![]() |
![]() |
![]()
Post
#1
|
|
Moving Target ![]() ![]() Group: Members Posts: 870 Joined: 2-October 06 From: Athens Ga Member No.: 9,517 ![]() |
I was just looking at cetiah's post of his hacking rules as a way of speeding up hacking and I thought I would say something about speeding up hacking.
I understand that the official position of Fanpro is that hacking occurs by proxy of personas because the matrix just moves that fast. I don't disagree with the thought that computers will move faster and faster but I don't like the consequences of the way they thought this out. Okay if they are saying that the persona is the one actually doing things because we are too slow then why not do that all the way? Make hacking a function of agents and not people. Then you can throw away all the matrix rules and have an agent roll. The rest occurs behind the scenes. > Well that wouldn't be fun and it would take away a character type. People who are interested in computers like to be able to deal with the matrix. But the matrix system doesn't reflect actual computers. If you know much about computers then you know that most of this doesn't make any sense. >But it could make sense in the future! SO your making a detailed computer system to please the people who are interested in computers by making one that doesn't make sense to people who know computers? ( See Lewis Black for an expression about this logic, the one with the confounded jowl shaking) I think that computers will be fast and are fast now but they still depend on people. They will be limited to what their computer is telling them. No one can stare at something at the rate these people are talking about. Making a perception test several times a second against all the traffic in a system for a normal 8 hour shift? Think about that for a second. You will end up will a drooling mess that can see anything anymore. It won't work. You are effectively increasing the time that they perceive by a factor of their initiative increase. So they are staring at something for effectively 24 hours! Even staring at the same area for more then a few minutes normal time will wear out a person. How is it going to feel with high resolution hyperactivity of the brain from all the input? So we go back to programs making the perception tests. The spyder only pays attention when the programs tell him something. That way the poor spyder doesn't fall unconscious with a few minutes of his shift starting. Now programs can make constant perception tests. Okay so for one why would the roll vary? They are artificial so they would notice the same amount of information all the time. So take it's average successes as a threshold. So we have eliminated the problem of multiple perception tests by the system. If you are going to do something that they might think is strange then you just have to beat a perception threshold with your stealth. We have sped things up alot so far! Now you don't have to worry about making perception tests for every second. More in a bit. |
|
|
![]() |
![]()
Post
#2
|
|||
Moving Target ![]() ![]() Group: Members Posts: 745 Joined: 2-January 07 From: Los Angeles, CA Member No.: 10,510 ![]() |
Serbitar, you almost always revert the conversation of hacking to either agents or account rights. Correct me if I'm wrong on this, but is it your view that when a hacker is hacking into a system, he is, by definition, logging into the system with an account? Is it your view that a hacker can choose to login with an "illegitimate account"? Can he login and hack without an account? It would help me to understand some of your arguments that I've having trouble grasping if you can give me an idea where you're coming from with this view. It sounds like you're saying that a hacker is given rights by the system because of his account (legitimate or not). I think that's taking the definition of "rights" a little too far. Accounts aren't the only thing given "rights"; programs and processes are given rights, too. For that matter, "rights" just means that a given task (like assigning a pointer to a zero-length block of memory) is protected from accounts, programs, and processes that do not have "rights". So what? A hacker can bypass these protections... that's what he does. That's what his Exploit system is supposed to do. So by a hacker's "rights" we're not necessarily talking about the same type of "rights" that a user or admin is assigned by the system, but rather a measure of the capabilities the hacker can influence within the system despite his lack of any rights granted by the system. Does that make sense? So, acquiring rights by aquiring an account is one technique of the hacker, but it is not the only technique, nor is it the best technique (far from it), nor is it particularly "stealthy", and I don't think it should be thought of as the default model for hacking that you seem to imply. (Or at least that's the impression I get from your posts.) Garrowolf, Synner, correct me if I'm wrong in any of this. (P.S. I know this contradicts my earlier posts, but I think we've all seemed to abandon my "Matrix as Operating System" theory, which, I still think has a lot of merit despite everyone's insistence on dismissing it, by the way.) |
||
|
|||
![]() ![]() |
![]() |
Lo-Fi Version | Time is now: 6th August 2025 - 04:20 AM |
Topps, Inc has sole ownership of the names, logo, artwork, marks, photographs, sounds, audio, video and/or any proprietary material used in connection with the game Shadowrun. Topps, Inc has granted permission to the Dumpshock Forums to use such names, logos, artwork, marks and/or any proprietary materials for promotional and informational purposes on its website but does not endorse, and is not affiliated with the Dumpshock Forums in any official capacity whatsoever.