(crossposted at Shadowrun4 forum)
I'm requesting a rules check as it looks to me as though there's a defense against (some) spoofing.
Put a databomb on the access port.
As I read the rules, to issue a command (with the access ID) the node must be accessed.
Now I'd not put this on devices that have a wide range of interaction. Putting them on the slaved drones and other devices, however, looks to me like a nice way to cover the only weakness of slaved devices -- their vulnerability to spoof attacks.
However, I'm still learning and could be wrong, so I'm asking for a doublecheck. Thanks.
MM, i dont think so, since the DB only goes off if someone is unauthorized, if they spoof and succeed they're authorized, however,i would say if they spoof and fail, then it could go boom
No, you set a different passcode for the data bomb.
I'd say no, it's doesn't count as a login - after all, you're not hacking the node's login mechanism, and while spoofing a slaved device you can't as a result login to the node it's slaved to. But ymmv.
Databombs only affect you if your logging in, if your spoofing your not logging in. By design slaving is vulnerable to spoofing there should not be a 100% foolproof unhackable system anyway.
Lurker, this wouldn't make it unhackable.
It would just make it a bit more difficult/risky to spoof. (grin)
Spoofing is not logging in. It's touchless. Even if the data bomb could go off, there's literally nothing there for it to hit.
hurray for right answer, wrong reason
Powered by Invision Power Board (http://www.invisionboard.com)
© Invision Power Services (http://www.invisionpower.com)