IPB

Welcome Guest ( Log In | Register )

2 Pages V   1 2 >  
Reply to this topicStart new topic
> New member with some questions, if anyone can help
joe13
post Jul 26 2011, 08:04 PM
Post #1


Target
*

Group: Members
Posts: 12
Joined: 26-July 11
Member No.: 34,078



Hello, and thank you for allowing me to join this group. I GM'ed 2nd and 3rd
edition and I am now doing 4th, and I have a few questions if anyone can help me
out. When a hacker reduces his datatrail on his access ID, do they just spoof it
each time they log on to different nodes or the Matrix by doing a Hacking +
Spoof test? I read that somewhere online, but I thought they could only alter
software or hardware as listed on pg 224, and when they reboot their commlink,
wouldnt they lose all their programs? And, if characters constantly change their
ID, is there anyway their datatrail can be tracked days after a run? Is there
one roll or game mechanic to cover this, or is it something played out, like
extensive Data Searches to find evidence? Any help anyone can give me would be
much appreciated. Thanks.

Go to the top of the page
 
+Quote Post
suoq
post Jul 26 2011, 08:34 PM
Post #2


Running Target
***

Group: Members
Posts: 1,272
Joined: 22-June 10
From: Omaha. NE
Member No.: 18,746



If your software is registered to an access ID, then yes, life sucks. Discuss things with your GM and figure out what house rules they use. If software is registered find out how that option is removed. If piracy is used, does that software come unregistered. Missions, season 4, if I recall, does not have registration so you can, I believe, change you access_ID and keep your software. Note that your hacking commlink should NEVER go into active mode. (SR4A 223: "You give permission for anyone to connect to your commlink and see what is on it.") You should have another commlink for active mode.

If characters constantly change their ID, their data trail can still be tracked depending on the OPSEC. For example, if the hacker is always hacking from the same SoyBoy franchise, or, heaven forbid, from their teammates safehouse, then that location can be watched for activity going through or from that node.





Go to the top of the page
 
+Quote Post
remmus
post Jul 26 2011, 08:45 PM
Post #3


Moving Target
**

Group: Members
Posts: 202
Joined: 6-May 09
Member No.: 17,145



ooo plan to host that game here? Or it´s with some RL friends of yours?

Sorry for going of topic, just notice that part ^^
Go to the top of the page
 
+Quote Post
sabs
post Jul 26 2011, 08:47 PM
Post #4


Prime Runner
*******

Group: Members
Posts: 3,996
Joined: 1-June 10
Member No.: 18,649



Suoq, He IS the GM (IMG:style_emoticons/default/smile.gif)

If you use AccessID A when you are hacking into corp site 1, from soybun franchise 2.
When you are done doing your run, you spoof your accessID to B.

Corp Spider does a trace on AccessID A, he gets to Soybun Franchise 2, but doesn't see anything answering to AccessID A, because it's gone. Corp Spider is called upon to do another trace on accessID R, and it shows up in the Soybun Franchise 2 again. That seems odd, so they start pulling security footage, to figure out who the hacker using the Soybun's matrix connection was.

Go to the top of the page
 
+Quote Post
Mardrax
post Jul 26 2011, 09:00 PM
Post #5


Running Target
***

Group: Members
Posts: 1,083
Joined: 13-December 10
From: Rotterdam, The Netherlands
Member No.: 19,228



QUOTE (sabs @ Jul 26 2011, 10:47 PM) *
Corp Spider does a trace on AccessID A, he gets to Soybun Franchise 2, but doesn't see anything answering to AccessID A, because it's gone. Corp Spider is called upon to do another trace on accessID R, and it shows up in the Soybun Franchise 2 again. That seems odd, so they start pulling security footage, to figure out who the hacker using the Soybun's matrix connection was.

Of course, SoyBun Inc -wholly owned subsidiary of Aztechnology- outsourced security spider will go "¿Estás loco, amigo? Sal de mi sistema!" at NeoNet's request for his security footage.
Go to the top of the page
 
+Quote Post
joe13
post Jul 26 2011, 09:26 PM
Post #6


Target
*

Group: Members
Posts: 12
Joined: 26-July 11
Member No.: 34,078



So, it is possible to trace to a location even after someone has logged off? I thought they could only run a trace while the user is online. And,can a hacker spoof their ID, without having to change software or hardware, like it mentions on pages 223-224 of the rulebook? In that example, the software change only lasts until they reboot their commlink, and the hardware adjustment lasts until they change their hardware, which seems to be a pain and would be expensive. The Anatomy of a Shadowrun mentions spoofing ID before going online, but since the character in that example is a technomancer they dont have to.
Go to the top of the page
 
+Quote Post
sabs
post Jul 26 2011, 09:55 PM
Post #7


Prime Runner
*******

Group: Members
Posts: 3,996
Joined: 1-June 10
Member No.: 18,649



the hardware change is just some sodering, basically. And the software only lasts until they reboot their commlink that's correct. Although one of the first actions they can take is spoof their accessID.

