IPB

Welcome Guest ( Log In | Register )

2 Pages V   1 2 >  
Reply to this topicStart new topic
> Copy Protection, Information as inventory
cetiah
post Feb 7 2007, 12:21 AM
Post #1


Moving Target
**

Group: Members
Posts: 745
Joined: 2-January 07
From: Los Angeles, CA
Member No.: 10,510



Is there any way we can logically restrict players from just copying all their software and giving it to their hacker friends or getting copies of software from their hacker friends? If we say "copy protection is nearly perfect in 2070", is that unreasonable? What about custom-designed software? If a hacker makes an agent, is there any logical argument for why he can't make 10,000 of them either to store on his comlink, keep as backups, or give away as Christmas presents?

What about spells formulas? What's to stop a mage from just logging onto www.freespells.com or the equivilent and downloading all their favorite open-source spells?

If anyone would know the data havens that supply these, it's the shadowrunners.

But I like the idea that spells and programs are "inventory", but I'm not sure if that really makes sense in 2070. I would also like to see rating-6 programs and spells as something fairly rare, rather than something that can just be downloaded off the Matrix or copied from a friend.

Is there anyone who would have serious problems with just handwaiving these issues away with "future tech"?


edit for clarification: I'm not necessarily looking for rules to solve these issues, just the fluff/reasoning behind it.
Go to the top of the page
 
+Quote Post
Ravor
post Feb 7 2007, 12:59 AM
Post #2


Cybernetic Blood Mage
******

Group: Members
Posts: 3,472
Joined: 11-March 06
From: Northeastern Wyoming
Member No.: 8,361



Well personally I don't have a problem with Deckers sharing (Rating 6) programs with their friends at wil anymore then Mages teaching each other their spells.

Of course, given the nature of the way I see the Sixth World, most would never do so freely because not only could the source code / spell formula be traced back to the Decker / Mage but there would always be questions about possible back doors built into the code / formula without going through so much effort that the receiving Decker / Mage might as well simply write their own code / formula.

Granted, I'm not sure that its RAW, but its the way I see things... *winks*

Go to the top of the page
 
+Quote Post
Serbitar
post Feb 7 2007, 01:05 AM
Post #3


Running Target
***

Group: Members
Posts: 1,498
Joined: 4-August 05
From: ADL
Member No.: 7,534



\signed
Go to the top of the page
 
+Quote Post
kzt
post Feb 7 2007, 01:09 AM
Post #4


Great Dragon
*********

Group: Members
Posts: 5,537
Joined: 27-August 06
From: Albuquerque NM
Member No.: 9,234



It's possible to do something like this, but it violates how the system is described. The other issue is that it's hard to enforce the law on people doing illegal stuff. (AKA, murderers are not deterred by gun laws from carrying guns illegally.) So you can't exactly depend on legal mechanism to keep people from stealing your stuff when the primary market would be computer thieves.

Software that loads and runs on a standard computer (what people think of as a PC) is really hard to keep secure and copy protected. The problem is that you can essentially run the software in a virtual machine where you can see how the copy protection system works and engineer around that. Typically you cut it out or figure out how to forge and present the credentials it wants. This can be hard to do, but there are teams of people who do it as a hobby.

Some sort of cryptographic solution might be possible, but nobody writing SR understands how crypto is used in the real world, so it's totally worthless in SR4. Even if it wasn't I suspect that you could simply program your way around this, if you can see the running code unless that entire OS and hardware platform were really heavily protected. This is possible (see the Vista content protection for a first helting step in htat direction) but without essentially unbreakable crypto it won't work at all.

So I'd have to think that you need to tie the software to a physical device that prevents people from seeing it's inner workings. An obvious approach would be selling software and the hardware as a single unit, like an old Nintendo cart, but with the memory and processor included. You plug it into a slot on your PC and it fires up.

From a consumer point of view this really big time sucks, hence is of questionable commercial potential.

