![]() |
![]() ![]() |
![]() |
![]()
Post
#126
|
|
Douche ![]() ![]() ![]() ![]() Group: Banned Posts: 1,584 Joined: 2-March 11 Member No.: 23,135 ![]() |
But you have yet to tell us why the Baton Actually NEEDS software to operate... It doesn't. It has a button or lever or flipout that takes an action to actuate. Or you can hook it up to your wireless and think it open as a free action. These appear to be benefits because the old option was just to burn an action. |
|
|
![]()
Post
#127
|
|
Prime Runner Ascendant ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 17,568 Joined: 26-March 09 From: Aurora, Colorado Member No.: 17,022 ![]() |
It doesn't. It has a button or lever or flipout that takes an action to actuate. Or you can hook it up to your wireless and think it open as a free action. These appear to be benefits because the old option was just to burn an action. And yet, SOMEHOW, a Pan connection just does not suffice... I call BS. *shrug* |
|
|
![]()
Post
#128
|
|
Douche ![]() ![]() ![]() ![]() Group: Banned Posts: 1,584 Joined: 2-March 11 Member No.: 23,135 ![]() |
My actual hope is that skinlink makes a reappearance as a bioimplant (to improve the data throughput of the skin) but be vulnerable to directed jamming or electric shocks. They would make individual gear untargetable but the commlink would remain a security issue.
People without implants should get no such link and be forced to run wireless with all its issues. |
|
|
![]()
Post
#129
|
|
Douche ![]() ![]() ![]() ![]() Group: Banned Posts: 1,584 Joined: 2-March 11 Member No.: 23,135 ![]() |
|
|
|
![]()
Post
#130
|
|
Old Man Jones ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Group: Dumpshocked Posts: 4,415 Joined: 26-February 02 From: New York Member No.: 1,699 ![]() |
What? A PAN suffices, but a PAN is vulnerable. Vulnerable only if the PAN has a Matrix connection. Or the hacker is right on top of you in mutual signal range. His point, I think, is that if he is commanding it with his mind the Matrix shouldn't be required, just a connection between his mind and the baton. Whether that connection be a cable or a PAN or whatever. -k |
|
|
![]()
Post
#131
|
|
jacked in ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Group: Admin Posts: 9,493 Joined: 26-February 02 Member No.: 463 ![]() |
|
|
|
![]()
Post
#132
|
|
Moving Target ![]() ![]() Group: Members Posts: 284 Joined: 26-February 02 From: Seattle Metroplex Member No.: 217 ![]() |
And they retconned things to say that it's always worked like that. I'm ok with retcons when the retcons make sense, but this one just blows my mind. (If the new rules were actually any good then the retcon would be OK). No they retconned to say SR4 always worked like that... but they forget Shadowrun has more than an 8 year history. There was no "Wireless Matrix" for these devices to run on when they existed in the 2050s and 2060s unless they're retconning the entire history of the Matrix. Also, I wouldn't say there is ANY problem with the new rules that I've seen so far. It is the way it is specifically applied to all cyberware with a blanket. It could easily be fixed with a cybertech book which provides alternate versions of these items like a cyberspur that costs a little more money but includes a DNI rather than wireless for control. I actually like this solution because it gives a wider variety of cyberware that actually makes a difference. |
|
|
![]()
Post
#133
|
|
Prime Runner ![]() ![]() ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 3,803 Joined: 3-February 08 From: Finland Member No.: 15,628 ![]() |
Or, they simply no longer support the older models. You know, the stuff that ran on the old Matrix? What part of "Didn't need matrix at all before SR5" do you not understand? Seriously come on. Also, I wouldn't say there is ANY problem with the new rules that I've seen so far. It is the way it is specifically applied to all cyberware with a blanket. It could easily be fixed with a cybertech book which provides alternate versions of these items like a cyberspur that costs a little more money but includes a DNI rather than wireless for control. I actually like this solution because it gives a wider variety of cyberware that actually makes a difference. That would be total and utter waste of space in a book that really doesn't have any space to waste. I would much rather have as much new pieces of gear as possible. |
|
|
![]()
Post
#134
|
|
Moving Target ![]() ![]() Group: Members Posts: 732 Joined: 5-April 08 From: Ottawa, Canada Member No.: 15,847 ![]() |