My hackers tend to do this:
They change the accessID with hardware changes about once a month. Everytime they boot up their system, they use a software test to do a new accessID. Before every hack attempt (when possible) they do a new accessID, and change it afterwards.

My hackers also tend to have the disguise skill, and hack from somewhere public, and never the same place twice if they can help it.

Mardrax is right, the Aztecnology spider tells the neo-net guy to go to hell, if the neo-net guy asks for the footage, instead of hacking for it.

I always rule that you can back trace an offline user to the last known location, (within 50m) for a number of hours equal to 10 - stealth rating.

But that's totally a houserule.
Go to the top of the page
 
+Quote Post
suoq
post Jul 26 2011, 10:35 PM
Post #8


Running Target
***

Group: Members
Posts: 1,272
Joined: 22-June 10
From: Omaha. NE
Member No.: 18,746



QUOTE (joe13 @ Jul 26 2011, 03:26 PM) *
So, it is possible to trace to a location even after someone has logged off? I thought they could only run a trace while the user is online.
Trace action = while online. Look at the logs = after the fact. Even assuming good opsec it may be possible to get quite a bit of information from log files. As a RL example of this, read Clifford Stoll's "The Cuckoo's Egg" which documents a long term hacker hunt based off an accounting discrepancy. In game, this is why hackers edit the log files, because doing so is better opsec than not doing so. That being said, it's not a guarantee.

QUOTE
And,can a hacker spoof their ID, without having to change software or hardware, like it mentions on pages 223-224 of the rulebook?

Your campaign, your rules. Unwired makes a mess of the hacking rules by adding registration, copying, and piracy.

Readings I do reccomend:
http://forums.dumpshock.com/index.php?s=&a...st&p=804857 - Game, Set, and Match by Tiger eyes. (edit: Note that unwired changes the spoofing rules by adding modifiers for access level.)
http://forums.dumpshock.com/index.php?s=&a...t&p=1072291 - Hacking a Node by sabs.
http://www.serbitar.de/stuff/sgm_1.pdf - Serbitar’s guide to the matrix
Go to the top of the page
 
+Quote Post
joe13
post Jul 26 2011, 10:39 PM
Post #9


Target
*

Group: Members
Posts: 12
Joined: 26-July 11
Member No.: 34,078



Thanks everyone for your help.
Go to the top of the page
 
+Quote Post
Tymeaus Jalynsfe...
post Jul 27 2011, 12:32 PM
Post #10


Prime Runner Ascendant
**********

Group: Members
Posts: 17,568
Joined: 26-March 09
From: Aurora, Colorado
Member No.: 17,022



QUOTE (sabs @ Jul 26 2011, 02:55 PM) *
the hardware change is just some sodering, basically. And the software only lasts until they reboot their commlink that's correct. Although one of the first actions they can take is spoof their accessID.

My hackers tend to do this:
They change the accessID with hardware changes about once a month. Everytime they boot up their system, they use a software test to do a new accessID. Before every hack attempt (when possible) they do a new accessID, and change it afterwards.

My hackers also tend to have the disguise skill, and hack from somewhere public, and never the same place twice if they can help it.

Mardrax is right, the Aztecnology spider tells the neo-net guy to go to hell, if the neo-net guy asks for the footage, instead of hacking for it.

I always rule that you can back trace an offline user to the last known location, (within 50m) for a number of hours equal to 10 - stealth rating.

But that's totally a houserule.


You really should install a Spoof Chip in your Comlink. (IMG:style_emoticons/default/smile.gif)
Go to the top of the page
 
+Quote Post
suoq
post Jul 27 2011, 01:01 PM
Post #11


Running Target
***

Group: Members
Posts: 1,272
Joined: 22-June 10
From: Omaha. NE
Member No.: 18,746



QUOTE (Tymeaus Jalynsfein @ Jul 27 2011, 06:32 AM) *
You really should install a Spoof Chip in your Comlink. (IMG:style_emoticons/default/smile.gif)
Arsenal 105, if you're looking. The main disadvantage of a spoof chip is that you can't use it to go back to a previously used access_ID if you wish to. I've also been mulling over the joys of getting a list of access IDs of people I don't like and deliberately using their IDs on jobs.
Go to the top of the page
 
+Quote Post
sabs
post Jul 27 2011, 01:07 PM
Post #12


Prime Runner
*******

Group: Members
Posts: 3,996
Joined: 1-June 10
Member No.: 18,649



yeah, spoof chip is cute, but I like the manual ability to go back, and reuse certain accessID's during certain jobs. Sometimes, you want to frame someone.

