Here is the idea for an ICE I have :
Stealthy ICE that Analyse every persona in his node.
If the ICE detect a not-allowed persona it will track it back to his origins node.
When in the persona node he will launch an Agent in the node then go back home.
The Agent is Stealthy and Selfreplicating.
Agent script :
- If it dont replicate yet, replicate.
- Analyse the node to see if it is crypted by his own device, if not then Encrypt the node with a Databomb that would explode if not provided by the Agent password.
- Analyse the decryption program to see if it exist or is not encrypted yet, if so Encrypt the program with a Databomb that would explode if not provided by the Agent password.
- Analyse all the programs to see if they are encrypted, if not encrypt them with Databomb.
- Do the same for the files.
- Check for any Agent/Persona unknown presence, if so track and infiltrate them. Go back to start of list.
- If nothing left to do check for any master/slave connection in the node and access the master/slave. Go back to start of list.
How did it translate in game terms ?
More specific question :
1- Is the hacker automatically aware of the lowering of Response on his commlink.
2- Can you really Encrypt a Decrypt program ?
3- Can you run another copy of the program ?
4- Can you Encrypt loaded but not running program ?
5- Can a program/files/node be crypted by different users/programs ?
6- Is it too strong ?
7- What would happen if you Encrypt a Node while a persona is originating from it ?
Well, there are a couple of problems I see with this idea...
First of all, your agent will use the Track program to trace a not-allowed icon back to its source, correct?
Now you seem to assume, that the agent automatically has access to the originating node (most likely a hacker's commlink). But as far as I can see, that is not the case.
A Trace user action gives you only the access ID and the physical location of the originating node. For everything else that your agent wants to do, it would first need to access the hacker's commlink, e.g use exploit to hack an account on the node.
And I think it is rather unlikely that the agent will succeed to bypass all security measures a competent hacker will use to secure his own commlink (Encryption, Data Bombs, Patroling IC etc) unnoticed.
But if your IC really accomplishes all that, the next problem I see is that you can't encrypt running prorgams. Mind you, I can only look at the BBB at the moment, so Unwired might tell something else, but you can only encrypt "a file, set of files, node, or communication link" (SR4A p. 229). So, I think it should be possible to encrpyt programs that are not running, since at that moment they are just files.
At the moment your potential IC agent will need a payload of Stealth, Track, Decrypt, Exploit, Encrypt and Data Bomb. That's quite a lot, and you will probably want to have Adaptability autosoft too.
So simply the fact, that this IC is suddenly running on the hacker's commlink will most likely reduce response on the 'link and the hacker will recognize this cause all of his own programs suddenly go slower...
-CJ
actually, given that the hacker being traced already have his icon present in the node the trace is being performed from, they already have the access id by way of a simple matrix perception test. Its when one intercept data traffic (say a call) between two nodes that one need to trace to get the access id.
I'm working on integrating the Matrix into my Maptools framework next week, and while doing research I found a copy of "Virtual Realities". There used to be a *lovely* little program called "Trace and Burn".
hehe, trace and burn, from back when software could light a cyberdeck on fire (pesky thing is about as explosive as a star trek control console!).
"Copy Protection prohibits the program from being copied", Unwired p114
And where's it say its legal to load multiple copies of something that can't be copied? :-)
Ah, I see now... good call fella's, thanks!
Ok.
But lets say the ICe Encrypt the Hacker Decrypt program before he run it. The Hacker will need another Decrypt program to be loaded and started or someone else to come and decrypt it before he could launch it ?
If both the Decrypt and the Node are crypted then the hacker lose control on the commlink and need to use another one to access and purge ?
(Of course, usually Hackers have a Decrypt program running all the times, so I suppose the ICe should try to crash the running Decrypt after it crypt the loaded version ).
I understood that this is a lot of programs running for the agent. The idea is that the Agent was launched from the Hacker Commlink in order to lower his Response and make him less able to continue the original hacking/fight replicating Agents.
i dont know if a comlink can be encrypted in that way, but then what exactly that can be encrypted have never been clarified. Best i can tell, one can encrypt against external access, but i dont think one can encrypt against direct access (that is, directly jacking in to the comlink).
btw, i kinda like the idea of encrypting someones decrypt program. Reminds me of the issue of putting a tool into a clamshell packing so that one need the tool to unpack it all...
Powered by Invision Power Board (http://www.invisionboard.com)
© Invision Power Services (http://www.invisionpower.com)