IPB

Welcome Guest ( Log In | Register )

kjones
post Apr 19 2010, 01:37 PM
Post #1


Moving Target
**

Group: Members
Posts: 332
Joined: 15-February 10
From: CMU
Member No.: 18,163



The encryption that we use today is called asymmetric key encryption - basically, this means that if Alice and Bob want to speak securely, they don't need to meet up beforehand to exchange a password. This is good, because it lets you give Amazon.com your credit card number without having to work out some way to exchange a password that isn't itself insecure.

Modern asymmetric key encryption takes advantage of the mathematical principle that it is easier to multiply two prime numbers together than it is to factor a number into its prime components - if somebody were to come up with a way to factor products of large primes quickly, this would obliterate modern encryption as we know it. Presumably, this is what happened in Shadowrun.

However, asymmetric key encryption is not the only kind of encryption in the real world. Symmetric key encryption, if properly implemented, is mathematically perfect. Consider the following encryption algorithm - I have a string of characters, "dumpshock". I come up with perfectly random string of characters (there are ways to do this, but the one that I'm going to use, mashing on my keyboard, is not one of them) - "avzliwamf". I then take each character's numerical value (a = 1, etc.) from the plaintext ("dumpshock") and add it to the key ("avzliwamf"), and if the result is greater than 26, I subtract 26.

In cryptography parlance,
Plaintext: dumpshock
Key: avzliwamf
Ciphertext: dumpshock + avzliwam = eplxadppp

This cipher is unbreakable because while I could try guessing different keys and seeing if I get "dumpshock" back, I would only know that's the correct answer if I knew it going in - "eplxadppp" could also mean "kjonesroxx" or "iluvdandd" or anything, and there's no way of knowing. (Assuming that the key generated was perfectly random.)

Now, the obvious problem with this method is that if Alice wants to send Bob a message encrypted with this algorithm (known as a "one-time pad"), Alice must first work out a way to send Bob the key. This is why we don't use one-time pads in the real world - key exchange is too much of a hassle.

But, say you're a shadowrunner, and you have a very real and immediate need for secure exchange of data among your teammates. Since data storage in the 6th world is "enough", there's nothing stopping you from generating a couple billion megapulses of randomly generated keys and passing them among your team the next time you all meet up at the Stuffer Shack. It would not be hard to encrypt all data passed among your teammates during a run (or whenever) using these one-time pads. If you run out, knock off a couple billion more.

The irony here is that the greatest insecurity in this system is that a hacker can still waltz in, hack anyone's comm, and grab the keys, but there are ways to defend against this - firewalls, data bombs, and I seem to recall an option in Unwired that helps prevent files from being moved around. But there is no way to break this encryption by simply intercepting wireless signals. This helps solve, for example, the insecurity of tacnets.

Thoughts? Suggestions? Reasons why I'm wrong?
Go to the top of the page
 
+Quote Post
7 Pages V   1 2 3 > »   
Start new topic
Replies (1 - 99)
Ancient History
post Apr 19 2010, 01:42 PM
Post #2


Great Dragon
*********

Group: Members
Posts: 6,748
Joined: 5-July 02
Member No.: 2,935



If your key is as long as your plaintext message, then by definition it's a one-time pad, which is unbreakable. I actually mentioned that in the FAQ. The problem is generating the one-time pads and communicating them without being intercepted. That's why modern (but breakable) cryptography uses pseudo-random number generation for the keys, among other things.
Go to the top of the page
 
+Quote Post
Starmage21
post Apr 19 2010, 01:43 PM
Post #3


Moving Target
**

Group: Members
Posts: 745
Joined: 13-April 07
From: Houston, Texas
Member No.: 11,448



QUOTE (kjones @ Apr 19 2010, 09:37 AM) *
The encryption that we use today is called asymmetric key encryption - basically, this means that if Alice and Bob want to speak securely, they don't need to meet up beforehand to exchange a password. This is good, because it lets you give Amazon.com your credit card number without having to work out some way to exchange a password that isn't itself insecure.

Modern asymmetric key encryption takes advantage of the mathematical principle that it is easier to multiply two prime numbers together than it is to factor a number into its prime components - if somebody were to come up with a way to factor products of large primes quickly, this would obliterate modern encryption as we know it. Presumably, this is what happened in Shadowrun.

However, asymmetric key encryption is not the only kind of encryption in the real world. Symmetric key encryption, if properly implemented, is mathematically perfect. Consider the following encryption algorithm - I have a string of characters, "dumpshock". I come up with perfectly random string of characters (there are ways to do this, but the one that I'm going to use, mashing on my keyboard, is not one of them) - "avzliwamf". I then take each character's numerical value (a = 1, etc.) from the plaintext ("dumpshock") and add it to the key ("avzliwamf"), and if the result is greater than 26, I subtract 26.

In cryptography parlance,
Plaintext: dumpshock
Key: avzliwamf
Ciphertext: dumpshock + avzliwam = eplxadppp

This cipher is unbreakable because while I could try guessing different keys and seeing if I get "dumpshock" back, I would only know that's the correct answer if I knew it going in - "eplxadppp" could also mean "kjonesroxx" or "iluvdandd" or anything, and there's no way of knowing. (Assuming that the key generated was perfectly random.)

Now, the obvious problem with this method is that if Alice wants to send Bob a message encrypted with this algorithm (known as a "one-time pad"), Alice must first work out a way to send Bob the key. This is why we don't use one-time pads in the real world - key exchange is too much of a hassle.

But, say you're a shadowrunner, and you have a very real and immediate need for secure exchange of data among your teammates. Since data storage in the 6th world is "enough", there's nothing stopping you from generating a couple billion megapulses of randomly generated keys and passing them among your team the next time you all meet up at the Stuffer Shack. It would not be hard to encrypt all data passed among your teammates during a run (or whenever) using these one-time pads. If you run out, knock off a couple billion more.

The irony here is that the greatest insecurity in this system is that a hacker can still waltz in, hack anyone's comm, and grab the keys, but there are ways to defend against this - firewalls, data bombs, and I seem to recall an option in Unwired that helps prevent files from being moved around. But there is no way to break this encryption by simply intercepting wireless signals. This helps solve, for example, the insecurity of tacnets.

Thoughts? Suggestions? Reasons why I'm wrong?


unbreakable encryption exists, as explained in Unwired, and it's basically a GM Fiat that says "no, you cant hack this".

Without breakable encryption, Hackers, who have been a major staple of the game since it's inception, become useless.

So the fluff explaination for that is decryption algorithms and computers are so awesome that no amount of encryption is safe.
Go to the top of the page
 
+Quote Post
Synner667
post Apr 19 2010, 01:49 PM
Post #4


Moving Target
**

Group: Members
Posts: 946
Joined: 16-September 05
From: London
Member No.: 7,753



QUOTE (Starmage21 @ Apr 19 2010, 01:43 PM) *
unbreakable encryption exists, as explained in Unwired, and it's basically a GM Fiat that says "no, you cant hack this".

Without breakable encryption, Hackers, who have been a major staple of the game since it's inception, become useless.

So the fluff explaination for that is decryption algorithms and computers are so awesome that no amount of encryption is safe.

That sums it up, really.
Supposed realism, that completely goes out the window in the name of the game.
Obviously, too much to expect that players actually have to work.
Go to the top of the page
 
+Quote Post
Bira
post Apr 19 2010, 01:56 PM
Post #5


Moving Target
**

Group: Members
Posts: 254
Joined: 26-February 02
Member No.: 1,768



Actually it just forces you to get a little more creative in obtaining those cryptographic keys, which can be a good thing depending on what tone you want for your campaigns.

The reason Shadowrun's default encryption is so weak is that SR is not trying to emulate reality. It's emulating Hollywood action movies. In action movies, hackers can always break any encryption within seconds by tapping on a keyboard for a bit. The thinking here is that realistic encryption, and the ins and outs of getting around it, are not as exciting as the shootouts, martial arts fights, car chases, and tense sneaking scenes. Therefore, encryption is set up as a minor obstacle that can be overcome in the same time frame as the exciting scenes, and is meant to be used as an additional complication.

Realistic "strong" encryption, which, even when not unbreakable, would take many years to break through brute force, works best for more "cerebral" games, where the group is indeed interested in the longer, more involved process for getting around them. Cracking an encrypted file, or tapping into a secure connection, can then become the main goal of the adventure, rather than a secondary obstacle.
Go to the top of the page
 
+Quote Post
DireRadiant
post Apr 19 2010, 02:05 PM
Post #6


The Dragon Never Sleeps
*********

Group: Admin
Posts: 6,924
Joined: 1-September 05
Member No.: 7,667



If we get realistic encryption, can I have realistic dragons, elves, magic and guns too?
Go to the top of the page
 
+Quote Post
Eratosthenes
post Apr 19 2010, 02:17 PM
Post #7


Moving Target
**

Group: Members
Posts: 356
Joined: 3-April 10
Member No.: 18,409



A little imagination could see how a world that has cars that can drive themselves (better than many humans, even), could come up with fuzzy logic algorithms that break standard encryption routines.

There are two (that I can think of) problems with decryption:

1) Identifying the method of encryption
2) Breaking the cipher

For one, perhaps mathematics has discovered particular encryption methods leaves tell-tale signatures on the pattern or distribution of bits, bytes, or characters. With a method to determine the type of encryption used, you can get down to pattern matching, reverse engineering, or raw plug-n-chug analysis.

And one-time pad's aren't fool proof (you can always build a better fool!), especially if the method for randomly generating the one-time pads can be determined. Say two devices regularly exchange a nearly identical encrypted "handshake", with but the time-date stamp changing. This creates a HUGE hole in the strength of the encryption, as two messages can be directly compared. Enigma is a good example: a lot of the work breaking Enigma was thanks to encoded weather reports sent out by the Luftwaffe.

As for the game, it does provide for strong encryption, and unbreakable encryption. Personally, I'm thinking of using a house rule that the extended test for Decrypt is (Encrypt Rating ^ 2, complex action) for standard encryption with glitches causing the decrypt to have to start over and critical glitches meaning it was unbreakable for that Decrypt program. It would make Encrypt 6 take a *lot* longer to break, while Encrypt 3-4 is still manageable.
Go to the top of the page
 
+Quote Post
D2F
post Apr 19 2010, 02:41 PM
Post #8


Moving Target
**

Group: Members
Posts: 765
Joined: 28-December 09
Member No.: 18,001



QUOTE (DireRadiant @ Apr 19 2010, 02:05 PM) *
If we get realistic encryption, can I have realistic dragons, elves, magic and guns too?

I'd be up for that =)
Go to the top of the page
 
+Quote Post
Draco18s
post Apr 19 2010, 02:52 PM
Post #9


Immortal Elf
**********

Group: Members
Posts: 10,289
Joined: 2-October 08
Member No.: 16,392



QUOTE (Ancient History @ Apr 19 2010, 08:42 AM) *
If your key is as long as your plaintext message, then by definition it's a one-time pad, which is unbreakable. I actually mentioned that in the FAQ. The problem is generating the one-time pads and communicating them without being intercepted. That's why modern (but breakable) cryptography uses pseudo-random number generation for the keys, among other things.


Pseudorandom is generally strong enough even in a ShadowRun hacking sense, as there are a multitude of random number algorithms (some more random than others), but predicting them--even in a ShadowRun hacking sense--is going to be extremely difficult as you need to know three (possibly four) things:

What the algorithm is.
What the seed was.
How much of the sequence has already been generated.
(Possibly) How often the seed is reseeded.

