Nash Equilibria and Matrices, Your targets are not stupid. |
Nash Equilibria and Matrices, Your targets are not stupid. |
Nov 7 2007, 07:30 PM
Post
#1
|
|
Prime Runner Group: Banned Posts: 3,732 Joined: 1-September 05 From: Prague, Czech Republic Member No.: 7,665 |
There is a time and a place for nonsensical adventuring, and it is called Dungeons and Dragons. How does a room full of top predators stay alive and successfully breeding new generations for hundreds if years inside a locked tomb in the middle of the desert? Who cares!? Let's kill them and take their stuff. Stuff which they have, for no reason.
But in games with a "grittier" feel, there is a desire for the world to make some sense. If you're breaking into a building full of monsters and locked doors, someone actually built that building. They also had some well-paid architect go through and design the fire escapes, the locking mechanisms, the floor plan. And you had someone actually put all the monsters there. And they didn't ust put duck-rabbits all over the place in order to fight adventurers and drop loot, they put magical animals in specific locations for use as guards, research subects, and pets. They do not have wandering monsters wandering around their homes and offices because that would cause their employees to get killed. That would be bad. Nash Equilibrium The basic concept of Nash Equilibrium is that if you are in conflict with others it is best for you to use your best strategies. Sounds non-controversial, right? Well, the second part about Nash Equilibrium can best be summated with the "Wine in front of me" argument from The Princess Bride - because the people you are in conflict with know that you are going to want to use your best strategies. And you know that they are going to use their best strategies, and they know that you know and all that. But the third part of Nash Eqilibrium is that your "best" strategy depends upon what your opponents are doing. And your opponet's best strategy depends upon what you are doing. That attacks and defenses evolve, and do so extremely quickly, to maximize the effectiveness of their offenses and defenses against their opponents. Your Opponents Are Not Static It is all well and good to plan the perfect heist, the killer crime, the ultimate attack. But the fact is that you are not the only tactician in the world. Other people are also inventing, also perceiving and closing weaknesses, and if you wait long enough your attack will be decidedly less than ultimate. Shaka Zulu did some amazing strategic and tactical innovations right up until he met with gun toting Europeans coming the other way. So regardless of how the world is described, if there is an exploitable weakness in it which is fixable in a manner which is affordable and simple, that weakness will not last long. If a problem has an easily presentable solution, that problem will be solved. And soon. Which means that if the game world depends upon the players exploiting some weakness over and over again in order to accomplish things, the solution to that problem cannot be "easy", or the world is inherently unstable. The entire campaign has a very perceivable end which wil approach very very soon. Budgets are not infinite A lone nut can, on occassion, stand on the upper story of a book depository and shoot a very important man in the face. This is generally quite difficult because powerfl individuals have people going around looking for guys with firearms and axes to grind. Given enough of these people, they would find all the lone nuts, but as is they merely catch most of them. Vulnerabilities which are sufficiently expensive to solve 100% of the time are not going to be solved 100% of the time. A really useful fact for the game world is that if security that is good enough to keep out all of the rabble and merely challenging for the player characters happens to be the economical choice based on costs and projected losses - it is reasonable to expect security which is challenging and exciting every time you run into it. Computer Security Modern day covert ops teams don't bring computer hackers with them. The reason is multifarious; from the fact that may hackers can do their thing from home, to the fact that most hackers work at least as well on their own, to the fact that hackers tend to not be super good at a lot of "covert ops" style tasks. But the really important part is that computer security that is essentially unbeatable by anyone who does not have your password or physical access to your computer in their laboratory is extremely easy to come by. Noone has ever hacked a z/OS server and they probably never will. NetBSD is essentially impenetrable, and is likely to stay that way for the foreseeable future. Using the "sneaker net" - that is putting a physical lack of connection between the outside world your data, carrying flash drives with the tranmissable data to networked machines and keeping the secure data in a place which is actually secure - has been shown to be essentially unhackable under any circumsyances. Nash Equilibrium in the Modern Day What this means is that the Nash Equilibrium has already been reached in the modern world using realistic computer standards of 2007. Actually secure data cannot be hacked and Navy Seals don't bring hackers on covert missions. Not even into hostile office buildings. And what that means is that any system which falls back on any of the core assumptions we make about modern computer security - will inevitably result in a Nash Equilibrium which maps to our present experience: covert operations teams don't even bother having a Computer Specialist. And while you could run a game like that quite easily, the Shadowrun conceit is that the team has Dodger, Sally Tsung, and Ghost Who Walks on it. And for that conceit to hold, the Nash Equilibrium has to include computer specialists as its endstage. Nash Equilibrium in the Shadowrn Future So here's the important parts: it can't be simple or cheap to keep out a matrix specialist, or people would do that. That means that the air gap, even the sneaker net, can't work. But it's more than that. The cheapest alternative of all of course is simply not having a computer, which means that you're down to one of three possibilities:
-Frank |
|
|
Nov 7 2007, 07:47 PM
Post
#2
|
|
Shooting Target Group: Members Posts: 1,706 Joined: 30-June 06 From: Fort Wayne, IN Member No.: 8,814 |
Well, couldn't one simply say that in 2071, that AR is so relevant and needed, that people would suffer, say a -6 to all actions? I think that would give the SR world the feel it is trying to put forth in fluff, that everyone has a commlink and everyone is ultra-reliant on AR to function everyday.
