirement in section 4 to
"keep intact all notices".
c) You must license the entire work, as a whole, under this
License to anyone who comes into possession of a copy. This
License will therefore apply, along with any applicable section 7
additional terms, to the whole of the work, and all its parts,
regardless of how they are packaged. This License gives no
permission to license the work in any other way, but it does not
invalidate such permission if you have separately received it.
d) If the work has interactive user interfaces, each must display
Appropriate Legal Notices; however, if the Program has interactive
interfaces that do not display Appropriate Legal Notices, your
work need not make them do so.
A compilation of a covered work with other separate and independent
works, which are not by their nature extensions of the covered work,
and which are not combined with it such as to form a larger program,
in or on a volume of a storage or distribution medium, is called an
"aggregate" if the compilation and its resulting copyright are not
used to limit the access or legal rights of the compilation's users
beyond what the individual works permit. Inclusion of a covered work
in an aggregate does not cause this License to apply to the other
parts of the aggregate.
6. Conveying Non-Source Forms.
You may convey a covered work in object code form under the terms
of sections 4 and 5, provided that you also convey the
machine-readable Corresponding Source under the terms of this License,
in one of these ways:
a) Convey the object code in, or embodied in, a physical product
(including a physical distribution medium), accompanied by the
Corresponding Source fixed on a durable physical medium
customarily used for software interchange.
b) Convey the object code in, or embodied in, a physical product
(including a physical distribution medium), accompanied by a
written offer, valid for at least three years and valid for as
long as you offer spare parts or customer support for that product
model, to give anyone who possesses the object code either (1) a
copy of the Corresponding Source for all the software in the
product that is covered by this License, on a durable physical
medium customarily used for software interchange, for a price no
more than your reasonable cost of physically performing this
conveying of source, or (2) access to copy the
Corresponding Source from a network server at no charge.
c) Convey individual copies of the object code with a copy of the
written offer to provide the Corresponding Source. This
alternative is allowed only occasionally and noncommercially, and
only if you received the object code with such an offer, in accord
with subsection 6b.
d) Convey the object code by offering access from a designated
place (gratis or for a charge), and offer equivalent access to the
Corresponding Source in the same way through the same place at no
further charge. You need not require recipients to copy the
Corresponding Source along with the object code. If the place to
copy the object code is a network server, the Corresponding Source
may be on a different server (operated by you or a third party)
that supports equivalent copying facilities, provided you maintain
clear directions next to the object code saying where to find the
Corresponding Source. Regardless of what server hosts the
Corresponding Source, you remain obligated to ensure that it is
available for as long as needed to satisfy these requirements.
e) Convey the object code using peer-to-peer transmission, provided
you inform other peers where the object code and Corresponding
Source of the work are being offered to the general public at no
charge under subsection 6d.
A separable portion of the object code, whose source code is excluded
from the Corresponding Source as a System Library, need not be
included in conveying the object code work.
A "User Product" is either (1) a "consumer product", which means any
tangible personal property which is normally used for personal, family,
or household purposes, or (2) anything designed or sold for incorporation
into a dwelling. In determining whether a product is a consumer product,
doubtful cases shall be resolved in favor of coverage. For a particular
product received by a particular user, "normally used" refers to a
typical or common use of that class of product, regardless of the status
of the particular user or of the way in which the particular user
actually uses, or expects or is expected to use, the product. A product
is a consumer product regardless of whether the product has substantial
commercial, industrial or non-consumer uses, unless such uses represent
the only significant mode of use of the product.
"Installation Information" for a User Product means any methods,
procedures, authorization keys, or other information required to install
and execute modified versions of a covered work in that User Product from
a modified version of its Corresponding Source. The information must
suffice to ensure that the continued functioning of the modified object
code is in no case prevented or interfered with solely because
modification has been made.
If you convey an object code work under this section in, or with, or
specifically for use in, a User Product, and the conveying occurs as
part of a transaction in which the right of possession and use of the
User Product is transferred to the recipient in perpetuity or for a
fixed term (regardless of how the transaction is characterized), the
Corresponding Source conveyed under this section must be accompanied
by the Installation Information. But this requirement does not apply
if neither you nor any third party retains the ability to install
modified object code on the User Product (for example, the work has
been installed in ROM).
The requirement to provide Installation Information does not include a
requirement to continue to provide support service, warranty, or updates
for a work that has been modified or installed by the recipient, or for
the User Product in which it has been modified or installed. Access to a
network may be denied when the modification itself materially and
adversely affects the operation of the network or violates the rules and
protocols for communication across the network.
Corresponding Source conveyed, and Installation Information provided,
in accord with this section must be in a format that is publicly
documented (and with an implementation available to the public in
source code form), and must require no special password or key for
unpacking, reading or copying.
7. Additional Terms.
"Additional permissions" are terms that supplement the terms of this
License by making exceptions from one or more of its conditions.
Additional permissions that are applicable to the entire Program shall
be treated as though they were included in this License, to the extent
that they are valid under applicable law. If additional permissions
apply only to part of the Program, that part may be used separately
under those permissions, but the entire Program remains governed by
this License without regard to the additional permissions.
When you convey a copy of a covered work, you may at your option
remove any additional permissions from that copy, or from any part of
it. (Additional permissions may be written to require their own
removal in certain cases when you modify the work.) You may place
additional permissions on material, added by you to a covered work,
for which you have or can give appropriate copyright permission.
Notwithstanding any other provision of this License, for material you
add to a covered work, you may (if authorized by the copyright holders of
that material) supplement the terms of this License with terms:
a) Disclaiming warranty or limiting liability differently from the
terms of sections 15 and 16 of this License; or
b) Requiring preservation of specified reasonable legal notices or
author attributions in that material or in the Appropriate Legal
Notices displayed by works containing it; or
c) Prohibiting misrepresentation of the origin of that material, or
requiring that modified versions of such material be marked in
reasonable ways as different from the original version; or
d) Limiting the use for publicity purposes of names of licensors or
authors of the material; or
e) Declining to grant rights under trademark law for use of some
trade names, trademarks, or service marks; or
f) Requiring indemnification of licensors and authors of that
material by anyone who conveys the material (or modified versions of
it) with contractual assumptions of liability to the recipient, for
any liability that these contractual assumptions directly impose on
those licensors and authors.
All other non-permissive additional terms are considered "further
restrictions" within the meaning of section 10. If the Program as you
received it, or any part of it, contains a notice stating that it is
governed by this License along with a term that is a further
restriction, you may remove that term. If a license document contains
a further restriction but permits relicensing or conveying under this
License, you may add to a covered work material governed by the terms
of that license document, provided that the further restriction does
not survive such relicensing or conveying.
If you add terms to a covered work in accord with this section, you
must place, in the relevant source files, a statement of the
additional terms that apply to those files, or a notice indicating
where to find the applicable terms.
Additional terms, permissive or non-permissive, may be stated in the
form of a separately written license, or stated as exceptions;
the above requirements apply either way.
8. Termination.
You may not propagate or modify a covered work except as expressly
provided under this License. Any attempt otherwise to propagate or
modify it is void, and will automatically terminate your rights under
this License (including any patent licenses granted under the third
paragraph of section 11).
However, if you cease all violation of this License, then your
license from a particular copyright holder is reinstated (a)
provisionally, unless and until the copyright holder explicitly and
finally terminates your license, and (b) permanently, if the copyright
holder fails to notify you of the violation by some reasonable means
prior to 60 days after the cessation.
Moreover, your license from a particular copyright holder is
reinstated permanently if the copyright holder notifies you of the
violation by some reasonable means, this is the first time you have
received notice of violation of this License (for any work) from that
copyright holder, and you cure the violation prior to 30 days after
your receipt of the notice.
Termination of your rights under this section does not terminate the
licenses of parties who have received copies or rights from you under
this License. If your rights have been terminated and not permanently
reinstated, you do not qualify to receive new licenses for the same
material under section 10.
9. Acceptance Not Required for Having Copies.
You are not required to accept this License in order to receive or
run a copy of the Program. Ancillary propagation of a covered work
occurring solely as a consequence of using peer-to-peer transmission
to receive a copy likewise does not require acceptance. However,
nothing other than this License grants you permission to propagate or
modify any covered work. These actions infringe copyright if you do
not accept this License. Therefore, by modifying or propagating a
covered work, you indicate your acceptance of this License to do so.
10. Automatic Licensing of Downstream Recipients.
Each time you convey a covered work, the recipient automatically
receives a license from the original licensors, to run, modify and
propagate that work, subject to this License. You are not responsible
for enforcing compliance by third parties with this License.
An "entity transaction" is a transaction transferring control of an
organization, or substantially all assets of one, or subdividing an
organization, or merging organizations. If propagation of a covered
work results from an entity transaction, each party to that
transaction who receives a copy of the work also receives whatever
licenses to the work the party's predecessor in interest had or could
give under the previous paragraph, plus a right to possession of the
Corresponding Source of the work from the predecessor in interest, if
the predecessor has it or can get it with reasonable efforts.
You may not impose any further restrictions on the exercise of the
rights granted or affirmed under this License. For example, you may
not impose a license fee, royalty, or other charge for exercise of
rights granted under this License, and you may not initiate litigation
(including a cross-claim or counterclaim in a lawsuit) alleging that
any patent claim is infringed by making, using, selling, offering for
sale, or importing the Program or any portion of it.
11. Patents.
A "contributor" is a copyright holder who authorizes use under this
License of the Program or a work on which the Program is based. The
work thus licensed is called the contributor's "contributor version".
A contributor's "essential patent claims" are all patent claims
owned or controlled by the contributor, whether already acquired or
hereafter acquired, that would be infringed by some manner, permitted
by this License, of making, using, or selling its contributor version,
but do not include claims that would be infringed only as a
consequence of further modification of the contributor version. For
purposes of this definition, "control" includes the right to grant
patent sublicenses in a manner consistent with the requirements of
this License.
Each contributor grants you a non-exclusive, worldwide, royalty-free
patent license under the contributor's essential patent claims, to
make, use, sell, offer for sale, import and otherwise run, modify and
propagate the contents of its contributor version.
In the following three paragraphs, a "patent license" is any express
agreement or commitment, however denominated, not to enforce a patent
(such as an express permission to practice a patent or covenant not to
sue for patent infringement). To "grant" such a patent license to a
party means to make such an agreement or commitment not to enforce a
patent against the party.
If you convey a covered work, knowingly relying on a patent license,
and the Corresponding Source of the work is not available for anyone
to copy, free of charge and under the terms of this License, through a
publicly available network server or other readily accessible means,
then you must either (1) cause the Corresponding Source to be so
available, or (2) arrange to deprive yourself of the benefit of the
patent license for this particular work, or (3) arrange, in a manner
consistent with the requirements of this License, to extend the patent
license to downstream recipients. "Knowingly relying" means you have
actual knowledge that, but for the patent license, your conveying the
covered work in a country, or your recipient's use of the covered work
in a country, would infringe one or more identifiable patents in that
country that you have reason to believe are valid.
If, pursuant to or in connection with a single transaction or
arrangement, you convey, or propagate by procuring conveyance of, a
covered work, and grant a patent license to some of the parties
receiving the covered work authorizing them to use, propagate, modify
or convey a specific copy of the covered work, then the patent license
you grant is automatically extended to all recipients of the covered
work and works based on it.
A patent license is "discriminatory" if it does not include within
the scope of its coverage, prohibits the exercise of, or is
conditioned on the non-exercise of one or more of the rights that are
specifically granted under this License. You may not convey a covered
work if you are a party to an arrangement with a third party that is
in the business of distributing software, under which you make payment
to the third party based on the extent of your activity of conveying
the work, and under which the third party grants, to any of the
parties who would receive the covered work from you, a discriminatory
patent license (a) in connection with copies of the covered work
conveyed by you (or copies made from those copies), or (b) primarily
for and in connection with specific products or compilations that
contain the covered work, unless you entered into that arrangement,
or that patent license was granted, prior to 28 March 2007.
Nothing in this License shall be construed as excluding or limiting
any implied license or other defenses to infringement that may
otherwise be available to you under applicable patent law.
12. No Surrender of Others' Freedom.
If conditions are imposed on you (whether by court order, agreement or
otherwise) that contradict the conditions of this License, they do not
excuse you from the conditions of this License. If you cannot convey a
covered work so as to satisfy simultaneously your obligations under this
License and any other pertinent obligations, then as a consequence you may
not convey it at all. For example, if you agree to terms that obligate you
to collect a royalty for further conveying from those to whom you convey
the Program, the only way you could satisfy both those terms and this
License would be to refrain entirely from conveying the Program.
13. Use with the GNU Affero General Public License.
Notwithstanding any other provision of this License, you have
permission to link or combine any covered work with a work licensed
under version 3 of the GNU Affero General Public License into a single
combined work, and to convey the resulting work. The terms of this
License will continue to apply to the part which is the covered work,
but the special requirements of the GNU Affero General Public License,
section 13, concerning interaction through a network will apply to the
combination as such.
14. Revised Versions of this License.
The Free Software Foundation may publish revised and/or new versions of
the GNU General Public License from time to time. Such new versions will
be similar in spirit to the present version, but may differ in detail to
address new problems or concerns.
Each version is given a distinguishing version number. If the
Program specifies that a certain numbered version of the GNU General
Public License "or any later version" applies to it, you have the
option of following the terms and conditions either of that numbered
version or of any later version published by the Free Software
Foundation. If the Program does not specify a version number of the
GNU General Public License, you may choose any version ever published
by the Free Software Foundation.
If the Program specifies that a proxy can decide which future
versions of the GNU General Public License can be used, that proxy's
public statement of acceptance of a version permanently authorizes you
to choose that version for the Program.
Later license versions may give you additional or different
permissions. However, no additional obligations are imposed on any
author or copyright holder as a result of your choosing to follow a
later version.
15. Disclaimer of Warranty.
THERE IS NO WARRANTY FOR THE PROGRAM, TO THE EXTENT PERMITTED BY
APPLICABLE LAW. EXCEPT WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT
HOLDERS AND/OR OTHER PARTIES PROVIDE THE PROGRAM "AS IS" WITHOUT WARRANTY
OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO,
THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
PURPOSE. THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE PROGRAM
IS WITH YOU. SHOULD THE PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF
ALL NECESSARY SERVICING, REPAIR OR CORRECTION.
16. Limitation of Liability.
IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING
WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MODIFIES AND/OR CONVEYS
THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES, INCLUDING ANY
GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE
USE OR INABILITY TO USE THE PROGRAM (INCLUDING BUT NOT LIMITED TO LOSS OF
DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD
PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER PROGRAMS),
EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF
SUCH DAMAGES.
17. Interpretation of Sections 15 and 16.
If the disclaimer of warranty and limitation of liability provided
above cannot be given local legal effect according to their terms,
reviewing courts shall apply local law that most closely approximates
an absolute waiver of all civil liability in connection with the
Program, unless a warranty or assumption of liability accompanies a
copy of the Program in return for a fee.
END OF TERMS AND CONDITIONS
How to Apply These Terms to Your New Programs
If you develop a new program, and you want it to be of the greatest
possible use to the public, the best way to achieve this is to make it
free software which everyone can redistribute and change under these terms.
To do so, attach the following notices to the program. It is safest
to attach them to the start of each source file to most effectively
state the exclusion of warranty; and each file should have at least
the "copyright" line and a pointer to where the full notice is found.
<one line to give the program's name and a brief idea of what it does.>
Copyright (C) <year> <name of author>
This program is free software: you can redistribute it and/or modify
it under the terms of the GNU General Public License as published by
the Free Software Foundation, either version 3 of the License, or
(at your option) any later version.
This program is distributed in the hope that it will be useful,
but WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
GNU General Public License for more details.
You should have received a copy of the GNU General Public License
along with this program. If not, see <https://www.gnu.org/licenses/>.
Also add information on how to contact you by electronic and paper mail.
If the program does terminal interaction, make it output a short
notice like this when it starts in an interactive mode:
<program> Copyright (C) <year> <name of author>
This program comes with ABSOLUTELY NO WARRANTY; for details type `show w'.
This is free software, and you are welcome to redistribute it
under certain conditions; type `show c' for details.
The hypothetical commands `show w' and `show c' should show the appropriate
parts of the General Public License. Of course, your program's commands
might be different; for a GUI interface, you would use an "about box".
You should also get your employer (if you work as a programmer) or school,
if any, to sign a "copyright disclaimer" for the program, if necessary.
For more information on this, and how to apply and follow the GNU GPL, see
<https://www.gnu.org/licenses/>.
The GNU General Public License does not permit incorporating your program
into proprietary programs. If your program is a subroutine library, you
may consider it more useful to permit linking proprietary applications with
the library. If this is what you want to do, use the GNU Lesser General
Public License instead of this License. But first, please read
<https://www.gnu.org/licenses/why-not-lgpl.html>.

