IPB

Welcome Guest ( Log In | Register )

 
Reply to this topicStart new topic
> Electronic Security on Runs
Aaron
post May 14 2006, 12:32 AM
Post #1


Mr. Johnson
******

Group: Dumpshocked
Posts: 3,148
Joined: 27-February 06
From: UCAS
Member No.: 8,314



I had this idea, and I'm wondering a) who's already thought of it, and b) whether it's a good idea.

On a run, have every other team member subscribe their PANs to the hacker's commlink. The hacker then acts as the only route to the outside world, theoretically securing (or making more secure) the team's PANs (including their cyberware).

On the one hand, the street sammies et alia are much safer against a malign hacker. On the other hand, the team is boned if the hacker is attacked or jammed.
Go to the top of the page
 
+Quote Post
hobgoblin
post May 14 2006, 01:14 AM
Post #2


panda!
**********

Group: Members
Posts: 10,331
Joined: 8-March 02
From: north of central europe
Member No.: 2,242



i dont recall reading about exactly that idea before, but it does have similaritys with the "multiple interconnected comlinks" security meme.

and i kinda like the idea ;)
Go to the top of the page
 
+Quote Post
Jaid
post May 14 2006, 02:49 AM
Post #3


Great Dragon
*********

Group: Members
Posts: 7,089
Joined: 4-October 05
Member No.: 7,813



and of course, it's no harder to spoof into the team LAN anyways, so it's still not really all that secure.

the only way to have a strong, secure commlink is for that specific commlink to be strong, and secured, or to have only wired connections.
Go to the top of the page
 
+Quote Post
Aaron
post May 14 2006, 03:20 AM
Post #4


Mr. Johnson
******

Group: Dumpshocked
Posts: 3,148
Joined: 27-February 06
From: UCAS
Member No.: 8,314



QUOTE (Jaid)
and of course, it's no harder to spoof into the team LAN anyways, so it's still not really all that secure.

Sure it is. In order to spoof commands from the hacker's commlink, you have to find it first. In order to do that, you have to overcome its stealth, which is likely to be much higher than you average runner's. Just check the sample characters and their commlinks.

Of course, even if you get that far, the Spoof Command action specifically describes sending commands to agents and drones, not to commlinks. Sure, it's not a huge leap to include them, but your mileage varies with your GM.

Of course, the ultra-paranoid would change the ID of the hacker's commlink every sixty seconds or so, anyway, just to keep the security tight.
Go to the top of the page
 
+Quote Post
Edward
post May 14 2006, 04:45 AM
Post #5


Neophyte Runner
*****

Group: Members
Posts: 2,073
Joined: 23-August 04
Member No.: 6,587



The other COM links are still operating a wireless connection witch can be hacked.

Also you will have issues with AR when you should be able to see something but the hacker is not within range of its signal.

In order to force entry threw a gateway you canít use a wireless connection (think about pan hacking and a skin link.

Edward
Go to the top of the page
 
+Quote Post
James McMurray
post May 14 2006, 04:57 AM
Post #6


Great Dragon
*********

Group: Members
Posts: 5,430
Joined: 10-January 05
From: Fort Worth, Texas
Member No.: 6,957



Copying programs is free, so everyone in the group should have the highest rating encryption programs and IC available running on their commlinks.
Go to the top of the page
 
+Quote Post
Backgammon
post May 14 2006, 05:04 AM
Post #7


Ain Soph Aur
******

Group: Dumpshocked
Posts: 3,477
Joined: 26-February 02
From: Montreal, Canada
Member No.: 600



As was pointed out, the team's commlinks are still wifi enabled, and thus just as susceptible as ever to interception and hacking.

It's actually worse to do things this way, because if someone hacks the hacker's commlink, he has unchallenged access to the entire team's commlinks.

If you keep the team's commlinks uncentralised, an attacker would have to hack each one to get in.

So really, it's a liability with no gain.
Go to the top of the page
 
+Quote Post
James McMurray
post May 14 2006, 05:09 AM
Post #8


Great Dragon
*********

Group: Members
Posts: 5,430
Joined: 10-January 05
From: Fort Worth, Texas
Member No.: 6,957



You should definitely run cables from each team member to the hacker's commlink so you can use his defenses without leaving yourself wifi enabled. ;)
Go to the top of the page
 
+Quote Post
DrowVampyre
post May 14 2006, 05:34 AM
Post #9


Target
*

Group: Members
Posts: 68
Joined: 19-April 06
From: Rio Rancho, NM
Member No.: 8,484



Maybe I missed something, but wouldn't the easy way to get electronic security be to either not have everything on your PAN connected to your commlink (not sure if you can do that or if you have to have a commlink, but it makes sense to me) or to carry two, one of which has wireless off and runs all your gear skinlinked, the other one with wireless on, not connected to anything else on you, and which you use to run any AR or communications stuff you need?
Go to the top of the page
 
+Quote Post
The Jopp
post May 14 2006, 06:41 AM
Post #10


Runner
******

Group: Members
Posts: 2,925
Joined: 26-February 02
Member No.: 948



A somewhat secure setup.

