Well. That is a lot, all at once.
She thinks for a moment about how to formulate her reply, her inflatable chair drifting serenely with the gentle ocean breeze.
Her fixity crystal is, not to toot her own horn, very robust. After all, what is the point in having a personal fixity device, in which her entire self is stored, if you cannot be nearly certain that it is safe? She and her forks (well ... mostly her forks, she was focused on physics) have spent thousands of person-years on imagining what could go wrong and making it less likely.
The crystal itself, apart from being very durable due to its construction, is also designed so that the internal components form an aperiodic tiling, so that it's harder to cleave. And if you did cleave it, both subsections would be perfectly capable of operating independently, since computation, data storage, energy generation, fixity field projection, and so on are distributed throughout the device. When the CPUs are in contact, clusters of them run the same computations and check each other, resetting any malfunctioning units to a known good state. The crystal is perfectly capable of detecting alterations to its own physical structure and reversing them, and the distributed storage uses error correction codes with varying levels of redundancy depending on how important the data is.
On the software level, it uses a custom stack, from the CPU architecture up, that is designed to make common security problems impossible. The lowest levels have formal proofs of correctness (and didn't Elm love to bitch about how much of a problem those were to adapt). The upper levels have sophisticated type systems, but also have chaos testing to shake out bugs. The networking protocols run in an isolated area of memory. The supply of cryptographic randomness comes from directly measuring quantum effects.
In short, Xanthoceras feels pretty safe. In many ways, she is the least secure part of her whole system.
She pauses, at that thought, and flips back to the part of Seeker's message about psykers using a "compelling voice". She clips her senses through a tight compression codec, making the sound of the waves into a low, rhythmic rumble, and the colors of the water and the horizon into a flat block of blue. Then she forwards the settings patch to Yew, along with an explanation.
Hopefully, the precaution is unnecessary, since Seeker doesn't even seem to think she can interact directly with the Warp for some reason.
But she also didn't think her experiment was going to explode, and she has even fewer theories about the Warp, so it's worth treating the danger as real. She thinks about what information she should ask for, given that Seeker thinks understanding the Warp is an infohazard — which is even less how physics works, actually.
She types up a reply.
Thank you for the explanation. It's a lot to take in.
While it is true that my brain does now run partly or entirely on a computer (depending on how you define your terms), I was born a biological human. I uploaded myself after inventing my universal fabricator because it was safer and more convenient. And the way that my brain works is still more similar to a baseline human than to a computer program; it is emulated by a physics simulation, not a raw neural net or anything like that. So I don't know whether I properly qualify as a Silica Animus, in your terms. In my world, we would call someone like me an uploaded human, if we even needed to differentiate uploaded and non-uploaded humans at all.
I'm also curious how you came to the conclusion that I lack a soul — it seems important to know, to really know whether the Warp can touch me directly.
As for worries about corruption from the Warp — obviously defending against any infohazardous thing is incredibly difficult, so I will understand if the answer is no — but can you elaborate on how the Warp corrupts minds and machinery, and any known defenses? (Other than not being a psyker). I did see some strange-looking code on the local network, but it didn't seem like the right category of thing to harm me. My computer has pretty good protections against having alterations made to memory or data in-flight, and my network sandboxes have had no problem filtering out the probes from local systems. And of course I myself have no traditional program to "hack", since I'm running on emulated neurons.