Another realitybraker, subscription rule kills wireless hacking |
Another realitybraker, subscription rule kills wireless hacking |
Feb 16 2006, 10:06 AM
Post
#1
|
|||
Running Target Group: Members Posts: 1,498 Joined: 4-August 05 From: ADL Member No.: 7,534 |
What does the rule do? It implements an unhackable link between two devices. This link works, hacking-wise, like a cable that can not be intercepted. Whats the Problem? This rule is killing wireless hacking. Devices that do not have to access the matrix, will only grant access to a limited number of other devices, which need to use the device in question. These connections are, as defined by the rule, unhackable. Example1: All the wireless devices in a house only accept input from the house-telecom and the comlink of the owner. The telecom and the commlink of the owner only accept input from the local security node of their matrix service provider. Example2: All devices in a coporation facility only accept input from devices of the coporate facility. For outside communication, a heavily secured choke point is used. Example3: Cars only accept input from the comlinks of their owners. Cars can not be hacked without finding the owner comlink, first, which in turn, is only accesible by the security node of the matrix service provider. This rule effectively kills wireless hacking and is extremely senseless. Why shouldnt one be able to spoof the device codes? With this rule, we are back to SR3 hacking. Even worse, there is no way to "tap" the wireless links. They are, by rule, 100% secure. Solution: Skip the rule. PAN devices with a rating of 0 are already more then enough protected by their very short broadcasting length and possible skinlink solutions. |
||
|
|||
Feb 16 2006, 10:19 AM
Post
#2
|
|
Moving Target Group: Members Posts: 934 Joined: 26-August 05 From: Earth - Europe - AGS - Norddeutscher Bund - Hannover Member No.: 7,624 |
The question is: What is a device and what is a node?
My guess would be that a vehicle can't be subscribed to a commlink. The same goes with commlinks. |
|
|
Feb 16 2006, 10:52 AM
Post
#3
|
|
Running Target Group: Members Posts: 1,498 Joined: 4-August 05 From: ADL Member No.: 7,534 |
There is no (qualitative) difference between a wireless link in a cyberware device, a car, or a comlink.
All use the same protocol. The shape of the object has nothing to do with it. |
|
|
Feb 16 2006, 11:41 AM
Post
#4
|
|||||||
Karma Police Group: Dumpshocked Posts: 1,358 Joined: 22-July 04 From: Gothenburg, SE Member No.: 6,505 |
Nobody would configure their commlink and telecom to accept input from only the service provider. Not unless they had a commlink and telecom only for the purpouse of controling the house hold's devices, and kept another set of computers for everything else. That seems unlikely as it would destroy the seamless interacting you can get with just one commlink (you would have to pick up different commlinks for making calls and for changing the tune on your stereo). It could happen with very paranoid people, but it would be extremely rare I think.
This only means you have to hack your way into the building's network before you can control cameras and electric fences. I thought that was the point :| ???
Again, great hackers who are able to break through good firewalls and IC are not common enough for anyone to sacrifice all but one of a commlink's functions. Instead they will rely on regular security measures and enjoy the seamless interaction with people and electronics that a single commlink can provide. So what it really means is that you can't drive around parked cars like radio-controled toy cars. You need the "key" first. And I bet you can still do it the old fashioned way and break in physicly. Maybe you can get past the subscription problem by jacking in with cable? |
||||||
|
|||||||
Feb 16 2006, 11:42 AM
Post
#5
|
|
Runner Group: Members Posts: 2,925 Joined: 26-February 02 Member No.: 948 |
Any device that can connect to the Matrix is a Node, wireless or not. A commlink, drone, car, credstick etc can be a node as long as they have any kind of connection. A non-wireless device can also be a node as long as one can connect to it through another node with access to the matrix.
|
|
|
Feb 16 2006, 11:50 AM
Post
#6
|
|
Awakened Asset Group: Members Posts: 4,464 Joined: 9-April 05 From: AGS, North German League Member No.: 7,309 |
There is the possibility of spoofing. Exactly for this situation.
|
|
|
Feb 16 2006, 11:53 AM
Post
#7
|
|
Runner Group: Members Posts: 3,314 Joined: 26-February 02 From: Lisbon, Cidade do Pecado Member No.: 185 |
You're missing the point. While two devices can be programmed to only recognize each other the connections themselves are "unhackable", the devices themselves aren't (unless they're not connecting to the Matrix at all).