View File

@ -1,33 +0,0 @@
# A project deticated to the game Firewatch by Campo Santo (Now defunct: Sold to valvesoftware)
---
## want to contribute? Fork the project then do a pull request.
![Guide](https://sophia.ml/cdn/contribute.PNG)
---
## Contact Email
### [projectfirewatch@gmail.com](mailto:projectfirewatch@gmail.com)
---
## Planned things.
### Moved to https://github.com/orgs/ProjectFirewatch/projects/1
---
# Contributers!
### 1. [Sophia](https://github.com/SophiaAtkinson) Project Owner
---
![Hits](https://camo.githubusercontent.com/612c403f0241d9c1edf9ea44167dc013cb6de7457457f6e7c0a1373b3b5db65c/68747470733a2f2f686974732e736565796f756661726d2e636f6d2f6170692f636f756e742f696e63722f62616467652e7376673f75726c3d68747470732533412532462532466769746875622e636f6d253246536f7068696141746b696e736f6e2532464669726577617463682d477569646526636f756e745f62673d253233323532353235267469746c655f62673d2532333235323532352669636f6e3d2669636f6e5f636f6c6f723d253233453745374537267469746c653d436c69636b61726f6f7326656467655f666c61743d74727565)
---
*projectfirewatch.com is a community website and is not affiliated with Firewatch or Campo Santo.*
*Firewatch and the Firewatch logos are trademarks of Campo Santo. All other trademarks are property of their respective owners.*

View File

@ -1,3 +0,0 @@
# Security Policy
### If you find a spam link or something that has snuck onto this project, please let me know by emailing us. The email is in the ReadME.md

View File

@ -1,6 +0,0 @@
theme: jekyll-theme-midnight
plugins:
- jemoji
- jekyll-sitemap
- jekyll-seo-tag

View File

@ -1,143 +0,0 @@
# All Achievements
---
### [Home](/)
---
![Good First Day](/cdn/achievements/goodday.jpg)
Good first day.
Completed Day 1
Story related and cannot be missed. Complete Day 1 of the game to unlock this achievement.
---
![Back to work](/cdn/achievements/backtowork.png)
Back to work.
Completed Day 2
• Story related and cannot be missed. Complete Day 2 of the game to unlock this achievement.
---
![Someone's out here.](/cdn/achievements/someonesouthere.png)
Someone's out here.
Completed Day 76
• Story related and cannot be missed. Complete Day 76 of the game to unlock this achievement.
---
![Burn the place down.](/cdn/achievements/burntheplacedown.png)
Burn the place down.
Completed Day 77
Story related and cannot be missed. Complete Day 77 of the game to unlock this achievement.
---
![Firewatch](/cdn/achievements/firewatch.png)
Firewatch.
Completed Day 79
Story related and cannot be missed. Complete Day 79 of the game to unlock this achievement.
---
![Shutter Bug](/cdn/achievements/shutterbug.png)
Shutter Bug.
Filled a disposable camera with photos.
• This can be completed as early as Day 2. After finding the downed line and heading down the path (headed toward cache 241), you will see a backpack hanging on a tree. Knock it down and grab the items in it. One of the items is a disposable camera. Use up the remaining pictures to unlock the achievement.
---
![Love Turts](/cdn/achievements/loveturts.png)
Love Turts.
Adopted a turtle as a pet.
In Firewatch, turtles can be found in several locations throughout the wilderness. I listed a few of these locations below if you wish to find a turtle pet of your own. However, keep in mind that a turtle will not always be present at the locations listed below. These are just some of the common locations that players have found their own turtle companions. Once you find a turtle, make sure to report it to Delilah and adopt it to bring it with you.
Thorofare Trail
The first location you can check for a turtle is along the Thorofare Trail. Starting at the Two Forks Lookout tower, head southeast along a trail leading away from the bottom of the tower stairs. Before the trail curves to the left, look for an opening in the fence leading to another trail heading east. Continue down this trail.
You will eventually pass by a fallen log that you can either hop over or walk around. At the end of the path, look for a turtle sitting on a rock just in front of the rockslide. Pick up the turtle, and report it to Delilah to give it a name. Make sure to press Hold to adopt the turtle as your new pet companion.
![Map Location](/cdn/achievements/jonesylakemap.jpg)
![Turt Location](/cdn/achievements/thorofaretrailturt.jpg)
Jonesy Lake
During Day 1, you will need to travel to Jonesy Lake to inspect some suspicious behavior. Consult your map and head west toward the lake along the lake trails. When you reach the lake, walk along its shoreline to the north. Keep an eye out for yellow supply cache 305. Open the cache and copy the map information to update your map. Continue a few feet north of the supply cache and look for a flat rock beneath a tree, close to the lake. With any luck, there may be a turtle sitting atop the rock for you to befriend.
![Map Location](/cdn/achievements/thorofaretrailmap.jpg)
![Turt](/cdn/achievements/turtatjonesylake.jpg)
Beartooth Point
During Day 2, you must travel north toward Beartooth Point to inspect a communication line. The trails will diverge into several winding paths, as shown in the map image below. Use the nearby telephone line as your guide through the valley.
![Map Location](/cdn/achievements/beartoothpointmap.jpg)
![Turt](/cdn/achievements/beartoothpointturt.jpg)
---
![The Life and Times of Raccoon Carter](/cdn/achievements/thelifeandtimesofraccooncarter.png)
The Life and Times of Raccoon Carter.
Got attacked by a raccoon; probably didn't get rabies.
Start a free roam game and go to the location marked on the map. Enter the cabin where the arrow is pointing and go down the stairs. Open the stove and a raccoon will jump out and the achievement will unlock.
![Map 1](/cdn/achievements/2438900192_preview_UhPAbZJ.jpg)
This can be completed as early as Day 76. When you start Day 76, head north toward Beartooth Point. About halfway there (between the words "Thorofare Trail" and "Telephone"), the trail splits once and then again. After the split, look for an old outhouse that is falling apart (it contains the lyrics to Ol' Shoshone inside). From the outhouse, head east and look for an old cabin that is falling apart. Inside, go into the basement and open the stove. A raccoon should jump out and the achievement will unlock.
![Map 2](/cdn/achievements/2438900192_preview_4208-001.jpg)
![Raccoon](/cdn/achievements/2438900192_preview_racoon.jpg)
---
![Bee Plot](/cdn/achievements/beeplot.png)
Bee Plot.
Got stung by a bee. It happens.
• Start a free roam game and make sure you bring your climbing gear and the axe with you.
Go to the area marked on the map and open the gate. Directly in front of you is a small box thing you can open. Open it and a bee will fly out and sting you and the achievement will unlock.
![Bee Plot](/cdn/achievements/2438900192_preview_wapiti.jpg)
---
![Ol' Shoshone](/cdn/achievements/olshoshone.png)
Ol' Shoshone.
Listened to the tape of "Ol' Shoshone." Cavorted among the aspens.
Start a free roam game. Make sure you take the axe with you from the lookout.
Go to the area marked on the map and clear out the bushes where the arrow is pointing. Continue through and you will see a chair and a bunch of junk. Pick up the tape and the achievement should pop.
![Ol' Shoshone](/cdn/achievements/2438900192_preview_shoshone.jpg)
---
# Credits
[Guide By TORGADDON](https://steamcommunity.com/sharedfiles/filedetails/?id=2438900192)
[truesteamachievements.com](https://truesteamachievements.com/)
[xboxachievements.com](https://www.xboxachievements.com/)
[astats.astats.nl](https://astats.astats.nl)
[usgamer.net](https://www.usgamer.net/)
---
*projectfirewatch.com is a community website and is not affiliated with Firewatch or Campo Santo.*
*Firewatch and the Firewatch logos are trademarks of Campo Santo. All other trademarks are property of their respective owners.*