And woot! I got quoted as a source (IMG:style_emoticons/default/smile.gif)
Go to the top of the page
 
+Quote Post
Tymeaus Jalynsfe...
post Jul 27 2011, 01:52 PM
Post #13


Prime Runner Ascendant
**********

Group: Members
Posts: 17,568
Joined: 26-March 09
From: Aurora, Colorado
Member No.: 17,022



QUOTE (sabs @ Jul 27 2011, 06:07 AM) *
yeah, spoof chip is cute, but I like the manual ability to go back, and reuse certain accessID's during certain jobs. Sometimes, you want to frame someone.

And woot! I got quoted as a source (IMG:style_emoticons/default/smile.gif)


Having a Spoof Chip does not preclude you from using a previous/specific Access ID. Just do not enable the Spoof Chip for that particular Matrix Run, and manually set the ID. You can turn them on and off after all.
Go to the top of the page
 
+Quote Post
joe13
post Jul 27 2011, 04:51 PM
Post #14


Target
*

Group: Members
Posts: 12
Joined: 26-July 11
Member No.: 34,078



I do have two new questions that I would like to ask if everyone doesn't mind. The first is when deleting log files, I read online that every hit a Hacker does deletes" edit program rating" hits worht of traces left behind. I am assuming that each action in a node counts as a possible trace, for instance 20 actions done in a node would equal 20 hits? And I have a question about Agents, the SR4 rulebook does not exactly state where they come from in regards to a commlink, is it just as simple as buying an Agent Program from the gear section?
Go to the top of the page
 
+Quote Post
sabs
post Jul 27 2011, 05:54 PM
Post #15


Prime Runner
*******

Group: Members
Posts: 3,996
Joined: 1-June 10
Member No.: 18,649



Yes, every action is 1 entry in a log.

You buy agent programs, and run them on your commlink.
They will have the accessID of your commlink.
Go to the top of the page
 
+Quote Post
capt.pantsless
post Jul 27 2011, 07:08 PM
Post #16


Moving Target
**

Group: Members
Posts: 206
Joined: 9-September 10
From: Minneapolis, MN
Member No.: 19,032



QUOTE (Mardrax @ Jul 26 2011, 04:00 PM) *
Of course, SoyBun Inc -wholly owned subsidiary of Aztechnology- outsourced security spider will go "¿Estás loco, amigo? Sal de mi sistema!" at NeoNet's request for his security footage.


Well, maybe. Inter-megacorp cooperation is certainly possible, given the proper motivation and/or persuasion. After all, Mr. Johnson's can have cross-corp contacts as well. Shadowrunners should never feel safe hacking Corp B from somewhere within Corp A. It'll take more effort to get the footage/logs/etc, but it can be done.
Go to the top of the page
 
+Quote Post
sabs
post Jul 27 2011, 07:20 PM
Post #17


Prime Runner
*******

Group: Members
Posts: 3,996
Joined: 1-June 10
Member No.: 18,649



This is why Hackers should have disguise skill, con, and a bunch of throw away commlinks with cheap SiNs for casual use. Given that you can create masks that will let you use your hits in a computer+edit roll to add to your disguise total. That's just awesome for a hacker. If you can, also keep a handful of personafix chips that you can slot when needed to. Combined with Skillwires, you can imitate almost anyone, doing any job.


Go to the top of the page
 
+Quote Post
Mardrax
post Jul 27 2011, 10:19 PM
Post #18


Running Target
***

Group: Members
Posts: 1,083
Joined: 13-December 10
From: Rotterdam, The Netherlands
Member No.: 19,228



QUOTE (sabs @ Jul 27 2011, 07:54 PM) *
You buy agent programs, and run them on your commlink.
They will have the accessID of your commlink.

Partially false, or rather incomplete: agents have their own Access ID programmed into them. They will only use your comlink's Access ID when they're loaded into your persona. They can (and often do) operate completely independently as well, in which case they use their own Access ID.
Go to the top of the page
 
+Quote Post
Redjack
post Jul 27 2011, 11:28 PM
Post #19


Man Behind the Curtain
**********

Group: Admin
Posts: 14,871
Joined: 2-July 89
From: End of the Yellow-Brick Road
Member No.: 3



QUOTE (Mardrax @ Jul 27 2011, 05:19 PM) *
Partially false, or rather incomplete: agents have their own Access ID programmed into them. They will only use your comlink's Access ID when they're loaded into your persona. They can (and often do) operate completely independently as well, in which case they use their own Access ID.
Hmmmm... An agent is software.. Can you provide a reference to this?
Go to the top of the page
 
+Quote Post
Mardrax
post Jul 27 2011, 11:49 PM
Post #20


Running Target
***

Group: Members
Posts: 1,083
Joined: 13-December 10
From: Rotterdam, The Netherlands
Member No.: 19,228



QUOTE (SR4A pg 234)
Agents loaded into your persona use your access ID. Traces on an agent program trace back to your own point of origin.
Agents (or IC) acting independently of your persona, whether on your commlink or on some other device, use their own hardcoded access ID to identify themselves to other nodes. This access ID is identical in all copies of a given agent unless it is patched with a Software + Logic (Rating x 3, 1 week) Extended Test.