The second problem is that hacking utilities are typically created, in current practice, by people who are not trying to get paid. You can get really good utilities for most security purposes for free. In most cases, the free utilities are the best one out there.

Of course, you yourself could go and download all the utilities and tools used by computer hackers. You can put together the same set of tools as used by someone who makes their living breaking into computers. This isn't going to make you someone who can break into computers for a living, any more than owning a Bell helmet and a Simpson firesuit makes you a winning race driver. You have to know how to win races before having the fancy gear helps, and the same is true of computers. You need some gear, but having the gear without the skills, experiance and knowledge is fairly useless.

I think you will achieve more of what you want by thinking about ways to make SR hacking less of a burglary tools based system and more of a skilled hacker based system.
Go to the top of the page
 
+Quote Post
Mistwalker
post Feb 7 2007, 01:30 AM
Post #5


Moving Target
**

Group: Members
Posts: 668
Joined: 4-September 06
Member No.: 9,304



I have no problem with PCs sharing software or spell formula with others. For the most part, they are self-limiting and are not very expensive in the grand scheme of things.

When you come down to it, the price isn't all that great for software. If you have more than one potential hacker in the group, sharing the costs, they have all the programs at 6 in relatively short order, then stop thinking about them.

For spell formula, well, what difference does it make if you have all the spell formula out there, throw in a few unknown ones. The mage still needs to spend karma to learn each and everyone one of them.

Go to the top of the page
 
+Quote Post
Sir_Psycho
post Feb 7 2007, 01:39 AM
Post #6


Shooting Target
****

Group: Members
Posts: 1,629
Joined: 14-December 06
Member No.: 10,361



Why don't we introduce some rules for copy protection and illegal copying? Make the hackers/deckers roll computer + a certain utility to make successful copies. If they get a certaind high number of hits, then they have a copy, if they don't even hit a lower set of hits, then the program nukes itself into junk. The more malicious copy protection screwing over your deck, or maybe even working like Tracer IC (or whatever you sr4 "hackers"guys have. You young whipper-snappers should go get some haircuts!) and alerting the party that owns the program.
Go to the top of the page
 
+Quote Post
cetiah
post Feb 7 2007, 01:51 AM
Post #7


Moving Target
**

Group: Members
Posts: 745
Joined: 2-January 07
From: Los Angeles, CA
Member No.: 10,510



QUOTE (Sir_Psycho @ Feb 6 2007, 08:39 PM)
Why don't we introduce some rules for copy protection and illegal copying? Make the hackers/deckers roll computer + a certain utility to make successful copies. If they get a certaind high number of hits, then they have a copy, if they don't even hit a lower set of hits, then the program nukes itself into junk. The more malicious copy protection  screwing over your deck, or maybe even working like Tracer IC (or whatever you sr4 "hackers"guys have. You young whipper-snappers should go get some haircuts!) and alerting the party that owns the program.

Because if copy protection CAN be hacked its a logical assumption that it will be hacked. And hackers like data havens. It's very likely they will share the programs just as they share occasional paydata or news or tips for less stressful shadowruns. A hacker who makes the top-of-the-line programs freely available to the community gains a lot in terms of street cred, and also sticks it to "the man" which is likely even more important. And that's not even counting the developmental benefits of the open-source market, such as having more people work to improve your software (for free) or having access to custom programs written by others.
Go to the top of the page
 
+Quote Post
cetiah
post Feb 7 2007, 01:54 AM
Post #8


Moving Target
**

Group: Members
Posts: 745
Joined: 2-January 07
From: Los Angeles, CA
Member No.: 10,510



QUOTE (Mistwalker @ Feb 6 2007, 08:30 PM)
I have no problem with PCs sharing software or spell formula with others. For the most part, they are self-limiting and are not very expensive in the grand scheme of things.

When you come down to it, the price isn't all that great for software. If you have more than one potential hacker in the group, sharing the costs, they have all the programs at 6 in relatively short order, then stop thinking about them.