View File

@ -1,674 +0,0 @@
GNU GENERAL PUBLIC LICENSE
Version 3, 29 June 2007
Copyright (C) 2007 Free Software Foundation, Inc. <https://fsf.org/>
Everyone is permitted to copy and distribute verbatim copies
of this license document, but changing it is not allowed.
Preamble
The GNU General Public License is a free, copyleft license for
software and other kinds of works.
The licenses for most software and other practical works are designed
to take away your freedom to share and change the works. By contrast,
the GNU General Public License is intended to guarantee your freedom to
share and change all versions of a program--to make sure it remains free
software for all its users. We, the Free Software Foundation, use the
GNU General Public License for most of our software; it applies also to
any other work released this way by its authors. You can apply it to
your programs, too.
When we speak of free software, we are referring to freedom, not
price. Our General Public Licenses are designed to make sure that you
have the freedom to distribute copies of free software (and charge for
them if you wish), that you receive source code or can get it if you
want it, that you can change the software or use pieces of it in new
free programs, and that you know you can do these things.
To protect your rights, we need to prevent others from denying you
these rights or asking you to surrender the rights. Therefore, you have
certain responsibilities if you distribute copies of the software, or if
you modify it: responsibilities to respect the freedom of others.
For example, if you distribute copies of such a program, whether
gratis or for a fee, you must pass on to the recipients the same
freedoms that you received. You must make sure that they, too, receive
or can get the source code. And you must show them these terms so they
know their rights.
Developers that use the GNU GPL protect your rights with two steps:
(1) assert copyright on the software, and (2) offer you this License
giving you legal permission to copy, distribute and/or modify it.
For the developers' and authors' protection, the GPL clearly explains
that there is no warranty for this free software. For both users' and
authors' sake, the GPL requires that modified versions be marked as
changed, so that their problems will not be attributed erroneously to
authors of previous versions.
Some devices are designed to deny users access to install or run
modified versions of the software inside them, although the manufacturer
can do so. This is fundamentally incompatible with the aim of
protecting users' freedom to change the software. The systematic
pattern of such abuse occurs in the area of products for individuals to
use, which is precisely where it is most unacceptable. Therefore, we
have designed this version of the GPL to prohibit the practice for those
products. If such problems arise substantially in other domains, we
stand ready to extend this provision to those domains in future versions
of the GPL, as needed to protect the freedom of users.
Finally, every program is threatened constantly by software patents.
States should not allow patents to restrict development and use of
software on general-purpose computers, but in those that do, we wish to
avoid the special danger that patents applied to a free program could
make it effectively proprietary. To prevent this, the GPL assures that
patents cannot be used to render the program non-free.
The precise terms and conditions for copying, distribution and
modification follow.
TERMS AND CONDITIONS
0. Definitions.
"This License" refers to version 3 of the GNU General Public License.
"Copyright" also means copyright-like laws that apply to other kinds of
works, such as semiconductor masks.
"The Program" refers to any copyrightable work licensed under this
License. Each licensee is addressed as "you". "Licensees" and
"recipients" may be individuals or organizations.
To "modify" a work means to copy from or adapt all or part of the work
in a fashion requiring copyright permission, other than the making of an
exact copy. The resulting work is called a "modified version" of the
earlier work or a work "based on" the earlier work.
A "covered work" means either the unmodified Program or a work based
on the Program.
To "propagate" a work means to do anything with it that, without
permission, would make you directly or secondarily liable for
infringement under applicable copyright law, except executing it on a
computer or modifying a private copy. Propagation includes copying,
distribution (with or without modification), making available to the
public, and in some countries other activities as well.
To "convey" a work means any kind of propagation that enables other
parties to make or receive copies. Mere interaction with a user through
a computer network, with no transfer of a copy, is not conveying.
An interactive user interface displays "Appropriate Legal Notices"
to the extent that it includes a convenient and prominently visible
feature that (1) displays an appropriate copyright notice, and (2)
tells the user that there is no warranty for the work (except to the
extent that warranties are provided), that licensees may convey the
work under this License, and how to view a copy of this License. If
the interface presents a list of user commands or options, such as a
menu, a prominent item in the list meets this criterion.
1. Source Code.
The "source code" for a work means the preferred form of the work
for making modifications to it. "Object code" means any non-source
form of a work.
A "Standard Interface" means an interface that either is an official
standard defined by a recognized standards body, or, in the case of
interfaces specified for a particular programming language, one that
is widely used among developers working in that language.
The "System Libraries" of an executable work include anything, other
than the work as a whole, that (a) is included in the normal form of
packaging a Major Component, but which is not part of that Major
Component, and (b) serves only to enable use of the work with that
Major Component, or to implement a Standard Interface for which an
implementation is available to the public in source code form. A
"Major Component", in this context, means a major essential component
(kernel, window system, and so on) of the specific operating system
(if any) on which the executable work runs, or a compiler used to
produce the work, or an object code interpreter used to run it.
The "Corresponding Source" for a work in object code form means all
the source code needed to generate, install, and (for an executable
work) run the object code and to modify the work, including scripts to
control those activities. However, it does not include the work's
System Libraries, or general-purpose tools or generally available free
programs which are used unmodified in performing those activities but
which are not part of the work. For example, Corresponding Source
includes interface definition files associated with source files for
the work, and the source code for shared libraries and dynamically
linked subprograms that the work is specifically designed to require,
such as by intimate data communication or control flow between those
subprograms and other parts of the work.
The Corresponding Source need not include anything that users
can regenerate automatically from other parts of the Corresponding
Source.
The Corresponding Source for a work in source code form is that
same work.
2. Basic Permissions.
All rights granted under this License are granted for the term of
copyright on the Program, and are irrevocable provided the stated
conditions are met. This License explicitly affirms your unlimited
permission to run the unmodified Program. The output from running a
covered work is covered by this License only if the output, given its
content, constitutes a covered work. This License acknowledges your
rights of fair use or other equivalent, as provided by copyright law.
You may make, run and propagate covered works that you do not
convey, without conditions so long as your license otherwise remains
in force. You may convey covered works to others for the sole purpose
of having them make modifications exclusively for you, or provide you
with facilities for running those works, provided that you comply with
the terms of this License in conveying all material for which you do
not control copyright. Those thus making or running the covered works
for you must do so exclusively on your behalf, under your direction
and control, on terms that prohibit them from making any copies of
your copyrighted material outside their relationship with you.
Conveying under any other circumstances is permitted solely under
the conditions stated below. Sublicensing is not allowed; section 10
makes it unnecessary.
3. Protecting Users' Legal Rights From Anti-Circumvention Law.
No covered work shall be deemed part of an effective technological
measure under any applicable law fulfilling obligations under article
11 of the WIPO copyright treaty adopted on 20 December 1996, or
similar laws prohibiting or restricting circumvention of such
measures.
When you convey a covered work, you waive any legal power to forbid
circumvention of technological measures to the extent such circumvention
is effected by exercising rights under this License with respect to
the covered work, and you disclaim any intention to limit operation or
modification of the work as a means of enforcing, against the work's
users, your or third parties' legal rights to forbid circumvention of
technological measures.
4. Conveying Verbatim Copies.
You may convey verbatim copies of the Program's source code as you
receive it, in any medium, provided that you conspicuously and
appropriately publish on each copy an appropriate copyright notice;
keep intact all notices stating that this License and any
non-permissive terms added in accord with section 7 apply to the code;
keep intact all notices of the absence of any warranty; and give all
recipients a copy of this License along with the Program.
You may charge any price or no price for each copy that you convey,
and you may offer support or warranty protection for a fee.
5. Conveying Modified Source Versions.
You may convey a work based on the Program, or the modifications to
produce it from the Program, in the form of source code under the
terms of section 4, provided that you also meet all of these conditions:
a) The work must carry prominent notices stating that you modified
it, and giving a relevant date.
b) The work must carry prominent notices stating that it is
released under this License and any conditions added under section
7. This requirement modifies the requirement in section 4 to
"keep intact all notices".
c) You must license the entire work, as a whole, under this
License to anyone who comes into possession of a copy. This
License will therefore apply, along with any applicable section 7
additional terms, to the whole of the work, and all its parts,
regardless of how they are packaged. This License gives no
permission to license the work in any other way, but it does not
invalidate such permission if you have separately received it.
d) If the work has interactive user interfaces, each must display
Appropriate Legal Notices; however, if the Program has interactive
interfaces that do not display Appropriate Legal Notices, your
work need not make them do so.
A compilation of a covered work with other separate and independent
works, which are not by their nature extensions of the covered work,
and which are not combined with it such as to form a larger program,
in or on a volume of a storage or distribution medium, is called an
"aggregate" if the compilation and its resulting copyright are not
used to limit the access or legal rights of the compilation's users
beyond what the individual works permit. Inclusion of a covered work
in an aggregate does not cause this License to apply to the other
parts of the aggregate.
6. Conveying Non-Source Forms.
You may convey a covered work in object code form under the terms
of sections 4 and 5, provided that you also convey the
machine-readable Corresponding Source under the terms of this License,
in one of these ways:
a) Convey the object code in, or embodied in, a physical product
(including a physical distribution medium), accompanied by the
Corresponding Source fixed on a durable physical medium
customarily used for software interchange.
b) Convey the object code in, or embodied in, a physical product
(including a physical distribution medium), accompanied by a
written offer, valid for at least three years and valid for as
long as you offer spare parts or customer support for that product
model, to give anyone who possesses the object code either (1) a
copy of the Corresponding Source for all the software in the
product that is covered by this License, on a durable physical
medium customarily used for software interchange, for a price no
more than your reasonable cost of physically performing this
conveying of source, or (2) access to copy the
Corresponding Source from a network server at no charge.
c) Convey individual copies of the object code with a copy of the
written offer to provide the Corresponding Source. This
alternative is allowed only occasionally and noncommercially, and
only if you received the object code with such an offer, in accord
with subsection 6b.
d) Convey the object code by offering access from a designated
place (gratis or for a charge), and offer equivalent access to the
Corresponding Source in the same way through the same place at no
further charge. You need not require recipients to copy the
Corresponding Source along with the object code. If the place to
copy the object code is a network server, the Corresponding Source
may be on a different server (operated by you or a third party)
that supports equivalent copying facilities, provided you maintain
clear directions next to the object code saying where to find the
Corresponding Source. Regardless of what server hosts the
Corresponding Source, you remain obligated to ensure that it is
available for as long as needed to satisfy these requirements.
e) Convey the object code using peer-to-peer transmission, provided
you inform other peers where the object code and Corresponding
Source of the work are being offered to the general public at no
charge under subsection 6d.
A separable portion of the object code, whose source code is excluded
from the Corresponding Source as a System Library, need not be
included in conveying the object code work.
A "User Product" is either (1) a "consumer product", which means any
tangible personal property which is normally used for personal, family,
or household purposes, or (2) anything designed or sold for incorporation
into a dwelling. In determining whether a product is a consumer product,
doubtful cases shall be resolved in favor of coverage. For a particular
product received by a particular user, "normally used" refers to a
typical or common use of that class of product, regardless of the status
of the particular user or of the way in which the particular user
actually uses, or expects or is expected to use, the product. A product
is a consumer product regardless of whether the product has substantial
commercial, industrial or non-consumer uses, unless such uses represent
the only significant mode of use of the product.
"Installation Information" for a User Product means any methods,
procedures, authorization keys, or other information required to install
and execute modified versions of a covered work in that User Product from
a modified version of its Corresponding Source. The information must
suffice to ensure that the continued functioning of the modified object
code is in no case prevented or interfered with solely because
modification has been made.
If you convey an object code work under this section in, or with, or
specifically for use in, a User Product, and the conveying occurs as
part of a transaction in which the right of possession and use of the
User Product is transferred to the recipient in perpetuity or for a
fixed term (regardless of how the transaction is characterized), the
Corresponding Source conveyed under this section must be accompanied
by the Installation Information. But this requirement does not apply
if neither you nor any third party retains the ability to install
modified object code on the User Product (for example, the work has
been installed in ROM).
The requirement to provide Installation Information does not include a
requirement to continue to provide support service, warranty, or updates
for a work that has been modified or installed by the recipient, or for
the User Product in which it has been modified or installed. Access to a
network may be denied when the modification itself materially and
adversely affects the operation of the network or violates the rules and
protocols for communication across the network.
Corresponding Source conveyed, and Installation Information provided,
in accord with this section must be in a format that is publicly
documented (and with an implementation available to the public in
source code form), and must require no special password or key for
unpacking, reading or copying.
7. Additional Terms.
"Additional permissions" are terms that supplement the terms of this
License by making exceptions from one or more of its conditions.
Additional permissions that are applicable to the entire Program shall
be treated as though they were included in this License, to the extent
that they are valid under applicable law. If additional permissions
apply only to part of the Program, that part may be used separately
under those permissions, but the entire Program remains governed by
this License without regard to the additional permissions.
When you convey a copy of a covered work, you may at your option
remove any additional permissions from that copy, or from any part of
it. (Additional permissions may be written to require their own
removal in certain cases when you modify the work.) You may place
additional permissions on material, added by you to a covered work,
for which you have or can give appropriate copyright permission.
Notwithstanding any other provision of this License, for material you
add to a covered work, you may (if authorized by the copyright holders of
that material) supplement the terms of this License with terms:
a) Disclaiming warranty or limiting liability differently from the
terms of sections 15 and 16 of this License; or
b) Requiring preservation of specified reasonable legal notices or
author attributions in that material or in the Appropriate Legal
Notices displayed by works containing it; or
c) Prohibiting misrepresentation of the origin of that material, or
requiring that modified versions of such material be marked in
reasonable ways as different from the original version; or
d) Limiting the use for publicity purposes of names of licensors or
authors of the material; or
e) Declining to grant rights under trademark law for use of some
trade names, trademarks, or service marks; or
f) Requiring indemnification of licensors and authors of that
material by anyone who conveys the material (or modified versions of
it) with contractual assumptions of liability to the recipient, for
any liability that these contractual assumptions directly impose on
those licensors and authors.
All other non-permissive additional terms are considered "further
restrictions" within the meaning of section 10. If the Program as you
received it, or any part of it, contains a notice stating that it is
governed by this License along with a term that is a further
restriction, you may remove that term. If a license document contains
a further restriction but permits relicensing or conveying under this
License, you may add to a covered work material governed by the terms
of that license document, provided that the further restriction does
not survive such relicensing or conveying.
If you add terms to a covered work in accord with this section, you
must place, in the relevant source files, a statement of the
additional terms that apply to those files, or a notice indicating
where to find the applicable terms.
Additional terms, permissive or non-permissive, may be stated in the
form of a separately written license, or stated as exceptions;
the above requirements apply either way.
8. Termination.
You may not propagate or modify a covered work except as expressly
provided under this License. Any attempt otherwise to propagate or
modify it is void, and will automatically terminate your rights under
this License (including any patent licenses granted under the third
paragraph of section 11).
However, if you cease all violation of this License, then your
license from a particular copyright holder is reinstated (a)
provisionally, unless and until the copyright holder explicitly and
finally terminates your license, and (b) permanently, if the copyright
holder fails to notify you of the violation by some reasonable means
prior to 60 days after the cessation.
Moreover, your license from a particular copyright holder is
reinstated permanently if the copyright holder notifies you of the
violation by some reasonable means, this is the first time you have
received notice of violation of this License (for any work) from that
copyright holder, and you cure the violation prior to 30 days after
your receipt of the notice.
Termination of your rights under this section does not terminate the
licenses of parties who have received copies or rights from you under
this License. If your rights have been terminated and not permanently
reinstated, you do not qualify to receive new licenses for the same
material under section 10.
9. Acceptance Not Required for Having Copies.
You are not required to accept this License in order to receive or
run a copy of the Program. Ancillary propagation of a covered work
occurring solely as a consequence of using peer-to-peer transmission
to receive a copy likewise does not require acceptance. However,
nothing other than this License grants you permission to propagate or
modify any covered work. These actions infringe copyright if you do
not accept this License. Therefore, by modifying or propagating a
covered work, you indicate your acceptance of this License to do so.
10. Automatic Licensing of Downstream Recipients.
Each time you convey a covered work, the recipient automatically
receives a license from the original licensors, to run, modify and
propagate that work, subject to this License. You are not responsible
for enforcing compliance by third parties with this License.
An "entity transaction" is a transaction transferring control of an
organization, or substantially all assets of one, or subdividing an
organization, or merging organizations. If propagation of a covered
work results from an entity transaction, each party to that
transaction who receives a copy of the work also receives whatever
licenses to the work the party's predecessor in interest had or could
give under the previous paragraph, plus a right to possession of the
Corresponding Source of the work from the predecessor in interest, if
the predecessor has it or can get it with reasonable efforts.
You may not impose any further restrictions on the exercise of the
rights granted or affirmed under this License. For example, you may
not impose a license fee, royalty, or other charge for exercise of
rights granted under this License, and you may not initiate litigation
(including a cross-claim or counterclaim in a lawsuit) alleging that
any patent claim is infringed by making, using, selling, offering for
sale, or importing the Program or any portion of it.
11. Patents.
A "contributor" is a copyright holder who authorizes use under this
License of the Program or a work on which the Program is based. The
work thus licensed is called the contributor's "contributor version".
A contributor's "essential patent claims" are all patent claims
owned or controlled by the contributor, whether already acquired or
hereafter acquired, that would be infringed by some manner, permitted
by this License, of making, using, or selling its contributor version,
but do not include claims that would be infringed only as a
consequence of further modification of the contributor version. For
purposes of this definition, "control" includes the right to grant
patent sublicenses in a manner consistent with the requirements of
this License.
Each contributor grants you a non-exclusive, worldwide, royalty-free
patent license under the contributor's essential patent claims, to
make, use, sell, offer for sale, import and otherwise run, modify and
propagate the contents of its contributor version.
In the following three paragraphs, a "patent license" is any express
agreement or commitment, however denominated, not to enforce a patent
(such as an express permission to practice a patent or covenant not to
sue for patent infringement). To "grant" such a patent license to a
party means to make such an agreement or commitment not to enforce a
patent against the party.
If you convey a covered work, knowingly relying on a patent license,
and the Corresponding Source of the work is not available for anyone
to copy, free of charge and under the terms of this License, through a
publicly available network server or other readily accessible means,
then you must either (1) cause the Corresponding Source to be so
available, or (2) arrange to deprive yourself of the benefit of the
patent license for this particular work, or (3) arrange, in a manner
consistent with the requirements of this License, to extend the patent
license to downstream recipients. "Knowingly relying" means you have
actual knowledge that, but for the patent license, your conveying the
covered work in a country, or your recipient's use of the covered work
in a country, would infringe one or more identifiable patents in that
country that you have reason to believe are valid.
If, pursuant to or in connection with a single transaction or
arrangement, you convey, or propagate by procuring conveyance of, a
covered work, and grant a patent license to some of the parties
receiving the covered work authorizing them to use, propagate, modify
or convey a specific copy of the covered work, then the patent license
you grant is automatically extended to all recipients of the covered
work and works based on it.
A patent license is "discriminatory" if it does not include within
the scope of its coverage, prohibits the exercise of, or is
conditioned on the non-exercise of one or more of the rights that are
specifically granted under this License. You may not convey a covered
work if you are a party to an arrangement with a third party that is
in the business of distributing software, under which you make payment
to the third party based on the extent of your activity of conveying
the work, and under which the third party grants, to any of the
parties who would receive the covered work from you, a discriminatory
patent license (a) in connection with copies of the covered work
conveyed by you (or copies made from those copies), or (b) primarily
for and in connection with specific products or compilations that
contain the covered work, unless you entered into that arrangement,
or that patent license was granted, prior to 28 March 2007.
Nothing in this License shall be construed as excluding or limiting
any implied license or other defenses to infringement that may
otherwise be available to you under applicable patent law.
12. No Surrender of Others' Freedom.
If conditions are imposed on you (whether by court order, agreement or
otherwise) that contradict the conditions of this License, they do not
excuse you from the conditions of this License. If you cannot convey a
covered work so as to satisfy simultaneously your obligations under this
License and any other pertinent obligations, then as a consequence you may
not convey it at all. For example, if you agree to terms that obligate you
to collect a royalty for further conveying from those to whom you convey
the Program, the only way you could satisfy both those terms and this
License would be to refrain entirely from conveying the Program.
13. Use with the GNU Affero General Public License.
Notwithstanding any other provision of this License, you have
permission to link or combine any covered work with a work licensed
under version 3 of the GNU Affero General Public License into a single
combined work, and to convey the resulting work. The terms of this
License will continue to apply to the part which is the covered work,
but the special requirements of the GNU Affero General Public License,
section 13, concerning interaction through a network will apply to the
combination as such.
14. Revised Versions of this License.
The Free Software Foundation may publish revised and/or new versions of
the GNU General Public License from time to time. Such new versions will
be similar in spirit to the present version, but may differ in detail to
address new problems or concerns.
Each version is given a distinguishing version number. If the
Program specifies that a certain numbered version of the GNU General
Public License "or any later version" applies to it, you have the
option of following the terms and conditions either of that numbered
version or of any later version published by the Free Software
Foundation. If the Program does not specify a version number of the
GNU General Public License, you may choose any version ever published
by the Free Software Foundation.
If the Program specifies that a proxy can decide which future
versions of the GNU General Public License can be used, that proxy's
public statement of acceptance of a version permanently authorizes you
to choose that version for the Program.
Later license versions may give you additional or different
permissions. However, no additional obligations are imposed on any
author or copyright holder as a result of your choosing to follow a
later version.
15. Disclaimer of Warranty.
THERE IS NO WARRANTY FOR THE PROGRAM, TO THE EXTENT PERMITTED BY
APPLICABLE LAW. EXCEPT WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT
HOLDERS AND/OR OTHER PARTIES PROVIDE THE PROGRAM "AS IS" WITHOUT WARRANTY
OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO,
THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
PURPOSE. THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE PROGRAM
IS WITH YOU. SHOULD THE PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF
ALL NECESSARY SERVICING, REPAIR OR CORRECTION.
16. Limitation of Liability.
IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING
WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MODIFIES AND/OR CONVEYS
THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES, INCLUDING ANY
GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE
USE OR INABILITY TO USE THE PROGRAM (INCLUDING BUT NOT LIMITED TO LOSS OF
DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD
PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER PROGRAMS),
EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF
SUCH DAMAGES.
17. Interpretation of Sections 15 and 16.
If the disclaimer of warranty and limitation of liability provided
above cannot be given local legal effect according to their terms,
reviewing courts shall apply local law that most closely approximates
an absolute waiver of all civil liability in connection with the
Program, unless a warranty or assumption of liability accompanies a
copy of the Program in return for a fee.
END OF TERMS AND CONDITIONS
How to Apply These Terms to Your New Programs
If you develop a new program, and you want it to be of the greatest
possible use to the public, the best way to achieve this is to make it
free software which everyone can redistribute and change under these terms.
To do so, attach the following notices to the program. It is safest
to attach them to the start of each source file to most effectively
state the exclusion of warranty; and each file should have at least
the "copyright" line and a pointer to where the full notice is found.
<one line to give the program's name and a brief idea of what it does.>
Copyright (C) <year> <name of author>
This program is free software: you can redistribute it and/or modify
it under the terms of the GNU General Public License as published by
the Free Software Foundation, either version 3 of the License, or
(at your option) any later version.
This program is distributed in the hope that it will be useful,
but WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
GNU General Public License for more details.
You should have received a copy of the GNU General Public License
along with this program. If not, see <https://www.gnu.org/licenses/>.
Also add information on how to contact you by electronic and paper mail.
If the program does terminal interaction, make it output a short
notice like this when it starts in an interactive mode:
<program> Copyright (C) <year> <name of author>
This program comes with ABSOLUTELY NO WARRANTY; for details type `show w'.
This is free software, and you are welcome to redistribute it
under certain conditions; type `show c' for details.
The hypothetical commands `show w' and `show c' should show the appropriate
parts of the General Public License. Of course, your program's commands
might be different; for a GUI interface, you would use an "about box".
You should also get your employer (if you work as a programmer) or school,
if any, to sign a "copyright disclaimer" for the program, if necessary.
For more information on this, and how to apply and follow the GNU GPL, see
<https://www.gnu.org/licenses/>.
The GNU General Public License does not permit incorporating your program
into proprietary programs. If your program is a subroutine library, you
may consider it more useful to permit linking proprietary applications with
the library. If this is what you want to do, use the GNU Lesser General
Public License instead of this License. But first, please read
<https://www.gnu.org/licenses/why-not-lgpl.html>.

