IPB

Welcome Guest ( Log In | Register )

32 Pages V  « < 4 5 6 7 8 > »   
Reply to this topicStart new topic
Sorry Pal, I Had To Hack Your Eyes
You cannot see the results of the poll until you have voted. Please login and cast your vote to see the results of this poll.
Total Votes: 133
Guests cannot vote 
Epicedion
post Jun 29 2013, 05:51 PM
Post #126


Douche
****

Group: Banned
Posts: 1,584
Joined: 2-March 11
Member No.: 23,135



QUOTE (Tymeaus Jalynsfein @ Jun 29 2013, 12:47 PM) *
But you have yet to tell us why the Baton Actually NEEDS software to operate...


It doesn't. It has a button or lever or flipout that takes an action to actuate. Or you can hook it up to your wireless and think it open as a free action.

These appear to be benefits because the old option was just to burn an action.
Go to the top of the page
 
+Quote Post
Tymeaus Jalynsfe...
post Jun 29 2013, 05:54 PM
Post #127


Prime Runner Ascendant
**********

Group: Members
Posts: 17,568
Joined: 26-March 09
From: Aurora, Colorado
Member No.: 17,022



QUOTE (Epicedion @ Jun 29 2013, 10:51 AM) *
It doesn't. It has a button or lever or flipout that takes an action to actuate. Or you can hook it up to your wireless and think it open as a free action.

These appear to be benefits because the old option was just to burn an action.


And yet, SOMEHOW, a Pan connection just does not suffice... I call BS. *shrug*
Go to the top of the page
 
+Quote Post
Epicedion
post Jun 29 2013, 05:57 PM
Post #128


Douche
****

Group: Banned
Posts: 1,584
Joined: 2-March 11
Member No.: 23,135



My actual hope is that skinlink makes a reappearance as a bioimplant (to improve the data throughput of the skin) but be vulnerable to directed jamming or electric shocks. They would make individual gear untargetable but the commlink would remain a security issue.

People without implants should get no such link and be forced to run wireless with all its issues.
Go to the top of the page
 
+Quote Post
Epicedion
post Jun 29 2013, 05:58 PM
Post #129


Douche
****

Group: Banned
Posts: 1,584
Joined: 2-March 11
Member No.: 23,135



QUOTE (Tymeaus Jalynsfein @ Jun 29 2013, 12:54 PM) *
And yet, SOMEHOW, a Pan connection just does not suffice... I call BS. *shrug*


What? A PAN suffices, but a PAN is vulnerable.
Go to the top of the page
 
+Quote Post
KarmaInferno
post Jun 29 2013, 06:15 PM
Post #130


Old Man Jones
********

Group: Dumpshocked
Posts: 4,415
Joined: 26-February 02
From: New York
Member No.: 1,699



QUOTE (Epicedion @ Jun 29 2013, 12:58 PM) *
What? A PAN suffices, but a PAN is vulnerable.

Vulnerable only if the PAN has a Matrix connection. Or the hacker is right on top of you in mutual signal range.

His point, I think, is that if he is commanding it with his mind the Matrix shouldn't be required, just a connection between his mind and the baton. Whether that connection be a cable or a PAN or whatever.


-k
Go to the top of the page
 
+Quote Post
Thanee
post Jun 29 2013, 06:31 PM
Post #131


jacked in
**********

Group: Admin
Posts: 9,493
Joined: 26-February 02
Member No.: 463



QUOTE (Shinxy @ Jun 29 2013, 06:16 PM) *
Um, it isn't paranoid if it's the truth. Do you even read the news?


Shinxy, please don't drag this discussion further down to a personal level. It's the best, in general, to stay within the Shadowrun context.

Bye
Thanee
Go to the top of the page
 
+Quote Post
Not of this Worl...
post Jun 29 2013, 06:34 PM
Post #132


Moving Target
**

Group: Members
Posts: 284
Joined: 26-February 02
From: Seattle Metroplex
Member No.: 217



QUOTE (Draco18s @ Jun 29 2013, 08:32 AM) *
And they retconned things to say that it's always worked like that.

I'm ok with retcons when the retcons make sense, but this one just blows my mind.

(If the new rules were actually any good then the retcon would be OK).


No they retconned to say SR4 always worked like that... but they forget Shadowrun has more than an 8 year history. There was no "Wireless Matrix" for these devices to run on when they existed in the 2050s and 2060s unless they're retconning the entire history of the Matrix.