For spell formula, well, what difference does it make if you have all the spell formula out there, throw in a few unknown ones. The mage still needs to spend karma to learn each and everyone one of them.

Hmmm... should a hacker have to spend Karma to learn programs, then?

Or would it be better just to assume that all programs (and spells) are freely available and move on?
Go to the top of the page
 
+Quote Post
Kyoto Kid
post Feb 7 2007, 02:06 AM
Post #9


Bushido Cowgirl
*********

Group: Members
Posts: 5,782
Joined: 8-July 05
From: On the Double K Ranch a half day's ride out of Phlogiston Flats
Member No.: 7,490



...hacker 1 breaks the copy protection gives copy to hacker 2.

...dormant trojan horse is passively activated and loaded as the actual programme.

...hacker 2 activates his "copied" version.

...programme appears to work normally for a while, then crashes, taking the comlink's OS & any active programmes with it.

...if hacker 2 paid hacker 1 for the copy he gets mad, and takes it out on hacker 1.

...anyone remember the cute little "feature" in the old Raid on Kabul game? If you had an illegal copy of the game, you could never get past the airport & were thrown in prison. When you asked how to get yourself out, a message came up that said something like "buy your own damn copy" If you checked out the file size in the directory, it would appear be normal for the actual game (and this was in the "bronze age" of personal computing).

You don't need laws or even corporate goons, just a few "built in" protections.

Go to the top of the page
 
+Quote Post
mfb
post Feb 7 2007, 03:07 AM
Post #10


Immortal Elf
**********

Group: Members
Posts: 11,410
Joined: 1-October 03
From: Pittsburgh
Member No.: 5,670



i don't think it's necessary to use crazy DRM schemes to keep high-rating programs unavailable for general download. just simply say "the high-end stuff can't be found online." top-of-the-line programs are not something that people want to share. and if they do share them, security providers can download them and immunize themselves, effectively lowering the rating.

so you just don't allow anything above, say, rating 3 to be found online. if someone buys a rating 6 program, sure, let 'em crack it and copy it. it's not like they cost all that much anyway.
Go to the top of the page
 
+Quote Post
Mistwalker
post Feb 7 2007, 03:12 AM
Post #11


Moving Target
**

Group: Members
Posts: 668
Joined: 4-September 06
Member No.: 9,304



That is assuming that you are buying legal programs. I cannot see corps selling hacking programs. No corp, probably no copy protection.

If nothing else, allowing runners to trade software between themselves, will probably discourage the runners from doing a run for themselves, against Best Buy or what not, to get all this nice shinny software and hardware.
Go to the top of the page
 
+Quote Post
mfb
post Feb 7 2007, 03:16 AM
Post #12


Immortal Elf
**********

Group: Members
Posts: 11,410
Joined: 1-October 03
From: Pittsburgh
Member No.: 5,670



why wouldn't corps sell hacking programs? they'd be restricted, of course; you couldn't walk into Babbages and pick up a copy of h4xx0r j00 6.0. their main buyers would be militaries and other corps.

and even non-corp programmers who put their talents up for sale would probably use copy protection, unless they're making it for a friend. if i'm living by my ability to sell attack programs to runners, i'm not going to want the runners to share. bad for my business.

but, yeah, within the team, i'd be surprised to see copy protection.
Go to the top of the page
 
+Quote Post
kzt
post Feb 7 2007, 03:43 AM
Post #13


Great Dragon
*********

Group: Members
Posts: 5,537
Joined: 27-August 06
From: Albuquerque NM
Member No.: 9,234



QUOTE (mfb @ Feb 6 2007, 08:16 PM)
and even non-corp programmers who put their talents up for sale would probably use copy protection, unless they're making it for a friend. if i'm living by my ability to sell attack programs to runners, i'm not going to want the runners to share. bad for my business.

Because you have to spend enormous amount of time making and testing copy protections schemes. There is an old joke about encryption that applies: "Anyone can design a copy protection scheme they can't break". It's designing a scheme that people who are good at breaking can't shred that is hard. An what worked last month probably won't work next month.