View File

@ -1,2 +0,0 @@
# A guide to play firewatch, and a day by day transcription.
# I have paused this project until June 2021

View File

@ -1,31 +0,0 @@
# Firewatch Guide
# What is Firewatch?
### Firewatch is a single-player first-person mystery set in the Wyoming wilderness, where your only emotional lifeline is the person on the other end of a handheld radio.
# I have paused this project until June 2021
[![Hits](https://hits.seeyoufarm.com/api/count/incr/badge.svg?url=https%3A%2F%2Fgithub.com%2FSophiaAtkinson%2FFirewatch-Guide&count_bg=%23FF6B00&title_bg=%23000000&icon=mediafire.svg&icon_color=%23E7E7E7&title=Page+Views+&edge_flat=false)](https://hits.seeyoufarm.com)
![Firewatch Intro Image](https://firewatch.ml/cdn/Firewatch%20Intro%20Image.jpg)
<!-- blank line -->
[Firewatch Playthrough No Commentary](https://www.youtube.com/watch?v=NGDuoCAu0Rg&t=4552s) 2:04 Hours
<!-- blank line -->
# BELOW ARE MAJOR SPOILERS!
<!-- blank line -->
# The Prologue
You get options and you can pick whatever you want, But during the prologue, you start your 2-day hike up to your tower. When you get up to the tower you turn on your light, then you hear a walkie-talkie going off, saying "Hello two forks tower!". You say Hello to Delilah, who is your boss, you will be spending the rest of your time as a Firewatch with her.
<!-- blank line -->
![Firewatch Intro Image](https://firewatch.ml/cdn/arch.jpg)
<!-- blank line -->
# Day One
Day 1 starts off with you (Henry) sitting at your desk getting some writing on your typewriter. Delilah chimes in on your walkie-talkie to say "good morning, or should I say good afternoon." Since there are a few hours of daylight left she wants to try to get some work in, Since it is your first day she wants to get you acquainted with the job, She wants you to look at the round table in the middle of your tower. "This is the Osbourne Fire Finder. Invented in 1914 by W.B..." You respond Osbourne?, "You use this to spot you guessed it, fi-what the fuck" Your quick run-through has been interrupted, by fireworks out your west-facing window. Now you have to go stop whoever is shooting off the Fireworks but to get down to the lake where the fireworks are going off you need a rope to get down the shale. Luckily there are these neat little supply boxes spread around the forest, "The code is "1-2-3-4" it's actually that for all of them" Delilah says. You open the box, there is a map and some notes, a map, and the rope, you copy the map to your map, read the note, then take the rope, there is a granola bar but, you decide to leave it. You make your way down the hill and then a little outcropping, you get to the shale slid, it's fairly steep, Delilah says that it's not named on their topos, so you decide to give it a name, you can name it 1 of 3 things, Cripple Gultch, Widowmaker, or Shitty boss is going to get me killed hill. I normally chose Cripple Gultch, but this time I chose, Shitty boss is going to get me killed hill. while going down the hill your rope snaps sending you down the shale, You survive but the name is fitting now. Coming down the hill you find a lot of empty beer cans, you decide to clean them up, keep the forest looking nice. The idiots down at the lake also decided to make a campfire, you put the fire out, then you find, a bottle of whiskey, a bundle of fireworks, two backpacks, then clothes. You tell Delilah about taking the fireworks, and then about the clothes, she makes a comment about "Nudie pyromaniacs." You start walking through some bushes, you find a bra, and two pairs of panties... There are two naked laddies in the lake setting off fireworks, You get their attention, but since they are teens they say this "Hey, you fucking fatso! Leave us alone." You tell them to take it easy with the fireworks. "You oughta take it easy with the Sizzler buffet." Now you let your anger get the best of you, you grab their boombox, and you through it in the lake... "Light another firework and it won't be your stereo I wreck." you say, now you make your way out of the lake, but since your rope broke you need to make your way through thunder canyon. "Hey, did that go okay?" Delilah asks, you lie and said it went fine. While you make your way back Delilah says, "So... I have a bit of a confession to make." "What is it?" you ask. "Um... Look, I was drunk last night when I welcomed you to the job." She apologies for being putting you on the spot about why your out here. You accept her apology. After that you keep walking, then you hear thunder, there is a storm out to the north of you. You find a supply box, you open it, and do your thing, you also find a flashlight in there. Then you find a cave, you go into the cave, part of the cave is gated off, they lost the keys a little while ago, so its secrets are locked away for good. You are very close to the tower when you see a light, then a figure, you tell Delilah, she makes fun of you. You climb up to the land of the tower, you lean on a sign, and boom you fall so does the sign. You walk up to the tower, you see your typewriter out on the ground by the stairs, you walk up the stairs with your typewriter, you find some broken glass, someone broke into the tower. They threw everything to shit, and they took your sheets, that's all they took. Delilah lets the forest service know what happened. You think that the girls at the lake did this. "I need you to feel safe out here," says Delilah, You ask her to locate you to the Forest service weapons cache. She says "Yeah... Someone made the decision years ago that leaving someone with a gun and infinite amounts of alone time was kinda a bad idea." That's Day one check back for Day Two soon.
<!-- blank line -->
![Firewatch Intro Image](https://firewatch.ml/cdn/pork.jpg)
<!-- blank line -->
# I have paused this project until June 2021
<!-- blank line -->
Firewatch.ml is a community website and is not affiliated with Firewatch or Campo Santo.

View File

@ -1 +0,0 @@
# Coming Soon in the somewhere near future

Binary file not shown.

Before

Width:  |  Height:  |  Size: 378 KiB

View File

@ -1,7 +0,0 @@
# This is where you can showcase your firewatch pictures.
A template will be coming soon.
*projectfirewatch.com is a community website and is not affiliated with Firewatch or Campo Santo.*
*Firewatch and the Firewatch logos are trademarks of Campo Santo. All other trademarks are property of their respective owners.*

View File

@ -1,21 +0,0 @@
# This is where you can showcase your firewatch pictures.
A template will be coming soon.
---
### [Home](/)
---
# Community Firewatch Photos
---
### [Sophia's Photos](/gallery/sophia)
---
*projectfirewatch.com is a community website and is not affiliated with Firewatch or Campo Santo.*
*Firewatch and the Firewatch logos are trademarks of Campo Santo. All other trademarks are property of their respective owners.*

Binary file not shown.

Before

Width:  |  Height:  |  Size: 450 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 641 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 603 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 535 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 181 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 398 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 120 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 150 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 160 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 532 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 276 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 495 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 383 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 716 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 228 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 673 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 461 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 596 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 493 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 594 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 247 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 763 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 192 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 207 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 330 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 202 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 185 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 385 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 563 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 167 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 248 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 593 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 610 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 323 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 264 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 602 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 142 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 387 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 269 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 650 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 337 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 414 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 432 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 337 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 347 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 413 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 411 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 387 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 296 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 344 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 426 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 972 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 372 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 312 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 525 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 477 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 328 KiB

View File

@ -1,127 +0,0 @@
# Every Firewatch photo from Sophia
---
### [Home](/)
---
![0](/gallery/sophia/i/1_photo_1.jpg)
![0](/gallery/sophia/i/1_photo_2.jpg)
![0](/gallery/sophia/i/1_photo_5.jpg)
![0](/gallery/sophia/i/1_photo_6.jpg)
![0](/gallery/sophia/i/1_photo_7.jpg)
![0](/gallery/sophia/i/1_photo_8.jpg)
![0](/gallery/sophia/i/1_photo_9.jpg)
![0](/gallery/sophia/i/1_photo_10.jpg)
![0](/gallery/sophia/i/1_photo_11.jpg)
![0](/gallery/sophia/i/1_photo_12.jpg)
![0](/gallery/sophia/i/1_photo_13.jpg)
![0](/gallery/sophia/i/1_photo_13.jpg)
![0](/gallery/sophia/i/2_photo_1.jpg)
![0](/gallery/sophia/i/2_photo_2.jpg)
![0](/gallery/sophia/i/2_photo_3.jpg)
![0](/gallery/sophia/i/2_photo_4.jpg)
![0](/gallery/sophia/i/2_photo_5.jpg)
![0](/gallery/sophia/i/2_photo_6.jpg)
![0](/gallery/sophia/i/2_photo_7.jpg)
![0](/gallery/sophia/i/2_photo_8.jpg)
![0](/gallery/sophia/i/2_photo_9.jpg)
![0](/gallery/sophia/i/3_photo_1.jpg)
![0](/gallery/sophia/i/3_photo_2.jpg)
![0](/gallery/sophia/i/3_photo_3.jpg)
![0](/gallery/sophia/i/3_photo_4.jpg)
![0](/gallery/sophia/i/3_photo_5.jpg)
![0](/gallery/sophia/i/3_photo_6.jpg)
![0](/gallery/sophia/i/3_photo_7.jpg)
![0](/gallery/sophia/i/3_photo_8.jpg)
![0](/gallery/sophia/i/3_photo_9.jpg)
![0](/gallery/sophia/i/3_photo_10.jpg)
![0](/gallery/sophia/i/3_photo_11.jpg)
![0](/gallery/sophia/i/3_photo_12.jpg)
![0](/gallery/sophia/i/3_photo_13.jpg)
![0](/gallery/sophia/i/3_photo_14.jpg)
![0](/gallery/sophia/i/3_photo_15.jpg)
![0](/gallery/sophia/i/3_photo_16.jpg)
![0](/gallery/sophia/i/3_photo_17.jpg)
![0](/gallery/sophia/i/3_photo_18.jpg)
![0](/gallery/sophia/i/4_photo_1.jpg)
![0](/gallery/sophia/i/4_photo_2.jpg)
![0](/gallery/sophia/i/4_photo_3.jpg)
![0](/gallery/sophia/i/4_photo_4.jpg)
![0](/gallery/sophia/i/4_photo_5.jpg)
![0](/gallery/sophia/i/4_photo_6.jpg)
![0](/gallery/sophia/i/4_photo_7.jpg)
![0](/gallery/sophia/i/4_photo_8.jpg)
![0](/gallery/sophia/i/4_photo_9.jpg)
![0](/gallery/sophia/i/4_photo_10.jpg)
![0](/gallery/sophia/i/4_photo_11.jpg)
![0](/gallery/sophia/i/4_photo_12.jpg)
![0](/gallery/sophia/i/4_photo_13.jpg)
![0](/gallery/sophia/i/4_photo_14.jpg)
![0](/gallery/sophia/i/4_photo_15.jpg)
![0](/gallery/sophia/i/4_photo_16.jpg)
![0](/gallery/sophia/i/4_photo_17.jpg)
![0](/gallery/sophia/i/4_photo_18.jpg)
---
*projectfirewatch.com is a community website and is not affiliated with Firewatch or Campo Santo.*
*Firewatch and the Firewatch logos are trademarks of Campo Santo. All other trademarks are property of their respective owners.*

View File

@ -1,68 +0,0 @@
![Header](/cdn/header.png)
---
# What is Firewatch?
---
### Firewatch is a single-player first-person mystery set in the Wyoming wilderness, where your only emotional lifeline is the person on the other end of a handheld radio.
---
![Clickaroos](https://camo.githubusercontent.com/612c403f0241d9c1edf9ea44167dc013cb6de7457457f6e7c0a1373b3b5db65c/68747470733a2f2f686974732e736565796f756661726d2e636f6d2f6170692f636f756e742f696e63722f62616467652e7376673f75726c3d68747470732533412532462532466769746875622e636f6d253246536f7068696141746b696e736f6e2532464669726577617463682d477569646526636f756e745f62673d253233323532353235267469746c655f62673d2532333235323532352669636f6e3d2669636f6e5f636f6c6f723d253233453745374537267469746c653d436c69636b61726f6f7326656467655f666c61743d74727565)
---
## Table of contents
### [Achievements](/achievements/)
### [Shoshone Wildlife Notes](/shoshonewildlifenotes/)
### [Shoshone Book Club](/shoshonebookclub/)
### [Gallery](/gallery/)
### [Game Transcription (Discontinued)](/transcription/)
### [Misc Info](/info/)
### [Firewatch Playthrough](/playthrough/)
### [Audio Tour Transcription](/cdn/FirewatchAudioTour.pdf)
---
## Community Update!
## 7/30/2021
## Thanks for 5.3 million page views, As an fyi I am on "vacation" and I will be back soon.
---
![Firewatch Photo](/cdn/20201109190843_1.jpg)
---
![Firewatch Photo](/cdn/20201109191235_1.jpg)
---
![Firewatch Photo](/cdn/20200701135637_1.jpg)
---
![Firewatch Photo](/cdn/20200701135646_1.jpg)
---
![Firewatch Intro](/cdn/20200701135654_1.jpg)
---
*projectfirewatch.com is a community website and is not affiliated with Firewatch or Campo Santo.*
*Firewatch and the Firewatch logos are trademarks of Campo Santo. All other trademarks are property of their respective owners.*