Also, I wouldn't say there is ANY problem with the new rules that I've seen so far. It is the way it is specifically applied to all cyberware with a blanket. It could easily be fixed with a cybertech book which provides alternate versions of these items like a cyberspur that costs a little more money but includes a DNI rather than wireless for control. I actually like this solution because it gives a wider variety of cyberware that actually makes a difference.
Go to the top of the page
 
+Quote Post
Mäx
post Jun 29 2013, 06:41 PM
Post #133


Prime Runner
*******

Group: Members
Posts: 3,803
Joined: 3-February 08
From: Finland
Member No.: 15,628



QUOTE (Tashiro @ Jun 29 2013, 05:51 PM) *
Or, they simply no longer support the older models. You know, the stuff that ran on the old Matrix?

What part of "Didn't need matrix at all before SR5" do you not understand?
Seriously come on.
QUOTE (Not of this World @ Jun 29 2013, 09:34 PM) *
Also, I wouldn't say there is ANY problem with the new rules that I've seen so far. It is the way it is specifically applied to all cyberware with a blanket. It could easily be fixed with a cybertech book which provides alternate versions of these items like a cyberspur that costs a little more money but includes a DNI rather than wireless for control. I actually like this solution because it gives a wider variety of cyberware that actually makes a difference.

That would be total and utter waste of space in a book that really doesn't have any space to waste.
I would much rather have as much new pieces of gear as possible.
Go to the top of the page
 
+Quote Post
Tashiro
post Jun 29 2013, 06:52 PM
Post #134


Moving Target
**

Group: Members
Posts: 732
Joined: 5-April 08
From: Ottawa, Canada
Member No.: 15,847



QUOTE (Sengir @ Jun 29 2013, 11:17 AM) *
Because the "thing" on the baton which receives the commands from the corp server is not software? Nope, you have just replace software which receives commands with software which receives commands, no advantage there (IMG:style_emoticons/default/wink.gif)

And what exactly stops my hacker from spoofing commands from the corp server to get that functionality without the corp server?


If I had to do a quick guess, off-the-cuff? Not much, except for the time and effort it takes to find out what the send-receive protocols are. For simple things (like, say, the stun baton), that would be simple. For something like the recharging of certain pieces of 'ware? That might be a lot tougher, since the remote recharger doesn't send juice without the proper protocols.

It isn't like the system's going to be flawless and unhackable. But the question of 'why isn't this like THIS', can be answered simply. And can shadowrunners hack it? I'd say 'usually, yes'. But I doubt that should be covered by the main rulebook.
Go to the top of the page
 
+Quote Post
Tashiro
post Jun 29 2013, 06:56 PM
Post #135


Moving Target
**

Group: Members
Posts: 732
Joined: 5-April 08
From: Ottawa, Canada
Member No.: 15,847



QUOTE (cndblank @ Jun 29 2013, 12:50 PM) *
You mean with all the deckers out there, there are not multiple Warz groups going out and reverse engineering the software?
Etc, etc


Oh, I'm certain there are people doing this. No question.
But it takes time. And it takes money. And it wouldn't be 'normal'.

And again, I figure something like this would be in an expansion sourcebook.

Actually, if I were to take it one step further...
Going through security or checkpoints, I could see someone being scanned, to ensure that their goods aren't hacked. 'Please connect to the matrix for a brief scan - it's for your security'. I could see that.

Hmm, I think I'll use that in the near future...
Go to the top of the page
 
+Quote Post
Cochise
post Jun 29 2013, 07:57 PM
Post #136


Mr. Quote-function
***

Group: Dumpshocked
Posts: 1,316
Joined: 26-February 02
From: Somewhere in Germany
Member No.: 1,376



QUOTE (Tashiro @ Jun 29 2013, 08:52 PM) *
That might be a lot tougher, since the remote recharger doesn't send juice without the proper protocols.


Let me just say ... ~naw, forget it, who cares for physics anyways~

QUOTE
It isn't like the system's going to be flawless and unhackable.


It already is hackable ... for every other purpose, by manipulating the very same protocols. That's the core principle behind the decker archetype.

QUOTE
But the question of 'why isn't this like THIS', can be answered simply.


And people reject these "simple" answers ...

QUOTE
And can shadowrunners hack it? I'd say 'usually, yes'. But I doubt that should be covered by the main rulebook.