I mean, even mages would have to follow this... There's a solution that doesn't involve brain hacking and is relatively easy to implant into any existing game... |
|
|
Nov 7 2007, 07:55 PM
Post
#3
|
|||
Prime Runner Group: Banned Posts: 3,732 Joined: 1-September 05 From: Prague, Czech Republic Member No.: 7,665 |
Saying that people can't accomplish basic life and archetype functions without being plgged directly into a computer would in fact force a Nash Equilibrim in which people ran systems that were hackable. Would you find that less offensive than a situation in which people who have machines that can directly affect the mind, and attack programs that damage the minds of enemies, could use those two together to damage the minds of enemies directly? I know definitively that I would not. I would find it more insulting if I was unable to effectively shoot a rifle or sneak through the woods without an active computer link than I find the concept of people remotely triggering conformational changes in the nerves of targets who don't have any special antenna equipment on them. Of course, I don't find the second option at all implausible or far fetched, so the fact that I find the concept of it being in any particular way difficult to fire a gun or walk quietly without computer asistance makes the question pretty one sided. -Frank |
||
|
|||
Nov 7 2007, 08:03 PM
Post
#4
|
|
Shooting Target Group: Members Posts: 1,706 Joined: 30-June 06 From: Fort Wayne, IN Member No.: 8,814 |
But that is personal taste...I think the SR4 world is open to either of those options, those being:
1) People are so dependent on computers (i.e. AR) that they actually find it harder to do everything without 2) That the brain has been unlocked and a "hacker" with the write tools and knowledge, can target any mind and attack it, regardless of its connectivity to the matrix Those are both plausible assumptions in 2071. |
|
|
Nov 7 2007, 08:10 PM
Post
#5
|
|
Moving Target Group: Members Posts: 393 Joined: 2-July 07 Member No.: 12,125 |
So is a post-nuclear holocaust. But that would be Fallout... Or maybe Gamma World.
Either case, its not really "Shadowrun" anymore. Brain hacking your mom for no reason is not necessarily "Shadowrun" except for extremely rare occurances of wtfbbq stuff (otaku etc). I mean, I am no expert on SR background info, but that seems like a rather severe departure from the accepted reality of the 6th world. - der menkey "Certainly there is no hunting like the hunting of man and those who have hunted armed men long enough and liked it, never really care for anything else thereafter." ~ Ernest Hemingway |
|
|
Nov 7 2007, 08:29 PM
Post
#6
|
|
Target Group: Members Posts: 87 Joined: 11-September 07 From: Saeder-Krupp Rhine-Ruhr Regional HQ Member No.: 13,215 |
Frank, I'm not entirely certain I fully grasp get why you so emphatically reject both air gap and sneaker net. If I understand your point correctly (and please do correct me if I don't!) you consider them the anathema to ShadowRun's long-standing practice of including computer specialists in runner teams.