1. Commlink 1: Wireless:Off, password required for access.
This is the hackers "hacking" commlink and he's using 9 rating 4 programs on his response 5 commlink. This way he can use all the programs he need and still have a reasonable strong defense.

2. Commlink 2: Wireless:On, Linked Password required.
This is the hackers second commlink and gateway to the matrix, his first node you could say. In order to access it you need a password and then an answer from commlink 1 that accepts that code.

3. Wire teams communications through commlink 2. Each team member runs with Linked Password to Hackers commlink in BOTH directions. In order to access either a team members commlink or the hackers they need a confirmation from one of the other team members commlinks.

4: Load up Commlink 2 with ECCM, Encryption on Device, Databomb on Device and Encryption on Signal. Then you fill the rest of the remaining 5 response slots with agents/IC for spoofing and analyzing for security of the commlink.

Anyone trying to comprimise the commlink router would have to find, decrypt and then hack THROUGH commlink 2 in order to gain any kind of access to the teams commlinks.

Ok, they CAN tap the signal but no system is foolproof, ask any hacker. :grinbig:

Commlink 2 has another fun thing as well, no subscription list so it cannot be used to gain access to any items or gear.

Yea, i'm not running the maximum strength on programs but I find that diversity is the key in this case. Running 9 programs with only a -1 to response is quite good, and that means I can theoretically run 9 rating 4 agents on a commlink.
Go to the top of the page
 
+Quote Post
GrinderTheTroll
post May 15 2006, 04:57 PM
Post #11


Shooting Target
****

Group: Members
Posts: 1,754
Joined: 9-July 04
From: Modesto, CA
Member No.: 6,465



QUOTE (Edward)
The other COM links are still operating a wireless connection witch can be hacked.

Also you will have issues with AR when you should be able to see something but the hacker is not within range of its signal.

In order to force entry threw a gateway you canít use a wireless connection (think about pan hacking and a skin link.

Edward

That's true, but can't you set the team's comlinks to only accept commands from the Hacker's com? Aside from feeding some false data or static, wouldn't you need to hack the Hacker's com to then start spoofing commands downstream?
Go to the top of the page
 
+Quote Post
Aaron
post May 15 2006, 05:43 PM
Post #12


Mr. Johnson
******

Group: Dumpshocked
Posts: 3,148
Joined: 27-February 06
From: UCAS
Member No.: 8,314



QUOTE (GrinderTheTroll)
QUOTE (Edward @ May 13 2006, 09:45 PM)
The other COM links are still operating a wireless connection witch can be hacked.

Also you will have issues with AR when you should be able to see something but the hacker is not within range of its signal.

In order to force entry threw a gateway you canít use a wireless connection (think about pan hacking and a skin link.

Edward

That's true, but can't you set the team's comlinks to only accept commands from the Hacker's com? Aside from feeding some false data or static, wouldn't you need to hack the Hacker's com to then start spoofing commands downstream?

I think you're right, Grinder, although an enemy hacker can spoof the ID from where they are by finding the central hacker's hidden node, checking it out with matrix perception (to get the ID), and then attempt to beat the target with a spoofed ID.

A defense against this could be to alter the central hacker's ID regularly. I don't have the rules (geez, I need to get a PDF copy), and I don't remember how long it takes to change a commlink's ID (it's on the same page as spoofing commands is, though). Anybody got that?
Go to the top of the page
 
+Quote Post

Reply to this topicStart new topic

 



RSS Lo-Fi Version Time is now: 14th April 2024 - 07:28 AM

Topps, Inc has sole ownership of the names, logo, artwork, marks, photographs, sounds, audio, video and/or any proprietary material used in connection with the game Shadowrun. Topps, Inc has granted permission to the Dumpshock Forums to use such names, logos, artwork, marks and/or any proprietary materials for promotional and informational purposes on its website but does not endorse, and is not affiliated with the Dumpshock Forums in any official capacity whatsoever.