Basically it seems like all personal electronics (especially on runners) should only have the admin level and thus require an extra 6 successes on to hack into them.
Is this right? I.E. if you try and hack a smartlink (Device rating 3?) you should have to get 9 successes hacking in and have it probably roll 6 die against you every time.
A lot of devices today have multiple levels of access, either to keep the users from messing up options they usually don't need, or (more commonly) to keep the user from doing things that don't make financial sense for the company. (like cell phones that "only work with one carrier"
or a budget printer that is really the full-price model with a slowdown chip,
or a comlink model 2031C that has only minimal anti-interference tech (ECCM 3) "But if you spring the extra ¥75 you can get the 2031A, with ECCM 4!" (The A model is just the C model minus a jumper that disables some of the hardware signal filters)
My point is, many devices COULD have only an admin level of access, but it's far more likely that the user (and most hostile hackers) will only deal with a dumbed-down user-account.
_______________
>>"I got a critical glitch trying to remove the inhibitor chip in my left hand, and it send a kill-signal to all Fuchi tech on my PAN. ... I didn't know my new lungs were made by a Fuchi subsidiary."
>>"I'm sorry sir, but you've clearly voided you warranty. I'm terminating the call now.*
--Customer Service in 2067 stinks
As security goes in SR, commlinks and any devices meant to be used by one single user (or by many users with the same account privileges) should only have an admin access.
(I know that's not how it works nowadays)
For commlinks, there might be some "user" access for other users. For example, I might give a user access to my friends so that they can see my photo-album in my commlink.
Yeah I agree with Blade. If the OS is 'hard coded' wich.. effecitvely it would be in things like smartlinks. Then there's absolutely NO reason why you shouldnt soley have an 'admin access account'. I mean just look at the IPod. You dont have sub 'accoutns' on that. Just one sole 'access'. The software is all 'firmware'. With just the device itself you cant possibly edit the software. And if you mess it up you just wipe the internal drive and reinstall.
I shoudl know. My Ipod got messed up somehow or other when I was updating the playlist. The only way to fix it was to do a fresh install of the software. Also back when I used to work tech support for Compaq they had these computer terminals you could effectively get for what ever the tax cost you. Because you paid say.. $900 for the computer + monitor. You got a direct $100 rebate from Compaq. You got an additional $300 rebate from Microsoft if you signed up for their MSN service, and so on and so forth. On some of the system syou could actually 'technically' make $40. But that contract with MS is for 3 years. So your not really 'making' money it's just prestented that way.
The systems themselves either worked.. or didnt. They didnt even have a hard drive. The more 'advance'd systems had one as an added feature. Normally they just had a floppy drive and a CDrom. Along with a 'hard coded' OS. If something went wrong with the OS you wiped the flash memory and reinstalled. If that didnt work you sent it back to Compaq and (assuming it was still under warranty) they sent you a new one.
There was only one 'account' to that version of windows as well I belive. Since you couldnt really even save your settings.
| QUOTE (Blade) |
| As security goes in SR, commlinks and any devices meant to be used by one single user (or by many users with the same account privileges) should only have an admin access. (I know that's not how it works nowadays) |
Actually thats the other thing. If you have say.. a copy of Windows Xp on yoru computer. And no one else has an 'account' on that computer. Guess what? -You- Are admin access.
It's part of the reason some people manage to totally screw up their systems on a regular basis. Like all thsoe time yet again when I was workign in tech support. I'd get callers saying their computer wouldnt boot up. Why? End reason. They'd used that admin access to go into the system registry and 'delete all that junk I didnt need'.
Course all that junk was what told the computer what was what, and where that stuff was. With that gone it didnt know what the hell to do.
But contrary to Shadowrun, in real life, it is more difficult to hack servers that dont only have an admin account. Having only an admin account is a drawback in RL.
Yeah well. RL doesnt have DNI either ![]()
In the end I dont pick at SR too much for it's certain failures in logic. Thats where the fantasy/fiction part of the game comes in.