But the sneaker net doesn't appaer to necessarily preclude, to me, connections between servers behind such a sneaker net. Even if all terminals in a given location are run by sneaker-netting data around, that only seems to serve as even more of an incentive to take the data extraction specialists to the servers so that they may do their job via hardwire access. That, in turn, strikes me as not at all at odds with the RAW. Granted, the BBB uses "WiFi-repellent paint" and similarly slightly silly gizmos in place of a good old-fashioned guy with a datachip in his pocket (or, to return to more cyberpunk-relevant imagery, in his head). But the principle is the same. Also, I have been thinking about the vulnerability of brains to haking attempts that you posit as a fundamental to your system. While it makes absolute sense to assume that with ASIST-technology having been around for about half a century, going in the reverse direction would be easily accomplished, I cannot wrap my head around how hacking unconnected brains could work on "targets who don't have any special antenna equipment on them". Surely, whatever else may be necessary in order to perform such a feat, the victim would need to be outfited with one or the other form of DNI transmitter, be it electrodes or datajack? Everything else smacks to me of confusing hacking with Technomancy. I agree strongly with at least part of your position: Technomancers should have recourse to such actions, even in cases where no DNI interface was involved. But hackers need a go-between to establish the hacker-victim connection. This cannot be optional: for it to be so would be to place one foot on the slope of fallacy. Your main argument is that ASIST makes the brain accessible to hackers -- but if the targets can be hacked without such cybernetics involved, why should hackers be so restricted? The consequence would be abandoning mundane hackers altogether and making Technomancers the norm. (Which, incidentally, is also the final stage of considering them the next stage of human evolution.) For if there were no difference between the two but for name and BP cost, why uphold the divide? |
|
|
Nov 7 2007, 08:31 PM
Post
#7
|
|
Incertum est quo loco te mors expectet; Group: Dumpshocked Posts: 6,546 Joined: 24-October 03 From: DeeCee, U.S. Member No.: 5,760 |
Your post is excellent, but fails to detail one important note - it assumes both players are rational.
People continue to pay twice as much for a product that works only half as well as its competitor, because it has better advertising or looks neater. Everyone knows it's good to eat in moderation and exercise regularly, but we continue to smoke, drink and watch Family Guy. Corporations generally invest not based on long-term financial gain, but on short term rises in perceived value (which sometimes results in their intentionally NOT producing anything of value except their own PR). Government operates such that if you perform underbudget, your budget gets cut next year, so use it or lose it. Granted, within their perceived worlds each of these players is in fact rational (although not especially bright, since he refuses to look beyond first impressions). But the fact remains, people do not always choose what is best for them. No where is this more clear than when it comes to security. How many people have a $10 door lock as the only thing protecting their $1,000 computer (and $20,000 in other goods)? Raise your hands? Doesn't this strike you as odd? How many people thinking windows Automatic Update is a pain in the rear and hates seeing that little window pop up when you're busy looking at porn? Now you're certainly right, Shadowrun computer security should be waaay better than it is. In SR3 it always bothers me that characters will almost always be able to get INTO the system without much trouble, but realistically, getting INTO the system should be the single most difficult step. So definitely, some concessions have been made. However with both SR3 and SR4, the assumption is definitely that technology has become so convenient and so easy to use, everyone uses it. It's just that securing it isn't nearly as easy as using it. |
|
|
Nov 7 2007, 08:42 PM
Post
#8
|
|
Midnight Toker Group: Members Posts: 7,686 Joined: 4-July 04 From: Zombie Drop Bear Santa's Workshop Member No.: 6,456 |
It's all about the Benjamins.
Productivity is measured in units/time. Any discrete unit of production can be converted into currency. Therefore, productivity is measured in money/time. In this case, it is nuyen/time. In order to determine profits, one must subtract the productivity from the costs. Remember to keep the units the same. Costs include losses. The losses incurred from hacking can be measured as nuyen/event and the number of events can be measured as event/time so losses from hacking can be measured as nuyen/time. The profit from highly hackable networked business is then [(productivity in nuyen)/time - (losses from hacking in nuyen)/time - (other losses in nuyen)/time] while the profit from non-networked businesses is [(Productivity2 in nuyen)/time - (other losses in nuyen)/time] Now, other losses will be the same, so if productivity-hacking > productivity2, it only makes sense to use extremely hackable networked systems. Most shadowrunners will be hitting white-collar side of business. There isn't an profit in stealing baby food one can at a time but there is in stealing the brand new secret formula for great-tasting baby food. There is a great deal of productivity interference in the traditional model of white-collar employment. One has to commute to an office, which wastes valuable time. Since white-collar employees are salaried, commute time comes out the the company's pockets. Virtual telecommuting with remote lock-in (the same technology used by Black IC to prevent jacking out) ensures a most productive middle-management employee. Entirely replacing physical offices with virtual offices also saves floor space which can be put to great use. Science can benefit from both telecommuting and AR, though it is not possible to eliminate the physical laboratory. |
