IPB

Welcome Guest ( Log In | Register )

> One really confusing thing in Matrix stuff, IC in encryption
sunnyside
post Jul 26 2007, 03:17 PM
Post #1


Neophyte Runner
*****

Group: Members
Posts: 2,429
Joined: 31-December 06
Member No.: 10,502



One little sentence on 225

"Note that some encryption schemes may incorporate IC
as a second line of defense."

So that's massive. Maybe. What the heck does that mean? This seems to apply to files and communications from how the paragraph is phrased.

Personally I consider that IC with whatever programs it's supposed to have count as running on the system doing the encryption during communication or the encryption process. Essentially the IC is loading itself along with traps into the file or communication packet, and kind of acting a bit like a data bomb.

Whenever someone tries to decrypt the file I give the IC a matrix perception test to detect them. If it succeds I consider decrypt program to have triggered some trap and the IC activates wherever the decryption is taking place, likely sending communications to it's owner if possible and generally causing havok with whatever programs it has loaded.

However what do the rest of you do? I like the basic idea as it makes encryption worth something without making decryption take forever. So the hacker can still hack on the fly, but there is a risk.
Go to the top of the page
 
+Quote Post

Posts in this topic


Reply to this topicStart new topic

 



RSS Lo-Fi Version Time is now: 1st October 2025 - 09:25 AM

Topps, Inc has sole ownership of the names, logo, artwork, marks, photographs, sounds, audio, video and/or any proprietary material used in connection with the game Shadowrun. Topps, Inc has granted permission to the Dumpshock Forums to use such names, logos, artwork, marks and/or any proprietary materials for promotional and informational purposes on its website but does not endorse, and is not affiliated with the Dumpshock Forums in any official capacity whatsoever.