Which again brings us back to design level and the resulting problem: The design goal of having combat hackable gear will get neutered once such options arise, therefore from a development standpoint such things must not become availible otherwise they'd have wasted valuable design and production time which could have been spent on other subjects.
Go to the top of the page
 
+Quote Post
Fatum
post Jun 29 2013, 08:02 PM
Post #137


Runner
******

Group: Dumpshocked
Posts: 2,801
Joined: 2-September 09
From: Moscow, Russia
Member No.: 17,589



QUOTE (Tashiro @ Jun 29 2013, 04:34 PM) *
You don't get it, do you? The answer is not 'go play another game'. Shadowrun has a good mix of fantasy and cyberpunk. It allows me to look at things like transhumanism, while dealing with the conflict that comes naturally from dealing with the awakened age and the advancement of technology. There's no reason for me to go to another game for this.
The answer to wanting things SR does not give and is not supposed to give due to its genre is precisely going to play games in the genre you want.

QUOTE (Tashiro @ Jun 29 2013, 04:34 PM) *
You're missing the point. The entire idea behind this kind of thing is control. The corporation can sell hundreds of thousands (if not millions) of items, keep all the software on their own servers, and keep track of how often, when, and where the items are being used. They only need to patch one thing, and everyone gets the update automatically - without having to download the patch. Because the corporations keep control of the software, nobody can hack or modify of the software.

Or, as my friend says: how to control the software - never let anybody have a full copy of it.
That has worked so well historically. Besides, it's not like hackers can write their own soft - especially the kind of super-complex soft required to have a baton extend.


On a side note, is triangulation a lost art by 2075? I mean, when you have someone walk into a secure zone lit up like a new year tree with wireless transmission, detecting and pinpointing him is child's game.
Go to the top of the page
 
+Quote Post
Sendaz
post Jun 29 2013, 08:36 PM
Post #138


Runner
******

Group: Dumpshocked
Posts: 3,039
Joined: 23-March 05
From: The heart of Rywfol Emwolb Industries
Member No.: 7,216



QUOTE (Fatum @ Jun 29 2013, 04:02 PM) *
Besides, it's not like hackers can write their own soft - especially the kind of super-complex soft required to have a baton extend.
He is of course referring to the tragic Baton Bashup of '68 when the Radical Ions scriptkiddie gang sold secondrate batons out of Prague utilizing their own gimped software, resulting in a series of accidents due to malfunctions in the extension/retraction software with injuries ranging from broken fingers and wrists to at least 3 cases of blunt force trauma to the groin region when local toughs carried the baton tucked in the front of their synthleather jeans.

Go to the top of the page
 
+Quote Post
Sendaz
post Jun 29 2013, 08:53 PM
Post #139


Runner
******

Group: Dumpshocked
Posts: 3,039
Joined: 23-March 05
From: The heart of Rywfol Emwolb Industries
Member No.: 7,216



QUOTE (Epicedion @ Jun 29 2013, 12:57 PM) *
My actual hope is that skinlink makes a reappearance as a bioimplant (to improve the data throughput of the skin) but be vulnerable to directed jamming or electric shocks. They would make individual gear untargetable but the commlink would remain a security issue.

People without implants should get no such link and be forced to run wireless with all its issues.

Someone mentioned that skinlink will be back in later book, but in a changed form so it doesn't entirely remove the hack factor, but no specifics (ie reduces range, increases defense, etc)
Go to the top of the page
 
+Quote Post
Tashiro
post Jun 29 2013, 09:07 PM
Post #140


Moving Target
**

Group: Members
Posts: 732
Joined: 5-April 08
From: Ottawa, Canada
Member No.: 15,847



QUOTE (Sendaz @ Jun 29 2013, 03:36 PM) *
He is of course referring to the tragic Baton Bashup of '68 when the Radical Ions scriptkiddie gang sold secondrate batons out of Prague utilizing their own gimped software, resulting in a series of accidents due to malfunctions in the extension/retraction software with injuries ranging from broken fingers and wrists to at least 3 cases of blunt force trauma to the groin region when local toughs carried the baton tucked in the front of their synthleather jeans.

You're now officially my hero. (IMG:style_emoticons/default/biggrin.gif)
Go to the top of the page
 
+Quote Post
Stahlseele
post Jun 29 2013, 11:02 PM
Post #141


The ShadowComedian
**********

Group: Dumpshocked
Posts: 14,538
Joined: 3-October 07
From: Hamburg, AGS
Member No.: 13,525



QUOTE (Epicedion @ Jun 29 2013, 07:58 PM) *
What? A PAN suffices, but a PAN is vulnerable.

actually, as things are right now, no, a PAN seems to not be enough . .
Go to the top of the page
 
+Quote Post
Not of this Worl...
post Jun 29 2013, 11:47 PM
Post #142


Moving Target
**

Group: Members
Posts: 284
Joined: 26-February 02
From: Seattle Metroplex
Member No.: 217



QUOTE (Mäx @ Jun 29 2013, 10:41 AM) *
That would be total and utter waste of space in a book that really doesn't have any space to waste.
I would much rather have as much new pieces of gear as possible.