|
|
Nov 7 2007, 08:44 PM
Post
#9
|
|||
Great Dragon Group: Members Posts: 5,537 Joined: 27-August 06 From: Albuquerque NM Member No.: 9,234 |
Frank, I understand where you are coming from, but you are making a fundamental mistake on how computer security exists in the real world. If you think that ANY OS is so secure it can't be hacked or that it's extremely easy to make a network connected machine secure you are living in a dream world. For example look at NetBSD Security Advisories Any machine connected to the public Internet and offering services to the Internet will eventually be compromised. It's just how these things work. From one of the leading IT security guys, here is his current (August 3rd) thoughts on the state of computer security vs attackers # Existing defenses are absolutely ineffective against current attacks. I am struggling to describe the importance of this insight. It does not matter if you are fully patched, "properly configured," not running Javascript, or adopting any number of other current defensive stratgies if you use a Web browser that renders modern rich content. Almost none of the techniques described in the Black Hat talks relies upon exploiting vulnerable software. Almost all of them abuse inherent functionality for malicious reasons. # Detecting current attacks in "real time" is increasingly difficult, if not impossible. Even if you assume attacks are not obscured by encryption, recognizing and understanding the variety of Web-based attacks shown at Black Hat is almost a lost cause. There is basically no way for defenders to address the expanse of the attack surface exposed by "rich Internet applications" and frameworks. I realized that the "rich" in "RIA" refers to the money intruders will make by exploiting Web clients. # The average Web developer and security professional will never be able to counter these attacks. Intruders are so far ahead of the defenders with respect to tools and techniques that it is simply not possible to prevent the attacks I saw at Black Hat. This statement will probably offend many people but it's time to face the truth. There is no way to get "ahead of the threat" here. And yet we still use computers, they are connected into networks, and the networks are connected to the Internet. So I'd argue that their are compelling reasons for people to use systems that greatly increase their vulnerability to being attacked by the entire world without having to go over the edge. |
||
|
|||
Nov 7 2007, 09:21 PM
Post
#10
|
|
Runner Group: Members Posts: 3,009 Joined: 25-September 06 From: Paris, France Member No.: 9,466 |
Okay, the Matrix is everywhere and everything. You can't even legally walk in some places without being connected to the Matrix.
Want to listen to the Radio (or even to your own music albums)? Connect to the Matrix. Want to be able to contact your friends and be contacted? Connect to the Matrix. Want to watch TV? Connect to the Matrix. Want to read a Book? Connect to the Matrix. Want an official document? Connect to the Matrix. Want a map of the area? Connect to the Matrix. Want to check if you forgot something at home? Connect to the Matrix Books? Want your car to pick you up? Connect to the Matrix. Want to pay the bus ride? Connect to the Matrix. And the list can go on. Not using the Matrix is nearly impossible. Some things we can do today without using any device are harder to do without in 2070 because of the material or infrastructural issues: paying, getting a map of the place, reading a book... Some other have been lost. Are you able to light a fire with just a piece of wood and a string? Why bother? We have lighters and matches. Some other are just more trouble without the Matrix. People often forget that AR gives a +2 bonus to any kind of action that could be helped by using it... And there's actually a lot of them. Sure, there are hackers. Well, that doesn't prevent people from connecting to the Internet in 2007. Brain cancer doesn't prevent them from using mobile phones. Anyway, what's the risk? All their precious data is on "secured" servers. Bank account? My bank takes care of the security. And I think that by 2070 all security companies offer a 3 in 1 physical, magical and matrix protection of your home. In the case of the Matrix, it means your commlink. So everyone who today has some alarm system at home is likely to have a firewall+IC pack for his commlink, with spiders ready to check if an alarm is triggered. And I think that's a trend that goes further than that. Governments all around the world still have trouble dealing with Internet crime today. In 2070 Matrix Crime is now fully covered by the law, and the Lone Star can come kick the ass of any hacker they catch abusing the citizens of any place they are paid to protect. So most people have enough to be protected from too simple hacking techniques (low skilled hackers and low rating programs) and governments actively fight higher hacking threats. [What follows is more a personal take on the Shadowrun universe] If you add on top of that a closed Matrix, made for and by corps, instead of a mostly free and anarchic Internet, and you'll realize that hackers shouldn't be so many, or at least so many to stay long enough in the buisiness. Widely distributing high rating hacking programs will get you arrested in no time, so most of them are just distributed in small underground networks. And that's