The only thing that makes it easier is if the algorithm is shitty:

Say, this formula I was once given (for (supposedly) generating a number from 6 to 36 with more outside results than interiors):

y = (root(60 * random) – root(15))^2 + 21; //where random is a call to Flash's RNG.
Its output:
http://i42.tinypic.com/1zc4dx.png

Two other "better than Flash's RNG" formulas and distribution graphs:

var str = "0."+((Math.random()*(new Date().getTime())/Math.pow(Math.random(), Math.sin(Math.random() +
Math.cos(Math.random()*Math.PI)))));
str = str.replace(/[.-]/g,"");
http://i41.tinypic.com/106yb0x.png

and

"0."+((Math.random()*(new Date().getTime())+Math.pow(Math.random()*(new Date().getHours())+1, Math.sin(Math.random() +
Math.cos(Math.random()*Math.PI))))).toString().replace(/[.-]/g,"").substring(3,53);
http://i43.tinypic.com/24wzor9.png

However, utilizing that data requires knowing something about the RNG, which you can only get from a string of crypotext by analyzing its character makeup and comparing to the makeup of average English text. Byt th4t'z EZly D-featable.

Famous case: Kryptos. The fourth part has been unsolved for almost 20 years and it sits in the CIA's courtyard. It took eight years to solve the first three sections, the creator thought it would take 8 months and expected that the final section would take a few years. Due to how long its taken there is one other person who has the solution, in case the creator dies first so any future solution can be checked (though he doesn't know the solution off the top of his head any more anyway).
Go to the top of the page
 
+Quote Post
Brazilian_Shinob...
post Apr 19 2010, 04:09 PM
Post #10


Shooting Target
****

Group: Dumpshocked
Posts: 1,989
Joined: 28-July 09
From: Somewhere along the brazilian coast
Member No.: 17,437



Of course, Shadowrun gives the impression that P=NP and someone reliably proved this, making possible black boxes capable of actual non-deterministic computation. This would be a lot of pain for the scientists of today to create a new way of making data secure. Of course, this would be boring and SR adopted the network/dungeon approach, where there are "beasts" defending the "dungeon".
Go to the top of the page
 
+Quote Post
Draco18s
post Apr 19 2010, 04:19 PM
Post #11


Immortal Elf
**********

Group: Members
Posts: 10,289
Joined: 2-October 08
Member No.: 16,392



QUOTE (Brazilian_Shinobi @ Apr 19 2010, 11:09 AM) *
Of course, Shadowrun gives the impression that P=NP and someone reliably proved this, making possible black boxes capable of actual non-deterministic computation. This would be a lot of pain for the scientists of today to create a new way of making data secure. Of course, this would be boring and SR adopted the network/dungeon approach, where there are "beasts" defending the "dungeon".


Right. SR wants beasts defending the dungeon, but at the same time, do away with the dungeon (see: everything is wireless, even your underwear). Means that at most paydata is 2 hops away from "you" and its trivial to avoid the beasts.

Example: hacking cyberware. Cyberware can't run IC, yet can be hacked, by RAW, wirelessly, from a distance, without going through the user's PAN (which can run IC...if their comlink isn't the el cheapo 1/1).
Go to the top of the page
 
+Quote Post
Tymeaus Jalynsfe...
post Apr 19 2010, 04:27 PM
Post #12


Prime Runner Ascendant
**********

Group: Members
Posts: 17,568
Joined: 26-March 09
From: Aurora, Colorado
Member No.: 17,022



QUOTE (Bira @ Apr 19 2010, 07:56 AM) *
Actually it just forces you to get a little more creative in obtaining those cryptographic keys, which can be a good thing depending on what tone you want for your campaigns.

The reason Shadowrun's default encryption is so weak is that SR is not trying to emulate reality. It's emulating Hollywood action movies. In action movies, hackers can always break any encryption within seconds by tapping on a keyboard for a bit. The thinking here is that realistic encryption, and the ins and outs of getting around it, are not as exciting as the shootouts, martial arts fights, car chases, and tense sneaking scenes. Therefore, encryption is set up as a minor obstacle that can be overcome in the same time frame as the exciting scenes, and is meant to be used as an additional complication.

Realistic "strong" encryption, which, even when not unbreakable, would take many years to break through brute force, works best for more "cerebral" games, where the group is indeed interested in the longer, more involved process for getting around them. Cracking an encrypted file, or tapping into a secure connection, can then become the main goal of the adventure, rather than a secondary obstacle.



We use a combination of these solutions...

Breakable Encryption on most systems (Standard Rules)...
"Strong Encryption" for those systems that need more finesse than Brute strength (Optional)...

Both work out pretty well, depending upin which system you are trying to hack... sometimes we know going in which we are going to use, and sometimes we do not,... I thas wroked very well for us...

Keep the Faith
Go to the top of the page
 
+Quote Post
Tymeaus Jalynsfe...
post Apr 19 2010, 04:35 PM
Post #13


Prime Runner Ascendant
**********

Group: Members
Posts: 17,568
Joined: 26-March 09
From: Aurora, Colorado
Member No.: 17,022



QUOTE (Draco18s @ Apr 19 2010, 10:19 AM) *
Right. SR wants beasts defending the dungeon, but at the same time, do away with the dungeon (see: everything is wireless, even your underwear). Means that at most paydata is 2 hops away from "you" and its trivial to avoid the beasts.

Example: hacking cyberware. Cyberware can't run IC, yet can be hacked, by RAW, wirelessly, from a distance, without going through the user's PAN (which can run IC...if their comlink isn't the el cheapo 1/1).


Just 2 Hops? Really? I do not see that myself...

Cyberware can't run IC? Really? it is a peripheral node that can be clusterd, so I would say that it CAN run IC if configured properly (and since it can contain a DataBomb on its access node (assumming that it is wireless), I do not see why it could not contain something else)... and as for the Hacking of the "ware, If you disable all of the Wireless (Doable by RAW) then you cannot hack it at all... and if you never integrated the 'ware into your PAN, then you cannot get to it that way either... so I am not sure what your point is in that example...

Keep the Faith
Go to the top of the page
 
+Quote Post
Eratosthenes
post Apr 19 2010, 04:44 PM
Post #14


Moving Target
**

Group: Members
Posts: 356
Joined: 3-April 10
Member No.: 18,409



QUOTE (Draco18s @ Apr 19 2010, 11:19 AM) *
Right. SR wants beasts defending the dungeon, but at the same time, do away with the dungeon (see: everything is wireless, even your underwear). Means that at most paydata is 2 hops away from "you" and its trivial to avoid the beasts.

Example: hacking cyberware. Cyberware can't run IC, yet can be hacked, by RAW, wirelessly, from a distance, without going through the user's PAN (which can run IC...if their comlink isn't the el cheapo 1/1).


Cyberware operates in hidden mode, meaning that to connect to it wirelessly, you'd need to be in mutual signal range.

Since cyberware has a signal of 1...you can't exactly hack it from anywhere.

(You would have to first hack their commlink)
Go to the top of the page
 
+Quote Post
Draco18s
post Apr 19 2010, 04:58 PM
Post #15


Immortal Elf
**********

Group: Members
Posts: 10,289
Joined: 2-October 08
Member No.: 16,392



QUOTE (Tymeaus Jalynsfein @ Apr 19 2010, 11:35 AM) *
Just 2 Hops? Really? I do not see that myself...


Park the van across the street or down the block. Van -> nearby node -> target.

QUOTE (Eratosthenes @ Apr 19 2010, 11:44 AM) *
Cyberware operates in hidden mode, meaning that to connect to it wirelessly, you'd need to be in mutual signal range.


Or hack something that's in mutual range of it. Say...the vending machine, that dude's shirt, the water fountain....there's no penalty for doing that, you know. And there's a bonus: harder to trace!

And hidden mode doesn't have any effect on signal range.

QUOTE (Eratosthenes @ Apr 19 2010, 11:44 AM) *
Since cyberware has a signal of 1...you can't exactly hack it from anywhere.


Signal rating 1 gives 40 meters. There's a lot of places you can be that's 40 meters away and avoid getting shot/seen/stabbed. There's also a lot of stuff between me and the target where each object is less than 40 meters away from the next that has a signal of 1.
Go to the top of the page
 
+Quote Post
Minchandre
post Apr 19 2010, 05:12 PM
Post #16


Moving Target
**

Group: Members
Posts: 368
Joined: 18-April 10
From: Boulder, PCC Sector, Denver
Member No.: 18,468



I'm very sad that no one's pointed out the primary implication of stronger encryption to the average 'runner: a proliferation of lead-pipe decryption methods.
Go to the top of the page
 
+Quote Post
nezumi
post Apr 19 2010, 05:26 PM
Post #17


Incertum est quo loco te mors expectet;
*********

Group: Dumpshocked
Posts: 6,546
Joined: 24-October 03
From: DeeCee, U.S.
Member No.: 5,760



Note that I use SR3.


My assumption is that, because of the size and speed of data transferred for ASIST technology makes conventional encryption uneconomical (because of the lag it would cause). For my SR game, I wrote the following:


Encryption is a huge issue all on its own. In the real world, any encryption that can be broken in 5 minutes using COTS gear is trash. On the flip side, not allowing encrypted transmissions to be broken fairly easily makes decking far, far more difficult and time-consuming. This is something I've been considering for a while. I'm definitely open to thoughts on this. Generally what I've settled on is there are three basic types of encryption:

1) 1:Many, high-throughput encryption- this is what a matrix server uses. As it must cater to very, very many users and has to transmit a lot of information very quickly, it has all sorts of difficulties establishing who precisely you are, settling on encryption algorithms and encrypting and decrypting almost instantaneously. Because of these difficulties, a decker can break in with some know-how and the right tools.

2) File encryption - this is low-throughput and presumably has fewer users, all of whom already possess a shared secret like a password. This is more like conventional encryption on files. It takes time to break, sometimes a lot of time, but it's not unbeatable. A decker won't want to decrypt a file on the host because of how time-consuming it is, but he may download the file and decrypt it at his leisure.

3) 1:1, high-throughput encryption - this is what riggers generally use. Because a rigger has physical access to the device, she can install firmware like a one-time-pad which greatly increases encryption strength. If this is possible to break, it is extremely difficult and not especially expensive to install.

Shadowrun gets sort of weird in that it has a dozen different types of encryption, with different rules for each, but without any real understanding of why they're different. I think if we established the different methods, you could use them as appropriate and allow for crossover without a lot of fuss. A system may use encryption method #1 for its drones because it has a hundred people who each have to log in to a thousand specialized drones. Meanwhile, a matrix host may use #3 encryption because it's a restricted access host that only has a few users. Your own commlinks might use #1 or #3, but each one has its own special requirements in order to work. If you use #3, you can't interface with anyone until you've physically had time to fool with their device, and everyone is limited to the lowest-rating encryption in the group. If you're using #1, it's a lot more dynamic, but easier to crack.

Go to the top of the page
 
+Quote Post
Sengir
post Apr 19 2010, 05:49 PM
Post #18


Great Dragon
*********

Group: Dumpshocked
Posts: 5,088
Joined: 3-October 09
From: Kohle, Stahl und Bier
Member No.: 17,709



QUOTE (Draco18s @ Apr 19 2010, 04:58 PM) *
Or hack something that's in mutual range of it. Say...the vending machine, that dude's shirt, the water fountain....

Why hack it? Routing is done automatically, as long as some device (in active mode) is in range of a device that's in range of a device in range of your target you have a connection.


But as far as cyberware is concerned: All implants have DNI, so why bother to switch on the wireless function in public?
Go to the top of the page
 
+Quote Post
Draco18s
post Apr 19 2010, 05:51 PM
Post #19


Immortal Elf
**********

Group: Members
Posts: 10,289
Joined: 2-October 08
Member No.: 16,392



QUOTE (Sengir @ Apr 19 2010, 12:49 PM) *
Why hack it? Routing is done automatically, as long as some device (in active mode) is in range of a device that's in range of a device in range of your target you have a connection.


Voila. Dungeon removed.

QUOTE
But as far as cyberware is concerned: All implants have DNI, so why bother to switch on the wireless function in public?