| QUOTE (Kesslan) |
| Yeah I agree with Blade. If the OS is 'hard coded' wich.. effecitvely it would be in things like smartlinks. Then there's absolutely NO reason why you shouldnt soley have an 'admin access account'. I mean just look at the IPod. You dont have sub 'accoutns' on that. Just one sole 'access'. The software is all 'firmware'. With just the device itself you cant possibly edit the software. And if you mess it up you just wipe the internal drive and reinstall. I shoudl know. My Ipod got messed up somehow or other when I was updating the playlist. The only way to fix it was to do a fresh install of the software. Also back when I used to work tech support for Compaq they had these computer terminals you could effectively get for what ever the tax cost you. Because you paid say.. $900 for the computer + monitor. You got a direct $100 rebate from Compaq. You got an additional $300 rebate from Microsoft if you signed up for their MSN service, and so on and so forth. On some of the system syou could actually 'technically' make $40. But that contract with MS is for 3 years. So your not really 'making' money it's just prestented that way. The systems themselves either worked.. or didnt. They didnt even have a hard drive. The more 'advance'd systems had one as an added feature. Normally they just had a floppy drive and a CDrom. Along with a 'hard coded' OS. If something went wrong with the OS you wiped the flash memory and reinstalled. If that didnt work you sent it back to Compaq and (assuming it was still under warranty) they sent you a new one. There was only one 'account' to that version of windows as well I belive. Since you couldnt really even save your settings. |
| QUOTE (ixombie) | ||
Just... no. We should not be using ipods of all things as a model for technology in 2070. In 2070, computers can be woven into jackets. There is no reason to assume that your toaster, or your underpants even, have a dumbed down 'firmware' computer in them. Devices with a System have a System, and that's all that SR4 provides. As a general rule, SR4 technology, 63 years in the future, is better than modern tech. I don't think it ever makes sense to assume that SR4 technology is limited just because similar tech is limited today. |
Hell for that mater look at the BIOS of any computer as it's been for years. Guess what? Solid state OS right there. Real basic perhaps. But it still is one. Hell modern motehrboards pretty much all now have 'dual bios' now too. Which means if one BIOS chip gets screwed to hell somehow you still have a totally seperate secondary backup to run off of.
But the bottom line is if you're trying to hack anything that doesn't actively have user account, like some Matrix site, you're looking at a minimum of 7 successes to hack in. Something like a smartgun will probably take 9(Device rating 3) and Mr. J's commlink (rating 5) should take 11. And assuming they have up to date analyze programs the devices are probably throwing ratingx2 dice at you every time you try and hack them.
It basically means that hacking on the fly is a lot harder than I'd previously thought as getting that extra 6 successes will often get you detected.
I suppose that kinda makes sense. If you've got a system that has to juggle tons of users it's bound to have more chinks that one that's just meant to have one.
| QUOTE (Kesslan) |
| Hell for that mater look at the BIOS of any computer as it's been for years. Guess what? Solid state OS right there. Real basic perhaps. But it still is one. Hell modern motehrboards pretty much all now have 'dual bios' now too. Which means if one BIOS chip gets screwed to hell somehow you still have a totally seperate secondary backup to run off of. |
| QUOTE (sunnyside) |
| Basically it seems like all personal electronics (especially on runners) should only have the admin level and thus require an extra 6 successes on to hack into them. Is this right? I.E. if you try and hack a smartlink (Device rating 3?) you should have to get 9 successes hacking in and have it probably roll 6 die against you every time. |
I suppose there is an issue of RAW vs how we feel about things. I'm kind of interested in both.
From a RAW(Rules as written) point of view it says admin access takes an extra 6 successes and that simple devices usually only have admin accounts. It however does not specify whether you can choose to only have admin type access on systems that typically have lower security levels (I.e. if a corp can only have admin access on their high security offline system because they know it makes it much harder for a hacker to get in undetected in the time they have while security closes in).
From this viewpoint lower access acounts are a liability that you put up with because you want to be able to handle extra traffic and users who may do things like forget their passwords etc. If you can't turn the lower levels off they represent the fact it's easier to hack things like computers that are meant to interface with the Matrix in many ways (all sorts of ports are open, all sorts of traffic is coming in, all sorts of traffic is going out and expecting responses). Something like a smartlink need not assume this liability as it need only interact with one device in one way.
Conversly you could make an argument (a slightly weak one) that devices like smartlinks are not so sophisticated and so would be more vulnerable (they wouldn't get +6 for admin access, you log in as normal and get admin access).
Or you could argue a departure from RAW and say they should have multiple levels which would be quite workable especially from the modern day cell phone analogy.
Still this makes a HUGE difference ingame. At three successes to get in most PC hackers can get in on the first try and probably not be detected. At nine successes it'll take them more like three combat turns and they're looking at 18 dice coming at them, which will typically beat a level six stealth program and easily beat the more common level five.