And you now have to handle copy activation and support. Activation means you can be, among other things, traced and "prosecuted". Say by the corp that someone who owned a copy broke into. They may not be able to find the guy who broke in, but they can find you, the guy who sold him to tool he used to steal 10 million from them. Killing you might not get their money back, but it might make them feel better.

And when someone has paid you real money for software they kind of expect that you will help deal with setup and install issues. Or you're not going to sell many copies. So now you get phone calls and emails from people all the time.
Go to the top of the page
 
+Quote Post
mfb
post Feb 7 2007, 04:06 AM
Post #14


Immortal Elf
**********

Group: Members
Posts: 11,410
Joined: 1-October 03
From: Pittsburgh
Member No.: 5,670



copy protection in SR is, universally, pretty easily broken. it's basically a speed bump, a deterrent--it's not going to stop anyone who's determined and reasonably skilled. honestly, i figure copy protection in SR is a matter of running No Hacks 6.0 on your source code before compiling it. if you want actual unbreakable copy protection, well... too bad!
Go to the top of the page
 
+Quote Post
Sir_Psycho
post Feb 7 2007, 10:57 AM
Post #15


Shooting Target
****

Group: Members
Posts: 1,629
Joined: 14-December 06
Member No.: 10,361



QUOTE (cetiah)
QUOTE (Sir_Psycho @ Feb 6 2007, 08:39 PM)
Why don't we introduce some rules for copy protection and illegal copying? Make the hackers/deckers roll computer + a certain utility to make successful copies. If they get a certaind high number of hits, then they have a copy, if they don't even hit a lower set of hits, then the program nukes itself into junk. The more malicious copy protection  screwing over your deck, or maybe even working like Tracer IC (or whatever you sr4 "hackers"guys have. You young whipper-snappers should go get some haircuts!) and alerting the party that owns the program.

Because if copy protection CAN be hacked its a logical assumption that it will be hacked. And hackers like data havens. It's very likely they will share the programs just as they share occasional paydata or news or tips for less stressful shadowruns. A hacker who makes the top-of-the-line programs freely available to the community gains a lot in terms of street cred, and also sticks it to "the man" which is likely even more important. And that's not even counting the developmental benefits of the open-source market, such as having more people work to improve your software (for free) or having access to custom programs written by others.

Sounds good, of course it CAN be hacked, I'm just proposing that there are some decent risks and skill involved in illegal copying of programs.

So burning some-one your rating 8 program is kind of like a mage summoning a force 6 great form elemental, and then just giving it to some-one else. Sure, you can do it, knock yourself out (literally).
Go to the top of the page
 
+Quote Post
cetiah
post Feb 7 2007, 12:31 PM
Post #16


Moving Target
**

Group: Members
Posts: 745
Joined: 2-January 07
From: Los Angeles, CA
Member No.: 10,510



How do you guys feel about having a Hacker spend Karma to learn programs like a mage does to learn spells?

I guess the idea would be that the program must be customized before it can do any good - which goes well with the theme of merging man and machine. So giving someone else your customizations really won't help them (until they spend Karma...).

How badly do you all hate the suggestion?
Go to the top of the page
 
+Quote Post
Rotbart van Dain...
post Feb 7 2007, 01:21 PM
Post #17


Hoppelhäschen 5000
*********

Group: Members
Posts: 5,807
Joined: 3-January 04
Member No.: 5,951



Such hacker is called 'Technomancer' in SR4.
Go to the top of the page
 
+Quote Post
ShadowDragon8685
post Feb 7 2007, 01:50 PM
Post #18


Horror
*********

Group: Members
Posts: 5,322
Joined: 15-June 05
From: BumFuck, New Jersey
Member No.: 7,445



QUOTE (cetiah)
How do you guys feel about having a Hacker spend Karma to learn programs like a mage does to learn spells?

I guess the idea would be that the program must be customized before it can do any good - which goes well with the theme of merging man and machine. So giving someone else your customizations really won't help them (until they spend Karma...).