Because by RAW it is. All the time. There is in fact a side panel about turning it off.
Go to the top of the page
 
+Quote Post
Bira
post Apr 19 2010, 06:05 PM
Post #20


Moving Target
**

Group: Members
Posts: 254
Joined: 26-February 02
Member No.: 1,768



I think it's a bit of a stretch to go from "wireless functionality can be turned off" to "it's on all the time, for everything!". I see the side panels and other explanations as the authors going out of their way to explain that people aren't stupid (at least, not the people shadowrunners are likely to target). They're not going to leave wireless networks hanging out wily-nilly. In fact, one of the specific design goals of the new Matrix system is to make the really juicy hosts hard to access remotely, thus making the group's hacker have to go in and mix it up along with the rest of the team. Those secure servers are going to either be off the airwaves entirely, or will have their wireless networks sharply limited by radio-blocking paint and other similar measures, if they absolutely must have Wi-Fi.
Go to the top of the page
 
+Quote Post
Draco18s
post Apr 19 2010, 06:15 PM
Post #21


Immortal Elf
**********

Group: Members
Posts: 10,289
Joined: 2-October 08
Member No.: 16,392



QUOTE (Bira @ Apr 19 2010, 01:05 PM) *
I see the side panels and other explanations as the authors going out of their way to explain that people aren't stupid [...] Those secure servers are going to either be off the airwaves entirely, or will have their wireless networks sharply limited by radio-blocking paint and other similar measures, if they absolutely must have Wi-Fi.


The authors intentionally made it easier to target a secure location without being on-site, then wrote sidebars on how that's not the case?

That seems...counter-productive.

I also love how the authors seem to think that wifi--which is for ease of access from anywhere, and inherently less secure--is PERFECT for security devices. It's like taking your classic CC TV (that stands for "closed circuit television" which means its not on the 'net which means it is simply NOT HACKABLE from the outside) and putting it on wireless, and then having rules that say that any wireless device can connect to any other wireless device (provided signal range). That means that your CEO's personal computer is on the same network as the door lock on the front of the building which is on the same network as the coffee shop across the street, which is....

You get the idea. They intentionally made everything easier to access from the matrix, didn't put in any of the Domain boundaries that exist in the real world, and then had to go "waitaminute" and whip up some half-assed explanation on why it doesn't work that way (wifi-inhibiting paint in every room, which means that the security camera can't talk to the main security server...oh, well, maybe we need something else too. Uh, encryption...wait, that's trivial to break. Um...).

They took out the dungeon (the matrix map) in favor of "automatic routing" and then had to bullshit a reason why you can't just hack anything from anywhere adding the dungeon back in.
Go to the top of the page
 
+Quote Post
sunnyside
post Apr 19 2010, 06:19 PM
Post #22


Neophyte Runner
*****

Group: Members
Posts: 2,344
Joined: 31-December 06
Member No.: 10,502



QUOTE (kjones @ Apr 19 2010, 09:37 AM) *
This cipher is unbreakable because while I could try guessing different keys and seeing if I get "dumpshock" back, I would only know that's the correct answer if I knew it going in - "eplxadppp" could also mean "kjonesroxx" or "iluvdandd" or anything, and there's no way of knowing. (Assuming that the key generated was perfectly random.)



While that's true, only one of those will make the rest of the text or whatever come out legible.

If you presume the existance of quantum computers they may be able to crack all sorts of stuff simply be requiring the system to collapse into something that matches a known language. I'm not sure how in the world to actually do that, but it would seem to be within the realm of theoretical possibility... At the least I've seen people writing about quantum computers being able to bust the classic prime # problem that way.

However, in the end it comes down to us knowing a lot less about this stuff than the Hackers, Deckers, or Otaku.

Imagine people in our past an equal distance to where SR is set in the future. I think that's what, 63 years now? So that'd be 1947. Stuff that was probably considered ubreakable without capture of a machine would be eaten for breakfast by modern computers. The people of that era would probably have a hard time wrapping their heads around what our desktops can do.

So, given that we can't really know what things are going to be like in encryption, we might as well select something that's fun (IMG:style_emoticons/default/smile.gif)


Also, since I was thinking about it, one time pads might be hard to use in SR because of the realities of interferance and the hacker sending in their own signals. The security of a one time pad is based on a lot of assumptions, and when you start doing things like resending, responding to everything in the air, or resorting to pseudorandom numbers stuff starts breaking down.

Go to the top of the page
 
+Quote Post
Sengir
post Apr 19 2010, 06:28 PM
Post #23


Great Dragon
*********

Group: Dumpshocked
Posts: 5,088
Joined: 3-October 09
From: Kohle, Stahl und Bier
Member No.: 17,709



QUOTE (Draco18s @ Apr 19 2010, 05:51 PM) *
Voila. Dungeon removed.

Well, the dungeon in removed (that's why I dislike the subscription rules - I again have to design a dungeon, but only for my PAN?), but the big bad monster (aka "the badass IC") guarding the door to the treasure is still there.


QUOTE
Because by RAW it is. All the time.

By RAW most cyberware has some wireless capacity...but who the hell would want to keep that active? And even if it is active, it should still be slaved to your 'link (and if you are lucky, that 'link is slaved to the TM's bionode (IMG:style_emoticons/default/wink.gif) )
Go to the top of the page
 
+Quote Post
Draco18s
post Apr 19 2010, 06:33 PM
Post #24


Immortal Elf
**********

Group: Members
Posts: 10,289
Joined: 2-October 08
Member No.: 16,392



QUOTE (sunnyside @ Apr 19 2010, 01:19 PM) *
While that's true, only one of those will make the rest of the text or whatever come out legible.


Actually, no. It comes out legible for every 9 letter word.

And there's a lot of those.

Also: when encrypting more data, you don't encrypt just the letters. You encrypt the spaces and punctuation too (requires 92 encrypt-able characters, IIRC*). Add in an additional number of standard (but not on the keyboard) characters and you get 114.** Bump that up to 128 and you can encrypt any stream of data, parsed into 7 bits each, though likely you'd hop up to 8 bits so each encryption character is a nice even byte in size.

*26 letters *2 + 10 numbers = 62.
+10 number-key symbols = 72
11 additional dual-symbol keys * 2 = 22
72 + 22 = 94.

So close. Off by 2.

**Basing this number off Flash's embed font option. Upper, lower, number, and symbol total to 114 characters.
Go to the top of the page
 
+Quote Post
Bira
post Apr 19 2010, 06:37 PM
Post #25


Moving Target
**

Group: Members
Posts: 254
Joined: 26-February 02
Member No.: 1,768



I figure that the prevalence of "easy" wireless connections applies more to the day-to-day lives of people in the Sixth World than to the hypothetical ultra-secure facility we all like to use in our examples. That place is certainly not going to bother with wireless connections for anything that doesn't absolutely require it. If all the camera feeds go into a central server, which is itself behind a RF-inhibiting barrier, then of course they're connected to it by hard lines rather than wi-fi.

The cutting edge in security doesn't have to be old-fashioned, centrally controlled CCTV cameras, though. You could also have a place liberally sprinkled with tiny sensors of varied types linked into a mesh network with all the drones and guards patrolling the area, protected by a dramatically appropriate level of encryption (see my first post here). It's all behind its own RF barrier, of course, so you have to get into the sensors' range before you can hack them. There isn't a single place you can hack to take control of the whole network, either, which would be the case with the camera server.

Pervasive wireless networking opens up new applications, but the people that design security systems aren't going to use it for those applications where wired networks are obviously better. That's plain common sense, IMHO. The game does give you some chances to shoot yourself in the foot when it comes to wireless security, but it doesn't mean everyone will jump at those (IMG:style_emoticons/default/smile.gif) .
Go to the top of the page
 
+Quote Post
kzt
post Apr 19 2010, 07:18 PM
Post #26


Great Dragon
*********

Group: Members
Posts: 5,537
Joined: 27-August 06
From: Albuquerque NM
Member No.: 9,234



QUOTE (Brazilian_Shinobi @ Apr 19 2010, 10:09 AM) *
Of course, Shadowrun gives the impression that P=NP and someone reliably proved this, making possible black boxes capable of actual non-deterministic computation. This would be a lot of pain for the scientists of today to create a new way of making data secure. Of course, this would be boring and SR adopted the network/dungeon approach, where there are "beasts" defending the "dungeon".

What that means, essentially, is that all the things we thought were really, really hard are really trivially simple. So that means you can have 6 month weather forecasts that are as accurate as the modern 2 day forecast. And things like matching fragmentary evidence solidly to a suspect? Child's play. Predicting where a shadowrunner will strike? Got that covered too.
Go to the top of the page
 
+Quote Post
kzt
post Apr 19 2010, 07:20 PM
Post #27


Great Dragon
*********

Group: Members
Posts: 5,537
Joined: 27-August 06
From: Albuquerque NM
Member No.: 9,234



QUOTE (Minchandre @ Apr 19 2010, 11:12 AM) *
I'm very sad that no one's pointed out the primary implication of stronger encryption to the average 'runner: a proliferation of lead-pipe decryption methods.

It's technically called Rubber-hose cryptanalysis.
Go to the top of the page
 
+Quote Post
Tymeaus Jalynsfe...
post Apr 19 2010, 07:25 PM
Post #28


Prime Runner Ascendant
**********

Group: Members
Posts: 17,568
Joined: 26-March 09
From: Aurora, Colorado
Member No.: 17,022



QUOTE (Draco18s @ Apr 19 2010, 10:58 AM) *
Park the van across the street or down the block. Van -> nearby node -> target.



I see it a more, Van > Nearby Node > Target Public Access Node > Access to the Non-Public Node > Search around in various Nodes > until you find the Paydata Node...

Minimum of 6 Nodes, and possibly even more...
Anything else is just a simplified Matrix Hack (1,2,3)... Nothing wrong with that, but I just prefer my matrix nodes to be a little more challenging, and possibly mimic a network that is not open to just anyone... Sometimes you will only need a Public Node for what you intend, but you cannot always count on that...

And on the other topic, If yuo have implanted cyberware that has signal rating 1 enabled, you deserve to be hacked... And I was under the impression that it was Signal 0 not Signal 1 anyways... even at Signal 1 (3 Meters) you deserve to be hacked... Turn that stuff off/Disable it entirely... it is not needed.

Keep the Faith
Go to the top of the page
 
+Quote Post
Draco18s
post Apr 19 2010, 07:27 PM
Post #29


Immortal Elf
**********

Group: Members
Posts: 10,289
Joined: 2-October 08
Member No.: 16,392



QUOTE
It's technically called Rubber-hose cryptanalysis.


Also Black Bag Cryptanalysis

QUOTE
I see it a more, Van > Nearby Node > Target Public Access Node > Access to the Non-Public Node > Search around in various Nodes > until you find the Paydata Node...

Minimum of 6 Nodes, and possibly even more...
Anything else is just a simplified Matrix Hack (1,2,3)... Nothing wrong with that, but I just prefer my matrix nodes to be a little more challenging, and possibly mimic a network that is not open to just anyone... Sometimes you will only need a Public Node for what you intend, but you cannot always count on that...



Ah, but that's personal preference. There's nothing in the rules that says it has to be that way.

(Edit note: apparently in quick-edit, if there's a BBCode tag error, it turns all your ' into \' )
Go to the top of the page
 
+Quote Post
kzt
post Apr 19 2010, 07:29 PM
Post #30


Great Dragon
*********

Group: Members
Posts: 5,537
Joined: 27-August 06
From: Albuquerque NM
Member No.: 9,234



QUOTE (sunnyside @ Apr 19 2010, 12:19 PM) *
If you presume the existance of quantum computers they may be able to crack all sorts of stuff simply be requiring the system to collapse into something that matches a known language. I'm not sure how in the world to actually do that, but it would seem to be within the realm of theoretical possibility... At the least I've seen people writing about quantum computers being able to bust the classic prime # problem that way.

No, the output of random keys will be random text. Some of it will make sense due to chance. It's the Infinite monkey theorem. Whether "Romeo and Juliet" was what was put in by the original encoder there is going to be at least one key that will have it as the output.

The issue with OTPs is the practical generation and operational usage, not the theory. The KGB used OTP to communicate with their US agents, and due to operational mistakes, many messages were successfully attacked as part of the Venona project.
Go to the top of the page
 
+Quote Post
Tymeaus Jalynsfe...
post Apr 19 2010, 07:31 PM
Post #31


Prime Runner Ascendant
**********

Group: Members
Posts: 17,568
Joined: 26-March 09
From: Aurora, Colorado
Member No.: 17,022



QUOTE (Draco18s @ Apr 19 2010, 01:27 PM) *
Also Black Bag Cryptanalysis

Ah, but that's personal preference. There's nothing in the rules that says it has to be that way.