View File

@ -1,83 +0,0 @@
# Firewatch Wiki
---
### [Home](/)
---
Firewatch is an adventure game developed by Campo Santo and published by the developer in partnership with Panic. The game was released in February 2016 for Microsoft Windows, OS X, Linux, and PlayStation 4, for Xbox One in September 2016, and for Nintendo Switch in December 2018.
The story follows a fire lookout named Henry in the Shoshone National Forest, a year after the Yellowstone fires of 1988. A month after his first day at work, strange things begin happening to him and his supervisor Delilah, which connects to a conspired mystery that happened years ago. Henry interacts with Delilah using a walkie-talkie, with the player choosing from dialog options to communicate. His exchanges with Delilah inform the process by which their relationship is developed. The game was directed by Olly Moss and Sean Vanaman, written by Chris Remo, Jake Rodkin, Moss and Vanaman, and produced by Gabe McGill and artist Jane Ng. The game's environment was modelled by Ng, based on a single painting by Moss. The design draws inspiration from New Deal advertisements by the National Park Service and field research conducted in Yosemite National Park.
The game received generally positive reviews, earning praise for its story, characters, dialogue, and visual style. However, the presence of technical issues and the game's ending were both subjects of criticism. Firewatch won the award for Best 3D Visual Experience at the Unity Awards 2016, Best Indie Game at the 2016 Golden Joystick Awards, Best Narrative at the 2017 Game Developers Choice Awards and Debut Game at the 2017 British Academy Games Awards. By late 2016, the game had sold over a million copies.
---
## Plot
In the spring of 1989, after his wife develops early-onset dementia, Henry (Rich Sommer) takes a job as a fire lookout in Shoshone National Forest, Wyoming. On his first day, Delilah (Cissy Jones), a lookout in another watchtower, contacts him via walkie-talkie and asks him to investigate illegal fireworks by the lake. Henry discovers a pair of teenage girls, who accuse him of leering. On his way home he comes across a locked cave, and spots a shadowy figure watching him before disappearing. He returns to his watchtower to find it ransacked. The next day, Delilah asks Henry to investigate a downed communication line. He finds it cut, with a note apparently signed by the teens. He and Delilah plot to scare the girls off, but when he finds the girls' campsite ransacked and abandoned, they begin to worry.
Henry finds an old backpack and a disposable camera belonging to a boy named Brian Goodwin, who Delilah explains was the son of Ned, a former lookout. Ned was an outdoorsman who drank heavily due to his traumatic experiences in the Vietnam War, while his son, Brian, enjoyed fantasy novels and role-playing games. Though it is against the rules for employees to bring their children to the towers, Delilah was fond of Brian and lied about his presence. He and Ned apparently left abruptly and never returned. The teenage girls are reported missing. Fearing an inquiry, Delilah falsifies reports to say that neither she nor Henry encountered the girls.
Two months after Henry started his job, a small wildfire breaks out south of his tower. Two weeks later, Henry discovers a radio and a clipboard while fishing, with notes including transcripts of his conversations with Delilah. He is knocked unconscious by an unseen assailant and wakes up to find the clipboard and radio gone. In a meadow referred to on the clipboard letterhead, he finds a fenced-off government research area. He breaks in and discovers surveillance equipment and typewritten reports detailing his and Delilah's conversations and private lives. He also discovers a tracking device which he takes with him. Henry and Delilah discuss destroying the government camp, but decide against it. As Henry hikes home, however, someone sets fire to the camp.
The next day, Henry uses the tracking device to find a backpack with a key to the locked cave. Delilah reports a figure in Henry's tower; when Henry arrives, he finds a Walkman taped to the door with an incriminating recording of Henry and Delilah's discussion about destroying the government camp. The next day, someone impersonating Henry calls another lookout and claims that Delilah knows the cause of the station fire, putting her and Henry more on edge.
Henry uses the found key to enter the cave but is suddenly locked inside by an unseen figure. Deep in the cave, he discovers Brian's body and broken climbing gear before escaping the cave. Delilah is upset by the news. The next day, an evacuation order is given for all the lookouts, as the wildfire that Henry had spotted and named earlier has grown out of control.
As Henry prepares to leave, the tracking device begins beeping. He follows the signal and discovers a tape from Ned. Ned claims that Brian's death was accidental, and that the boy fell due to climbing inexperience. Unwilling to return to society after Brian's death, Ned secretly lived in the area ever since. Choosing to venture deeper into the wilderness, Ned warns Henry not to look for him. Henry finds Ned's makeshift bunker, along with items stolen from the government camp, the lookout towers, and the teenage girls, who Delilah confirms have been found safe. The government camp was simply studying wildlife; Ned had been using its radio equipment to ensure no one was looking for him and to create transcripts to scare Henry away. Despite Neds confession, Delilah blames him for Brian's death and leaves on the helicopter. Henry goes to her tower, and he and Delilah say their goodbyes via radio before Henry evacuates.
---
## Development and release
Firewatch is the first video game from Campo Santo, and was created by Jake Rodkin and Sean Vanaman, who were the creative leads on The Walking Dead; Nels Anderson, the lead designer of Mark of the Ninja; and artist Olly Moss. Chris Remo was involved in many aspects of the design, and also composed the score. Development for Firewatch began with a single painting by Moss. Jane Ng, lead environmental artist at Campo Santo, was tasked with translating Moss' work into 3D environments while maintaining his stylized artistic vision. Moss, who had previously been known primarily for his graphic design work, had joined Vanaman and Rodkin to found Campo Santo after spending many years working on the periphery of game development. In creating the painting, Moss emulated National Park Service posters from the New Deal era in both color palette and iconography. The development team went on a camping trip to Yosemite National Park for inspiration for the game, where they visited a lookout tower built with the same design as its video game counterpart. Further inspiration for the game came from Vanaman and Anderson's experiences growing up in rural Wyoming.
Firewatch runs on the Unity game engine. Ng disapproved of the tools for creating trees, and therefore hand-modeled the 23 kinds of trees that would be placed within the game 4,600 times. A custom shader was also employed to produce more stylized and simplified foliage. The in-game fire lookout towers were built in accordance with government specifications, utilizing standard lumber size, after Ng's first attempt was unsatisfactory.
The walkie-talkie interaction in Firewatch is inspired by the relationship in BioShock between the player character and Atlas, as well as the dialog system from The Walking Dead. At one point in the development, it was intended that the protagonist would be able to communicate with multiple characters, such as hikers, but the idea was discarded due to its expense and the schedule requirements with which the team were working. The team hoped to avoid lip syncing and minimize the amount of animation needed due to the limited team size and resources. The developers cast Cissy Jones, who appeared in The Walking Dead, as the voice of Delilah in 2014. It took longer to find a voice actor for Henry who the developers felt jibed with Jones; they ultimately cast Rich Sommer. Jones and Sommer recorded their lines in separate studios, but while on conference calls with each other to achieve a more natural rapport. The actors made a decision not to meet during production to maintain the distance between their characters.
The game's opening chapter features the song "Push Play" from Joy Chun and Nate Bosley's 2014 synthwave album Let's Get Electric, which depicts a fictitious 1980s synthpop act known as Cheap Talk. Taylor Dayne's "Tell It to My Heart" was used as a placeholder in the scene, but Vanaman conceded that the song was too overwhelming, and would cost too much to license. Upon the realization that it would also be too costly to commission a song, Remo sought a song in the style of the 1980s by an unsigned, independent artist, leading to the use of "Push Play". The score features a combination of electric and acoustic guitar, bass and electric piano, with samples of Fender Rhodes as a substitute for the actual piano. Remo played all of the instruments himself.
The game was announced in March 2014 with a tentative release date of 2015. At GDC, Campo Santo housed a public playtest, and Ng hosted a panel on the design and aesthetic of the game entitled "The Art of Firewatch".In June 2015, the team visited E3. There, they confirmed that they would be bringing the game to PlayStation 4, but that this would be the only console version. However, an Xbox One version was later released in North America on September 21, 2016, featuring an audio tour and a free roam mode. Due to ratings issues, the version was delayed in Europe until September 30 and in Australia and New Zealand until October 14.
Users of the HTC Vive and Oculus Rift virtual reality headsets can tour Henry's lookout tower using the Steam application Destinations. For this purpose, the scene was rebuilt on the Source game engine. Firewatch was made compatible with PlayStation 4 Pro on its November 10 launch, with enhanced performance through 4K resolution and high-dynamic-range imaging. The free roam mode was enabled for PlayStation 4 Pro and Steam shortly thereafter. Partnering with Limited Run Games, Campo Santo distributed under ten thousand physical copies of the game on PlayStation 4. 4,800 copies were made available for order on the Limited Run Games website on December 16, 2016, while 2,500 were sold through the Campo Santo online store starting January 16, 2017.In April 2018, Campo Santo announced the game will be released for Nintendo Switch later in the year. It was later clarified the Nintendo Switch port is a heavily optimised version of the game, and the update will also be available for other platforms. Additionally, the Nintendo Switch version features some exclusive elements. Campo Santo later confirmed, via Twitter, the worldwide release date for the Nintendo Switch port as December 17, 2018.
---
## Reception
Firewatch received "generally favorable" reviews, according to review aggregator Metacritic. The game sold more than five hundred thousand copies within a month of its release and over one million copies by the end of its first year. As of 2018, Firewatch has sold over 2.5 million copies across all platforms.
Steven Hansen at Destructoid welcomed the choice-based dialog tree gameplay, going on to praise the dialog itself, as well as the voice performances. The game's most impressive achievement, as stated by Hansen, was the "thematic cohesion", which was said to revolve around self-imposed isolation. The sound design was lauded to have evoked a Hitchcockian sense of fear. Reviewing Firewatch, Game Informer's Jeff Cork wrote, "I was immediately drawn into the game's world, partly because of the power of its simple text intro, and also because of the novelty of taking part in something so mundane". Cork observed that its interactive dialog, though simple, "breathes life into the game" and called the conversations "natural" and "engaging". He enjoyed exploring the forest environment, yet felt the ending was unsatisfactory.
Scott Butterworth of GameSpot thought that the analog navigation tools a hand-held compass and paper map were "immersive" but "occasionally frustrating". He found that the visual beauty of the setting allowed for a more rewarding form of exploration and noted that the sound design complemented the depth of its atmosphere. Judging the development of the characters through dialog to be "bold" and "admirable", he opined that it served as "a patient, reflective examination of how two people grow to trust and care for each other". According to Butterworth, the voice acting was brilliant and layered with emotional nuance, as he had evolved a strong attachment to the characters. GamesRadar's Justin Towell described Firewatch as "one of the most enthralling slices of entertainment I've ever experienced". He commended the voice acting for having successfully defined each character's personality traits. Towell added that the music, alongside the sound design, worked well in service of the atmosphere. However, he disparaged a few noticeable continuity problems that left him disillusioned.
Ryan McCaffrey at IGN hailed the sense of realism elicited by the setting, despite the stylized level design and artwork. He also approved of the script, saying that voice acting enhanced it further. Of the writing, McCaffrey said, "It's tense, scary, and funny sometimes all within a few minutes of each other. Not a lot of games can successfully claim that". He deemed the ending polarizing because of the story's promising escalation. Polygon's Colin Campbell appreciated the use of humor and empathy to develop the characters, considered the game's mystery to be successful and the story to be "elegant" and "satisfying". He criticized the conclusion, regarding it as unsuccessful.
---
## Here are some concept sketches during development.
![Sketch](/cdn/info/Firewatch/Et2R-V7U0Ag0Rbu.jpg)
![Sketch](/cdn/info/Firewatch/Et2U6VBVkAIKp9v.jpg)
![Sketch](/cdn/info/Firewatch/Et2Uu8RVoAI4Q_b.png)
![Sketch](/cdn/info/Firewatch/Et2VBwwVEAIw1p-.png)
![Sketch](/cdn/info/Firewatch/Et2VDdAVcAMvC7t.jpg)
---
## Credits
[WikiPedia](https://en.wikipedia.org/wiki/Firewatch)
[Campo Santo Twitter](https://twitter.com/camposanto/status/1359403257437712388)
---
*projectfirewatch.com is a community website and is not affiliated with Firewatch or Campo Santo.*
*Firewatch and the Firewatch logos are trademarks of Campo Santo. All other trademarks are property of their respective owners.*

View File

@ -1,41 +0,0 @@
![Campo Santo Logo](/cdn/info/camposanto/logo.png)
---
### [Home](/)
---
### Campo Santo Productions LLC was founded September 2013 in Bellevue, Washington by Sean Vanaman, Jake Rodkin, Nels Anderson, and Olly Moss.
### In August 2014, a game demo of Firewatch was released at PAX West, The game was released for Microsoft Windows, PlayStation 4, OS X, Linux, and Xbox One in late 2016.
### In February 2016, Vanaman stated that Campo Santo's next game would not be a sequel to Firewatch. In September 2016, both Campo Santo and Good Universe issued a partnership to produce a feature film adaptation of Firewatch and other content. In November 2016, the company stated that the game would begin a limited-run physical release towards the end of the year. At the same time, it was announced that Firewatch had sold over a million copies.
### In June 2016, Ford Motor Company used an image that closely resembled promotional art from Firewatch, which caused controversy from both Panic, Vanaman and others. Shortly thereafter, Quirk Auto Dealers issued an apology, stating that Ford was not involved within the advertisement planning.
### On April 21, 2018, Campo Santo announced that they had been acquired by Valve and would subsequently move to Valve's Bellevue, Washington headquarters and continuing In the Valley of Gods as a Valve game. According to Vanaman and Rodkin, after the success of Firewatch, they started internal discussions of where they wanted to take their company. These discussions continued informally with third parties, including Valve's Robin Walker, Erik Johnson and Scott Lynch. These Valve employees suggested that Campo Santo could retain its own direction while being wholly within Valve, yet still draw from Valve's knowledge and expertise. Vanaman and Rodkin discussed this more formally with Valve, ultimately leading to the acquisition.
### Development on In The Valley of Gods was put on hold in July 2019, partially due to head writer Sean Vanaman moving to the writing team for Half-Life: Alyx, which had not been announced to the public at the time. In November 2019, it was noted by journalists that Claire Hummel, Jane Ng, and Rodkin had removed In the Valley of Gods from their Twitter profile descriptions. The game also disappeared from Campo Santo's website and the original announcement trailer was made private on YouTube, though the website and its Steam profile page were still available. It was later revealed by Rodkin that the game was put on hold as he and the other designers of the game had been busy working on other projects at Valve, such as Half-Life: Alyx, Dota Underlords, and Steam.
---
Key People
-
Sean Vanaman
Jake Rodkin
Chris Remo
Jane Ng
---
Credits [Wikipedia](https://en.wikipedia.org/wiki/Campo_Santo_(company))
---
*projectfirewatch.com is a community website and is not affiliated with Firewatch or Campo Santo.*
*Firewatch and the Firewatch logos are trademarks of Campo Santo. All other trademarks are property of their respective owners.*

View File

@ -1,23 +0,0 @@
# Info Page
---
### [Home](/)
---
## Table Of Contents
### [Campo Santo](/info/camposanto)
### [Firewatch](/info/Firewatch)
### [Project News/Info](/info/project)
### [Thank you](/info/thanks)
---
*projectfirewatch.com is a community website and is not affiliated with Firewatch or Campo Santo.*
*Firewatch and the Firewatch logos are trademarks of Campo Santo. All other trademarks are property of their respective owners.*

View File

@ -1,16 +0,0 @@
# Project info/news and more
---
### [Home](/)
---
# July Change Log
- Firewatch Gallery Added
- Changed footer
- Changed Repo name
- Header image added
- Moved Audio Tour from google drive to the site.
- Added a page for the Firewatch Playthrough

View File

@ -1,36 +0,0 @@
# This is where we thank all of you.
---
### [Home](/)
---
6/11/2021
Thank you so so much for 900,000 page views! I cant belive it, cant wait to see this project done!
---
6/12/2021
I am at a loss for words 1,000,000 page views... from the bottom of my heart, thank you.
---
7/2/2021
I was gone for about a week and I came back to almost 3.1 million page views, I don't know what to say. Why? Like out of all the sites to be seen? My unfinished site is this popular... Well thank you all for coming here, I hope you have a great day.
---
7/30/2021
Thanks for 5.3 million page views, As an fyi I am on "vacation" and I will be back soon.
---
*projectfirewatch.com is a community website and is not affiliated with Firewatch or Campo Santo.*
*Firewatch and the Firewatch logos are trademarks of Campo Santo. All other trademarks are property of their respective owners.*

View File

@ -1,54 +0,0 @@
# Firewatch Playthrough in 4K
---
## You can watch it here or on youtube [here](https://www.youtube.com/watch?v=WxTp-I0O8TU)
---
## New playthrough coming Q3 or Q4 2021.
---
### [Home](/)
---
<iframe width="650" height="366" src="https://www.youtube.com/embed/WxTp-I0O8TU" title="YouTube video player" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture" allowfullscreen></iframe>
---
Timestamps
0:00 Prologue
7:29 Day 1
23:43 Day 2
44:22 Day 3
48:02 Day 9
49:31 Day 15
53:02 Day 64
55:58 Day 76
1:10:35 Day 77
1:25:21 Day 77 (Night)
1:29:20 Day 78
1:41:42 Day 79 (Evacuation)
2:01:49 Credits
*Also in pinned comment and description*
---
*projectfirewatch.com is a community website and is not affiliated with Firewatch or Campo Santo.*
*Firewatch and the Firewatch logos are trademarks of Campo Santo. All other trademarks are property of their respective owners.*