Seriously? Who are you to judge? For me it would sell the book (or at least to my players) and probably wouldn't need to take up more than two pages.
Go to the top of the page
 
+Quote Post
Tymeaus Jalynsfe...
post Jun 30 2013, 02:57 AM
Post #143


Prime Runner Ascendant
**********

Group: Members
Posts: 17,568
Joined: 26-March 09
From: Aurora, Colorado
Member No.: 17,022



QUOTE (Epicedion @ Jun 29 2013, 11:58 AM) *
What? A PAN suffices, but a PAN is vulnerable.


A PAN does NOT suffice, you MUST BE CONNECTED TO THE MATRIX. I still call BS. (IMG:style_emoticons/default/smile.gif)
Go to the top of the page
 
+Quote Post
Draco18s
post Jun 30 2013, 04:09 AM
Post #144


Immortal Elf
**********

Group: Members
Posts: 10,289
Joined: 2-October 08
Member No.: 16,392



QUOTE (Tymeaus Jalynsfein @ Jun 29 2013, 09:57 PM) *
A PAN does NOT suffice, you MUST BE CONNECTED TO THE MATRIX. I still call BS. (IMG:style_emoticons/default/smile.gif)


So let me get this strait.

Matrix--as in the WHOLE internet--is required to extend a baton faster?
Go to the top of the page
 
+Quote Post
Tashiro
post Jun 30 2013, 04:12 AM
Post #145


Moving Target
**

Group: Members
Posts: 732
Joined: 5-April 08
From: Ottawa, Canada
Member No.: 15,847



A connection to the software is required. And that's in the Matrix.
Go to the top of the page
 
+Quote Post
tete
post Jun 30 2013, 04:27 AM
Post #146


Running Target
***

Group: Members
Posts: 1,095
Joined: 26-February 02
From: Seattle Wa, USA
Member No.: 1,139



QUOTE (Neurosis @ Jun 28 2013, 05:41 PM) *
2) "Wahhhhhhhhhhhh! Hacking cyberware is not realistic! Wahhhhhhhhhhhhhh!" SHUT UP!

Oh, I'm sorry, I didn't realize you were a time traveling computer science major FROM THE FUTURE.

In that case, elves dragons wizards vampires bug spirits and shape-changing fox people would like to have A FUCKING WORD WITH YOU about "REALISM".


You forgot that you can already hack pacemakers and some other electronics we already put inside the human body (IMG:style_emoticons/default/grinbig.gif)

QUOTE (Fatum @ Jun 29 2013, 08:02 PM) *
On a side note, is triangulation a lost art by 2075? I mean, when you have someone walk into a secure zone lit up like a new year tree with wireless transmission, detecting and pinpointing him is child's game.


Well pen-registers sorta are more art than science. Its only a child's game in the movies... I'm assuming your talking about cell phone triangulation ie pen-register which works off the two ID keys every cellular device has and you can "track" it as leaves signal range of one tower and hits the signal range of a new tower. Its not like sonar giving your an exact reading its more like Tarzan swinging from vine to vine.

QUOTE (Shinxy @ Jun 29 2013, 06:54 AM) *
To anyone complaining that cyberware being hackable is a security hole that anyone with two brain cells to rub together would be able to address:

Do you use a cell phone? Do you use the internet?

You're aware that all your communications are being monitored by the NSA this very minute, right? The NSA can even track your cell phone when it's off. They can get into your email and social networking accounts at will. Shouldn't you have "addressed" that, in the same way your characters should have "addressed" their every Matrix security vulnerability?


See above for cell phones, for internet the root servers are run by the US so that is not surprising. Also I wouldn't use the word monitoring, that implies actively looking its more like recording, and frankly this happens on its own every time you hit a server, switch, router, etc. Your ISP is recording everything you do for a limited period of time which is why we have things like SSL and other encryption technologies. The news with the NSA was how long they were keeping the information for, not that it happens. Which still doesn't mean someone cant get my passwords it just means it takes longer. Security is all about being obfuscated enough that your not worth the time and effort to bother caring about whats in your TCP/IP packets. If your cell phone is actually off, it cant be tracked, but most smart phones don't actually turn off when your turn them off. Its more like they go to sleep when you turn them off. As for the email and social networking accounts, this is really complicated and has to do with hash keys, court orders, the company policy and other fun. I'm not sure I can go into that in any general way easily so I'm sure I'd break some form I signed once upon a time going into any specifics. They aren't hacking your account to get it though they just ask google, yahoo, whomever to hand over your mail.
Go to the top of the page
 
