My Assistant
![]() ![]() |
May 16 2006, 08:32 AM
Post
#1
|
|
|
Neophyte Runner ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 2,073 Joined: 23-August 04 Member No.: 6,587 |
Safe decryption, the powerful rating 1 comlink.
Having stolen encrypted data file to decrypt at my leisure I am concerned that it could contain IC or a data bomb, not trusting myself to notice such I load the file onto a cheep rating 1 comlink along with a rating 1 decrypt utility. With some effort (using low end decrypt prog) I crack open the file. The ice or data bomb attempts to run but the system is already running the maximum number of programs. I see 3 possible outcomes. The IC runes, the comlinks response drops to 0, the system may crash or continue to run will all programs (including IC) working at rating 0, thus nothing bad happens to me or my file while I deal with the IC based on my skill alone. The system crashes and with luck I got an idea of where the IC/data bomb is giving me an advantage when I try again (I copied the file). The IC/data bomb fails to run at all because there is no runtime available, i can now read the file at my leisure while the IC waits for the system resources it needs to fry my brain. What do you good people think of this. Edward |
|
|
|
May 16 2006, 09:28 AM
Post
#2
|
|
|
Awakened Asset ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 4,464 Joined: 9-April 05 From: AGS, North German League Member No.: 7,309 |
I think it is option 4: You fail to open the file. Nothing happens.
Reason: Running the data bomb is part of the process of opening the file. You either can or you can´t do that. If you can open the file, the databomb runs and does its work. (One could allow for opening the file anyway, but something better than "MS whatever" should prevent that. In that case option 2 with no information gained) Regarding copying the file: How? Copy should be a form of access - the bomb should be triggered at that stage. |
|
|
|
May 16 2006, 09:29 AM
Post
#3
|
|
|
Running Target ![]() ![]() ![]() Group: Members Posts: 1,498 Joined: 4-August 05 From: ADL Member No.: 7,534 |
1st: decryption rules are broken
2nd: fix decryption rules (to something like a treshold of 4 x encryption rating) 3rd: you can (optionally, but this is a MUST) only roll "dice" times in RAW (I would fix that to "skill" times) 4th: With a comlink of 1 you can only roll 2 (response+decryption)dice 2 times, to a maximum number of 4 hits. This comlink is at best going to crack an encryption of 1. (With my house rule, you roll Logic+Hacking with a maximum number of "hacking" rolls and a maximum number of "decryption" hits per roll, so thats 6 hits with hacking 6 and decryption 1) Rules exploit fixed. |
|
|
|
May 16 2006, 09:30 AM
Post
#4
|
|
|
Running Target ![]() ![]() ![]() Group: Members Posts: 1,000 Joined: 17-November 05 From: Halifax, Canada Member No.: 7,975 |
If copying the file would have triggered the Data Bomb, then it would have triggered in the node he originally found it in.
|
|
|
|
May 16 2006, 09:35 AM
Post
#5
|
|
|
Moving Target ![]() ![]() Group: Members Posts: 681 Joined: 28-February 06 From: UK Member No.: 8,319 |
Agreed. But I rule that copying would trigger a data bomb. Otherwise it's just too easy for a hacker to go into a node, copy everything, then retire to a safe distance and pick over it at leisure.
|
|
|
|
May 16 2006, 10:02 AM
Post
#6
|
|
|
panda! ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 10,331 Joined: 8-March 02 From: north of central europe Member No.: 2,242 |
i would say that the ice runs and beats the crap out of the hackers persona. but then i have my own interpetation about how the response drop works...
|
|
|
|
May 16 2006, 10:28 AM
Post
#7
|
|
|
Runner ![]() ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 2,925 Joined: 26-February 02 Member No.: 948 |
I would rule that trying to access the file in ANY way would trigger the databomb unless it was found and disabled. The databomb should have exploded within the node he was active in if he tried to copy it.
What I find annoying is that Databombs aren't that scary, they do Rating boxes of damage, that's a maximum of six boxes of damage. I'd rather see that they did Rating X2 boxes so that even low yield bombs would actually make you sweat when disarming them. |
|
|
|
May 16 2006, 10:34 AM
Post
#8
|
|
|
Running Target ![]() ![]() ![]() Group: Members Posts: 1,498 Joined: 4-August 05 From: ADL Member No.: 7,534 |
I think, the fact that they can trigger an alarm is THE most dangerous thing. Secondly, they destroy the data file, wich is the main use of the bomb. The data-bomb would be useful even without any damage. The damage is just an additional gimmick.
|
|
|
|
May 16 2006, 11:52 AM
Post
#9
|
|||
|
Runner ![]() ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 2,925 Joined: 26-February 02 Member No.: 948 |
Hmm, yea, I guess - but it would be nice with databombs that are just there to inflict damage. :grinbig: |
||
|
|
|||
May 16 2006, 01:54 PM
Post
#10
|
|||
|
Mr. Johnson ![]() ![]() ![]() ![]() ![]() ![]() Group: Dumpshocked Posts: 3,148 Joined: 27-February 06 From: UCAS Member No.: 8,314 |
According to the hymnal, that which triggers a Data Bomb is decided when it is set. Thus, it could go off when the file is accessed, copied, edited, or even analyzed. |
||
|
|
|||
May 16 2006, 02:16 PM
Post
#11
|
|
|
Runner ![]() ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 2,925 Joined: 26-February 02 Member No.: 948 |
Hmm, according to the RAW it does say when "Accessed". This should mean that any action involving the file in question like copying, moving etc would make the file to go off.