There's two ways of hacking these. You go to the device itself and Spoof it into thinking you are the device its authorized to recieve from. Or (assuming one or the other is connected to the Matrix) you hack that one to get to the other (as has been mentioned elsewhere most runners would use this chokepoint configuration). Limiting your access to a single service provider just makes you easier to track anyway. |
|
|
Feb 16 2006, 12:00 PM
Post
#8
|
|
Awakened Asset Group: Members Posts: 4,464 Joined: 9-April 05 From: AGS, North German League Member No.: 7,309 |
Despite the lack of examples I would not make any device a fully functional node. Many security risks without benefit. Many devices need very few functions available to wireless control.
One could be inside the house network and order the coffeemaker to commence producing lifeblood, but not be present INSIDE the coffeemaker. Why should a coffeemaker offer that kind of performance? "Unwired" indeed... |
|
|
Feb 16 2006, 12:09 PM
Post
#9
|
|||
Runner Group: Members Posts: 3,314 Joined: 26-February 02 From: Lisbon, Cidade do Pecado Member No.: 185 |
Are you mixing AR with VR? AR is intended as a means of interfacing with things wirelessly (subscribing) and simply sending orders to the device (presumably selecting one of the available functions). You can hack the operating system of the coffeemaker and reprogram the timer so that it always burns the coffee - but aside from pranks, there's no significant point in doing so for most appliances and basic electronics. |
||
|
|||
Feb 16 2006, 12:17 PM
Post
#10
|
|
Moving Target Group: Members Posts: 934 Joined: 26-August 05 From: Earth - Europe - AGS - Norddeutscher Bund - Hannover Member No.: 7,624 |
Ok Synner, could you give us that as an example please? What exactly does an AR Hacker have to do to make the coffemaker burn the coffee? Which tests are necessary?
|
|
|
Feb 16 2006, 01:01 PM
Post
#11
|
|
Dragon Group: Members Posts: 4,138 Joined: 10-June 03 From: Tennessee Member No.: 4,706 |
I don't think that use of spoof is actually present in the rules...
Anyway, I don't see this as a huge deal. If someone sets their commlink to access only the matrix node, then they're giving up everything associated with AR. They can still get commcalls and the like, but everything which doesn't go through the Matrix will be hidden to them. Sure, an ultra-paranoid individual could do this, but they should be rare. The intent of the rules is that to access any of your devices, a hacker has to first hit your commlink. I think that's fair. |
|
|
Feb 16 2006, 01:04 PM
Post
#12
|
|
Runner Group: Members Posts: 3,314 Joined: 26-February 02 From: Lisbon, Cidade do Pecado Member No.: 185 |
[double post]
|
|
|
Feb 16 2006, 01:06 PM
Post
#13
|
|
Runner Group: Members Posts: 3,314 Joined: 26-February 02 From: Lisbon, Cidade do Pecado Member No.: 185 |
Assuming you're an unauthorized user and the house has a centralized network, you Spoof the coffeemaker into thinking you're the household system or the owner's commlink and alter the OS's timer with an Edit command if you want to make it a permanent problem or just change the current timer function for prank value (which might not even require a test see Controlling Devices p.220 SR4).
|
|
|
Feb 16 2006, 01:09 PM
Post
#14
|
|||||||||
Running Target Group: Members Posts: 1,498 Joined: 4-August 05 From: ADL Member No.: 7,534 |
Wrong conculsion. You still use the comlink as normal. It is just routed through the security node. INcoming calls just reach you via security node, you dont even notice it.
No, thats not the point. The point of the wireless system was, that eveything is hackable.
Again. You dont sacrifice anything. Everything is still seamless. It just comes down to routing.
