Electronic Security on Runs |
Electronic Security on Runs |
May 14 2006, 12:32 AM
Post
#1
|
|
Mr. Johnson Group: Dumpshocked Posts: 3,148 Joined: 27-February 06 From: UCAS Member No.: 8,314 |
I had this idea, and I'm wondering a) who's already thought of it, and b) whether it's a good idea.
On a run, have every other team member subscribe their PANs to the hacker's commlink. The hacker then acts as the only route to the outside world, theoretically securing (or making more secure) the team's PANs (including their cyberware). On the one hand, the street sammies et alia are much safer against a malign hacker. On the other hand, the team is boned if the hacker is attacked or jammed. |
|
|
May 14 2006, 01:14 AM
Post
#2
|
|
panda! Group: Members Posts: 10,331 Joined: 8-March 02 From: north of central europe Member No.: 2,242 |
i dont recall reading about exactly that idea before, but it does have similaritys with the "multiple interconnected comlinks" security meme.
and i kinda like the idea ;) |
|
|
May 14 2006, 02:49 AM
Post
#3
|
|
Great Dragon Group: Members Posts: 7,089 Joined: 4-October 05 Member No.: 7,813 |
and of course, it's no harder to spoof into the team LAN anyways, so it's still not really all that secure.
the only way to have a strong, secure commlink is for that specific commlink to be strong, and secured, or to have only wired connections. |
|
|
May 14 2006, 03:20 AM
Post
#4
|
|||
Mr. Johnson Group: Dumpshocked Posts: 3,148 Joined: 27-February 06 From: UCAS Member No.: 8,314 |
Sure it is. In order to spoof commands from the hacker's commlink, you have to find it first. In order to do that, you have to overcome its stealth, which is likely to be much higher than you average runner's. Just check the sample characters and their commlinks. Of course, even if you get that far, the Spoof Command action specifically describes sending commands to agents and drones, not to commlinks. Sure, it's not a huge leap to include them, but your mileage varies with your GM. Of course, the ultra-paranoid would change the ID of the hacker's commlink every sixty seconds or so, anyway, just to keep the security tight. |
||
|
|||
May 14 2006, 04:45 AM
Post
#5
|
|
Neophyte Runner Group: Members Posts: 2,073 Joined: 23-August 04 Member No.: 6,587 |
The other COM links are still operating a wireless connection witch can be hacked.
Also you will have issues with AR when you should be able to see something but the hacker is not within range of its signal. In order to force entry threw a gateway you can’t use a wireless connection (think about pan hacking and a skin link. Edward |
|
|
May 14 2006, 04:57 AM
Post
#6
|
|
Great Dragon Group: Members Posts: 5,430 Joined: 10-January 05 From: Fort Worth, Texas Member No.: 6,957 |
Copying programs is free, so everyone in the group should have the highest rating encryption programs and IC available running on their commlinks.
|
|
|
May 14 2006, 05:04 AM
Post
#7
|
|
Ain Soph Aur Group: Dumpshocked Posts: 3,477 Joined: 26-February 02 From: Montreal, Canada Member No.: 600 |
As was pointed out, the team's commlinks are still wifi enabled, and thus just as susceptible as ever to interception and hacking.
It's actually worse to do things this way, because if someone hacks the hacker's commlink, he has unchallenged access to the entire team's commlinks. If you keep the team's commlinks uncentralised, an attacker would have to hack each one to get in. So really, it's a liability with no gain. |
|
|
May 14 2006, 05:09 AM
Post
#8
|
|
Great Dragon Group: Members Posts: 5,430 Joined: 10-January 05 From: Fort Worth, Texas Member No.: 6,957 |
You should definitely run cables from each team member to the hacker's commlink so you can use his defenses without leaving yourself wifi enabled. ;)
|
|
|
May 14 2006, 05:34 AM
Post
#9
|
|
Target Group: Members Posts: 68 Joined: 19-April 06 From: Rio Rancho, NM Member No.: 8,484 |
Maybe I missed something, but wouldn't the easy way to get electronic security be to either not have everything on your PAN connected to your commlink (not sure if you can do that or if you have to have a commlink, but it makes sense to me) or to carry two, one of which has wireless off and runs all your gear skinlinked, the other one with wireless on, not connected to anything else on you, and which you use to run any AR or communications stuff you need?
|
|
|
May 14 2006, 06:41 AM
Post
#10
|
|
Runner Group: Members Posts: 2,925 Joined: 26-February 02 Member No.: 948 |
A somewhat secure setup.
1. Commlink 1: Wireless:Off, password required for access. This is the hackers "hacking" commlink and he's using 9 rating 4 programs on his response 5 commlink. This way he can use all the programs he need and still have a reasonable strong defense. 2. Commlink 2: Wireless:On, Linked Password required. This is the hackers second commlink and gateway to the matrix, his first node you could say. In order to access it you need a password and then an answer from commlink 1 that accepts that code. 3. Wire teams communications through commlink 2. Each team member runs with Linked Password to Hackers commlink in BOTH directions. In order to access either a team members commlink or the hackers they need a confirmation from one of the other team members commlinks. 4: Load up Commlink 2 with ECCM, Encryption on Device, Databomb on Device and Encryption on Signal. Then you fill the rest of the remaining 5 response slots with agents/IC for spoofing and analyzing for security of the commlink. Anyone trying to comprimise the commlink router would have to find, decrypt and then hack THROUGH commlink 2 in order to gain any kind of access to the teams commlinks. Ok, they CAN tap the signal but no system is foolproof, ask any hacker. :grinbig: Commlink 2 has another fun thing as well, no subscription list so it cannot be used to gain access to any items or gear. Yea, i'm not running the maximum strength on programs but I find that diversity is the key in this case. Running 9 programs with only a -1 to response is quite good, and that means I can theoretically run 9 rating 4 agents on a commlink. |
|
|
May 15 2006, 04:57 PM
Post
#11
|
|||
Shooting Target Group: Members Posts: 1,754 Joined: 9-July 04 From: Modesto, CA Member No.: 6,465 |
That's true, but can't you set the team's comlinks to only accept commands from the Hacker's com? Aside from feeding some false data or static, wouldn't you need to hack the Hacker's com to then start spoofing commands downstream? |
||
|
|||
May 15 2006, 05:43 PM
Post
#12
|
|||||
Mr. Johnson Group: Dumpshocked Posts: 3,148 Joined: 27-February 06 From: UCAS Member No.: 8,314 |
I think you're right, Grinder, although an enemy hacker can spoof the ID from where they are by finding the central hacker's hidden node, checking it out with matrix perception (to get the ID), and then attempt to beat the target with a spoofed ID. A defense against this could be to alter the central hacker's ID regularly. I don't have the rules (geez, I need to get a PDF copy), and I don't remember how long it takes to change a commlink's ID (it's on the same page as spoofing commands is, though). Anybody got that? |
||||
|
|||||
Lo-Fi Version | Time is now: 16th October 2024 - 03:47 AM |
Topps, Inc has sole ownership of the names, logo, artwork, marks, photographs, sounds, audio, video and/or any proprietary material used in connection with the game Shadowrun. Topps, Inc has granted permission to the Dumpshock Forums to use such names, logos, artwork, marks and/or any proprietary materials for promotional and informational purposes on its website but does not endorse, and is not affiliated with the Dumpshock Forums in any official capacity whatsoever.