where we get back at the Cyberpunk. Real hackers aren't that common. Actually, there should be nearly as few "real" hackers as mages running the shadows (for example). Besides most of them don't target Joe Average. If they're interested in money, they can get much more elsewhere (and Matrix-assisted scams are easier to pull off anyway). Anyway, that's not what most of them are into. Being a real hacker in Shadowrun isn't just being good with computers and using it as a criminal. All hackers share more or less the same traits: they like to discover secrets, they like to deconstruct things to find what's inside... And they like to share it. Information should be free, small hacker communities and all that kind of stuff. The 2070 hacker isn't the "finance minister of Nigeria", he's not the WaReZ KiNg, he's closer to Richard Stallman, and all those people who fight for free software, or P2P as an ideal. Yes, I know,there's a big legal difference between Free Software and Pirate's Bay. But in 2070 they are all "dangerous criminals". Well, actually this last part isn't necessary, you can have a small hacker population without them being neo anarchists, but I just happen to like the idea and to think it goes along well in a Cyberpunk world. The main point, regarding the topic of this thread, is that real hackers simply aren't enough to be that much of a threat to Joe Average. So, basically, I think that the 1st solution is the best, but I'll expand it further: "People gain benefits from computers which are astoundingly awesome (and actually, society has been too far to pull back: it NEEDS them) and they would genuinely be willing to accept the vulnerability of potential hacking anyway, because the threat is small so the benefits largely outweigh the drawbacks. I know it leaves some question opens about corporate security, but I'll get back on this later. |
|
|
Nov 7 2007, 09:38 PM
Post
#11
|
|
Moving Target Group: Members Posts: 830 Joined: 3-April 04 From: Columbus, Ohio Member No.: 6,215 |
Essentially, you're saying that it's easy enough for targets to isolate all their important paydata from the Matrix, and if they can do that, why have a hacker?
In 2nd edition, we assumed pretty much the same thing up until the last 2nd ed. campaign I played. It coincided nicely with the fact that until the last campaign, we were all too lazy to actually learn the matrix rules. The big problem with that was that you're left trying to fill that classic Gibson-type cyberpunk void you've suddenly left by isolating every important computer system, which essentially kills the idea of the Matrix. We just started using lots and lots of Johnny Mnemonic-style couriers (who, by the way, really have no use if there IS a matrix). But eventually we put down the beer, learned the Matrix rules, and greatly improved our game, even if it DIDN'T make sense for companies to have sensitive information out there where the Super Deckers of the 6th world could snag it. Sometimes you have to suspend disbelief for the sake of atmosphere. If not, most corps would probably find a better solution to their illegal needs than the fixer/shadowrunner system. "You're willing to do nearly anything for money? Fantastic, let me turn you into damning evidence against me and ask you to pretty please not tell anyone about it!" |
|
|
Nov 7 2007, 09:55 PM
Post
#12
|
|
Ain Soph Aur Group: Dumpshocked Posts: 3,477 Joined: 26-February 02 From: Montreal, Canada Member No.: 600 |
Good thread.
I fall back on the "this is cyberpunk" argument. Corporations are well aware their networks are not secure but accept it as a cost of doing business, and hide that fact from Joe Average. Can Joe Average's bank account be hacked? Oh yes. Is Joe Average concerned about that? No, cause the bank lies to him and tells him it's impossible, or at least if does happen, magical insurance will cover it and he will never notice. There are cases of people's SINs being wiped out. That's your entire history, your bank accounts, everything. Has that caused anyone to question that maybe the way SINs are handled is perhaps a not very good idea? Nope. Just offer amnesty to those who can sort of prove they used to have a SIN, and those that fall in the cracks can go fuck themselves. Why? Cause nobody cares about anyone else but number 1 in a very deep, deep way. So SR computer networks operate with huge flaws, but nobody cares. The cost of properly securing them outweighs the benefits. |
|
|
Nov 7 2007, 10:07 PM
Post
#13
|
|||
Great Dragon Group: Members Posts: 5,537 Joined: 27-August 06 From: Albuquerque NM Member No.: 9,234 |
That's actually why people are willing use their credit cards to pay the bill in a restaurant. What does the waitress do when you give her the card? She walks away and goes somewhere else to do something with your card that you can't see and returns with the bill. If she copied it, how would you know? When you get a bill that shows someone bought a 52" high-def TV, and it wasn't you. Nor was it you that bought power tools all over the midwaest. But it doesn't really matter, because Visa won't make you pay if you point to them that you didn't actually buy the 52" high-def TV or the power tools. Hence people keep handing their credit cars to the waiter. (This is actually part of a longer argument by Bruce Schneier) |
||
|
|||
Nov 7 2007, 10:17 PM
Post
#14
|
|||||
Running Target Group: Members Posts: 1,219 Joined: 26-February 02 From: Lofwyr's stomach. Member No.: 1,320 |
to be two specific problems wrapped up in here. The first is why, from a narrative perspective, it is at all believable that people and corporations bother with the matrix. The second is why, from a gaming standpoint, they do so. I'll address them one at a time. First, from a fiction standpoint.