Thats not the point why the wireless system was invented. It was invented to make hacking easier. |
||||||||
|
|||||||||
Feb 16 2006, 01:15 PM
Post
#15
|
|||||||||
Running Target Group: Members Posts: 1,498 Joined: 4-August 05 From: ADL Member No.: 7,534 |
You hack devices over their connections. If all the conncetions to the device are unhackable, the device is unhackable.,
You mean physically? (wirelessly you cant, it wont accept your connection) Not an option. We want wireless hacking. BTW: What is the difference in acessing a device physically compared to wireless? Different protocoll? Or dou you just alter the electronics?
That leasds directly to the cockepoint solution.
Does Joe 2070 care? We are not talking about runners, but about people who are getting hacked by runners. Or not anymore, because of the unhackable connection rule . . . BTW: Please discribe your "spoofing" rules in connection with the "subscriber" rule. If you can spoof for example comlink codes, to acess devices (cyberware) connected to a comlinks PAN, then the "subscriber" rules is useless and should be skipped. |
||||||||
|
|||||||||
Feb 16 2006, 01:20 PM
Post
#16
|
|||
Running Target Group: Members Posts: 1,498 Joined: 4-August 05 From: ADL Member No.: 7,534 |
You can route AR through the matrix. The matrix IS wireless. Wireless IS matrix. There is no difference. The AR application just doesnt go directly to the comlink, but takes the routing over a security node. (Your comlink, when its not in hidden mode, broadcasts: Im here, and the AR device sends the data through the matrix over the security node, and so forth. Just a a matter of routing.) But I get your point. Direct wireless connections, would not be possible (if you want that). But the main problems are not the comlinks, but the chockepoint designs for installed devices, in coporations and homesystems alike. |
||
|
|||
Feb 16 2006, 01:28 PM
Post
#17
|
|
Running, running, running Group: Dumpshocked Posts: 2,220 Joined: 18-October 04 From: North Carolina Member No.: 6,769 |
i think you're reading too much into it Serbitar (maybe like i am with the skinlink thread). i think the best assumptions to run by are that:
1) Commlinks are always running in some wireless mode (even if you're hidden, you're still "out there" and you can be found. I dont think joe wageslave is going to understand or even risk the reprercussions of walking into the wrong place in hidden mode though, so he'll lively always be working in active mode, or maybe passive, if he knows he's walking through the redlight district and doesnt want to see ads for every "Hot Heather" and "sexy Suzy". 2) most devices will have wide-open wireless disabled, and only route through the users commlink, which will have all of the users preferences and passwords stored. so when fred wants to get on the matrix, he goes over to the computer (which, since it doesnt need to broadcast but to the person infront of it, and the devices immediately around it) it sends his password for the computer, and a picture of his son pops up as his background. When he leaves, he logs off, and his son comes over to do some research for school. his comm sends the same information, and his background, a picture of the Red Hot Halepeno Peppers (:rotfl:) pops up, and he does what he has too. so how do you hack their computer? You have to find fred or the son on the matrix (and, since their commlink is always connected, it might take a while, but if you're sitting infront of the house, it shouldnt be that hard) so that you can spoof their commcodes, and while the family is out, you break into the house, get right next to your computer, and have your commlink say "Hi, i'm fred." Bingo. |
|
|
Feb 16 2006, 01:28 PM
Post
#18
|
|
Awakened Asset Group: Members Posts: 4,464 Joined: 9-April 05 From: AGS, North German League Member No.: 7,309 |
@Serbitar: No. Wireless was invented to make networking easier. Already happening, you know? And routing can be manipulated in a wireless world. Most devices won´t support a relevant stealth program, so they are clearly visible nodes.