So we're talking about the difference between easy and hard hacking of devices.
| QUOTE (sunnyside) |
| So we're talking about the difference between easy and very hard hacking of devices. |
| QUOTE (Moon-Hawk) |
| True, but also bear in mind that this mainly applies to hacking on the fly. |
The +6 is fine, IMO, and I run with all device rated objects only having admin access. I think the main thing to realize is that while the +6 threshold makes it tougher on the hacker, its what the GM builds as a response to an alert that really makes the difference.
A low-security node may only have tracking IC or maybe even none at all...so while an alert may be raised, there may not be any major consequences from the alert. Some systems may just try and terminate the connection or do a reboot...I think keeping in mind that each node may be different is a good thing a GM needs to throw at their players.
Sometimes there will be a ton of IC ready to pounce on the hacker...other times, no recourse besides the hacker having to send a command to the node to cancel the alert...
I've always run it that any device with the exception of hosts have only admin level access -- even commlinks. It's worked out very well. though it has made the players feel less paranoid about their stuff getting hacked.
Edit: nevermind, just saw that deek posted essentially the same thing.
Ignoring the hacking difficulty modifiers and certain other rules, a lot of devices should have *no* admin access. It's a fairly standard security practice to remove all administrative accounts on a firewall, for example. Many consumer electronics, similarly, will have no administrative access to avoid people getting functionality that they haven't payed for. Then again, many consumer electronics only *say* they don't have admin accounts, and then leave hidden default accounts, which has led to a lot of exploitation in the past.
Unfortunately, SR4 *requires* that there be an admin account, which basically means you're out of luck if you want to make a secure/'locked in' system.
Most computer security guides will tell you to set up a user-level account on your computer, and to use that instead of root. Then whenever you need root access, you Sudo. This is so that you don't majorly screw things up in a totally accidental way, and so that programs you install on the fly don't get administrative powers (which limits viri, trojans, etc).
The current hacking system seems to reflect the old-school 'hacking the mainframe' philosophy more than the 'getting a person's browser to execute malicious code' one. That is, you find some pooly-protected user level account out of maybe 300 (with a password like '123' or 'JohnDoe1'), and mess with things until you figure out an exploit to get root access.
This doesn't really reflect personal computers (e.g. comlinks) very well, which should indeed (by the SR4 rules) only have admin access for security reasons. In this case, it might more sense to use an opposed test of your Exploit (+System 'cause that's how they do it) vs. the target's Electronic Warfare + Firewall. Then you get co-control of whatever account (probably the only account) was being used.
Cyberlimbs and other consumer electronics should (as you say) also only have admin access, and the owner of the limb won't have the password (Genetech or Ares or whoever have it). This is a situation in which the currently used DC makes a lot of sense, and really explains why anyone with half a brain turns off wireless access to their cyberware.
Regardless, the rules aren't designed to be realistic at all, so I probably just wasted a lot of breath
| QUOTE (Dashifen) |
| I've always run it that any device with the exception of hosts have only admin level access -- even commlinks. It's worked out very well. though it has made the players feel less paranoid about their stuff getting hacked. |
| QUOTE |
| nevermind, just saw that deek posted essentially the same thing. |
Yeah alot of this is more or less what I was trying to get at witht he whole admin thing. I mean with the BIOS you either have access or you dont. Which is really waht I was aiming at with the BIOS to Commlink reference. I've had it before where when I worked in a computer store, we'd get customers come in and they'd have a BIOS password setup. But we dont have it.
So.. either the customer had to give us the BIOS password so we could make the alterations. Or we had to pop open the case and physically reset the jumper. Depending on the system the only other time the password gets wiped is when the BIOS battery dies. Thus wiping the chip's memory and setting it back to hard coded factory settings.
I really dont see why a Commlink would ultimately be that much different. You have this underlaying OS thats flash encoded. And then whiel it's up and running and has a powersource you can save all thse fun settings etc and make all these alterations. But ultimately if something goes screwy you can just turn it off, turn it back on again and it's 'back to factory settings'. Your data is still stored in the memory though.
And that doesnt mean that there isnt some 'ultimate' 'true' admin access level put in by the manufacturer. But say in this case for a hacker to actually get at that they'd have to actually physically switch over a jumper. So to do it any other way they have to hack into the 'offical' 'admin' account. Which with a commlink since it's a personal device like a cellphone. Is the only 'account' available.
So yeah ultimately the commlink would give you that +6 where appropriate. And to me at least that seems alto more 'realistic' than a hacker being able to get in as easily as scatching his balls without some known ahead of time backdoor or some such. And I'd toally expect the 'stock OS' to have such a backdoor too. Finding it is a whole other story however.
Powered by Invision Power Board (http://www.invisionboard.com)
© Invision Power Services (http://www.invisionpower.com)