I'm playing a Hacker for the first time tomorrow and I've been re-reading the rules/FAQ/Errata/Dumpshock extensively. After doing a lot of searching, I have a few questions still.
1. Active Alerts:
Can I set my own commlink on Active Alert and gain the plus +4 to Firewall? Could I do this for my smartlink or for my drones? If yes, is there any drawback for being on an Active Alert? I could imagine some type of performance hit (either system or response) but I didn't see any mention in the rules.
2. Tracking
If I'm talking to someone on the telephone and assuming they're not using an anonymizer node, can I use the Track program to find their physical location (like tracking a persona)?
If I just have their commlink number, could I track them? And if yes, how? (assuming they're not 'running silent' as stated on page 214)?
What if I have the access ID instead? Can I use that to track them down (assuming they're not in hidden mode)?
I picture an access ID like a MAC address (hardwired). Is that true? Or is it more like an IP address (assigned by an MSP)?
Thanks for the help,
JKL
| QUOTE (jklst14) |
| I'm playing a Hacker for the first time tomorrow and I've been re-reading the rules/FAQ/Errata/Dumpshock extensively. After doing a lot of searching, I have a few questions still. 1. Active Alerts: Can I set my own commlink on Active Alert and gain the plus +4 to Firewall? Could I do this for my smartlink or for my drones? If yes, is there any drawback for being on an Active Alert? I could imagine some type of performance hit (either system or response) but I didn't see any mention in the rules. 2. Tracking If I'm talking to someone on the telephone and assuming they're not using an anonymizer node, can I use the Track program to find their physical location (like tracking a persona)? If I just have their commlink number, could I track them? And if yes, how? (assuming they're not 'running silent' as stated on page 214)? What if I have the access ID instead? Can I use that to track them down (assuming they're not in hidden mode)? I picture an access ID like a MAC address (hardwired). Is that true? Or is it more like an IP address (assigned by an MSP)? Thanks for the help, JKL |
I tend to feel that in SR4 things have moved beyond telephones and telephone numbers, since everyone (who matters) has a commlink anyway.
I also would be leary of equating an access ID to modern day concepts such as IP addresses or MAC addresses. Best just to abstract it to; "you need an access ID to use the matrix. It is possible to spoof your access ID".
Tracking is an extended test, resisted by spoofing and redirecting, but assuming the ID you were tracking didn't go offline before you found it, you'd probably be able to determine its physical location by triangulating the signal from whichever nearby network hubs it is using.
It's a little unclear exactly how hidden mode works in combination with actively using a commlink, but I would suggest that it can be tracked back following its path through the matrix, and being hidden just makes it harder for local users to locate the commlink, which is not broadcasting to all hubs in its location, but only to the ones it is subscribed to.
Active alert only applies to the hacker that triggered the alert, so you need something to actually be on active alert against. That's my interpretation of the rules anyway. Those with a better grasp of networking technology may be able to provide better ones.
Thanks for clarifying Active Alerts. Somehow I missed it when I went over the Matrix chapter.
| QUOTE |
| Can I set my own commlink on Active Alert and gain the plus +4 to Firewall? |
| QUOTE |
| If I'm talking to someone on the telephone and assuming they're not using an anonymizer node, can I use the Track program to find their physical location (like tracking a persona)? |
| QUOTE |
| If I just have their commlink number, could I track them? And if yes, how? (assuming they're not 'running silent' as stated on page 214)? |
| QUOTE |
| What if I have the access ID instead? Can I use that to track them down (assuming they're not in hidden mode)? |
| QUOTE |
| I picture an access ID like a MAC address (hardwired). Is that true? Or is it more like an IP address (assigned by an MSP)? |
MAC addresses can be set in modern network operating systems. While hardwired, yes, they aren't JUST hardwired.
my take on the access ID is as something other then a ip or mac address.
its more like a hardware id, something neitehr the IP or the mac is supposed to work as (the mac only id a network interface on the ethernet hardware layer or similar).
as in, its more like the phone number stored on a sim card (if you have used a gsm phone). it ids the hardware and indirectly the owner of the heardware, or may even id the owner rather then the hardware.
as in, its even more high level logical then a ip address. its at the very least a phone number (the ip, given that at present it can often be changed by requesting a new one from a pool, isnt as rigid as a phone number is) or a mail address.
Powered by Invision Power Board (http://www.invisionboard.com)
© Invision Power Services (http://www.invisionpower.com)