The matrix makes money. Aside from actual matrix businesses, the matrix is a great productivity booster. The game doesn't model this because this isn't "Accountant, the ledgering", but be sure that in most corporate offices, the productivity losses of not having matrix would be greater than the potential losses from hacking. Most of the time. The boss won't be turning off the matrix anytime soon. People merely like being connected. Plus people are irrational. Plus it gets more and more difficult every year not to be one of the fold. I see it like this: TV commercials are like Brain Hacking. And if you wanted to avoid having your desires hijacked (by the commercials, in this case), you can just turn off the TV. How many of us actually do that? The TV apparently gives us something that we feel is worth allowing companies to brainwash us. The second problem is where I think you really stand, Frank. Well, I think the problem is that the "carrot" of connectivity, the +1 to +3 bonus to appropriate tasks, is outlined in a sidebar, completely up to GM fiat, and with few to no guidelines. In a game where those bonuses are common, pervasive, and counted on, then getting someone to turn off their PAN in the first place would be a victory, as it would consistently reduce their dice pools. If I were to take the time to write house rules to challenge your new set, I'd start by outlining as many ways as I could think of to get those bonus dice. Those bonus dice would be the cornerstone of MY matrix rules. |
||||
|
|||||
Nov 7 2007, 10:18 PM
Post
#15
|
|
Running Target Group: Members Posts: 1,246 Joined: 8-June 07 Member No.: 11,869 |
I've actually worked as a network manager at military sites so I can tell you from personal experience that air gaps suck balls.
Yes, keeping your computers completely sealed from the internet definitely helps to keep out hackers, viruses, trojan horses, etc., but the amount of labor needed to keep systems updated is a huge pain in the ass and gets worse every year. I can see how by 2070, computer systems will become so complicated that there will be no choice but to keep your systems hooked up to the internet 24/7 just to make sure your systems are up to date and functioning at least as good as your competitors' systems. As competition comes down to a razor's edge, having your systems running 1% slower than your competitors for 1 day could mean the difference of millions of nuyen of profit and lost opportunities. Keeping your systems updated 24/7 becomes mandatory. Besides, with the movement towards web applications, I wouldn't be surprised if 100% internet-based systems become the norm rather than the exception. Who would expose their secret software to reverse engineering when you could just make customers connect to your black box web service instead? However from a game standpoint, I can see why the authors want air gaps and wifi repelling paint: so the characters have to get off the couch and run into dungeons...uh I mean office buildings, and have all kinds of cool sword fights and gun battles. It all comes down to deciding what kind of game you want:
|
|
|
Nov 7 2007, 10:54 PM
Post
#16
|
|||
ghostrider Group: Retired Admins Posts: 4,196 Joined: 16-May 04 Member No.: 6,333 |
I realize you're just making a point, but it's this perception that the only things there are to hack are commlinks and the occasional cyberarm is the reason this brainhacking silliness exists in the first place. Note: The rest this post is "in general" and does not attempt to follow any strict logical protocol in some attempt to win the internet. It's just how I feel about the issue. I should just put it in my sig, but If the only thing there is to hack in the game is commlinks, you're doing it wrong. Stop ignoring the rest of the book and the intent of the setting and rules just so you can complain about a made up problem. Disclaimer blah blah if you don't like it don't use it blah blah blah this isn't directed at any one person blah blah blah disclaimer. |
||
|
|||
Nov 7 2007, 11:27 PM
Post
#17
|
|
Moving Target Group: Members Posts: 246 Joined: 26-January 06 Member No.: 8,198 |
I can connect my brain to a cybernetic appendage and move it around, even blind, deaf, and hearing impaired.