View File

@ -1,674 +0,0 @@
GNU GENERAL PUBLIC LICENSE
Version 3, 29 June 2007
Copyright (C) 2007 Free Software Foundation, Inc. <https://fsf.org/>
Everyone is permitted to copy and distribute verbatim copies
of this license document, but changing it is not allowed.
Preamble
The GNU General Public License is a free, copyleft license for
software and other kinds of works.
The licenses for most software and other practical works are designed
to take away your freedom to share and change the works. By contrast,
the GNU General Public License is intended to guarantee your freedom to
share and change all versions of a program--to make sure it remains free
software for all its users. We, the Free Software Foundation, use the
GNU General Public License for most of our software; it applies also to
any other work released this way by its authors. You can apply it to
your programs, too.
When we speak of free software, we are referring to freedom, not
price. Our General Public Licenses are designed to make sure that you
have the freedom to distribute copies of free software (and charge for
them if you wish), that you receive source code or can get it if you
want it, that you can change the software or use pieces of it in new
free programs, and that you know you can do these things.
To protect your rights, we need to prevent others from denying you
these rights or asking you to surrender the rights. Therefore, you have
certain responsibilities if you distribute copies of the software, or if
you modify it: responsibilities to respect the freedom of others.
For example, if you distribute copies of such a program, whether
gratis or for a fee, you must pass on to the recipients the same
freedoms that you received. You must make sure that they, too, receive
or can get the source code. And you must show them these terms so they
know their rights.
Developers that use the GNU GPL protect your rights with two steps:
(1) assert copyright on the software, and (2) offer you this License
giving you legal permission to copy, distribute and/or modify it.
For the developers' and authors' protection, the GPL clearly explains
that there is no warranty for this free software. For both users' and
authors' sake, the GPL requires that modified versions be marked as
changed, so that their problems will not be attributed erroneously to
authors of previous versions.
Some devices are designed to deny users access to install or run
modified versions of the software inside them, although the manufacturer
can do so. This is fundamentally incompatible with the aim of
protecting users' freedom to change the software. The systematic
pattern of such abuse occurs in the area of products for individuals to
use, which is precisely where it is most unacceptable. Therefore, we
have designed this version of the GPL to prohibit the practice for those
products. If such problems arise substantially in other domains, we
stand ready to extend this provision to those domains in future versions
of the GPL, as needed to protect the freedom of users.
Finally, every program is threatened constantly by software patents.
States should not allow patents to restrict development and use of
software on general-purpose computers, but in those that do, we wish to
avoid the special danger that patents applied to a free program could
make it effectively proprietary. To prevent this, the GPL assures that
patents cannot be used to render the program non-free.
The precise terms and conditions for copying, distribution and
modification follow.
TERMS AND CONDITIONS
0. Definitions.
"This License" refers to version 3 of the GNU General Public License.
"Copyright" also means copyright-like laws that apply to other kinds of
works, such as semiconductor masks.
"The Program" refers to any copyrightable work licensed under this
License. Each licensee is addressed as "you". "Licensees" and
"recipients" may be individuals or organizations.
To "modify" a work means to copy from or adapt all or part of the work
in a fashion requiring copyright permission, other than the making of an
exact copy. The resulting work is called a "modified version" of the
earlier work or a work "based on" the earlier work.
A "covered work" means either the unmodified Program or a work based
on the Program.
To "propagate" a work means to do anything with it that, without
permission, would make you directly or secondarily liable for
infringement under applicable copyright law, except executing it on a
computer or modifying a private copy. Propagation includes copying,
distribution (with or without modification), making available to the
public, and in some countries other activities as well.
To "convey" a work means any kind of propagation that enables other
parties to make or receive copies. Mere interaction with a user through
a computer network, with no transfer of a copy, is not conveying.
An interactive user interface displays "Appropriate Legal Notices"
to the extent that it includes a convenient and prominently visible
feature that (1) displays an appropriate copyright notice, and (2)
tells the user that there is no warranty for the work (except to the
extent that warranties are provided), that licensees may convey the
work under this License, and how to view a copy of this License. If
the interface presents a list of user commands or options, such as a
menu, a prominent item in the list meets this criterion.
1. Source Code.
The "source code" for a work means the preferred form of the work
for making modifications to it. "Object code" means any non-source
form of a work.
A "Standard Interface" means an interface that either is an official
standard defined by a recognized standards body, or, in the case of
interfaces specified for a particular programming language, one that
is widely used among developers working in that language.
The "System Libraries" of an executable work include anything, other
than the work as a whole, that (a) is included in the normal form of
packaging a Major Component, but which is not part of that Major
Component, and (b) serves only to enable use of the work with that
Major Component, or to implement a Standard Interface for which an
implementation is available to the public in source code form. A
"Major Component", in this context, means a major essential component
(kernel, window system, and so on) of the specific operating system
(if any) on which the executable work runs, or a compiler used to
produce the work, or an object code interpreter used to run it.
The "Corresponding Source" for a work in object code form means all
the source code needed to generate, install, and (for an executable
work) run the object code and to modify the work, including scripts to
control those activities. However, it does not include the work's
System Libraries, or general-purpose tools or generally available free
programs which are used unmodified in performing those activities but
which are not part of the work. For example, Corresponding Source
includes interface definition files associated with source files for
the work, and the source code for shared libraries and dynamically
linked subprograms that the work is specifically designed to require,
such as by intimate data communication or control flow between those
subprograms and other parts of the work.
The Corresponding Source need not include anything that users
can regenerate automatically from other parts of the Corresponding
Source.
The Corresponding Source for a work in source code form is that
same work.
2. Basic Permissions.
All rights granted under this License are granted for the term of
copyright on the Program, and are irrevocable provided the stated
conditions are met. This License explicitly affirms your unlimited
permission to run the unmodified Program. The output from running a
covered work is covered by this License only if the output, given its
content, constitutes a covered work. This License acknowledges your
rights of fair use or other equivalent, as provided by copyright law.
You may make, run and propagate covered works that you do not
convey, without conditions so long as your license otherwise remains
in force. You may convey covered works to others for the sole purpose
of having them make modifications exclusively for you, or provide you
with facilities for running those works, provided that you comply with
the terms of this License in conveying all material for which you do
not control copyright. Those thus making or running the covered works
for you must do so exclusively on your behalf, under your direction
and control, on terms that prohibit them from making any copies of
your copyrighted material outside their relationship with you.
Conveying under any other circumstances is permitted solely under
the conditions stated below. Sublicensing is not allowed; section 10
makes it unnecessary.
3. Protecting Users' Legal Rights From Anti-Circumvention Law.
No covered work shall be deemed part of an effective technological
measure under any applicable law fulfilling obligations under article
11 of the WIPO copyright treaty adopted on 20 December 1996, or
similar laws prohibiting or restricting circumvention of such
measures.
When you convey a covered work, you waive any legal power to forbid
circumvention of technological measures to the extent such circumvention
is effected by exercising rights under this License with respect to
the covered work, and you disclaim any intention to limit operation or
modification of the work as a means of enforcing, against the work's
users, your or third parties' legal rights to forbid circumvention of
technological measures.
4. Conveying Verbatim Copies.
You may convey verbatim copies of the Program's source code as you
receive it, in any medium, provided that you conspicuously and
appropriately publish on each copy an appropriate copyright notice;
keep intact all notices stating that this License and any
non-permissive terms added in accord with section 7 apply to the code;
keep intact all notices of the absence of any warranty; and give all
recipients a copy of this License along with the Program.
You may charge any price or no price for each copy that you convey,
and you may offer support or warranty protection for a fee.
5. Conveying Modified Source Versions.
You may convey a work based on the Program, or the modifications to
produce it from the Program, in the form of source code under the
terms of section 4, provided that you also meet all of these conditions:
a) The work must carry prominent notices stating that you modified
it, and giving a relevant date.
b) The work must carry prominent notices stating that it is
released under this License and any conditions added under section
7. This requirement modifies the requirement in section 4 to
"keep intact all notices".
c) You must license the entire work, as a whole, under this
License to anyone who comes into possession of a copy. This
License will therefore apply, along with any applicable section 7
additional terms, to the whole of the work, and all its parts,
regardless of how they are packaged. This License gives no
permission to license the work in any other way, but it does not
invalidate such permission if you have separately received it.
d) If the work has interactive user interfaces, each must display
Appropriate Legal Notices; however, if the Program has interactive
interfaces that do not display Appropriate Legal Notices, your
work need not make them do so.
A compilation of a covered work with other separate and independent
works, which are not by their nature extensions of the covered work,
and which are not combined with it such as to form a larger program,
in or on a volume of a storage or distribution medium, is called an
"aggregate" if the compilation and its resulting copyright are not
used to limit the access or legal rights of the compilation's users
beyond what the individual works permit. Inclusion of a covered work
in an aggregate does not cause this License to apply to the other
parts of the aggregate.
6. Conveying Non-Source Forms.
You may convey a covered work in object code form under the terms
of sections 4 and 5, provided that you also convey the
machine-readable Corresponding Source under the terms of this License,
in one of these ways:
a) Convey the object code in, or embodied in, a physical product
(including a physical distribution medium), accompanied by the
Corresponding Source fixed on a durable physical medium
customarily used for software interchange.
b) Convey the object code in, or embodied in, a physical product
(including a physical distribution medium), accompanied by a
written offer, valid for at least three years and valid for as
long as you offer spare parts or customer support for that product
model, to give anyone who possesses the object code either (1) a
copy of the Corresponding Source for all the software in the
product that is covered by this License, on a durable physical
medium customarily used for software interchange, for a price no
more than your reasonable cost of physically performing this
conveying of source, or (2) access to copy the
Corresponding Source from a network server at no charge.
c) Convey individual copies of the object code with a copy of the
written offer to provide the Corresponding Source. This
alternative is allowed only occasionally and noncommercially, and
only if you received the object code with such an offer, in accord
with subsection 6b.
d) Convey the object code by offering access from a designated
place (gratis or for a charge), and offer equivalent access to the
Corresponding Source in the same way through the same place at no
further charge. You need not require recipients to copy the
Corresponding Source along with the object code. If the place to
copy the object code is a network server, the Corresponding Source
may be on a different server (operated by you or a third party)
that supports equivalent copying facilities, provided you maintain
clear directions next to the object code saying where to find the
Corresponding Source. Regardless of what server hosts the
Corresponding Source, you remain obligated to ensure that it is
available for as long as needed to satisfy these requirements.
e) Convey the object code using peer-to-peer transmission, provided
you inform other peers where the object code and Corresponding
Source of the work are being offered to the general public at no
charge under subsection 6d.
A separable portion of the object code, whose source code is excluded
from the Corresponding Source as a System Library, need not be
included in conveying the object code work.
A "User Product" is either (1) a "consumer product", which means any
tangible personal property which is normally used for personal, family,
or household purposes, or (2) anything designed or sold for incorporation
into a dwelling. In determining whether a product is a consumer product,
doubtful cases shall be resolved in favor of coverage. For a particular
product received by a particular user, "normally used" refers to a
typical or common use of that class of product, regardless of the status
of the particular user or of the way in which the particular user
actually uses, or expects or is expected to use, the product. A product
is a consumer product regardless of whether the product has substantial
commercial, industrial or non-consumer uses, unless such uses represent
the only significant mode of use of the product.
"Installation Information" for a User Product means any methods,
procedures, authorization keys, or other information required to install
and execute modified versions of a covered work in that User Product from
a modified version of its Corresponding Source. The information must
suffice to ensure that the continued functioning of the modified object
code is in no case prevented or interfered with solely because
modification has been made.
If you convey an object code work under this section in, or with, or
specifically for use in, a User Product, and the conveying occurs as
part of a transaction in which the right of possession and use of the
User Product is transferred to the recipient in perpetuity or for a
fixed term (regardless of how the transaction is characterized), the
Corresponding Source conveyed under this section must be accompanied
by the Installation Information. But this requirement does not apply
if neither you nor any third party retains the ability to install
modified object code on the User Product (for example, the work has
been installed in ROM).
The requirement to provide Installation Information does not include a
requirement to continue to provide support service, warranty, or updates
for a work that has been modified or installed by the recipient, or for
the User Product in which it has been modified or installed. Access to a
network may be denied when the modification itself materially and
adversely affects the operation of the network or violates the rules and
protocols for communication across the network.
Corresponding Source conveyed, and Installation Information provided,
in accord with this section must be in a format that is publicly
documented (and with an implementation available to the public in
source code form), and must require no special password or key for
unpacking, reading or copying.
7. Additional Terms.
"Additional permissions" are terms that supplement the terms of this
License by making exceptions from one or more of its conditions.
Additional permissions that are applicable to the entire Program shall
be treated as though they were included in this License, to the extent
that they are valid under applicable law. If additional permissions
apply only to part of the Program, that part may be used separately
under those permissions, but the entire Program remains governed by
this License without regard to the additional permissions.
When you convey a copy of a covered work, you may at your option
remove any additional permissions from that copy, or from any part of
it. (Additional permissions may be written to require their own
removal in certain cases when you modify the work.) You may place
additional permissions on material, added by you to a covered work,
for which you have or can give appropriate copyright permission.
Notwithstanding any other provision of this License, for material you
add to a covered work, you may (if authorized by the copyright holders of
that material) supplement the terms of this License with terms:
a) Disclaiming warranty or limiting liability differently from the
terms of sections 15 and 16 of this License; or
b) Requiring preservation of specified reasonable legal notices or
author attributions in that material or in the Appropriate Legal
Notices displayed by works containing it; or
c) Prohibiting misrepresentation of the origin of that material, or
requiring that modified versions of such material be marked in
reasonable ways as different from the original version; or
d) Limiting the use for publicity purposes of names of licensors or
authors of the material; or
e) Declining to grant rights under trademark law for use of some
trade names, trademarks, or service marks; or
f) Requiring indemnification of licensors and authors of that
material by anyone who conveys the material (or modified versions of
it) with contractual assumptions of liability to the recipient, for
any liability that these contractual assumptions directly impose on
those licensors and authors.
All other non-permissive additional terms are considered "further
restrictions" within the meaning of section 10. If the Program as you
received it, or any part of it, contains a notice stating that it is
governed by this License along with a term that is a further
restriction, you may remove that term. If a license document contains
a further restriction but permits relicensing or conveying under this
License, you may add to a covered work material governed by the terms
of that license document, provided that the further restriction does
not survive such relicensing or conveying.
If you add terms to a covered work in accord with this section, you
must place, in the relevant source files, a statement of the
additional terms that apply to those files, or a notice indicating
where to find the applicable terms.
Additional terms, permissive or non-permissive, may be stated in the
form of a separately written license, or stated as exceptions;
the above requirements apply either way.
8. Termination.
You may not propagate or modify a covered work except as expressly
provided under this License. Any attempt otherwise to propagate or
modify it is void, and will automatically terminate your rights under
this License (including any patent licenses granted under the third
paragraph of section 11).
However, if you cease all violation of this License, then your
license from a particular copyright holder is reinstated (a)
provisionally, unless and until the copyright holder explicitly and
finally terminates your license, and (b) permanently, if the copyright
holder fails to notify you of the violation by some reasonable means
prior to 60 days after the cessation.
Moreover, your license from a particular copyright holder is
reinstated permanently if the copyright holder notifies you of the
violation by some reasonable means, this is the first time you have
received notice of violation of this License (for any work) from that
copyright holder, and you cure the violation prior to 30 days after
your receipt of the notice.
Termination of your rights under this section does not terminate the
licenses of parties who have received copies or rights from you under
this License. If your rights have been terminated and not permanently
reinstated, you do not qualify to receive new licenses for the same
material under section 10.
9. Acceptance Not Required for Having Copies.
You are not required to accept this License in order to receive or
run a copy of the Program. Ancillary propagation of a covered work
occurring solely as a consequence of using peer-to-peer transmission
to receive a copy likewise does not require acceptance. However,
nothing other than this License grants you permission to propagate or
modify any covered work. These actions infringe copyright if you do
not accept this License. Therefore, by modifying or propagating a
covered work, you indicate your acceptance of this License to do so.
10. Automatic Licensing of Downstream Recipients.
Each time you convey a covered work, the recipient automatically
receives a license from the original licensors, to run, modify and
propagate that work, subject to this License. You are not responsible
for enforcing compliance by third parties with this License.
An "entity transaction" is a transaction transferring control of an
organization, or substantially all assets of one, or subdividing an
organization, or merging organizations. If propagation of a covered
work results from an entity transaction, each party to that
transaction who receives a copy of the work also receives whatever
licenses to the work the party's predecessor in interest had or could
give under the previous paragraph, plus a right to possession of the
Corresponding Source of the work from the predecessor in interest, if
the predecessor has it or can get it with reasonable efforts.
You may not impose any further restrictions on the exercise of the
rights granted or affirmed under this License. For example, you may
not impose a license fee, royalty, or other charge for exercise of
rights granted under this License, and you may not initiate litigation
(including a cross-claim or counterclaim in a lawsuit) alleging that
any patent claim is infringed by making, using, selling, offering for
sale, or importing the Program or any portion of it.
11. Patents.
A "contributor" is a copyright holder who authorizes use under this
License of the Program or a work on which the Program is based. The
work thus licensed is called the contributor's "contributor version".
A contributor's "essential patent claims" are all patent claims
owned or controlled by the contributor, whether already acquired or
hereafter acquired, that would be infringed by some manner, permitted
by this License, of making, using, or selling its contributor version,
but do not include claims that would be infringed only as a
consequence of further modification of the contributor version. For
purposes of this definition, "control" includes the right to grant
patent sublicenses in a manner consistent with the requirements of
this License.
Each contributor grants you a non-exclusive, worldwide, royalty-free
patent license under the contributor's essential patent claims, to
make, use, sell, offer for sale, import and otherwise run, modify and
propagate the contents of its contributor version.
In the following three paragraphs, a "patent license" is any express
agreement or commitment, however denominated, not to enforce a patent
(such as an express permission to practice a patent or covenant not to
sue for patent infringement). To "grant" such a patent license to a
party means to make such an agreement or commitment not to enforce a
patent against the party.
If you convey a covered work, knowingly relying on a patent license,
and the Corresponding Source of the work is not available for anyone
to copy, free of charge and under the terms of this License, through a
publicly available network server or other readily accessible means,
then you must either (1) cause the Corresponding Source to be so
available, or (2) arrange to deprive yourself of the benefit of the
patent license for this particular work, or (3) arrange, in a manner
consistent with the requirements of this License, to extend the patent
license to downstream recipients. "Knowingly relying" means you have
actual knowledge that, but for the patent license, your conveying the
covered work in a country, or your recipient's use of the covered work
in a country, would infringe one or more identifiable patents in that
country that you have reason to believe are valid.
If, pursuant to or in connection with a single transaction or
arrangement, you convey, or propagate by procuring conveyance of, a
covered work, and grant a patent license to some of the parties
receiving the covered work authorizing them to use, propagate, modify
or convey a specific copy of the covered work, then the patent license
you grant is automatically extended to all recipients of the covered
work and works based on it.
A patent license is "discriminatory" if it does not include within
the scope of its coverage, prohibits the exercise of, or is
conditioned on the non-exercise of one or more of the rights that are
specifically granted under this License. You may not convey a covered
work if you are a party to an arrangement with a third party that is
in the business of distributing software, under which you make payment
to the third party based on the extent of your activity of conveying
the work, and under which the third party grants, to any of the
parties who would receive the covered work from you, a discriminatory
patent license (a) in connection with copies of the covered work
conveyed by you (or copies made from those copies), or (b) primarily
for and in connection with specific products or compilations that
contain the covered work, unless you entered into that arrangement,
or that patent license was granted, prior to 28 March 2007.
Nothing in this License shall be construed as excluding or limiting
any implied license or other defenses to infringement that may
otherwise be available to you under applicable patent law.
12. No Surrender of Others' Freedom.
If conditions are imposed on you (whether by court order, agreement or
otherwise) that contradict the conditions of this License, they do not
excuse you from the conditions of this License. If you cannot convey a
covered work so as to satisfy simultaneously your obligations under this
License and any other pertinent obligations, then as a consequence you may
not convey it at all. For example, if you agree to terms that obligate you
to collect a royalty for further conveying from those to whom you convey
the Program, the only way you could satisfy both those terms and this
License would be to refrain entirely from conveying the Program.
13. Use with the GNU Affero General Public License.
Notwithstanding any other provision of this License, you have
permission to link or combine any covered work with a work licensed
under version 3 of the GNU Affero General Public License into a single
combined work, and to convey the resulting work. The terms of this
License will continue to apply to the part which is the covered work,
but the special requirements of the GNU Affero General Public License,
section 13, concerning interaction through a network will apply to the
combination as such.
14. Revised Versions of this License.
The Free Software Foundation may publish revised and/or new versions of
the GNU General Public License from time to time. Such new versions will
be similar in spirit to the present version, but may differ in detail to
address new problems or concerns.
Each version is given a distinguishing version number. If the
Program specifies that a certain numbered version of the GNU General
Public License "or any later version" applies to it, you have the
option of following the terms and conditions either of that numbered
version or of any later version published by the Free Software
Foundation. If the Program does not specify a version number of the
GNU General Public License, you may choose any version ever published
by the Free Software Foundation.
If the Program specifies that a proxy can decide which future
versions of the GNU General Public License can be used, that proxy's
public statement of acceptance of a version permanently authorizes you
to choose that version for the Program.
Later license versions may give you additional or different
permissions. However, no additional obligations are imposed on any
author or copyright holder as a result of your choosing to follow a
later version.
15. Disclaimer of Warranty.
THERE IS NO WARRANTY FOR THE PROGRAM, TO THE EXTENT PERMITTED BY
APPLICABLE LAW. EXCEPT WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT
HOLDERS AND/OR OTHER PARTIES PROVIDE THE PROGRAM "AS IS" WITHOUT WARRANTY
OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO,
THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
PURPOSE. THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE PROGRAM
IS WITH YOU. SHOULD THE PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF
ALL NECESSARY SERVICING, REPAIR OR CORRECTION.
16. Limitation of Liability.
IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING
WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MODIFIES AND/OR CONVEYS
THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES, INCLUDING ANY
GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE
USE OR INABILITY TO USE THE PROGRAM (INCLUDING BUT NOT LIMITED TO LOSS OF
DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD
PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER PROGRAMS),
EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF
SUCH DAMAGES.
17. Interpretation of Sections 15 and 16.
If the disclaimer of warranty and limitation of liability provided
above cannot be given local legal effect according to their terms,
reviewing courts shall apply local law that most closely approximates
an absolute waiver of all civil liability in connection with the
Program, unless a warranty or assumption of liability accompanies a
copy of the Program in return for a fee.
END OF TERMS AND CONDITIONS
How to Apply These Terms to Your New Programs
If you develop a new program, and you want it to be of the greatest
possible use to the public, the best way to achieve this is to make it
free software which everyone can redistribute and change under these terms.
To do so, attach the following notices to the program. It is safest
to attach them to the start of each source file to most effectively
state the exclusion of warranty; and each file should have at least
the "copyright" line and a pointer to where the full notice is found.
<one line to give the program's name and a brief idea of what it does.>
Copyright (C) <year> <name of author>
This program is free software: you can redistribute it and/or modify
it under the terms of the GNU General Public License as published by
the Free Software Foundation, either version 3 of the License, or
(at your option) any later version.
This program is distributed in the hope that it will be useful,
but WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
GNU General Public License for more details.
You should have received a copy of the GNU General Public License
along with this program. If not, see <https://www.gnu.org/licenses/>.
Also add information on how to contact you by electronic and paper mail.
If the program does terminal interaction, make it output a short
notice like this when it starts in an interactive mode:
<program> Copyright (C) <year> <name of author>
This program comes with ABSOLUTELY NO WARRANTY; for details type `show w'.
This is free software, and you are welcome to redistribute it
under certain conditions; type `show c' for details.
The hypothetical commands `show w' and `show c' should show the appropriate
parts of the General Public License. Of course, your program's commands
might be different; for a GUI interface, you would use an "about box".
You should also get your employer (if you work as a programmer) or school,
if any, to sign a "copyright disclaimer" for the program, if necessary.
For more information on this, and how to apply and follow the GNU GPL, see
<https://www.gnu.org/licenses/>.
The GNU General Public License does not permit incorporating your program
into proprietary programs. If your program is a subroutine library, you
may consider it more useful to permit linking proprietary applications with
the library. If this is what you want to do, use the GNU Lesser General
Public License instead of this License. But first, please read
<https://www.gnu.org/licenses/why-not-lgpl.html>.