I will grant you that it is personal preference, but it Should be that way in my opinion. Most RL systems are designed that way, and I do not see that changing in the game, it is just good practice... Shadowrun had to make some allowances to make the Hacker a viable option (Thus the Ecnryption thing every body hates), but that does not mean that the system architecture should be dumbed down right along with it...

Keep the Faith
Go to the top of the page
 
+Quote Post
Eratosthenes
post Apr 19 2010, 07:32 PM
Post #32


Moving Target
**

Group: Members
Posts: 356
Joined: 3-April 10
Member No.: 18,409



QUOTE (Draco18s @ Apr 19 2010, 11:58 AM) *
And hidden mode doesn't have any effect on signal range.


You're right. Hidden mode does not affect signal range. But it does prevent you from accessing said node from the matrix at large.

You have to be in mutual signal range to communicate with a device. Otherwise, one of the devices can send signals, but you won't get any feedback/confirmation. So a Signal 6 commlink and a Signal 0 cyberarm must be within the cyberarm's Signal 0 range.



QUOTE (Draco18s @ Apr 19 2010, 11:58 AM) *
Signal rating 1 gives 40 meters. There's a lot of places you can be that's 40 meters away and avoid getting shot/seen/stabbed. There's also a lot of stuff between me and the target where each object is less than 40 meters away from the next that has a signal of 1.


Looking it up just now, most cyberware (and things like smartlinks) have a signal of 0, which is a range of about 1 meter.
Go to the top of the page
 
+Quote Post
Tymeaus Jalynsfe...
post Apr 19 2010, 07:43 PM
Post #33


Prime Runner Ascendant
**********

Group: Members
Posts: 17,568
Joined: 26-March 09
From: Aurora, Colorado
Member No.: 17,022



QUOTE (Eratosthenes @ Apr 19 2010, 01:32 PM) *
You're right. Hidden mode does not affect signal range. But it does prevent you from accessing said node from the matrix at large.

You have to be in mutual signal range to communicate with a device. Otherwise, one of the devices can send signals, but you won't get any feedback/confirmation. So a Signal 6 commlink and a Signal 0 cyberarm must be within the cyberarm's Signal 0 range.

Looking it up just now, most cyberware (and things like smartlinks) have a signal of 0, which is a range of about 1 meter.


Not sure where you looked but my copy of the book lists Signal 0 as 3 meters... Page 222 of the SR4A book...

Keep the Faith
Go to the top of the page
 
+Quote Post
Demonseed Elite
post Apr 19 2010, 07:45 PM
Post #34


Neophyte Runner
*****

Group: Members
Posts: 2,078
Joined: 26-February 02
Member No.: 67



It's possible there's an error somewhere about cyberware having a Signal Rating of 1. If I recall correctly, in the first printing of SR4, it said cyberware was Signal 0 in one place and Signal 1 in the other.

This was because during early playtesting, there was no Signal 0. I argued strongly for it because I didn't feel intra-PAN devices should be broadcasting for 40 meters (or whatever Signal 1 is, I forget).
Go to the top of the page
 
+Quote Post
Draco18s
post Apr 19 2010, 07:48 PM
Post #35


Immortal Elf
**********

Group: Members
Posts: 10,289
Joined: 2-October 08
Member No.: 16,392



QUOTE (Eratosthenes @ Apr 19 2010, 02:32 PM) *
You're right. Hidden mode does not affect signal range. But it does prevent you from accessing said node from the matrix at large.


Not really. You just need to make a scan test* to see that it's there, and if you can see it in meatspace you get a bonus to the check. Once you can see the node you can hack it.

*I forget what it is called
Go to the top of the page
 
+Quote Post
kjones
post Apr 19 2010, 07:50 PM
Post #36


Moving Target
**

Group: Members
Posts: 332
Joined: 15-February 10
From: CMU
Member No.: 18,163



I recognize that Shadowrun is just a game, and that realism and playability are often mutually exclusive. This happens to bug me because I know a bit about cryptography - if I knew about guns, I'm sure that the gun rules would bother me.
Go to the top of the page
 
+Quote Post
Tymeaus Jalynsfe...
post Apr 19 2010, 07:57 PM
Post #37


Prime Runner Ascendant
**********

Group: Members
Posts: 17,568
Joined: 26-March 09
From: Aurora, Colorado
Member No.: 17,022



QUOTE (Demonseed Elite @ Apr 19 2010, 01:45 PM) *
It's possible there's an error somewhere about cyberware having a Signal Rating of 1. If I recall correctly, in the first printing of SR4, it said cyberware was Signal 0 in one place and Signal 1 in the other.

This was because during early playtesting, there was no Signal 0. I argued strongly for it because I didn't feel intra-PAN devices should be broadcasting for 40 meters (or whatever Signal 1 is, I forget).



No Problems... Thanks for the Insight...
I agree, Intra-PAN devices should not broadcast at 40 Meters... ridiculous indeed...

Keep the Faith
Go to the top of the page
 
+Quote Post
Tymeaus Jalynsfe...
post Apr 19 2010, 07:58 PM
Post #38


Prime Runner Ascendant
**********

Group: Members
Posts: 17,568
Joined: 26-March 09
From: Aurora, Colorado
Member No.: 17,022



QUOTE (kjones @ Apr 19 2010, 01:50 PM) *
I recognize that Shadowrun is just a game, and that realism and playability are often mutually exclusive. This happens to bug me because I know a bit about cryptography - if I knew about guns, I'm sure that the gun rules would bother me.



I have to agree with you kjones...

I know a fair bit about weapons, and the rules do bug me a bit... but you are right... it is a game, and sometimes reality needs to take a hit to make the game playable...

Keep the Faith
Go to the top of the page
 
+Quote Post
D2F
post Apr 19 2010, 08:00 PM
Post #39


Moving Target
**

Group: Members
Posts: 765
Joined: 28-December 09
Member No.: 18,001



QUOTE (kjones @ Apr 19 2010, 07:50 PM) *
if I knew about guns, I'm sure that the gun rules would bother me.

Yes, they would =) As would the damage rules in general.
The point is, though, that the rules aren't meant to be a realistic representation, but an abstract one. An abstract one meant for cinematic entertainment, no less. A purely realistic SR would not be fun for a large number of current SR players.
Go to the top of the page
 
+Quote Post
Tymeaus Jalynsfe...
post Apr 19 2010, 08:01 PM
Post #40


Prime Runner Ascendant
**********

Group: Members
Posts: 17,568
Joined: 26-March 09
From: Aurora, Colorado
Member No.: 17,022



QUOTE (D2F @ Apr 19 2010, 02:00 PM) *
Yes, they would =) As would the damage rules in general.
The point is, though, that the rules aren't meant to be a realistic representation, but an abstract one. An abstract one meant for cinematic entertainment, no less. A purely realistic SR would not be fun for a large number of current SR players.


Ain't that the truth...

Keep the Faith
Go to the top of the page
 
+Quote Post
kzt
post Apr 19 2010, 08:03 PM
Post #41


Great Dragon
*********

Group: Members
Posts: 5,537
Joined: 27-August 06
From: Albuquerque NM
Member No.: 9,234



The critical fail in a lot of the rules isn't that they are not realistic, it's that the people writing them don't know what reality is. For example, if you don't understand that the reason why people can transmit money across the internet is because of effectively unbreakable encryption and instead think that the only use for encryption is securing "secret files" you'd write something like SR4.
Go to the top of the page
 
+Quote Post
D2F
post Apr 19 2010, 08:33 PM
Post #42


Moving Target
**

Group: Members
Posts: 765
Joined: 28-December 09
Member No.: 18,001



QUOTE (kzt @ Apr 19 2010, 08:03 PM) *
The critical fail in a lot of the rules isn't that they are not realistic, it's that the people writing them don't know what reality is. For example, if you don't understand that the reason why people can transmit money across the internet is because of effectively unbreakable encryption and instead think that the only use for encryption is securing "secret files" you'd write something like SR4.

While that is certainly true (especially when it comes to things like Cyberware and Bioware) it's not exactly the point, though. Just like good action movies, the dramatization is more important than the realism. All you need is to achieve a suspension of disbelief. Some shows/movies achieved that even despite their blatant ignorance of even the most basic scientific facts (Star Trek), other by ignoring science alltogether and simply presenting a believeable reality (star wars) and some even combine a good dose of realism with pure cinematc drama (Bourne Identity). The point of any cinematic entertainment is not realism, but personal drama and contest. The struggle of the individual through all the hazards and trials on the way.
Have a look at "hacking" in movies. Not the SR kind of hacking, but ANY hacking. I don't know of even a single Movie that depicted hackers in something even remotely realistic. Why? Because watching a guy probe a system for weeks is boring beyond belief. Same goes for weapon knockdown. You ever seen how far a real bullet would propel a hit target through the air? Compare that to cinematic action scenes.
And it's not just that, either. The target audience, primed through decades of action movies have a certain expectation to what they consider "realistic", even if some of those expectations are so far off the mark to be laughable. But they want to be their own action movie superstar, pulling off all the stunts they have seen their favorite action hero perform. Any RPG rules need to allow that, or they would be unsatisfying for a lot of potential customers. And unsatisfied customers don't buy products.
The RPG industry is an entertainment industry and as such needs to entertain. If they fail to entertain, they fail at their purpose. Realism is the realm of simulators and while the simulator industry is a giant in itself, it is not related to the RPG industry, nor their customers.

That all said, there is a small (and I need to stress "small" in this context) part of the SR community that love realism more than cinematic action. I count myself among them. We adjust rules that need adjusting. We play with character and adventure concepts that fit our view of what we consider "realistic" and we invest a lot of time in researching how to be a "shadowrunner", by looking at real special ops, real spies and real weaponry to see how they act and behave in such a situation. We also look at realistic payouts, but that's a different story alltogether.
We cannot criticize the rules for their lack of realism, though. The game is not meant to be realistic. A lot of people would not enjoy it, if it were realistic. And most people would bore themselves to death having realistic hacking rules. A game that is not fun is not entertainment. A game that defies basic logic makes supension of disbelief difficult, though, so a proper balance needs to be achieved.
Go to the top of the page
 
+Quote Post
Draco18s
post Apr 19 2010, 08:34 PM
Post #43


Immortal Elf
**********

Group: Members
Posts: 10,289
Joined: 2-October 08
Member No.: 16,392



QUOTE (kzt @ Apr 19 2010, 03:03 PM) *
it's that the people writing them don't know what reality is. For example, if you don't understand that the reason why people can transmit money across the internet is because of effectively unbreakable encryption and instead think that the only use for encryption is securing "secret files" you'd write something like SR4.


Oh yeah. You can't "print" money in ShadowRun because of the super-awesome encryption, yet the device rating of a credstick is very low. Not to mention spoofing the stick into thinking is has money. And...and...and...

Yeah. You make a system where "everything is hackable" except the things that should never be hackable (money, banks, SINs) and then provide 0 rules to allow anybody else to secure anything to that level.

And then you get people like my GM who found the Four Programs to Comlink Security:

Analyze, Black Hammer, Armor, Agent. You get an agent, give it armor, analyze, and black hammer. If it sees something (which it will, with its high dice pool) it smacks it with black hammer, forcing the hacker into a cybercomat they can't win.
Go to the top of the page
 
+Quote Post
Dixie Flatline
post Apr 19 2010, 08:56 PM
Post #44


Moving Target
**

Group: Members
Posts: 110
Joined: 22-February 10
Member No.: 18,190



I don't have a problem sacrificing realism for game play and balance. In fact, just the opposite.

However, I *do* have a problem sacrificing common sense for gameplay "flavor". RAW, matrix rules mean that the entire economy of Shadowrun would collapse under mega-inflation within months, since essentially *everything* is hackable within a few moments. This requires no computer knowledge to realize the conclusion.