@Redjack Whoops. I missed! (IMG:style_emoticons/default/wobble.gif)
Go to the top of the page
 
+Quote Post
Redjack
post Jul 28 2011, 12:25 AM
Post #21


Man Behind the Curtain
**********

Group: Admin
Posts: 14,871
Joined: 2-July 89
From: End of the Yellow-Brick Road
Member No.: 3



(pg 234) Thanks!
Go to the top of the page
 
+Quote Post
PoliteMan
post Jul 28 2011, 02:07 AM
Post #22


Moving Target
**

Group: Members
Posts: 400
Joined: 4-August 10
Member No.: 18,889



QUOTE (capt.pantsless @ Jul 28 2011, 04:08 AM) *
Well, maybe. Inter-megacorp cooperation is certainly possible, given the proper motivation and/or persuasion. After all, Mr. Johnson's can have cross-corp contacts as well. Shadowrunners should never feel safe hacking Corp B from somewhere within Corp A. It'll take more effort to get the footage/logs/etc, but it can be done.

If nothing else, (IMG:style_emoticons/default/nuyen.gif) 1,000 will probably get that Azzie spider to turn over any relevant info.
Go to the top of the page
 
+Quote Post
Mardrax
post Jul 28 2011, 02:25 AM
Post #23


Running Target
***

Group: Members
Posts: 1,083
Joined: 13-December 10
From: Rotterdam, The Netherlands
Member No.: 19,228



QUOTE (PoliteMan @ Jul 28 2011, 04:07 AM) *
If nothing else, (IMG:style_emoticons/default/nuyen.gif) 1,000 will probably get that Azzie spider to turn over any relevant info.

You realise when that gets out, the spider will be accused of spying and treason (and probably end a human sacrifice or in some blood sport) and NeoNet will have quite some issue as it comes out they've been spying on the Azzies?

When dealing with corps, especially AAA ones, things aren't as easy as running a bribe here or there.
Go to the top of the page
 
+Quote Post
PoliteMan
post Jul 28 2011, 02:43 AM
Post #24


Moving Target
**

Group: Members
Posts: 400
Joined: 4-August 10
Member No.: 18,889



If that gets out where? If his boss finds out, he's in trouble because he didn't get a cut. And why would anyone higher up care? These aren't critical secrets, this is video footage from Soybun subsidiary franchise #423,977. If the spider for a freaking McDonalds is going to get executed for selling video footage of fat Americans farting, then your setting basically has no corruption. Or at least the megacorps have no corruption (god, that sounds wrong).
Go to the top of the page
 
+Quote Post
Mardrax
post Jul 28 2011, 03:09 AM
Post #25


Running Target
***

Group: Members
Posts: 1,083
Joined: 13-December 10
From: Rotterdam, The Netherlands
Member No.: 19,228



QUOTE (PoliteMan @ Jul 28 2011, 04:43 AM) *
If that gets out where? If his boss finds out, he's in trouble because he didn't get a cut. And why would anyone higher up care? These aren't critical secrets, this is video footage from Soybun subsidiary franchise #423,977. If the spider for a freaking McDonalds is going to get executed for selling video footage of fat Americans farting, then your setting basically has no corruption. Or at least the megacorps have no corruption (god, that sounds wrong).

Sometimes, it's not about what's lost, but about what's to gain if the issue is pressed. What would the Corporate Court think of clearcut international espionage? Clearly, there's something to gain, especially with the Azzies' wordspinners around.

Of course, NeoNet being able to call on more than a few deniable assets who are more than happy to do some datagrabbing is why this game is called Shadowrun.
Go to the top of the page
 
+Quote Post

2 Pages V   1 2 >
Reply to this topicStart new topic

 



RSS Lo-Fi Version Time is now: 11th February 2025 - 08:05 AM

Topps, Inc has sole ownership of the names, logo, artwork, marks, photographs, sounds, audio, video and/or any proprietary material used in connection with the game Shadowrun. Topps, Inc has granted permission to the Dumpshock Forums to use such names, logos, artwork, marks and/or any proprietary materials for promotional and informational purposes on its website but does not endorse, and is not affiliated with the Dumpshock Forums in any official capacity whatsoever.