Today marks the publication of Be My Enemy, the absolutely triumphant sequel to Ian McDonald's pulse-pounding young-adult science fiction novel Planesrunner.
Planesrunner -- a rollicking, multidimensional tale of a young boy who holds the key to infinite universes, seeking to rescue his physicist father from sinister powers -- finished on a brutal cliffhanger, leaving its readers gasping and cursing for more. Now we have it.
In Enemy, there's a lot more of what made Planesrunner great -- tremendous action scenes, cunning escapes, genius attacks on the ways that multidimensional travel might be weaponized, horrific glimpses of shadowy powers and sinister technologies.
But Enemy also has more of what makes McDonald's adult fiction some of the best work I've ever read: a gifted ear for poesie that makes the English language sing, the unapologetic presumption of the reader's ability to understand what's going on without a lot of hand-holding, and a technological mysticism that never explicitly says when the literal stops and the fantasy starts.
In Enemy, Everett, the young hero of Planesrunner, is confronted with multiple versions of himself from different worlds, all facing different versions of his crisis, and some not on his side. McDonald's handling of this is deft, going beyond the good Spock/evil Spock cliches and showing us how two "good" kids could start as multidimensional twins and end as mortal enemies.
If you held off on reading Planesrunner because you didn't want to commit to a series without knowing if the author could keep up the quality, have no fear. McDonald has proven himself handily. And if you read Planesrunner like me and have been slavering for the sequel ever since, rejoice -- the time is at hand!
Here are the first five chapters, courtesy of the kind folks at Pyr!
Be My Enemy
Mysterious Galaxy is a wonderful, longstanding science fiction bookstore, host to readings for the Clarion Workshop, designated bookseller for Comic-Con signings, and much more.
Daniel Moghimi, Berk Sunar, Thomas Eisenbarth and Nadia Heninger have published TPM-FAIL: TPM meets Timing and Lattice Attacks, their Usenix security paper, which reveals a pair of timing attacks against trusted computing chips ("Trusted Computing Modules" or TPMs), the widely deployed cryptographic co-processors used for a variety of mission-critical secure computing tasks, from verifying software […]
Infuriate your racist Facebook uncle this Thanksgiving with a Leopard RBG shirt.
Sous vide cooking: It sounds fancy, but it’s actually one of the easiest and most reliable ways to cook. It’s the reason why many restaurants are able to put out delicious dishes with a consistent flavor. All you need is the right equipment, and that hasn’t always been available to those outside the resto crowd. […]
The more you use your computer, the more it becomes possible for others to use it too. Where there are anti-virus systems, there are hackers looking for a way to get around them. That’s why it’s important to get software that doesn’t just passively scout for viruses in the background. The folks behind GlassWire have […]
Knowledge is power. It’s a cliché, but sometimes things turn into a cliché because they’re true. If you’re making your way through the world of business and entrepreneurship, it only makes sense to read about the insights of people who have climbed that ladder before you. Trouble is, the modern workday doesn’t leave a lot […]