If you want to actually include nebbish "real world" complaints, the idea of a "flat" Matrix topology makes me want to scream in agony. Routing requires routing tables, pure and simple. In order to route data from point A to point B, you have to know where to send the data. Which means you need "next hop" information. In a tiered network, this is trivial. You let core routers do all the real heavy routing and everything else has a handful of "next hop" entries for major categories of traffic.

The more flat your topology gets, the more entries each router needs to have. There's a command in Cisco routers that turns your router into a supernode, which means, essentially, it downloads a major portion of the topology of the internet. Unless you have a core router capable of 100,000 routing entries, your router is going to crash horribly. And that's for a tiered structure. With the flat wireless matrix topology, a supernode probably would have hundreds of millions, if not billions, of routing tables. Since the Matrix is a wireless full mesh topography, that means each node, from the vending machine to the supercomputer running Seattle's matrix, needs to have an immensely large routing table, since any node could transmit and relay any amount of data, at any time, to anywhere on the matrix.

That has to be one motherf*cking HELL of a routing protocol to process something even approaching full VR to wherever it needs to go with minimal latency.

I know the argument... "but hardware has advanced in SR to the point where that's possible". Okay, sure, but the computation power of something like that has to be *non* trivial, and switching to a tiered system where every comlink didn't have to sort through a billion routing entries to make an efficient connection for each packet of data would open up that non-trivial computational power so that you could use it for something else.

I could design, in probably 3-5 pages, a matrix topology that relies heavily on wireless, that makes sense from a computer user's point of view. A lot of things would be different about the matrix, but you wouldn't have people asking "sh*t, why don't I just forge craploads of credsticks?"
Go to the top of the page
 
+Quote Post
Draco18s
post Apr 19 2010, 09:07 PM
Post #45


Immortal Elf
**********

Group: Members
Posts: 10,289
Joined: 2-October 08
Member No.: 16,392



QUOTE (Dixie Flatline @ Apr 19 2010, 03:56 PM) *
I could design, in probably 3-5 pages, a matrix topology that relies heavily on wireless, that makes sense from a computer user's point of view. A lot of things would be different about the matrix, but you wouldn't have people asking "sh*t, why don't I just forge craploads of credsticks?"


Do it. I might actually start liking the Matrix again.
Go to the top of the page
 
+Quote Post
D2F
post Apr 19 2010, 09:12 PM
Post #46


Moving Target
**

Group: Members
Posts: 765
Joined: 28-December 09
Member No.: 18,001



QUOTE (Dixie Flatline @ Apr 19 2010, 08:56 PM) *
I could design, in probably 3-5 pages, a matrix topology that relies heavily on wireless, that makes sense from a computer user's point of view. A lot of things would be different about the matrix, but you wouldn't have people asking "sh*t, why don't I just forge craploads of credsticks?"

Please do it, then. And post it, so I can use it, too. (IMG:style_emoticons/default/biggrin.gif)
Go to the top of the page
 
+Quote Post
nylanfs
post Apr 19 2010, 09:19 PM
Post #47


Moving Target
**

Group: Members
Posts: 366
Joined: 10-November 08
Member No.: 16,576



I would LOVE to see that as well.
Go to the top of the page
 
+Quote Post
Minchandre
post Apr 19 2010, 09:24 PM
Post #48


Moving Target
**

Group: Members
Posts: 368
Joined: 18-April 10
From: Boulder, PCC Sector, Denver
Member No.: 18,468



QUOTE (Dixie Flatline @ Apr 19 2010, 01:56 PM) *
I could design, in probably 3-5 pages, a matrix topology that relies heavily on wireless, that makes sense from a computer user's point of view. A lot of things would be different about the matrix, but you wouldn't have people asking "sh*t, why don't I just forge craploads of credsticks?"


I'm a computer (okay, electrical) engineer, specializing in signal processing and communications; I might be able to lend a hand if you want.
Go to the top of the page
 
+Quote Post
Synner667
post Apr 19 2010, 09:27 PM
Post #49


Moving Target
**

Group: Members
Posts: 946
Joined: 16-September 05
From: London
Member No.: 7,753



QUOTE (Dixie Flatline @ Apr 19 2010, 09:56 PM) *
However, I *do* have a problem sacrificing common sense for gameplay "flavour".

That's it, exactly.

It's not about computer networks being realistic, as in they would work in the realworld...
...It's the handwavium nature of "nah, it doesn't have to be sensible, vaguely consistent or blatantly non-stupid. just do it"
Go to the top of the page
 
+Quote Post
D2F
post Apr 19 2010, 09:30 PM
Post #50


Moving Target
**

Group: Members
Posts: 765
Joined: 28-December 09
Member No.: 18,001



QUOTE (Synner667 @ Apr 19 2010, 09:27 PM) *
It's not about computer networks being realistic, as in they would work in the realworld...
...It's the handwavium nature of "nah, it doesn't have to be sensible, vaguely consistent or blatantly non-stupid. just do it"


QUOTE (Dixie Flatline @ Apr 19 2010, 08:56 PM) *
I don't have a problem sacrificing realism for game play and balance. In fact, just the opposite.

However, I *do* have a problem sacrificing common sense for gameplay "flavor".


Yet, none of you have a problem with healing in SR?
Go to the top of the page
 
+Quote Post
Tymeaus Jalynsfe...
post Apr 19 2010, 09:43 PM
Post #51


Prime Runner Ascendant
**********

Group: Members
Posts: 17,568
Joined: 26-March 09
From: Aurora, Colorado
Member No.: 17,022



QUOTE (Draco18s @ Apr 19 2010, 02:34 PM) *
And then you get people like my GM who found the Four Programs to Comlink Security:

Analyze, Black Hammer, Armor, Agent. You get an agent, give it armor, analyze, and black hammer. If it sees something (which it will, with its high dice pool) it smacks it with black hammer, forcing the hacker into a cybercomat they can't win.


That works against anything that is not a Agent... or a technomancer...

And since it is a contested roll (Matrix Perception vs the Hackers Stealth + Hacking roll) that agent of yours (his) may NOT notice the Hacker...

Just sayin...

Keep the Faith
Go to the top of the page
 
+Quote Post
Ascalaphus
post Apr 19 2010, 09:52 PM
Post #52


Runner
******

Group: Members
Posts: 2,899
Joined: 29-October 09
From: Leiden, the Netherlands
Member No.: 17,814



I haven't seen anyone mentioning the possibilities of the near-infinite storage capacity in SR4 combined with one-time pads.. you could plausibly have enough one-time pads on any one device to never run out. At least not before the device is scrapped due to the same kind of planned obsolescence that gave us program degradation.
Go to the top of the page
 
+Quote Post
TomDowd
post Apr 19 2010, 10:01 PM
Post #53


Shadowrun Co-Creator
*

Group: Members
Posts: 39
Joined: 5-February 08
From: Chicago, Illinois
Member No.: 15,644



There is no question that the Matrix rules in SR are completely "Gibsonian" in nature and utterly bogus. This was a deliberate decision on the part of the original designers. We started out with a much more realistic 'simulation' of late 1980's network topology and security, filtered through an admittedly shallow lens of what seventy years of technology change would bring, and ultimately it wasn't any fun to play. (And we knew of what we modeled since one of the early authors worked for a megacorp dealing with just those issues.)

Whomever upthread said that the SR Matrix rules were written to play out like an action movie is spot on. During my tenure (I cannot speak to what occurred afterward) the Matrix rules were probably our least successful rules set. There were a variety of reasons for this, but the primary reason was our inability to translate a primarily visual/sensorial experience into dice, tables, and goofy rules.

If you think that your SR game, and more importantly your players, would benefit from a "more realistic, less hand-wavey" system, go for it!

Tom Dowd
Go to the top of the page
 
+Quote Post
Mongoose
post Apr 19 2010, 10:02 PM
Post #54


Moving Target
**

Group: Members
Posts: 588
Joined: 26-February 02
Member No.: 227



I don't see that you need to keep a list of the routing to everything on the matrix. You just keep a list of the things you are connected to, and they tell you what they are connected to, etc, out to some arbitrary tree depth. If what you are looking for isn't in that tree, you send a request to the device corresponding to every "leaf" in your tree, and they check their trees... etc. I doubt many devices would have more than 15 degrees of separation.
Go to the top of the page
 
+Quote Post
Draco18s
post Apr 19 2010, 10:28 PM
Post #55


Immortal Elf
**********

Group: Members
Posts: 10,289
Joined: 2-October 08
Member No.: 16,392



QUOTE (D2F @ Apr 19 2010, 04:30 PM) *
Yet, none of you have a problem with healing in SR?


Healing in SR is absurdly quick, yes. But there's a fine line between "realistic" and "practical in game terms."

I have played a game (system) that did not have magic, and your "damage track" (in SR terms) was infinitely long. You were declared dead when your penalty was so great that you couldn't succeed at anything (or if you failed the "devastating trauma" from a high-damage attack and outright died/passed out).

Long story short, my character got into a cage-fight against his boss (over three times the strength, with twice the size and toughness*) at a bar and promptly lost (almost fist to the face one-hit KO; I threw in the towel after 2 combat rounds**) I was surprisingly still on my feet after taking both punches and landing nothing. Spent over 2 months in the hospital recovering.

That became, effectively, two full months of downtime for the whole party--not because I was important, but because no one wanted to play 2 months worth of game-time with me just twiddling my thumbs.^ Thus healing--for a game perspective--has to be fairly rapid: enter medkits and First Aid healing up debilitating wounds in minutes or less.

*What would you expect to happen if a polar bear got into a fight with a large monitor lizard?
**No "initiative pass" system either, just: him, me, him, quit.
^Given that I was the only person to make every game session....I think that would have dropped "party attendance" down to two.
Go to the top of the page
 
+Quote Post
D2F
post Apr 19 2010, 10:50 PM
Post #56


Moving Target
**

Group: Members
Posts: 765
Joined: 28-December 09
Member No.: 18,001



QUOTE (Draco18s @ Apr 19 2010, 10:28 PM) *
Healing in SR is absurdly quick, yes. But there's a fine line between "realistic" and "practical in game terms."

Yet, you don't apply the same lenience towards hacking and matrix mechanics? Isn't that a double standard?
Go to the top of the page
 
+Quote Post
kjones
post Apr 19 2010, 11:44 PM
Post #57


Moving Target
**

Group: Members
Posts: 332
Joined: 15-February 10
From: CMU
Member No.: 18,163



QUOTE (Ascalaphus @ Apr 19 2010, 04:52 PM) *
I haven't seen anyone mentioning the possibilities of the near-infinite storage capacity in SR4 combined with one-time pads.. you could plausibly have enough one-time pads on any one device to never run out. At least not before the device is scrapped due to the same kind of planned obsolescence that gave us program degradation.


Actually, I did mention this, in my first post. This realization was what prompted me to start this thread in the first place.
Go to the top of the page
 
+Quote Post
Ol' Scratch
post Apr 20 2010, 12:06 AM
Post #58


Immortal Elf
**********

Group: Validating
Posts: 7,999
Joined: 26-February 02
Member No.: 1,890



The problem with the theory is that this type of 'decrpytion' simply changes from brute-force computing to brute-force fist-to-facing. It's still not unbreakable because it relies on hardware and data, and the transmission of both, to all parties involved. Intercept that, and you've 'broken' the encryption.
Go to the top of the page
 
+Quote Post
Heath Robinson
post Apr 20 2010, 12:09 AM
Post #59


Running Target
***

Group: Members
Posts: 1,263
Joined: 4-March 08
From: Blighty
Member No.: 15,736



QUOTE (Dr. Funkenstein @ Apr 20 2010, 01:06 AM) *
The problem with the theory is that this type of 'decrpytion' simply changes from brute-force computing to brute-force fist-to-facing. It's still not unbreakable because it relies on hardware and data, and the transmission of both, to all parties involved. Intercept that, and you've 'broken' the encryption.