@TinkerGnome: Spoofing is Hacking+Spoof against Pilot+Firewall. See "Using hacking skill" @Synner: I´m not confusing AR and VR - I think. In VR, any device is a node, and any node can be entered in VR, or did I misunderstand? What would stop me from illegally accessing a node on the fly in VR (+2 dice) and hiding in the coffeemaker until any hackers left the house terminal? Any camera on a security PAN would be safer than the controlling terminal just because cameras can´t support worthwhile defense programs. |
|
|
Feb 16 2006, 01:32 PM
Post
#19
|
|||
Running Target Group: Members Posts: 1,498 Joined: 4-August 05 From: ADL Member No.: 7,534 |
How do you do this? The coffe device does not interact with you. You cant even start to spoof. If you can, then its a normal hacking attempt which is already in the book. Why the "subscriber" rule. People tell me, that their drones are unhackable, because they are subscribed to their PAN and thus, the comlink of the rigger must be hacked first. But the comlink is subscribed to the comlink of the hacker and I have to hack that first. SO what? Can I spoof something, to hack the drone directly (rendering the "subscriber" rule useless and invalid), or do I have to go through the comlink chain? The latter leads to chockepoint solutions everywhere and kills SR4 wireless hacking. |
||
|
|||
Feb 16 2006, 01:33 PM
Post
#20
|
|||
Hoppelhäschen 5000 Group: Members Posts: 5,807 Joined: 3-January 04 Member No.: 5,951 |
Wrong. In fact, using electronic warfare, that is perfectly possible even for those 'fixed' connections. |
||
|
|||
Feb 16 2006, 01:36 PM
Post
#21
|
|
panda! Group: Members Posts: 10,331 Joined: 8-March 02 From: north of central europe Member No.: 2,242 |
and everything is still hackable, you just have to go thru the chokepoint first ;) some tricks never goes out of date.
if someone puts their house telecom on a subscribed link to a matrix provider node, then you go thru said matrix provider node. its a extra step but other then that its the same old same old. if you want to spoof the coffe machine, get within 3 meters of it (and as its wireless, that can be the next room or similar), spoof the signal and presto. simple != effortless! |
|
|
Feb 16 2006, 01:37 PM
Post
#22
|
|
Moving Target Group: Members Posts: 718 Joined: 10-September 05 From: Montevideo, in the elusive shadows of Latin America Member No.: 7,727 |
Personally, I go the way Synner does. In our game linked devices (nodes) can be hacked via spoof.
Procedure: 1. Take a matrix perception test to Analyze the exchange. 2. Spoof one of the devices into thinking you are its linked counterpart 3. Once inside Edit/Command/Crash (attack) at leisure. Plus, many times the spoofing isn't really necessary as many devices are usually "open" to anything (i.e. the fridge) Do you do things differently? Please explain... Cheers, Max |
|
|
Feb 16 2006, 01:39 PM
Post
#23
|
|||
Running Target Group: Members Posts: 1,498 Joined: 4-August 05 From: ADL Member No.: 7,534 |
So, in your interpretation, you can hack drones, subscribed to a PAN, simply by just spoofing the PAN? Can you back this up by BBB quotes ? AND this means that the subscriber rule doesnt actually do anything. You can still hack every device. Would be fine for me. |
||
|
|||
Feb 16 2006, 01:42 PM
Post
#24
|
|
Awakened Asset Group: Members Posts: 4,464 Joined: 9-April 05 From: AGS, North German League Member No.: 7,309 |
Maxhunter has it right. I think.
|
|
|
Feb 16 2006, 01:52 PM
Post
#25
|
|
Hoppelhäschen 5000 Group: Members Posts: 5,807 Joined: 3-January 04 Member No.: 5,951 |
Not really - that device isn't directly on the matrix (except you are on the controling Node), so a Matrix Perception Test won't get you anywhere - a Scan Test using Electronic Warfare is required to find the Node.
Then comes a Sniffer Test to intercept the signal and an Edit Test to insert data. |
|
|
Lo-Fi Version | Time is now: 29th March 2024 - 10:51 AM |
Topps, Inc has sole ownership of the names, logo, artwork, marks, photographs, sounds, audio, video and/or any proprietary material used in connection with the game Shadowrun. Topps, Inc has granted permission to the Dumpshock Forums to use such names, logos, artwork, marks and/or any proprietary materials for promotional and informational purposes on its website but does not endorse, and is not affiliated with the Dumpshock Forums in any official capacity whatsoever.