Requirements for that statement to be true: 1.) The appendage must be connected to the brain. 2.) The appendage must be able to move. 3.) The appendage must have some way of knowing what to do. -A.) The program that tells the appendage what to do must be on a computer. -B.) The program must be able to translate brain thoughts into computer language. -C.) The program must be able to send information (Tactile or otherwise) back to the brain. This man's brain is already hacked, and we didn't even have to look at the matrix rules. EDIT: Ok, forgot to post the point to this. Shit like Math SPU's, Encephs, Datajacks linked to Sim moduals linked to knowledge softs, they all send things to the brain that your brain processes and sends information back. To have a VR work at all you've got to send and receive, so we know that shit can go in, the question is how. Alright, so the shit that goes in is data, just data the brain understands. If you can send this data via a cord you can send it over the waves. We know Trode nets send their signal to the brains, because thats how they work. So obviously some part of our brains (Or all) can receive this shit, unless trode nets are magic. So if it's specific, what happens when other parts of our brain get the signal? Does it suddenly go "NO THE BRAIN WONT EXCEPT ANYTHING NOW!" No, it does diddly squat. The parts that do accept it, accept it and take it without question. Easy! So, if I blast you with BrainData , the parts that receive take it and like it, cus they're bitches like that. Which means your signal doesnt have to be fine pin point focus. 1. Brains can send and receive data of a specific type. 2. 2070 computers can translate from computer data to brain data. 3. Brains can receive AND SEND this data via cable and air (Trodes). 4. Either the whole brain is able to, or specific parts can do all of the above (Sans 2). -If it's the whole brain, you do not need a pin point focus. -If it's specific parts of the brain, you do not need pin point focus --The parts that can send/receive do. --The parts that dont send/receive dont. |
|
|
Nov 7 2007, 11:44 PM
Post
#18
|
|
Deus Absconditus Group: Dumpshocked Posts: 2,742 Joined: 1-September 03 From: Downtown Seattle, UCAS Member No.: 5,566 |
Your logic is faulty. By that rationale, any time your computer connects to the internet, it is being 'hacked'.
To 'hack' an object, one is instructing the object to do something that it would not normally do, or is otherwise ordinarily prevented from doing. Simply sending data to it isn't hacking it. |
|
|
Nov 7 2007, 11:48 PM
Post
#19
|
|||
Moving Target Group: Members Posts: 246 Joined: 26-January 06 Member No.: 8,198 |
Sorry, edited befor after you posted, might want to read it. Sending data into a brain that it can translate for you to understand and automatically do? Thats fucking definitely hacking. You dont choose to receive that pop up that passed your filters. The computer send the data to your brain, FORCED YOU TO VISUALIZE IT IN THIS HALLUCINATORY WORLD, and then it happened. Caps for point focus. |
||
|
|||
Nov 7 2007, 11:49 PM
Post
#20
|
|
Target Group: Members Posts: 87 Joined: 11-September 07 From: Saeder-Krupp Rhine-Ruhr Regional HQ Member No.: 13,215 |
In the context of SR, it arguably is. Hackers use the Hacking skill with the Spoof program, rather than Spoofing it outright, so that so far as RAW goes, Spoofing is a "subspecies" of Hacking.
EDIT: Seven-7, I think you're steering a little too close to the same ravine Frank is already teetering on the brink of. Brains can only actively send their organic data into a machine by way of a datajack, which directly translates DNI data into machine code, or via trodes, which operate are at one remove (which they must, being non-invasive): they interprete the vastly more sophisticated 2070 analog to today's EEG, and return stimulate the brain through specifically tailored electromagnetic pulses applied to the skull. That is the only way a non-invasive ASIST technology can interact with the human brain, and as a consequence, brain hacking (which is still the overarching theme of this thread) is only possible if you go through their trode set (having hacked their commlink and hijacked the access) or by directly bypassing everything else and plugging yourself directly into the victims datajack, cerebro a cerebro. There is no way for a mundane to hack the brain of someone who does not possess a datajack, wears a trode rig, or at the very least has a skinlink installed. That is the only restriction I argue for in Frank's ruleset, as it is the most glaring flaw in that system an the one that rightly has many people clamoring. But if this restriction is met, all bets are off. |
|
|
Nov 7 2007, 11:54 PM
Post
#21
|
|||
Prime Runner Group: Banned Posts: 3,732 Joined: 1-September 05 From: Prague, Czech Republic Member No.: 7,665 |
Actually, in this case it is. The human brain is not set up to receive computer data at all. It is not designed to run computer processes, perform equations with its processing power, send or receive instructions. It's a biological problem solving lump of meat. The fact that it can be made to interact with a cybereye or an encephalon or a datajack or a blackhammer program is a result of people using the power of artifice to subvert the coding of the brain to make it do something it was never supposed to. Destruction is easier than construction. Entropy flows down hill. That an external device (nanopaste trodes) could project coherent information into your brain is much harder to believe than that an external device (commlink) could project destructive interference into your nervous system that would kill you. This is a 2071 where the brain is repeatedly violated. It is opened up, fed information, forced to process that information a trillion times over, and then that information is sucked right back out. People do this to themselves and they do it on purpose. But this is biology not Magic, so the fact that you are willing will purchase you a cup of coffee if and only if you also supply 1.5 nuyen alongside. Once it is established that the entire brain can be transformed by external electronic impulses into a huge calclator, it is insulting to my intelligence to tell me that it cannot also be turned into a steaming pile of useless pithed meat. -Frank |
||
|
|||
Nov 8 2007, 12:04 AM
Post
#22
|
|
Moving Target Group: Members Posts: 101 Joined: 29-October 05 Member No.: 7,908 |
Which definition of brain hacking is used here? In one version somebody signs the warrant by hooking up to a DNI.