Yeah, but everyone has the hardware (it's called a Commlink) and the data can be generated by holding your Commlink out the window to listen to audible and wireless noise for several hours. Transmitting the data is as simple as meeting in the pub since everyone is part of this great big wireless network thing. I think the books might have mentioned it once or twice.
Go to the top of the page
 
+Quote Post
Ol' Scratch
post Apr 20 2010, 12:11 AM
Post #60


Immortal Elf
**********

Group: Validating
Posts: 7,999
Joined: 26-February 02
Member No.: 1,890



QUOTE (Heath Robinson @ Apr 19 2010, 07:09 PM) *
Yeah, but everyone has the hardware (it's called a Commlink) and the data can be generated by holding your Commlink out the window to listen to audible and wireless noise for several hours. Transmitting the data is as simple as meeting in the pub since everyone is part of this great big wireless network thing. I think the books might have mentioned it once or twice.

Right. And all you have to do is mug the guy when he leaves the pub and bam, encryption broken.
Go to the top of the page
 
+Quote Post
kjones
post Apr 20 2010, 12:14 AM
Post #61


Moving Target
**

Group: Members
Posts: 332
Joined: 15-February 10
From: CMU
Member No.: 18,163



While I may have named the thread "Unbreakable Encryption" to get you all to read it, I should clarify that I never actually said this encryption was unbreakable. Rather, I said that it is unbreakable simply by intercepting the transmitted signals, which is both true and a huge improvement over stuff encrypted with Encrypt, which can usually be broken in a matter of seconds.
Go to the top of the page
 
+Quote Post
Heath Robinson
post Apr 20 2010, 12:17 AM
Post #62


Running Target
***

Group: Members
Posts: 1,263
Joined: 4-March 08
From: Blighty
Member No.: 15,736



QUOTE (Dr. Funkenstein @ Apr 20 2010, 01:11 AM) *
Right. And all you have to do is mug the guy when he leaves the pub and bam, encryption broken.


Assuming you can tell OTP key from ciphertext, sure. And know the people are exchanging an OTP key.
Go to the top of the page
 
+Quote Post
Ol' Scratch
post Apr 20 2010, 12:21 AM
Post #63


Immortal Elf
**********

Group: Validating
Posts: 7,999
Joined: 26-February 02
Member No.: 1,890



Chances are that you'll have researched that if the code is important enough to be worth the trouble of trying to break. Else, why even bother with it to begin with? Why even have the coded message exist, and why waste the time describing (to yourself or anyone else) how it works?
Go to the top of the page
 
+Quote Post
Bira
post Apr 20 2010, 12:27 AM
Post #64


Moving Target
**

Group: Members
Posts: 254
Joined: 26-February 02
Member No.: 1,768



Also, please bear in mind that the rules, unrealistic as they may be, still assume the people reading them have a modicum of common sense (IMG:style_emoticons/default/smile.gif) . You shouldn't take them too literally. Storage space in SR4 isn't literally infinite, just large enough not to matter for most applications. While I'm glad no one has to keep track of megapulses anymore, the GM still gets to say you ran out of space if you try to do absurd stuff like download the entire contents of a corporate mainframe into your portable commlink, or generating and storing enough one-time-pads to cover everything you'll ever send or receive for the rest of your life.
Go to the top of the page
 
+Quote Post
Kagetenshi
post Apr 20 2010, 12:56 AM
Post #65


Manus Celer Dei
**********

Group: Dumpshocked
Posts: 17,010
Joined: 30-December 02
From: Boston
Member No.: 3,802



QUOTE (Bira @ Apr 19 2010, 08:27 PM) *
the GM still gets to say you ran out of space if you try to do absurd stuff like download the entire contents of a corporate mainframe into your portable commlink, or generating and storing enough one-time-pads to cover everything you'll ever send or receive for the rest of your life.

No, that is precisely what the GM does not get to say—at least not without being a dick. Hidden limitations only discoverable after it's too late to plan for them need very good reasons to exist, and this just doesn't have one.

EDIT: correction, that's the mainframe issue. The OTP issue presumably doesn't occur in a difficult-to-replicate circumstance, so having not properly planned for the hidden limitation isn't as disastrous, and that limit might be ok.

~J
Go to the top of the page
 
+Quote Post
Yerameyahu
post Apr 20 2010, 01:03 AM
Post #66


Advocatus Diaboli
**********

Group: Members
Posts: 13,994
Joined: 20-November 07
From: USA
Member No.: 14,282



No, that's exactly what the GM does, because it's not hidden. The players know from the start that data is big enough to *mostly* not worry about, but also that it's not literally infinite. It's not like they'd invest in something like that first and only then be told they couldn't; there's no 'after it's too late'.
Go to the top of the page
 
+Quote Post
kjones
post Apr 20 2010, 01:14 AM
Post #67


Moving Target
**

Group: Members
Posts: 332
Joined: 15-February 10
From: CMU
Member No.: 18,163



Storage is subjective. Let's try to find some common ground by answering some questions:

-Does an average commlink have enough storage space to store an entire BTL?
-Does an average commlink have enough storage space to store 24 hours worth of simsense?
-Does an average commlink have enough storage space to store a week's worth of simsense?

Personally, my answers to the above would be "yes", "yes", and "no".
Go to the top of the page
 
+Quote Post
Starmage21
post Apr 20 2010, 01:18 AM
Post #68


Moving Target
**

Group: Members
Posts: 745
Joined: 13-April 07
From: Houston, Texas
Member No.: 11,448



QUOTE (kjones @ Apr 19 2010, 09:14 PM) *
Storage is subjective. Let's try to find some common ground by answering some questions:

-Does an average commlink have enough storage space to store an entire BTL?
-Does an average commlink have enough storage space to store 24 hours worth of simsense?
-Does an average commlink have enough storage space to store a week's worth of simsense?

Personally, my answers to the above would be "yes", "yes", and "no".


The answer SHOULD be yes, yes, and yes. Remember, we're dealing with computers that put modern day supercomputers to shame (in much the same way that modern day computers put 20 year old super computers to shame) except its by several orders of magnitude.

I could store a weeks worth of video on my 1.5 TB HDD very easily, maybe a whole month's depending on resolution and compression.
Go to the top of the page
 
+Quote Post
kzt
post Apr 20 2010, 01:34 AM
Post #69


Great Dragon
*********

Group: Members
Posts: 5,537
Joined: 27-August 06
From: Albuquerque NM
Member No.: 9,234



QUOTE (Dr. Funkenstein @ Apr 19 2010, 06:06 PM) *
The problem with the theory is that this type of 'decrpytion' simply changes from brute-force computing to brute-force fist-to-facing. It's still not unbreakable because it relies on hardware and data, and the transmission of both, to all parties involved. Intercept that, and you've 'broken' the encryption.

Yes, but it's an interesting and fun adventure, not one guy rolling dice in the corner for 30 minutes with the GM.

The other element is that encryption in worthless when you own the system. Nobody is going to carry around a little book full of unique 64 character sequences they have carefully to enter every time they want to look at the report they wrote last Monday; its all going to be done by the OS in in the background. Once you are recognized as the OS (or the user) by the system decryption just happens automatically in the background. We have this fight every 6 months with clueless security guys who wan to spend a small fortune and months of man-hours and will, in the end, provide no value to us unless someone breaks in and physically steals a server.
Go to the top of the page
 
+Quote Post
Ol' Scratch
post Apr 20 2010, 01:41 AM
Post #70


Immortal Elf
**********

Group: Validating
Posts: 7,999
Joined: 26-February 02
Member No.: 1,890



QUOTE (kzt @ Apr 19 2010, 08:34 PM) *
Yes, but it's an interesting and fun adventure, not one guy rolling dice in the corner for 30 minutes with the GM.

No arguments from me.
Go to the top of the page
 
+Quote Post
Draco18s
post Apr 20 2010, 01:49 AM
Post #71


Immortal Elf
**********

Group: Members
Posts: 10,289
Joined: 2-October 08
Member No.: 16,392



QUOTE (D2F @ Apr 19 2010, 05:50 PM) *
Yet, you don't apply the same lenience towards hacking and matrix mechanics? Isn't that a double standard?


I'm not holding a double standard. The matrix rules, as written, are both a) complex to the point of irritation, frustration, and endless forum threads (such as this one) and illogical from a common sense point of view (everything is hackable to the point of encryption being trivially beaten in seconds) while at the same time offering "it can't be hacked, not in a million years, forever, lalalalala I can't hear you" encryption. There's no middle ground. AND everything is wireless (except for all that stuff that you know, might have a security issue with being wireless (except for all of the gear that might have an issue being wireless, but the players own it)) which makes it trivial to hack (see previous point).

Healing on the other hand was just simplified to make it so you don't have to spend 6 to 9 months (and $8000) recovering from a job that went south (and paid out $8000).

Matrix rules that are simple, easy to use, and internally consistent are all I ask for. If its fun, then so much the better (the current rules are none of those).
Go to the top of the page
 
+Quote Post
Shinobi Killfist
post Apr 20 2010, 01:58 AM
Post #72


Neophyte Runner
*****

Group: Members
Posts: 2,431
Joined: 3-December 03
Member No.: 5,872



QUOTE (Draco18s @ Apr 19 2010, 09:49 PM) *
I'm not holding a double standard. The matrix rules, as written, are both a) complex to the point of irritation, frustration, and endless forum threads (such as this one) and illogical from a common sense point of view (everything is hackable to the point of encryption being trivially beaten in seconds) while at the same time offering "it can't be hacked, not in a million years, forever, lalalalala I can't hear you" encryption. There's no middle ground. AND everything is wireless (except for all that stuff that you know, might have a security issue with being wireless (except for all of the gear that might have an issue being wireless, but the players own it)) which makes it trivial to hack (see previous point).

Healing on the other hand was just simplified to make it so you don't have to spend 6 to 9 months (and $8000) recovering from a job that went south (and paid out $8000).

Matrix rules that are simple, easy to use, and internally consistent are all I ask for. If its fun, then so much the better (the current rules are none of those).


This.
Go to the top of the page
 
+Quote Post
Tymeaus Jalynsfe...
post Apr 20 2010, 02:16 AM
Post #73


Prime Runner Ascendant
**********

Group: Members
Posts: 17,568
Joined: 26-March 09
From: Aurora, Colorado
Member No.: 17,022



QUOTE (Draco18s @ Apr 19 2010, 07:49 PM) *
I'm not holding a double standard. The matrix rules, as written, are both a) complex to the point of irritation, frustration, and endless forum threads (such as this one) and illogical from a common sense point of view (everything is hackable to the point of encryption being trivially beaten in seconds) while at the same time offering "it can't be hacked, not in a million years, forever, lalalalala I can't hear you" encryption. There's no middle ground. AND everything is wireless (except for all that stuff that you know, might have a security issue with being wireless (except for all of the gear that might have an issue being wireless, but the players own it)) which makes it trivial to hack (see previous point).

Healing on the other hand was just simplified to make it so you don't have to spend 6 to 9 months (and $8000) recovering from a job that went south (and paid out $8000).

Matrix rules that are simple, easy to use, and internally consistent are all I ask for. If its fun, then so much the better (the current rules are none of those).


Odd that you say that, and I am not trying to be a prick about it, but I have yet to see anything truly difficult about the 4th Edition Matrix Rules... they are, in my opinion, simple, easy to use, and relatively consistent... to a point... the biggest inconsistencies are generally those that individuals manufacture to be inconsistent... the Rules were never meant to be a picture of real life, they are meant to be a method of providing a system to quickly model an electronic intrusion (as someone previously said in this thread... too lazy to look it up though)... In my opinion (I know that I am in the minority here), the rules are fun, and have succeeded in that regard, at the least.

The truly odd thing to me is that the people who truly do not like the rules provided (or their optional additions), try to intentionally make them more difficult to understand than they really are, and I am not sure exactly why that is. I know that the rules do not mimic real life in any way shape or form (nor would I want them to do so... talk about boring with a Capital B), with the possible exception of several buzz words that may share the same meanings. But that is really okay, there is no real need to over complicate the rules... And, for those who like a more complicated, or more realistic version of the Matrix, there are plenty of Optional Rules to provide such a version.