+Quote Post
Fatum
post Jun 30 2013, 04:56 AM
Post #147


Runner
******

Group: Dumpshocked
Posts: 2,801
Joined: 2-September 09
From: Moscow, Russia
Member No.: 17,589



QUOTE (tete @ Jun 30 2013, 08:27 AM) *
Well pen-registers sorta are more art than science. Its only a child's game in the movies... I'm assuming your talking about cell phone triangulation ie pen-register which works off the two ID keys every cellular device has and you can "track" it as leaves signal range of one tower and hits the signal range of a new tower. Its not like sonar giving your an exact reading its more like Tarzan swinging from vine to vine.
I'm talking about radio signal triangulation. You only need two scanning antennas to pinpoint the source of any known signal: for an elementary case with amplitude method, just scan the ether until you find the direction where the signal you're looking for is maximal. Since you have two points of location, draw a line from each in the direction of the maximum, and there you have your target. Easy as pie. Sure, in real urban environment it gets a little bit more complex, but minding that such a system can be easily set up in advance, and local conditions accounted for - again, child's play.
Same goes for cell phones, actually, except it's easier to use the delay method there - estimate the time it takes for a signal to arrive at the tower, and the difference between time it takes to arrive at other towers in the vicinity - and there is your target, again, clear and simple.
The only additional issue in SR would be the fact that there are lots of wireless-enabled devices around, but as long as their network protocols allow for device recognition, the triangulation system can use those to pick the needed targets just as well.
Go to the top of the page
 
+Quote Post
Medicineman
post Jun 30 2013, 05:06 AM
Post #148


Shooting Target
****

Group: Members
Posts: 1,748
Joined: 25-January 05
From: Good ol' Germany
Member No.: 7,015



QUOTE (Tymeaus Jalynsfein @ Jun 29 2013, 01:54 PM) *
And yet, SOMEHOW, a Pan connection just does not suffice... I call BS. *shrug*


Well ,I got good News (IMG:style_emoticons/default/smile.gif)
(Also for Tycho )

QUOTE
WIRELESS BONUSES

Because nearly every piece of gear and 'ware is wireless capable, it means nearly every piece of gear and cyberware benefits dramatically from being "meshed" into your wireless personal area network and the Matrix as a whole.

The BS is not as big as You think it is
to my understandiing that means you can still use Your PAN (and Your Comlink with Agents, strong Encryption,etc)to access the Matrix and your gadgets (Smartlink,etc) don't need to be connected ...."Bareskinned"(Is that the Right word for no protection & helpless ? )

HeyaHeyaHeyaJa
Medicineman
Go to the top of the page
 
+Quote Post
tete
post Jun 30 2013, 05:15 AM
Post #149


Running Target
***

Group: Members
Posts: 1,095
Joined: 26-February 02
From: Seattle Wa, USA
Member No.: 1,139



QUOTE (Fatum @ Jun 30 2013, 04:56 AM) *
but as long as their network protocols allow for device recognition,


They would have to or you would risk sending the wrong information to the device.
Go to the top of the page
 
+Quote Post
X-Kalibur
post Jun 30 2013, 05:30 AM
Post #150


Runner
******

Group: Members
Posts: 2,579
Joined: 30-May 06
From: SoCal
Member No.: 8,626



QUOTE (Medicineman @ Jun 29 2013, 09:06 PM) *
Well ,I got good News (IMG:style_emoticons/default/smile.gif)
(Also for Tycho )


The BS is not as big as You think it is
to my understandiing that means you can still use Your PAN (and Your Comlink with Agents, strong Encryption,etc)to access the Matrix and your gadgets (Smartlink,etc) don't need to be connected ...."Bareskinned"(Is that the Right word for no protection & helpless ? )

HeyaHeyaHeyaJa
Medicineman


I would assume, if that were actually how it worked, someone would have stepped up and said so already. Of course, I should know better than to assume.
Go to the top of the page
 
+Quote Post

32 Pages V  « < 4 5 6 7 8 > » 
Reply to this topicStart new topic

 

RSS Lo-Fi Version Time is now: 7th June 2025 - 10:53 PM

Topps, Inc has sole ownership of the names, logo, artwork, marks, photographs, sounds, audio, video and/or any proprietary material used in connection with the game Shadowrun. Topps, Inc has granted permission to the Dumpshock Forums to use such names, logos, artwork, marks and/or any proprietary materials for promotional and informational purposes on its website but does not endorse, and is not affiliated with the Dumpshock Forums in any official capacity whatsoever.