In another verison of brain hacking is pointing a signal emitter at an unborn fetus in its mother's womb, and hacking its prenatal brain into eternal loyalty for Saeder Krupp. In that world, Singularity has taken hold and the game is over. There is no game to play. This post has been edited by Red: Nov 8 2007, 12:12 AM |
|
|
Nov 8 2007, 12:09 AM
Post
#23
|
|||
Moving Target Group: Members Posts: 246 Joined: 26-January 06 Member No.: 8,198 |
Well, we know that shit can go into the brain, thats been proven, and that BrainData is something your brain can comprehend and spit answers out, like a computer, so how does Black Hammer work? These aggravated BTL-level signals may overload the target’ s neural connections and in turn render him unconscious, trigger psychological disorders, brainwash him, or cause death from stroke, heart failure, ...ect. This stuff isn't only plausible, its been there for as long as Black Hammer has been in Shadowrun, or ASIST, or Simsense. |
||
|
|||
Nov 8 2007, 12:20 AM
Post
#24
|
|
Target Group: Members Posts: 90 Joined: 25-May 07 From: Florianópolis, Brasil Member No.: 11,747 |
I've been GMing SR4 for little time, but it's funny to think that on my first reading of the core book i just did something like "humm... this trodes and nanopaste thing is quite ridiculous..." and cutted then out of my game.
In my games there is two ways to connect to Matrix. First is with commlink, gloves, glasses and so on... your brain if protected from damage, but you can't VR or use BTLs. Want to do VR, Hot VR or use Simsense and BTLs? Install a Datajack, then your brain could have a two-way connection to your commlink and the Matrix. You can VR, Hot VR, use Simsense, BTLs and so on, but you'll put your brain "in the game". Datajack is the only way to input/output data directly on someone's brain. Daily Matrix users just do'it through commlink, plus glasses (or cybereyes), gloves to interaction and so on, never experiencing something like VR. Hackers, professionals or people interested in VR games, Simsense or BTLs get datajacks. A hacker can't force hotsim on someone, even if the target is on VR, unless his commlink has been hardware modded to HotSim. I don't know how many problemas could appear from this decision. As i said, i´ve GMed only a few games, and my players are SR begginers like me (old RPG players, but begginer on SR), but so far no problem with this. (Sorry for the poor english. Brazilian guy trying hard to be undertood). (Edit: Little edit for clarification). |
|
|
Nov 8 2007, 12:22 AM
Post
#25
|
|||
Midnight Toker Group: Members Posts: 7,686 Joined: 4-July 04 From: Zombie Drop Bear Santa's Workshop Member No.: 6,456 |
12+B = 2B 12+B-B = 2B-B 12+0 = 1B B = 12 Yeah. Equation solving it can do. It can also send and receive instructions, albeit in a roundabout way. Of course, the brain is set up to receive sense input from various nerves throughout the body and it is set up to give instructions of various muscles. It is somewhat fallacious to assume that a mechanical arm which is designed to mimic a human arm so closely as to be functionally identical requires making alterations to the brain or that hacking that arm would allow one to hack the brain. My Playstation 2 connects to my TV but I can't use it to change the channel. |
||
|
|||
Lo-Fi Version | Time is now: 2nd December 2024 - 09:51 AM |
Topps, Inc has sole ownership of the names, logo, artwork, marks, photographs, sounds, audio, video and/or any proprietary material used in connection with the game Shadowrun. Topps, Inc has granted permission to the Dumpshock Forums to use such names, logos, artwork, marks and/or any proprietary materials for promotional and informational purposes on its website but does not endorse, and is not affiliated with the Dumpshock Forums in any official capacity whatsoever.