When you start bringing in real life/real world terminologies and expectations to the Matrix, then yes, the rules will bother you (As the Encryption Topics so generally provide)... I would say just relax about why it ISN'T what you want it to be, and play with what it is intended to be...

Anyways... enough of my ranting... I am pretty sure you are tired of my POV on this matter, so apologies if I have offended anyone, that is not my intent...

Keep the Faith
Go to the top of the page
 
+Quote Post
Draco18s
post Apr 20 2010, 02:32 AM
Post #74


Immortal Elf
**********

Group: Members
Posts: 10,289
Joined: 2-October 08
Member No.: 16,392



QUOTE (Tymeaus Jalynsfein @ Apr 19 2010, 09:16 PM) *
Anyways... enough of my ranting... I am pretty sure you are tired of my POV on this matter, so apologies if I have offended anyone, that is not my intent...


Not offended, I simply don't agree. I've attempted numerous times to use the matrix rules and have come to the conclusion that they are poorly written, not well explained, have few examples.* The only part about them that I like is ... actually, I don't think I like any of it. I would say I liked the fact that they exist and offer an option, but without understanding them fully they are unwieldy, confusing, and downright unhelpful.

The last thing I did with them personally was take over from the GM while a technomancer hacked a system. My job was to roll the system's analyze and throw a trace at the player.

After about four rounds of tracing him and letting him do his thing I stumbled upon something I'd missed which ret-conned the entire thing back to "ok, you *DO* notice the trace..." At which point I threw the book aside, looked at the player and said, "you notice the trace, you trivially avoid it" (as I knew the odds of success on that, based on his dice pool and mine) "and get the pay data without getting caught."

The player decided next session that the technomancer wasn't any an interesting/viable/fun character to play.

*Ok, so points A, B, and C are variations on the same. But they are different. Poorly written means you need better explanation, which can be done with examples, but doesn't need to be.
Go to the top of the page
 
+Quote Post
Tymeaus Jalynsfe...
post Apr 20 2010, 03:11 AM
Post #75


Prime Runner Ascendant
**********

Group: Members
Posts: 17,568
Joined: 26-March 09
From: Aurora, Colorado
Member No.: 17,022



QUOTE (Draco18s @ Apr 19 2010, 08:32 PM) *
Not offended, I simply don't agree. I've attempted numerous times to use the matrix rules and have come to the conclusion that they are poorly written, not well explained, have few examples.* The only part about them that I like is ... actually, I don't think I like any of it. I would say I liked the fact that they exist and offer an option, but without understanding them fully they are unwieldy, confusing, and downright unhelpful.

The last thing I did with them personally was take over from the GM while a technomancer hacked a system. My job was to roll the system's analyze and throw a trace at the player.

After about four rounds of tracing him and letting him do his thing I stumbled upon something I'd missed which ret-conned the entire thing back to "ok, you *DO* notice the trace..." At which point I threw the book aside, looked at the player and said, "you notice the trace, you trivially avoid it" (as I knew the odds of success on that, based on his dice pool and mine) "and get the pay data without getting caught."

The player decided next session that the technomancer wasn't any an interesting/viable/fun character to play.

*Ok, so points A, B, and C are variations on the same. But they are different. Poorly written means you need better explanation, which can be done with examples, but doesn't need to be.



Hey, No worries Draco18s...

I agree that the rules can be confusing... no Doubt about it...
Better Descriptions would definitely help, and more Examples, or more detailed examples, would help even more... I think that the redesigend section in SR4A may have helped to clear up a few things, but I could be wrong on that count...

Keep the Faith
Go to the top of the page
 
+Quote Post
Heath Robinson
post Apr 20 2010, 03:30 AM
Post #76


Running Target
***

Group: Members
Posts: 1,263
Joined: 4-March 08
From: Blighty
Member No.: 15,736



Draco,
If you would like there to exist an alternative to the current matrix system, why not start to make one? It may be a significant amount of work, and contentious to a number of other posters, but doing it publically on these forums would probably generate suggestions made in good faith. I know that I would enjoy assisting anyone embarking on such an endeavour.
Go to the top of the page
 
+Quote Post
Draco18s
post Apr 20 2010, 03:36 AM
Post #77


Immortal Elf
**********

Group: Members
Posts: 10,289
Joined: 2-October 08
Member No.: 16,392



QUOTE (Heath Robinson @ Apr 19 2010, 10:30 PM) *
Draco,
If you would like there to exist an alternative to the current matrix system, why not start to make one? It may be a significant amount of work, and contentious to a number of other posters, but doing it publically on these forums would probably generate suggestions made in good faith. I know that I would enjoy assisting anyone embarking on such an endeavour.


Someone's suggested one, I'd like to see theirs.

As for fixing it myself, I've thought on that and haven't been able to come up with a solution that adheres to existing game rules (that is, uses the same success/fail mechanic).
Go to the top of the page
 
+Quote Post
KarmaInferno
post Apr 20 2010, 06:30 AM
Post #78


Old Man Jones
********

Group: Dumpshocked
Posts: 4,415
Joined: 26-February 02
From: New York
Member No.: 1,699



While the number-field sieve is the best method currently known, there exists an intriguing possibility for a far more elegant approach. Here we would find a composition of extensions, each Abelian over the rationals, and hence contained in a single cyclotomic field. Using the Artin map, we might induce homomorphisms from the principal orders in each of these fields that z by f z. These maps could then be used to combine splitting information from all the fields. Interspersed with this in turn would require the standard Kummer extensions that non-torsion form of the Jacobians of the Fermat curves gives rise to. It would be a breakthrough of Gaussian proportions and allow us to acquire the solution in a dramatically more efficient manner. Now, I should emphasize that such an approach is purely theoretical. So far, no one has been able to accomplish such constructions. Yet.




-karma
Go to the top of the page
 
+Quote Post
KarmaInferno
post Apr 20 2010, 06:37 AM
Post #79


Old Man Jones
********

Group: Dumpshocked
Posts: 4,415
Joined: 26-February 02
From: New York
Member No.: 1,699



On a more serious note, wouldn't rotating personal ciphers be more or less unbreakable as well?

I mean, if I decide the word "Donut" means "Target what I'm aiming at and open fire" to my drone, and the word changes every time the command is given, there's no crypto-breaking system in the universe that could figure that out just from the transmission. They'd need access to either me or my drone.



-karma
Go to the top of the page
 
+Quote Post
Ascalaphus
post Apr 20 2010, 07:13 AM
Post #80


Runner
******

Group: Members
Posts: 2,899
Joined: 29-October 09
From: Leiden, the Netherlands
Member No.: 17,814



QUOTE (Heath Robinson @ Apr 20 2010, 04:30 AM) *
Draco,
If you would like there to exist an alternative to the current matrix system, why not start to make one? It may be a significant amount of work, and contentious to a number of other posters, but doing it publically on these forums would probably generate suggestions made in good faith. I know that I would enjoy assisting anyone embarking on such an endeavour.


Frank Trollman took that suggestion to heart. Unfortunately, he got into a fight, and his alternative proposal was never really discussed here. A shame, because it has a lot of ideas.

LINK
Go to the top of the page
 
+Quote Post
Heath Robinson
post Apr 20 2010, 07:44 AM
Post #81


Running Target
***

Group: Members
Posts: 1,263
Joined: 4-March 08
From: Blighty
Member No.: 15,736



QUOTE (Ascalaphus @ Apr 20 2010, 08:13 AM) *
Frank Trollman took that suggestion to heart. Unfortunately, he got into a fight, and his alternative proposal was never really discussed here. A shame, because it has a lot of ideas.

LINK

I've made suggestions on Frank's aWoD project on TGD. I know about The Ends (it's a sticky after all). I even have a PDF copy of it.

Some people find brain hacking objectionable, and I would enjoy seeing Dumpshock create a matrix alternative. We have a lot of decent minds posting here, surely they could do something cool.
Go to the top of the page
 
+Quote Post
kjones
post Apr 20 2010, 11:58 AM
Post #82


Moving Target
**

Group: Members
Posts: 332
Joined: 15-February 10
From: CMU
Member No.: 18,163



QUOTE (KarmaInferno @ Apr 20 2010, 02:30 AM) *
While the number-field sieve is the best method currently known, there exists an intriguing possibility for a far more elegant approach. Here we would find a composition of extensions, each Abelian over the rationals, and hence contained in a single cyclotomic field. Using the Artin map, we might induce homomorphisms from the principal orders in each of these fields that z by f z. These maps could then be used to combine splitting information from all the fields. Interspersed with this in turn would require the standard Kummer extensions that non-torsion form of the Jacobians of the Fermat curves gives rise to. It would be a breakthrough of Gaussian proportions and allow us to acquire the solution in a dramatically more efficient manner. Now, I should emphasize that such an approach is purely theoretical. So far, no one has been able to accomplish such constructions. Yet.




-karma


What's purple and commutes?

An abelian grape!
Go to the top of the page
 
+Quote Post
Demonseed Elite
post Apr 20 2010, 12:13 PM
Post #83


Neophyte Runner
*****

Group: Members
Posts: 2,078
Joined: 26-February 02
Member No.: 67



QUOTE (Ascalaphus @ Apr 20 2010, 02:13 AM) *
Frank Trollman took that suggestion to heart. Unfortunately, he got into a fight, and his alternative proposal was never really discussed here. A shame, because it has a lot of ideas.

LINK


Frank's Matrix material is well thought-out. I wish he'd been involved in the SR4 Matrix mechanics conversations. It is different than the standard rules, but he takes the time to consider all of the considerations that the SR writers had to think about when developing the Matrix rules for Fourth Edition. And in many cases, I feel Frank thought about them more clearly.

Too often, I see criticisms of the Matrix rules without proposed solutions, because the solutions are hard. And many of the things the critics say they would want effectively destroy the Matrix as a playable part of Shadowrun, which obviously no Shadowrun writer is ever going to do (or would be allowed to do).
Go to the top of the page
 
+Quote Post
Ol' Scratch
post Apr 20 2010, 12:17 PM
Post #84


Immortal Elf
**********

Group: Validating
Posts: 7,999
Joined: 26-February 02
Member No.: 1,890



One thing that a lot of people don't seem to realize is that it's far easier for one person to come up with a complete set of rules that are internally consistent than it is for a group of people, each writing different sections, to do the same. So while things may seem better thought out and organized when done by a single person, that doesn't mean the same amount of effort and energy didn't go into the other. It also doesn't mean that those rules are going to be balanced or immune to abuse anymore than any other set of rules, such as in the case of the discussed house rules. There's a lot of goofiness in there, and stuff I'd never even consider introducing into my games due to the absurdity thereof.
Go to the top of the page
 
+Quote Post
Demonseed Elite
post Apr 20 2010, 12:23 PM
Post #85


Neophyte Runner
*****

Group: Members
Posts: 2,078
Joined: 26-February 02
Member No.: 67



Don't quote me on this, because I'm not 100% sure, but I think most of the Fourth Edition Matrix rules were written by one author. For the most part, the SR4 writing pool was very small because the project was kept secret even from some freelancers (like myself) for quite a long time. The rest of the freelancers were brought in for playtesting, but the number of writers involved in creating the rules was fairly small.
Go to the top of the page
 
+Quote Post
Bira
post Apr 20 2010, 01:15 PM
Post #86


Moving Target
**

Group: Members
Posts: 254
Joined: 26-February 02
Member No.: 1,768



QUOTE (Kagetenshi @ Apr 19 2010, 09:56 PM) *
No, that is precisely what the GM does not get to say—at least not without being a dick. Hidden limitations only discoverable after it's too late to plan for them need very good reasons to exist, and this just doesn't have one.


Yerameyahu nailed it. It's not a "hidden" limitation at all, it's something everyone should know from minute one of the campaign. I believe it's even stated in the book. It's simply a common sense thing - of course a mainframe or nexus is going to have much more storage space than a commlink. Even if the commlink has enough space that you don't need to worry about it 99% of the time, of course the entire contents of a mainframe's storage will exceed the space you have available in your commlink.