How badly do you all hate the suggestion?

I hate it because it's crazy. That's what we have Technomancers for.
Go to the top of the page
 
+Quote Post
Dashifen
post Feb 7 2007, 02:47 PM
Post #19


Technomancer
********

Group: Retired Admins
Posts: 4,638
Joined: 2-October 02
From: Champaign, IL
Member No.: 3,374



I've found that the copy-protection described in the RAW seems to work well enough for me. The Software skill extended test with a threshold of 10-20 makes it easy to copy things like Edit (lower threshold as determined by me for common-use programs) while Exploit or Stealth with a threshold of 20 tend not to be reached by the time they have to stop rolling by the optional no-rolls-beyond-skill-pool limit. That and my warning that glitching will reduce the effectiveness of the program after copying and, if I'm mean, of the original as well. Critical glitches mean the original is slagged and must be repurchased.
Go to the top of the page
 
+Quote Post
Perssek
post Feb 7 2007, 02:49 PM
Post #20


Target
*

Group: Members
Posts: 87
Joined: 12-January 05
From: Brazil, RN, Natal (Also known as Amazonia)
Member No.: 6,968



Well, I don´t have a problem with that. The PCs can give software among themselves like crazy, once they break the copy security. It takes time, and a glitch can erase the loaded software being copied. Whops! You better have another copy ready.

All I ask them is a simple hacking test on the software, but with a severe difficulty, based on the software Rating, as an extended action.
Go to the top of the page
 
+Quote Post
Moon-Hawk
post Feb 7 2007, 03:25 PM
Post #21


Genuine Artificial Intelligence
********

Group: Members
Posts: 4,019
Joined: 12-June 03
Member No.: 4,715



QUOTE (cetiah)
Or would it be better just to assume that all programs (and spells) are freely available and move on?

Lately I've been leaning in this direction. It's been my experience that in very short order every member of the team has every program at a very high rating. After the first session the difference between the Hacker and everyone else is skill, and probably quality of commlink.
If you were to split the cost of all the programs across the team it's not all that much money, and all I have to show for it is a lot of wasted time rolling dice and bookkeeping.
I'm leaning towards keeping the programs as a limit on how many can be run at a time, but just forgetting about their ratings altogether. The hacker rolls Logic+Skill.
Program rating already was ignored when calculating how many programs are running, so the level of complexity and depth gained by managing your active programs is completely unchanged.
As a corrolary to this house rule I would consider increasing the cost of commlinks, but by a factor of 2 or 3, not expensive like old cyberdecks.

Just to be clear, I haven't actually tried this house-rule, it's just something that's been rattling around in my head lately.

note: Regarding free spells: They still require karma. I see no problem.
Go to the top of the page
 
+Quote Post
dog_xinu
post Feb 7 2007, 07:09 PM
Post #22


Moving Target
**

Group: Members
Posts: 289
Joined: 20-February 04
From: in the matrix
Member No.: 6,091



programs are copy protected but "hackers" either get "cracked" versions or "crack" ii themselves. The "hacker"-types in my game either gets the "cracked" version from their hacker-type buddies. If they buy software from "off the shelf" or non-hacker-type contact it is copy protected. Then they hacker-types spend some downtime cracking the protection so they can share it around (or trade them).

just my jaded opinion...
Go to the top of the page
 
+Quote Post
sunnyside
post Feb 7 2007, 10:08 PM
Post #23


Neophyte Runner
*****

Group: Members
Posts: 2,386
Joined: 31-December 06
Member No.: 10,502



A couple comments. First while they don't stress it one could make an argument for hardware based software systems Now if the chip were just a data chip you could simply read it out and copy it. However what if the chip in question contained much of it's logic in hardware? Unless it doesn't have feedback (like a movie) you can't "read out" an ASIC.

So you have that.

The other thing about programs is that the more people have them the sooner they get detected and patched against. This is obvious with programs like exploit and stealth but I'm sure there is an arms race with attack/armor programs too and so on. This is mentioned in the fluff (remember how they may have patched against your exploit when you try it again).