Because the "thing" on the baton which receives the commands from the corp server is not software? Nope, you have just replace software which receives commands with software which receives commands, no advantage there (IMG:style_emoticons/default/wink.gif) And what exactly stops my hacker from spoofing commands from the corp server to get that functionality without the corp server? If I had to do a quick guess, off-the-cuff? Not much, except for the time and effort it takes to find out what the send-receive protocols are. For simple things (like, say, the stun baton), that would be simple. For something like the recharging of certain pieces of 'ware? That might be a lot tougher, since the remote recharger doesn't send juice without the proper protocols. It isn't like the system's going to be flawless and unhackable. But the question of 'why isn't this like THIS', can be answered simply. And can shadowrunners hack it? I'd say 'usually, yes'. But I doubt that should be covered by the main rulebook. |
|
|
![]()
Post
#135
|
|
Moving Target ![]() ![]() Group: Members Posts: 732 Joined: 5-April 08 From: Ottawa, Canada Member No.: 15,847 ![]() |
You mean with all the deckers out there, there are not multiple Warz groups going out and reverse engineering the software? Etc, etc Oh, I'm certain there are people doing this. No question. But it takes time. And it takes money. And it wouldn't be 'normal'. And again, I figure something like this would be in an expansion sourcebook. Actually, if I were to take it one step further... Going through security or checkpoints, I could see someone being scanned, to ensure that their goods aren't hacked. 'Please connect to the matrix for a brief scan - it's for your security'. I could see that. Hmm, I think I'll use that in the near future... |
|
|
![]()
Post
#136
|
|
Mr. Quote-function ![]() ![]() ![]() Group: Dumpshocked Posts: 1,316 Joined: 26-February 02 From: Somewhere in Germany Member No.: 1,376 ![]() |
That might be a lot tougher, since the remote recharger doesn't send juice without the proper protocols. Let me just say ... ~naw, forget it, who cares for physics anyways~ QUOTE It isn't like the system's going to be flawless and unhackable. It already is hackable ... for every other purpose, by manipulating the very same protocols. That's the core principle behind the decker archetype. QUOTE But the question of 'why isn't this like THIS', can be answered simply. And people reject these "simple" answers ... QUOTE And can shadowrunners hack it? I'd say 'usually, yes'. But I doubt that should be covered by the main rulebook. Which again brings us back to design level and the resulting problem: The design goal of having combat hackable gear will get neutered once such options arise, therefore from a development standpoint such things must not become availible otherwise they'd have wasted valuable design and production time which could have been spent on other subjects. |
|
|
![]()
Post
#137
|
|
Runner ![]() ![]() ![]() ![]() ![]() ![]() Group: Dumpshocked Posts: 2,801 Joined: 2-September 09 From: Moscow, Russia Member No.: 17,589 ![]() |
You don't get it, do you? The answer is not 'go play another game'. Shadowrun has a good mix of fantasy and cyberpunk. It allows me to look at things like transhumanism, while dealing with the conflict that comes naturally from dealing with the awakened age and the advancement of technology. There's no reason for me to go to another game for this. The answer to wanting things SR does not give and is not supposed to give due to its genre is precisely going to play games in the genre you want. You're missing the point. The entire idea behind this kind of thing is control. The corporation can sell hundreds of thousands (if not millions) of items, keep all the software on their own servers, and keep track of how often, when, and where the items are being used. They only need to patch one thing, and everyone gets the update automatically - without having to download the patch. Because the corporations keep control of the software, nobody can hack or modify of the software. That has worked so well historically. Besides, it's not like hackers can write their own soft - especially the kind of super-complex soft required to have a baton extend.Or, as my friend says: how to control the software - never let anybody have a full copy of it. On a side note, is triangulation a lost art by 2075? I mean, when you have someone walk into a secure zone lit up like a new year tree with wireless transmission, detecting and pinpointing him is child's game. |
|
|
![]()
Post
#138
|
|
Runner ![]() ![]() ![]() ![]() ![]() ![]() Group: Dumpshocked Posts: 3,039 Joined: 23-March 05 From: The heart of Rywfol Emwolb Industries Member No.: 7,216 ![]() |
Besides, it's not like hackers can write their own soft - especially the kind of super-complex soft required to have a baton extend. He is of course referring to the tragic Baton Bashup of '68 when the Radical Ions scriptkiddie gang sold secondrate batons out of Prague utilizing their own gimped software, resulting in a series of accidents due to malfunctions in the extension/retraction software with injuries ranging from broken fingers and wrists to at least 3 cases of blunt force trauma to the groin region when local toughs carried the baton tucked in the front of their synthleather jeans. |
|
|
![]()
Post
#139
|
|
Runner ![]() ![]() ![]() ![]() ![]() ![]() Group: Dumpshocked Posts: 3,039 Joined: 23-March 05 From: The heart of Rywfol Emwolb Industries Member No.: 7,216 ![]() |