View File

@ -1,28 +0,0 @@
# Project Rights
---
### [Home](/)
---
## This project is an open-source and community-run, all of the trademarked content on this site belongs to its original owners.
---
## I own content that is on this page and I want it removed. Well that sucks but go ahead and [email](mailto:projectfirewatch@gmail.com) us
---
### This project is under the GNU General Public License v3.0
### The full thing can be found [here](/rights/LICENSE.md)
---
*projectfirewatch.com is a community website and is not affiliated with Firewatch or Campo Santo.*
*Firewatch and the Firewatch logos are trademarks of Campo Santo. All other trademarks are property of their respective owners.*

View File

@ -1,388 +0,0 @@
# Shoshone Book Club
---
Welcome, avid reader to the reading catalogue of the Friends of Shahone Book Club & Lending Library. Every title listed here is available thanks to Red Panda Press and Wyoming National Park Service.
Before browsing, be sure to play the game!
The book lists below contain location names which may be spoilers. The map doesn't list location names, but may spoil hidden surprises and plot points.
Note that titles marked as "pending" will not appear in their respective locations until later in the story.
---
### [Home](/)
---
# Book Map
![Book Map](/cdn/shoshonebookclub/625733417_preview_book_map.png)
---
# The Accidental Savior
![Book](/cdn/shoshonebookclub/625733417_preview_accidental_saviour.png)
- Author: Terrence L. Greenbriar
- Publisher: Mercury Books
- RRP: $0.65
- Last checked out to: Cache 307 (pending)
> November 21, 1963. John Russell knows that the President's life hangs in the balance...
but who would believe him?
>"Not just another James Bond!"
>T. Wakes, Mummy
>"A high-class political thriller"
> - Nicholas Wolfe, Removed
---
# The Birds of Wyoming
- Author: George Sinclair
- Publisher: Red Panda Press
- RRP: $5.99
- Last checked out to: Two Forks Lookout
>Featuring every species statewide with more than 300 illustrations , photographs and maps
>George Sinclair, the godfather of amateur ornithology, brings you this stunningly curated guide to the birds of Wyoming. For over forty years, Sinclair has traversed the continent, state by state, crafting the definitive guides that birdwatchers trust and this edition is no different.
>There, cruising the Windriver treeline; is that a Cooper's Hawk or a Sharp Skinned Hawk? Look, scuttling across a high prarie two-track; is that a Sage Grouse or Ruffed Grouse? Thanks to George Sinclair's immaculate descriptions and their accompanying photos and illustrations, these are questions you won't have long.
>Birders Responses to other George Sinclair guides:
>The Birds of Northern California
"George Sinclair is as indisposable as my binoculars." - Frank Mileh, Us Forest Service
>The Birds of New Jersey
"Who takes the time to put together a definitive birding guide for New Jersey? George Sinclair, that's who." - Soren Sampson, Birder
>The Birds of Oregon
"George Sinclair's descriptions drip off of the tongue. When I refer to one of his guides it's like I hear the warmth of his voices just behind my
---
# Glory
- Author: Michelle Macmanus
- Publisher: Mercury Books
- RRP: $3.99
- Last checked out to: Two Forks Lookout
>A burning romance amid a brutal tyranny, Glory is a story of liberty, bravery and inspiration. With over 20 million copies sold and with an American ruling class that only knows growth and expansion, there is no better time to pick up this modern classic.
>In the year 1999 there are only a few farmers left, Marc Ruth and his wife Ramona are two of them. The rest of succumb to a collective arrangement with world governments in a time when collectives have run rampant. Nevertheless, by tilling and fertilizing his soul in a manner that only Ruth knows, his farm has remained independent, quietly producing the best vegetables left in the United States.
>But when the President samples one of Ruth's carrots, Ruth and his wife are quickly subsumed by his administration and brought far closer to great power than he could ever imagine. Ruth's new status as the President's farmer brings with it new challenges and he is ultimately separated from the love of his life. But it is only in these dark times does Marc realize what he was born to plant in the seeds of revolution. For his wife. For America. For Glory.
---
# Jane Eyre
- Author: Charlotte Brontë
- Publisher:
- RRP:
- Last checked out to: Cache 307
---
# Lucien's Gambit, Book XVI of the Chronicles of Krindle
- Author: Timothy Howell
- Publisher: Red Panda Press
- RRP: $2.50
- Last checked out to: Thorofare Tower
>The thrilling continuation of the bestselling series of novels that have gripped the world!
>When we last joined our hero he had been separated from his allies by the evil Venomfang, whose blot to conquer all of the mortal realms is nearing fruition.
>Can Lucien and Lux reunite the shards of truth to free Krindle from his entrapment?
---
# The Patriots
- Author: Donald Anderson
- Publisher: Red Panda Crime
- RRP: $2.50
- Last checked out to: Two Forks Lookout
>It begins and ends deep in Red Russia, where they sent him to spy, where they urdged to him to kill, and where they learned that he wasn't The Patriot they had hoped.
>Sent to plant the poison pill of espionage inside the dinner of the communist bear, Ray Freidman would return to his government's doorstep disgraced and disowned by his keepers. Forced back into civilian life as a comptroller, but with the intelligence and super-skills bestowed upon him by the United Stated government, Ray struggles to fade into obscurity. That is, until a janitor named Claudell Williams reveals that he too was there the night in Stalingrad -- the night everything went wrong and the truth was made clear.
>Can two men ever return to civilian life in possession of information that will destroy both themselves and a presidency? ...Will the government even let them?
---
# The Singular Mind
- Author: Dr. Jonas Allard
- Publisher: Red Panda Press
- RRP: $6.99 (£4.99)
- Last checked out to: Two Forks Lookout
>DON'T MIND YOUR MIND ALONE
>Have you considered the untapped power of your own mind? • Do you often ponder the unexplanable? • Do you find yourself seeing that which is not there? • Do you yeard to explore the labyrinth of your own psyche?
>Join Jonas Allard, Ph.D.renowned psychoanalyst and Rhodes Chair of Psychology at Loyola Marymountas he explores the power of the solitary mind. This incisive but accessible treatise on the power of an isolated psyche unclogs the avenues of our day-to-day thoughts, helping us unlock the psychological potential burried deep within ourselves.
>The Seattle Enterprise: "Readers will be enraptured by this powerful exploration of Dr. Allard's hyper-vigilant methods of neuro-isolation."
>San Francisco Review of Books: "The quintessential road map of mental enlightenment. ... Dr Allard is a wizard."
---
# Steven's Room
>Author: Howard Crothers
>Publisher: Hart
>RRP: $2.50
>Last checked out to: Ned Goodwin?
>Steven's Room
by Howard Cruthers
>Art and Ainsley locke. They're affectionate parents to the a sweet child, passionate lovers in an ideal marriage, and up-and-coming real estate agents making a name for themselves as Whistle Creek's new power couple. And they've just bought their own dream home. Everything is perfect for the Locke family.
>But when their son Steven is crushed in the backyard by an old oak tree, his empty bedroom becomes irresitibly alluring to the mourning parents. Fears, sorrows, dreams, fantasies, and more al emanate from Steven's room.
>But what if Steven were to return? And what if he wants his room back? And what if Steven wasn't so sweet anymore...
>Praise for Howard Cruthers
"He's perfected the fine art of terror." - THE MIAMI DAY TRIBUNE
>"Cruthers is a sorcerer... of human suffering... and suspense. ...Can't get enough." - PHILADELPHIA REGISTER-CONSTITUTION
---
# Wizards & Wyverns
- Author:
- Publisher: Phaedrus
- RRP: $7.99
- Last checked out to: Gladius Sylva's Ancestral Home
>ADVENTURER! Your days of searching in magazines and dusty books are over. The Player's Handbook you hold in your hands contains all the Wizards & Wyverns spells, combat tables and character classes you need to make a name for yourself in the Sundered Lands of the Ur-Dark.
>Be you a stout Dwarven Fighter or a willowy Elf Ranger, your quests rely on the knowledge you'll find herein. And because this guide carries Phaedrus' Seal of Quality, it has "guaranteed compatibility" with all Wizards & Wyverns Adventure Campaigns, Quest Modules and One-Shot Epics. Go beyond the Game only with Phaedrus.
---
# One Chance to Die (Crime By The Numbers)
- Author: Richard Sturgeon
- Publisher: Red Panda Crime
- RRP: $2.50
- Last checked out to: Cache 307
>The first book in Crime By The Numbers, from the author of the bestselling S.P.E.C.T.R.U.M. spy series. One Chance to Die us the book that started it all.
>Neal Black is South City's most effective, but least known detective. A former SCPD officer, Neal is friend to few and ally to only one: justice.
>South City is in trouble. A city deep in debt tumbles into turmoil when the Deputy Mayor is assassinated and South City PD fears the killer is one of their own. With any internal affairs investigation sure to put another target on someone's back, they call upon the only person who can do the job. Neal Black.
>In a high-stakes game of chicken, he is the only one willing to take the risks to stop the killer in his tracks and do what nobody else can: put South City in the Black.
---
# Death Strikes at Two (Crime By The Numbers)
- Author: Richard Sturgeon
- Publisher: Red Panda Crime
- RRP: $2.50
- Last checked out to: Two Forks Lookout
>Experience Richard Sturgeon's explosive follow-up to "One Chance to Die"
>Twelve bodies. Zero leads. One man for the job.
>When Neal Black is asked to investigate the bizarre murder of a local teen, he reluctantly accepts at the behest of a "friend." A friend, that is, up until he discovers shocking evidence that the victim was just the latest in a string of unsolved murders that stretches back over the decade.
>Now, time is running out. It's only a matter of days until the killer strikes again and Neal Black is determined to make every second count.
>OVER THREE MILLION RICHARD STURGEON BOOKS IN PRINT
---
# Three Blind Rats (Crime By The Numbers)
- Author: Richard Sturgeon
- Publisher: Red Panda Crime
- RRP: $2.50
- Last checked out to: Cache 308
>When FBI informants need protection you call the police. When those informants wind up dead, you call Neal Black.
>In a rain-soaked return to South City, Neal Black is hung out to dry as the only man who can piece an FBI case back together with danger lurking around every corner. Introducing Black's arch-nemesis, the shadowy Don Karl, Three Blind Mice is Sturgeon at his best.
>When Neal Black is stabbed in the back, who will be the one holding the carving knife? One thing's for sure: it's not the farmer's wife.
---
# The Fourth Estate (Crime By The Numbers)
- Author: Richard Sturgeon
- Publisher: Red Panda Crime
- RRP: $2.50
- Last checked out to: Cache 305
>Neal Black thought a trip to California would do him good. He'd soak up some sun, drive a convertible and maybe even enjoy a poolside drink with a tiny umbrella.
>But in Richard Sturgeon's fourth entry in the Neal Black series, California is nothing but a dream. An emergency landing after a murder int he first class kicks off a trans-American thriller that puts Neal Black off the South City streets and slams him head-first into a sordid web of politics and high-finance and all he finds is murder, deceit and betrayal.
>The Fourth Estate is new territory for Sturgeon and it's not to be missed.
---
# Five Degrees North (Crime By The Numbers)
- Author: Richard Sturgeon
- Publisher: Red Panda Crime
- RRP: $2.50
- Last checked out to: Gladius Sylva's Ancestral Home
>Neal Black has just exposed the largest underground gambling racket in the nation's history. With the Mayor basking in the glory it's only when consequences come knocking is Neal Black called on again. Neal Black is a lot of things: but a fall guy isn't one of them.
>Can Neal beat the odds when the most dangerous names in the mob have his number? And in the end, when a high-risk sting goes wrong it's only a matter of time before the powers that be do what they always do...
>...put it on all Black.
---
# Six Feet Down Under (Crime By The Numbers)
- Author: Richard Sturgeon
- Publisher: Red Panda Crime
- RRP: $2.50
- Last checked out to: Cache 302
>Detective Neal Black told himself he'd never visit Australia but when a grizzly murder in South City leads all the way to Sydney, Black is determined to make the killer say g'day to justice.
>THE CRITICS RAVE OVER CRIME BY THE NUMBERS
>"Neal Black makes Sam Spade look like Mickey Mouse," -- Bill Wednesday, The Columbus Parade
>"We're living in a golden age of crime fiction and Dick Sturgeon is King Midas," -- Alfred Wu, The Oakland Register
>"Crime by the Number is as if Tolstory wrote the dime store novels of my youth. There may not be a better depicter of drama in our lifetime,"
>Greta O'Houlihan, The Boston Times
---
# 7erminal 7 (Crime By The Numbers)
- Author: Richard Sturgeon
- Publisher: Red Panda Crime
- RRP: $2.50
- Last checked out to: Cache 307 (pending)
>Now a major motion picture starring Anders Nelson as Neal Black
>Thanksgiving. South City Airport is packed to the gills with travelers eager to ditch the dreary metropolis for the holiday.And a group of Soviet Terrorists has just ensured that nobody is going anywhere.
>Only former South City copy turned world-class detective Neal Black can cut through the red-tape and give the hostages a fighting chance. While the FBI is ready to start Wold War III, Black knows the only person who could've orchestrated this act of terror -- and it's not Ivan.
>Starring Michael Keaton with Kurt Russel as Don Karl, Terminal Seven comes to the big screen Summer of 1986!
---
# Eight Rolled the Hard Way (Crime By The Numbers)
- Author: Richard Sturgeon
- Publisher: Red Panda Crime
- RRP: $2.50
- Last checked out to: Two Forks Lookout
>Neal Black has just exposed the largest underground gambling racket in the nation's history. With the Mayor basking in the glory it's only when consequences come knocking is Neal Black called on again. Neal Black is a lot of things: but a fall guy isn't one of them.
>Can Neal beat the odds when the most dangerous names in the mob have his number? And in the end, when a high-risk sting goes wrong it's only a matter of time before the powers that be do what they always do: put it all on Black.
>OVER 15 MILLION NEAL BLACK BOOKS IN PRINT
---
# Nine Lives Lost (Crime By The Numbers)
- Author: Richard Sturgeon
- Publisher: Red Panda Crime
- RRP: $2.50
- Last checked out to: Ned Goodwin
>Neal Black's first day of retirement could've gone better. It began with Neal shot in the chest and left for dead.
>Now, after decades of bringing hundreds of the nastiest elements of South City to justice, Neal is back on his feet with no leads and only a stray black cat that refuses to leave his apartment. Who would want Neal Black dead? A better question might be: who wouldn't?
>In Nine Lives Lost, Neal is at the service of the most endangered and murcurial client he's ever had. Himself.
---
# Ten to One (Crime By The Numbers)
- Author: Richard Sturgeon
- Publisher: Red Panda Crime
- RRP: $2.50
- Last checked out to: Camp Arapahoe
>The gripping finale to Crime By The Numbers
>Ten names, all sure to be dead in forty-eight hours.
>When a full-page ad is taken out in the South City Chronicle with the names of ten citizens, none connected, and three already dead, it's clear to the city of 1.5 million what is going to happen to the last seven.
>Closing out Richard Sturgeon's decalogue of thrills, Neal Black has two more jobs to do: find the killer and save South City from itself. Making his task even harder is the final name printed in the paper: his own.
>Ten to One is the climax that readers deserve and a fitting end to a fifteen years of Neal Black mystery.
---
# Magazines & Comics
---
# Black Band #3
- Author: Gary Boss
- Publisher: Comics Authority
- Date: April 1986
- Last checked out to: Gladius Sylva's Ancestral Home
---
# 1001 Crosswords
- Last checked out to: Thorofare Lookout
---
# 1001 More Crosswords
- Last checked out to: Thorofare Lookout
---
# Credit
[Original Post](https://steamcommunity.com/sharedfiles/filedetails/?id=625733417)
# Guide by
[Cheeseness](https://steamcommunity.com/id/cheeseness)
[Mimness](https://steamcommunity.com/id/Mim_Ness)
---
*projectfirewatch.com is a community website and is not affiliated with Firewatch or Campo Santo.*
*Firewatch and the Firewatch logos are trademarks of Campo Santo. All other trademarks are property of their respective owners.*