As a GM you can just play this abstractly. (if some script kiddies get ahold of your hackers nova hot program it doesn't work for drek the next time they try to use it). Or you could have some kind of rules (every time a critical glitch is rolled on a system attached to a corp and the logs aren't deleted the program drops a rating after one week).
Go to the top of the page
 
+Quote Post
Serbitar
post Feb 7 2007, 11:18 PM
Post #24


Running Target
***

Group: Members
Posts: 1,498
Joined: 4-August 05
From: ADL
Member No.: 7,534



What about the following idea:

A hacker can insert a backdoor into any executable software (programs, agents, system, firewall) he has cracked or has the sourcecode available.

Rules:

It takes rating x options hours and is a software test with the number of options as threshold. The net hits are the threshold to find the backdoor with a matrix perception test.

Backdoor options:
- Notify: the software is sending a notification to some other node everytime it is used, including the acess ID (commcode) of the node it is run on
- Backdoor: the software provides can be used as a backdoor, granting the hacker the same acess rights as the user of the program (software must be running and access ID of the node it is running on must be known)
- Crash: the software can be crashed instanly on command (software must be running and access ID of the node it is running on must be known)
- Corrupt: the software can be corrupted to stop working the next time it is used (this includes the software data file itself, so it must be reloaded from a backup source, software must be running and access ID of the node it is running on must be known to active, or can only be distributed activated so the copy is essentially useless)
- Explode: the software will generate rating unresisted damage to the marix icon it is runnig on activation, or on command (needs Corrupt or Crash option) modification)

Edited with more ideas
Go to the top of the page
 
+Quote Post
cetiah
post Feb 7 2007, 11:23 PM
Post #25


Moving Target
**

Group: Members
Posts: 745
Joined: 2-January 07
From: Los Angeles, CA
Member No.: 10,510



QUOTE (Serbitar @ Feb 7 2007, 06:18 PM)
What about the following idea:

A hacker can insert a backdoor into any executable software (programs, agents, system, firewall).

Rules:

It takes rating x options hours and is a software test with the number of options as threshold. The net hits are the threshold to find the backdoor with a matrix perception test.

Backdoor options:
- the software is sending a notification to some other node everytime it is used, including the acess ID (commcode) of the node it is run on
- the software provides can be used as a backdoor, granting the hacker the same acess rights as the user of the program (software must be running and access ID of the node it is running on must be known)
- the software can be crashed instanly on command (software must be running and access ID of the node it is running on must be known)
- the software can be corrupted to stop working the next time it is used (this includes the software data file itself, so it must be reloaded from a backup source, software must be running and access ID of the node it is running on must be known to active, or can only be distributed activated so the copy is essentially useless)
- the software will generate rating damage to the marix icon it is runnig on activation (needs software corruption modification)

I guess that's fine but even in real life there are communities that try to remove such protections and traps from software that are commly available on the internet, whether the software is legitimate or not.

The other thing, is I *hate* dealing with backdoors in RPG hacking rules. Just a personal prejudice of mine. Even the subrscription nodes in RAW are easier to manage than a hacker who wants to put back doors in everything, buy them, sell them, install them during downtime, determine when and how each one is found and destroyed, etc. etc. Its just not convinient from a gaming perspective.
Go to the top of the page
 
+Quote Post

2 Pages V   1 2 >
Reply to this topicStart new topic

 



RSS Lo-Fi Version Time is now: 28th August 2025 - 09:50 AM

Topps, Inc has sole ownership of the names, logo, artwork, marks, photographs, sounds, audio, video and/or any proprietary material used in connection with the game Shadowrun. Topps, Inc has granted permission to the Dumpshock Forums to use such names, logos, artwork, marks and/or any proprietary materials for promotional and informational purposes on its website but does not endorse, and is not affiliated with the Dumpshock Forums in any official capacity whatsoever.