My actual hope is that skinlink makes a reappearance as a bioimplant (to improve the data throughput of the skin) but be vulnerable to directed jamming or electric shocks. They would make individual gear untargetable but the commlink would remain a security issue. People without implants should get no such link and be forced to run wireless with all its issues. Someone mentioned that skinlink will be back in later book, but in a changed form so it doesn't entirely remove the hack factor, but no specifics (ie reduces range, increases defense, etc) |
|
|
![]()
Post
#140
|
|
Moving Target ![]() ![]() Group: Members Posts: 732 Joined: 5-April 08 From: Ottawa, Canada Member No.: 15,847 ![]() |
He is of course referring to the tragic Baton Bashup of '68 when the Radical Ions scriptkiddie gang sold secondrate batons out of Prague utilizing their own gimped software, resulting in a series of accidents due to malfunctions in the extension/retraction software with injuries ranging from broken fingers and wrists to at least 3 cases of blunt force trauma to the groin region when local toughs carried the baton tucked in the front of their synthleather jeans. You're now officially my hero. (IMG:style_emoticons/default/biggrin.gif) |
|
|
![]()
Post
#141
|
|
The ShadowComedian ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Group: Dumpshocked Posts: 14,538 Joined: 3-October 07 From: Hamburg, AGS Member No.: 13,525 ![]() |
|
|
|
![]()
Post
#142
|
|
Moving Target ![]() ![]() Group: Members Posts: 284 Joined: 26-February 02 From: Seattle Metroplex Member No.: 217 ![]() |
That would be total and utter waste of space in a book that really doesn't have any space to waste. I would much rather have as much new pieces of gear as possible. Seriously? Who are you to judge? For me it would sell the book (or at least to my players) and probably wouldn't need to take up more than two pages. |
|
|
![]()
Post
#143
|
|
Prime Runner Ascendant ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 17,568 Joined: 26-March 09 From: Aurora, Colorado Member No.: 17,022 ![]() |
What? A PAN suffices, but a PAN is vulnerable. A PAN does NOT suffice, you MUST BE CONNECTED TO THE MATRIX. I still call BS. (IMG:style_emoticons/default/smile.gif) |
|
|
![]()
Post
#144
|
|
Immortal Elf ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 10,289 Joined: 2-October 08 Member No.: 16,392 ![]() |
A PAN does NOT suffice, you MUST BE CONNECTED TO THE MATRIX. I still call BS. (IMG:style_emoticons/default/smile.gif) So let me get this strait. Matrix--as in the WHOLE internet--is required to extend a baton faster? |
|
|
![]()
Post
#145
|
|
Moving Target ![]() ![]() Group: Members Posts: 732 Joined: 5-April 08 From: Ottawa, Canada Member No.: 15,847 ![]() |
A connection to the software is required. And that's in the Matrix.
|
|
|
![]()
Post
#146
|
|
Running Target ![]() ![]() ![]() Group: Members Posts: 1,095 Joined: 26-February 02 From: Seattle Wa, USA Member No.: 1,139 ![]() |
2) "Wahhhhhhhhhhhh! Hacking cyberware is not realistic! Wahhhhhhhhhhhhhh!" SHUT UP! Oh, I'm sorry, I didn't realize you were a time traveling computer science major FROM THE FUTURE. In that case, elves dragons wizards vampires bug spirits and shape-changing fox people would like to have A FUCKING WORD WITH YOU about "REALISM". You forgot that you can already hack pacemakers and some other electronics we already put inside the human body (IMG:style_emoticons/default/grinbig.gif) On a side note, is triangulation a lost art by 2075? I mean, when you have someone walk into a secure zone lit up like a new year tree with wireless transmission, detecting and pinpointing him is child's game. Well pen-registers sorta are more art than science. Its only a child's game in the movies... I'm assuming your talking about cell phone triangulation ie pen-register which works off the two ID keys every cellular device has and you can "track" it as leaves signal range of one tower and hits the signal range of a new tower. Its not like sonar giving your an exact reading its more like Tarzan swinging from vine to vine. To anyone complaining that cyberware being hackable is a security hole that anyone with two brain cells to rub together would be able to address: Do you use a cell phone? Do you use the internet? You're aware that all your communications are being monitored by the NSA this very minute, right? The NSA can even track your cell phone when it's off. They can get into your email and social networking accounts at will. Shouldn't you have "addressed" that, in the same way your characters should have "addressed" their every Matrix security vulnerability? See above for cell phones, for internet the root servers are run by the US so that is not surprising. Also I wouldn't use the word monitoring, that implies actively looking its more like recording, and frankly this happens on its own every time you hit a server, switch, router, etc. Your ISP is recording everything you do for a limited period of time which is why