View File

@ -1,145 +0,0 @@
# Shoshone Wildlife Notes
---
Before continuing, be sure to play the game!
The animal lists below contain location names which may be spoilers. The map doesn't list location names, but may spoil hidden surprises and plot points.
---
### [Home](/)
---
# Wildlife Map
---
![Map](/cdn/shoshonewildlifenotes/631422921_preview_wildlife_map2.png)
![Map Icons](/cdn/shoshonewildlifenotes/631422921_preview_wildlife_icons.png)
---
# Bear
![Bear Tree](/cdn/shoshonewildlifenotes/631422921_preview_bear-tree.png)
I'd read that both Black Bears (Ursus americanus) and Grizzly Bears (Ursus arctos) can be found in the Shoshone National Forest, and I was anxious about the idea of encountering either during my stay. For better or worse, I only spotted signs of their presence.
On my first day after arriving, I came across a clawed up stump, presumably used as a scratching post to sharpen claws.
Later during my stay, I came across a note in Cache 241 that tallied five bear sightings, but I'm not certain how old that would be. I also came across a note mentioning that "Mama Grizz" had been absent recently - perhaps she was responsible for the stump and had moved on.
Along the trail from Cache 306 toward Jonesy Lake (clawed stump)
---
# Birds
![Birds](/cdn/shoshonewildlifenotes/631422921_preview_birds.png)
Upon arriving at Two Forks, I was glad to see a copy of George Sinclair's wonderful The Birds of Wyoming. I had forgotten to bring any bird reference books with me and had resigned myself to having to rely on memory to identify the Shashone birdlife.
As it happens, I've seen very few birds during my stay.
On my hike in, and at a number of locations across the Two Forks area, I've seen flocks of birds in flight. Unfortunately, they've been silhouetted every time I've seen them, making identification difficult, but something about them makes me think corvids.
On the first day after arriving, I spotted some kind of duck or goose out on Jonesy Lake. Unfortunately it was too far from shore for me to be able to make a positive identification. It was also unnervingly still and may have just been a decoy used by an illegal hunter.
Near Two Forks fixed to a dead tree is a small birdhouse. I've kept an eye to it for the duration of my stay, but haven't seen it used at all. I had planned to crush a granola bar and leave it in there, but I was unable to reach the opening.
I have also heard woodpeckers, crows and other forest birds - even owls at night, but was never able to actually spot any.
- Middle of Jonesy Lake (duck)
- Just North West of Two Forks tower (birdhouse)
- Thorofare Trailhead (flying flock - intro first day morning)
- On the trail from Thorofare Trailhead (flying flock x 2 - intro first day sunset)
- South of Five Mile Creek (flying flock)
- Near the clawed tree (flying flock)
---
# Elk
![Elk](/cdn/shoshonewildlifenotes/631422921_preview_elk.png)
A wild bull was grazing on the path as I hiked in from the Thorofare Trailhead. I was not prepared for just how big elk (Cervus canadensis) are. After getting over my surprise at the animal's mass, I studied it for a while. As soon as it caught my scent though, it bounded off.
Inside Cache 303, I found what looked to be the antler of a young bull elk, apparently left there by a park ranger at some point.
Once during my stay as I was hiking through Thunder Canyon, I heard one bugling - an unsettling scream-like sound that echoed down the ravine. That was the last evidence of live elk that I would see during my stay.
Toward the end of my visit, I spotted a deceased elk, which looked to have been taken by some kind of carnivore, with wounds on its belly. Interestingly, it was wearing some kind of tracking collar with the number 3871 on it.
- On the trail from Thorofare Trailhead (intro second day morning)
- In Cache 303 (antler)
- In the Thunder Canyon beneath the natural bridge (vocalisations heard)
- East of Hawk's Rest, near a hidden track (corpse)
---
# Insect
![Insect](/cdn/shoshonewildlifenotes/631422921_preview_dragonfly.png)
This place would be a lepidopterist's dream. No matter where I turn, I feel like I'm being bapped in the face by a moth or butterfly. They are too numerous to list individually, but I've spotted five distinct species: the Monarch (Danaus plexippus) with its distinctive orange and black markings, the yellow Tiger Swallowtail (Papilio glaucus), the Mourning Cloak (Nymphalis antiopa) with its deep maroon wings and creme trimming, an interesting variant of the American Painted Lady (Vanessa virginiensis) featuring ventral markings on its dorsal side, and the Cabbage Moth (Pieris rapae) - the butterfly that everybody calls a moth just because it doesn't have colourful markings.
Beyond butterflies, I've also observed Blue Dasher dragonflies (Pachydiplax longipennis), Honey Bees (Apis mellifera) and narrowly avoided getting stung by a Bumble Bee (Bombus pennsylvanicus).
- On the East shore of Jonesy Lake (dragonfly)
- On the Ruby River cascade near Cache 307 (dragonfly)
- On North Edge of Pork Pond (dragonfly)
- Between Pork Pond and the big tree (honey bee)
- Inside Wapiti information box (bumble bee)
- Everywhere (cabbage moth)
- Near the Two Forks outhouse (monarch)
- Near the teens' first campfire (monarch)
- Near the Cache 303 (monarch)
- Thorofare Trailhead (tiger swallowtail - intro first day morning)
- Near the burned tree below Mule Point (tiger swallowtail)
- South of Beartooth Point (tiger swallowtail)
- At the Medicine Wheel (mourning cloak)
- Outside the Wapiti station tent (mourning cloak)
- Near the Hawk's Rest outhouse (mourning cloak)
- Near the large tree between Cottonwood Creek and Pork Pond (mourning cloak)
- On the path between Cave 452 and Two Forks tower (american painted lady)
- Near the rope hook between the burned meadow trail and the Thorofare Trail (american painted lady)
- On the Thorofare Trail at the first hilltop from Thunder Canton (american painted lady)
- At the Medicine Wheel (american painted lady)
- At the damaged tree near the fire camp North of Camp Arapahoe (american painted lady)
---
# Turtle
![Turtle](/cdn/shoshonewildlifenotes/631422921_preview_turt.png)
The Ornate Box Turtle (Terrapene ornata) is enormously cute, but difficult to spot.
I've found five locations with signs of turtles, but once I've spotted or gotten close to one, I generally can't find another.
- On a rock on the North East shore of Jonesy Lake, as far North as I could travel without climbing rocks
- On a rock at the base of the rock slide blocking the path that I hiked in via
- On a log on the side of the trail between Cache 306 and the natural bridge crossing Thunder Canyon
- On a rock in the clearing next to Cache 302 beneath Beartooth Point
- On a rock between two pines North of Five Mile Creek
---
# Raccoon
![Raccoon](/cdn/shoshonewildlifenotes/631422921_preview_raccoon2.png)
When I first spotted one of Wyoming's raccoons (Procyon lotor) in a small clearing, I was dismayed to see it wrestling with a packaged granola bar. The cache boxes around here may be bear proof, but they certainly don't seem to be resistant to those tiny hands and mischievous minds.
As soon as it saw me, it scampered off, never to be seen again - or so I thought. Sometime later whilst exploring the ruins of Hawk's Rest, I was startled to find a raccoon trapped inside a stove! It jumped onto me as I opened the door and then quickly hopped out the window. I think it must've been as scared of me as I was of it. I only caught a short glimpse, but I'm convinced that it was the same raccoon.
- On a stump in the small clearing North East of the teens' first campfire
- Inside the downstairs stove at Hawk's Rest
---
# Credits
[Cheeseness](https://steamcommunity.com/sharedfiles/filedetails/?id=631422921)
---
*projectfirewatch.com is a community website and is not affiliated with Firewatch or Campo Santo.*
*Firewatch and the Firewatch logos are trademarks of Campo Santo. All other trademarks are property of their respective owners.*

View File

@ -1,34 +0,0 @@
# As of 7/2/2021 This page is no longer being worked on by staff, To people that would like to work on it feel free to.
---
# BELOW ARE MAJOR SPOILERS!
---
### [Home](/)
---
# The Prologue
You get options and you can pick whatever you want, But during the prologue, you start your 2-day hike up to your tower. When you get up to the tower you turn on your light, then you hear a walkie-talkie going off, saying "Hello two forks tower!". You say Hello to Delilah, who is your boss, you will be spending the rest of your time as a Firewatch with her.
---
![Firewatch Intro Image](/cdn/arch.jpg)
---
# Day One
Day 1 starts off with you (Henry) sitting at your desk getting some writing on your typewriter. Delilah chimes in on your walkie-talkie to say "good morning, or should I say good afternoon." Since there are a few hours of daylight left she wants to try to get some work in, Since it is your first day she wants to get you acquainted with the job, She wants you to look at the round table in the middle of your tower. "This is the Osbourne Fire Finder. Invented in 1914 by W.B..." You respond Osbourne?, "You use this to spot you guessed it, fi-what the fuck" Your quick run-through has been interrupted, by fireworks out your west-facing window. Now you have to go stop whoever is shooting off the Fireworks but to get down to the lake where the fireworks are going off you need a rope to get down the shale. Luckily there are these neat little supply boxes spread around the forest, "The code is "1-2-3-4" it's actually that for all of them" Delilah says. You open the box, there is a map and some notes, a map, and the rope, you copy the map to your map, read the note, then take the rope, there is a granola bar but, you decide to leave it. You make your way down the hill and then a little outcropping, you get to the shale slid, it's fairly steep, Delilah says that it's not named on their topos, so you decide to give it a name, you can name it 1 of 3 things, Cripple Gultch, Widowmaker, or Shitty boss is going to get me killed hill. I normally chose Cripple Gultch, but this time I chose, Shitty boss is going to get me killed hill. while going down the hill your rope snaps sending you down the shale, You survive but the name is fitting now. Coming down the hill you find a lot of empty beer cans, you decide to clean them up, keep the forest looking nice. The idiots down at the lake also decided to make a campfire, you put the fire out, then you find, a bottle of whiskey, a bundle of fireworks, two backpacks, then clothes. You tell Delilah about taking the fireworks, and then about the clothes, she makes a comment about "Nudie pyromaniacs." You start walking through some bushes, you find a bra, and two pairs of panties... There are two naked laddies in the lake setting off fireworks, You get their attention, but since they are teens they say this "Hey, you fucking fatso! Leave us alone." You tell them to take it easy with the fireworks. "You oughta take it easy with the Sizzler buffet." Now you let your anger get the best of you, you grab their boombox, and you through it in the lake... "Light another firework and it won't be your stereo I wreck." you say, now you make your way out of the lake, but since your rope broke you need to make your way through thunder canyon. "Hey, did that go okay?" Delilah asks, you lie and said it went fine. While you make your way back Delilah says, "So... I have a bit of a confession to make." "What is it?" you ask. "Um... Look, I was drunk last night when I welcomed you to the job." She apologies for being putting you on the spot about why your out here. You accept her apology. After that you keep walking, then you hear thunder, there is a storm out to the north of you. You find a supply box, you open it, and do your thing, you also find a flashlight in there. Then you find a cave, you go into the cave, part of the cave is gated off, they lost the keys a little while ago, so its secrets are locked away for good. You are very close to the tower when you see a light, then a figure, you tell Delilah, she makes fun of you. You climb up to the land of the tower, you lean on a sign, and boom you fall so does the sign. You walk up to the tower, you see your typewriter out on the ground by the stairs, you walk up the stairs with your typewriter, you find some broken glass, someone broke into the tower. They threw everything to shit, and they took your sheets, that's all they took. Delilah lets the forest service know what happened. You think that the girls at the lake did this. "I need you to feel safe out here," says Delilah, You ask her to locate you to the Forest service weapons cache. She says "Yeah... Someone made the decision years ago that leaving someone with a gun and infinite amounts of alone time was kinda a bad idea." That's Day one check back for Day Two soon.
---
![Firewatch Intro Image](/cdn/pork.jpg)
---
*projectfirewatch.com is a community website and is not affiliated with Firewatch or Campo Santo.*
*Firewatch and the Firewatch logos are trademarks of Campo Santo. All other trademarks are property of their respective owners.*