On the other hand, it's pretty obvious that most missions will not involve downloading the entire contents of a mainframe's storage, and if they ever do the Johnson is going to provide a large storage unit for the purpose. Downloading the limited set of data most runs require should pose no problem, even if you do take some additional paydata on the side. But copying everything on a mainframe into a commlink is pretty obviously impossible. Complaining about it is like complaining that putting a loaded gun to your character's head and pulling the trigger causes damage.
Go to the top of the page
 
+Quote Post
kzt
post Apr 20 2010, 03:14 PM
Post #87


Great Dragon
*********

Group: Members
Posts: 5,537
Joined: 27-August 06
From: Albuquerque NM
Member No.: 9,234



QUOTE (Demonseed Elite @ Apr 20 2010, 06:23 AM) *
Don't quote me on this, because I'm not 100% sure, but I think most of the Fourth Edition Matrix rules were written by one author. For the most part, the SR4 writing pool was very small because the project was kept secret even from some freelancers (like myself) for quite a long time. The rest of the freelancers were brought in for playtesting, but the number of writers involved in creating the rules was fairly small.

Frank publicly blamed Aaron for the goo that is the SR4 matrix rules, and Aaron's obnoxious defense of the wonderfulness of RAW Matrix supports that. He's also pointed out that there was at least one other author, because a critical concept gets used as though it means something else in one part of the rules. I can't remember the exact point, but it provided a reason for the opaqueness and internal contradictions of the rules.
Go to the top of the page
 
+Quote Post
Heath Robinson
post Apr 20 2010, 04:53 PM
Post #88


Running Target
***

Group: Members
Posts: 1,263
Joined: 4-March 08
From: Blighty
Member No.: 15,736



QUOTE (Dr. Funkenstein @ Apr 20 2010, 01:17 PM) *
One thing that a lot of people don't seem to realize is that it's far easier for one person to come up with a complete set of rules that are internally consistent than it is for a group of people, each writing different sections, to do the same. So while things may seem better thought out and organized when done by a single person, that doesn't mean the same amount of effort and energy didn't go into the other.

Frank also had the advantages of getting to see the SR4 BBB matrix rules in action before writing his houserules, and having no deadline. Frank even had an advantage from not needing to keep his rules secret from the world at large, as they're not intended to be a commercial venture. To paraphrase Linus' Law, "to enough eyes every problem is flat."
Go to the top of the page
 
+Quote Post
Semerkhet
post Apr 20 2010, 05:40 PM
Post #89


Moving Target
**

Group: Members
Posts: 489
Joined: 14-April 09
From: Madison, WI
Member No.: 17,079



Good discussion. I don't have much to add except...

I decided to post my amusement that one of the original SR creators (with only 12 total posts) throws out his viewpoint on the original Matrix design and the discussion continues as though nothing was said. Maybe that sounds fanboy-ish, but I'm intrigued that Mr. Dowd still takes the time to peruse DS now and then.
Go to the top of the page
 
+Quote Post
Draco18s
post Apr 20 2010, 05:50 PM
Post #90


Immortal Elf
**********

Group: Members
Posts: 10,289
Joined: 2-October 08
Member No.: 16,392



QUOTE (Semerkhet @ Apr 20 2010, 12:40 PM) *
I decided to post my amusement that one of the original SR creators (with only 12 total posts) throws out his viewpoint on the original Matrix design and the discussion continues as though nothing was said. Maybe that sounds fanboy-ish, but I'm intrigued that Mr. Dowd still takes the time to peruse DS now and then.


I didn't even see his post. Interesting..

QUOTE (TomDowd @ Apr 19 2010, 05:01 PM) *
Whomever upthread said that the SR Matrix rules were written to play out like an action movie is spot on. During my tenure (I cannot speak to what occurred afterward) the Matrix rules were probably our least successful rules set. There were a variety of reasons for this, but the primary reason was our inability to translate a primarily visual/sensorial experience into dice, tables, and goofy rules.


"Inability to translate visual/sensorial experience into dice." Huh. You know. Like the entire rest of the game. Last I checked there was a Perception skill that covered that kind of stuff.

(Not to bash Tom Dowd, but that's what I thought when I read his post. RPG games exist to simulate "sensorial" experiences and emulate effects with dice. The dice might be representing a physics action, rather than raw visual data, but really, when you have a matrix that effectively emulates Real Life, its ok to use existing game rules for those virtualized scenarios. The end result is the same: the character takes an action, using a skill and an attribute, with success modified by gear against an opposing force).
Go to the top of the page
 
+Quote Post
Demonseed Elite
post Apr 20 2010, 06:08 PM
Post #91


Neophyte Runner
*****

Group: Members
Posts: 2,078
Joined: 26-February 02
Member No.: 67



QUOTE (Heath Robinson @ Apr 20 2010, 11:53 AM) *
Frank also had the advantages of getting to see the SR4 BBB matrix rules in action before writing his houserules, and having no deadline. Frank even had an advantage from not needing to keep his rules secret from the world at large, as they're not intended to be a commercial venture. To paraphrase Linus' Law, "to enough eyes every problem is flat."


He also didn't have any developers saying that he needed to do it a certain way because of design decisions. Which, of course, is part of a developer's job but it does put constrains on the writers at times. I mean, when I saw SR4 during playtest, I wanted so badly for them to remove technomancers, but I was totally overruled on that. I'm not bitter about it, it's a direction they wanted to go with SR4. I didn't like it much, but it's not my call.

Unofficial material is much easier to write! (IMG:style_emoticons/default/smile.gif)
Go to the top of the page
 
+Quote Post
kjones
post Apr 20 2010, 08:29 PM
Post #92


Moving Target
**

Group: Members
Posts: 332
Joined: 15-February 10
From: CMU
Member No.: 18,163



The interesting thing that I see about Tom Dowd's post is that it matches something I've seen in every old-school game developer - the rules aren't set in stone, mess around with them yourself until you find something that works. Maybe it's just me, but people seem less willing to do that nowadays (especially with The Other RPG).
Go to the top of the page
 
+Quote Post
Ol' Scratch
post Apr 20 2010, 08:34 PM
Post #93


Immortal Elf
**********

Group: Validating
Posts: 7,999
Joined: 26-February 02
Member No.: 1,890



QUOTE (kjones @ Apr 20 2010, 03:29 PM) *
The interesting thing that I see about Tom Dowd's post is that it matches something I've seen in every old-school game developer - the rules aren't set in stone, mess around with them yourself until you find something that works. Maybe it's just me, but people seem less willing to do that nowadays (especially with The Other RPG).

That's been a big beef of mine for a while now. All the people who run around shouting about "RAW" and using it to bully people into shutting up is totally ruining the hobby for me. Apparently it's some cardinal sin to sit back and discuss ways to change, improve, or re-interpret the rules so that they make more sense or are more comfortable to use. It's one of the main reasons I get worked up a lot around here.
Go to the top of the page
 
+Quote Post
D2F
post Apr 20 2010, 08:46 PM
Post #94


Moving Target
**

Group: Members
Posts: 765
Joined: 28-December 09
Member No.: 18,001



QUOTE (Draco18s @ Apr 20 2010, 06:50 PM) *
"Inability to translate visual/sensorial experience into dice." Huh. You know. Like the entire rest of the game. Last I checked there was a Perception skill that covered that kind of stuff.

That's not what he was talking about.
Go to the top of the page
 
+Quote Post
D2F
post Apr 20 2010, 08:50 PM
Post #95


Moving Target
**

Group: Members
Posts: 765
Joined: 28-December 09
Member No.: 18,001



QUOTE (Dr. Funkenstein @ Apr 20 2010, 09:34 PM) *
That's been a big beef of mine for a while now. All the people who run around shouting about "RAW" and using it to bully people into shutting up is totally ruining the hobby for me. Apparently it's some cardinal sin to sit back and discuss ways to change, improve, or re-interpret the rules so that they make more sense or are more comfortable to use. It's one of the main reasons I get worked up a lot around here.

The main reason is that you are having trouble discerning when a discussion of alterntive rulings is appropriate and when not. In a thread about a particular rules question, you can only argue by the RAW. Everything else will lead to no result and endless battles of opinions. It's really quite pointless.
On the other side are thread that specifically deal with house rules, rule interpretations, differen rues proposal, or even complete rewrites. In such threads chimin in one's own opinion or one's own house rules not only makes sense but constitutes a nescessary and welcome contribution.
Go to the top of the page
 
+Quote Post
Draco18s
post Apr 20 2010, 08:54 PM
Post #96


Immortal Elf
**********

Group: Members
Posts: 10,289
Joined: 2-October 08
Member No.: 16,392



QUOTE (D2F @ Apr 20 2010, 03:46 PM) *
That's not what he was talking about.


Care to...fix it for me?

Or are you just going to say "you're wrong" and move on without attempting to correct me? If so, then "I'm right, so STFU."
Go to the top of the page
 
+Quote Post
D2F
post Apr 20 2010, 08:59 PM
Post #97


Moving Target
**

Group: Members
Posts: 765
Joined: 28-December 09
Member No.: 18,001



QUOTE (Draco18s @ Apr 20 2010, 09:54 PM) *
Care to...fix it for me?

Or are you just going to say "you're wrong" and move on without attempting to correct me? If so, then "I'm right, so STFU."

Nah, I just wasn't sure whether you were joking. What he was talking about was not how to represent matrix perception into rules, but how to represent something the developer can only imagine in audio-visual terms (read: a movie sequence, the imagination of a story sequence, the imagination of how they would like things to look like in SR, where they out into a audio-visual medium) into abstract, yet easy to use rules that are fun and internally consistent.

In other words:

How do you translate something your see and hear and feel into dice rolls? How do you translate a rollercoaster ride into dice rolls? How do you translate your first kiss into dice rolls? How do you translate the death of a loved on into dice rolls?
Go to the top of the page
 
+Quote Post
Ol' Scratch
post Apr 20 2010, 09:00 PM
Post #98


Immortal Elf
**********

Group: Validating
Posts: 7,999
Joined: 26-February 02
Member No.: 1,890



It really is the same thing as astral projection. If you can do one (astral projection), you should be able to do the other (VR) using pretty much the same rules philosophies. The problem is Shadowrun has always insisted on making the Matrix rules convoluted and alien to the rest of the system.
Go to the top of the page
 
+Quote Post
D2F
post Apr 20 2010, 09:03 PM
Post #99


Moving Target
**

Group: Members
Posts: 765
Joined: 28-December 09
Member No.: 18,001



QUOTE (Dr. Funkenstein @ Apr 20 2010, 10:00 PM) *
It really is the same thing as astral projection.

I get where you're coming from. But how would you represent paydata and encryption on the stral plane? How would represent access restriction on the astral pane? Or would you do without them?
Go to the top of the page
 
+Quote Post
Draco18s
post Apr 20 2010, 09:12 PM
Post #100


Immortal Elf
**********

Group: Members
Posts: 10,289
Joined: 2-October 08
Member No.: 16,392



QUOTE (D2F @ Apr 20 2010, 03:59 PM) *
In other words:

How do you translate something your see and hear and feel into dice rolls? How do you translate a rollercoaster ride into dice rolls? How do you translate your first kiss into dice rolls? How do you translate the death of a loved on into dice rolls?


Ok, I get what you're saying here, but I disagree that hacking the matrix is similar to those types of experiences. Hacking isn't something that happens to you, otherwise there would be no programs, options, actions, or results. Hacking can feel like those experiences, but that's not what it is as a whole.
Go to the top of the page
 
+Quote Post

7 Pages V   1 2 3 > » 
Reply to this topicStart new topic

 

RSS Lo-Fi Version Time is now: 12th June 2025 - 08:44 PM

Topps, Inc has sole ownership of the names, logo, artwork, marks, photographs, sounds, audio, video and/or any proprietary material used in connection with the game Shadowrun. Topps, Inc has granted permission to the Dumpshock Forums to use such names, logos, artwork, marks and/or any proprietary materials for promotional and informational purposes on its website but does not endorse, and is not affiliated with the Dumpshock Forums in any official capacity whatsoever.