we have things like SSL and other encryption technologies. The news with the NSA was how long they were keeping the information for, not that it happens. Which still doesn't mean someone cant get my passwords it just means it takes longer. Security is all about being obfuscated enough that your not worth the time and effort to bother caring about whats in your TCP/IP packets. If your cell phone is actually off, it cant be tracked, but most smart phones don't actually turn off when your turn them off. Its more like they go to sleep when you turn them off. As for the email and social networking accounts, this is really complicated and has to do with hash keys, court orders, the company policy and other fun. I'm not sure I can go into that in any general way easily so I'm sure I'd break some form I signed once upon a time going into any specifics. They aren't hacking your account to get it though they just ask google, yahoo, whomever to hand over your mail. |
|
|
![]()
Post
#147
|
|
Runner ![]() ![]() ![]() ![]() ![]() ![]() Group: Dumpshocked Posts: 2,801 Joined: 2-September 09 From: Moscow, Russia Member No.: 17,589 ![]() |
Well pen-registers sorta are more art than science. Its only a child's game in the movies... I'm assuming your talking about cell phone triangulation ie pen-register which works off the two ID keys every cellular device has and you can "track" it as leaves signal range of one tower and hits the signal range of a new tower. Its not like sonar giving your an exact reading its more like Tarzan swinging from vine to vine. I'm talking about radio signal triangulation. You only need two scanning antennas to pinpoint the source of any known signal: for an elementary case with amplitude method, just scan the ether until you find the direction where the signal you're looking for is maximal. Since you have two points of location, draw a line from each in the direction of the maximum, and there you have your target. Easy as pie. Sure, in real urban environment it gets a little bit more complex, but minding that such a system can be easily set up in advance, and local conditions accounted for - again, child's play.Same goes for cell phones, actually, except it's easier to use the delay method there - estimate the time it takes for a signal to arrive at the tower, and the difference between time it takes to arrive at other towers in the vicinity - and there is your target, again, clear and simple. The only additional issue in SR would be the fact that there are lots of wireless-enabled devices around, but as long as their network protocols allow for device recognition, the triangulation system can use those to pick the needed targets just as well. |
|
|
![]()
Post
#148
|
|
Shooting Target ![]() ![]() ![]() ![]() Group: Members Posts: 1,748 Joined: 25-January 05 From: Good ol' Germany Member No.: 7,015 ![]() |
And yet, SOMEHOW, a Pan connection just does not suffice... I call BS. *shrug* Well ,I got good News (IMG:style_emoticons/default/smile.gif) (Also for Tycho ) QUOTE WIRELESS BONUSES Because nearly every piece of gear and 'ware is wireless capable, it means nearly every piece of gear and cyberware benefits dramatically from being "meshed" into your wireless personal area network and the Matrix as a whole. The BS is not as big as You think it is to my understandiing that means you can still use Your PAN (and Your Comlink with Agents, strong Encryption,etc)to access the Matrix and your gadgets (Smartlink,etc) don't need to be connected ...."Bareskinned"(Is that the Right word for no protection & helpless ? ) HeyaHeyaHeyaJa Medicineman |
|
|
![]()
Post
#149
|
|
Running Target ![]() ![]() ![]() Group: Members Posts: 1,095 Joined: 26-February 02 From: Seattle Wa, USA Member No.: 1,139 ![]() |
|
|
|
![]()
Post
#150
|
|
Runner ![]() ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 2,579 Joined: 30-May 06 From: SoCal Member No.: 8,626 ![]() |
Well ,I got good News (IMG:style_emoticons/default/smile.gif) (Also for Tycho ) The BS is not as big as You think it is to my understandiing that means you can still use Your PAN (and Your Comlink with Agents, strong Encryption,etc)to access the Matrix and your gadgets (Smartlink,etc) don't need to be connected ...."Bareskinned"(Is that the Right word for no protection & helpless ? ) HeyaHeyaHeyaJa Medicineman I would assume, if that were actually how it worked, someone would have stepped up and said so already. Of course, I should know better than to assume. |
|
|
![]() ![]() |
![]() |
Lo-Fi Version | Time is now: 7th June 2025 - 10:53 PM |
Topps, Inc has sole ownership of the names, logo, artwork, marks, photographs, sounds, audio, video and/or any proprietary material used in connection with the game Shadowrun. Topps, Inc has granted permission to the Dumpshock Forums to use such names, logos, artwork, marks and/or any proprietary materials for promotional and informational purposes on its website but does not endorse, and is not affiliated with the Dumpshock Forums in any official capacity whatsoever.