Matrix perception tests are not an action that would trigger the bomb since you are just looking at it, albeit a bit closer. But here's the funny side of it. If you have Admin access (and IF the admin access include private files) you COULD use the admin access to copy the file to a crappy commlink. EDIT: Admins should have the right to move files, it would be quite inconvenient to have a few hundred files scattered around to suddenly go *pop* when they start moving to a new server... :grinbig: |
|
|
|
May 16 2006, 03:36 PM
Post
#12
|
|
|
Moving Target ![]() ![]() Group: Members Posts: 351 Joined: 17-February 06 From: San Francisco Member No.: 8,275 |
It doesn't take a complex action for Data Bombs to go off like it does for normal programs, they happen instantly then disappear. So it seems to be that the Data Bomb program isn't actually running. It ran when it installed the Bomb, then whoever installed the Bomb left. So the Data Bomb's Effects aren't programs.
The presence of a encrypted file doesn't mean that Encrypt is running, so a data bomb that goes off isn't a full program, just a self-contained file. But that's just me. :grinbig: |
|
|
|
May 16 2006, 04:41 PM
Post
#13
|
|
|
Neophyte Runner ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 2,073 Joined: 23-August 04 Member No.: 6,587 |
Copying would trigger a data bomb only if the data bomb is not encrypted. (Bomb added after encryption). This was described in SR4 in a side bar on IC and encryption
On a rating 1 system you would be rolling hacking + program (1) if you have hacking 5 that is 6 dice 6 times, 36 dice will open pretty much any file. Glayvin34’s interpretation could be correct, it is also posable that the passage I read aplyed only to IC not to databombs. This would mean it is only necessary for programs with encrypted IC, not encrypted data bombs. Edward |
|
|
|
May 16 2006, 05:08 PM
Post
#14
|
|||
|
Mr. Johnson ![]() ![]() ![]() ![]() ![]() ![]() Group: Dumpshocked Posts: 3,148 Joined: 27-February 06 From: UCAS Member No.: 8,314 |
My guess would be that a Data Bomb actually executable instructions to an operating system, either the hacker's or an agent's virtual machine. That way it can still munge up a system without actually running itself. |
||
|
|
|||
May 16 2006, 05:15 PM
Post
#15
|
|||
|
Mr. Johnson ![]() ![]() ![]() ![]() ![]() ![]() Group: Dumpshocked Posts: 3,148 Joined: 27-February 06 From: UCAS Member No.: 8,314 |
At the risk of looking dumb (nothing new, really), and not having the rules in front of me, isn't Decrypting done with Response + Decrypt? |
||
|
|
|||
May 16 2006, 05:21 PM
Post
#16
|
|
|
Shooting Target ![]() ![]() ![]() ![]() Group: Members Posts: 1,590 Joined: 11-September 04 Member No.: 6,650 |
computer + decrypt actually
|
|
|
|
May 16 2006, 05:22 PM
Post
#17
|
|
|
Mr. Johnson ![]() ![]() ![]() ![]() ![]() ![]() Group: Dumpshocked Posts: 3,148 Joined: 27-February 06 From: UCAS Member No.: 8,314 |
That's it, I'm gettin' me the PDF ...
|
|
|
|
May 16 2006, 05:46 PM
Post
#18
|
|||
|
Hoppelhäschen 5000 ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 5,807 Joined: 3-January 04 Member No.: 5,951 |
Not at all - it would be Hacking + Decrypt as it's a Hacking Program... but the actual rules use Response + Decrypt. |
||
|
|
|||
May 16 2006, 05:53 PM
Post
#19
|
|
|
Moving Target ![]() ![]() Group: Members Posts: 565 Joined: 7-January 04 Member No.: 5,965 |
actualy, decrypt uses the electronic warfare skill, not hacking.
this is an important skill, as it means a non-computer person who specializes in comunications equipment can still encrypt/decrypt broadcast transmissions without need for any real understanding of computers and hacking. a rigger, for instance, will have a high electronic warfare, but probably will have little use for hacking. so you roll Electronic warefare+Encrypt/Decrypt. this skill has no default, so the unskilled should not be able to perform this action. |
|
|
|
May 16 2006, 05:55 PM
Post
#20
|
|||
|
Mr. Johnson ![]() ![]() ![]() ![]() ![]() ![]() Group: Dumpshocked Posts: 3,148 Joined: 27-February 06 From: UCAS Member No.: 8,314 |
Oh. Well, I'm gettin' it anyway. |
||
|
|
|||
May 16 2006, 05:57 PM
Post
#21
|
|||||
|
Hoppelhäschen 5000 ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 5,807 Joined: 3-January 04 Member No.: 5,951 |
I stand corrected - Defuse uses Hacking, though...
Not quite: The Program is required and can run alone. And the actual rules for Decryption rely on Response. |
||||
|
|
|||||
May 16 2006, 06:01 PM
Post
#22
|
|||||||
|
Moving Target ![]() ![]() Group: Members Posts: 681 Joined: 28-February 06 From: UK Member No.: 8,319 |
I can't find this reference, though on p222 it does say:
Of course that doesn't mean a data bomb will only go off (if copied) if it was not encrypted first.
Agreed, but what kind of SysOp is going to protect a file in such a way that there's such an easy way around it? If you can copy a Data Bomb without any trouble and then spend all the time you want getting in to it (including copying it multiple times, so it doesn't even matter if one goes off and destroys the data) then the SysOp responsible deserves what he or she gets. I guess the bottom line (with any of these sort of ideas) is: yes, it's a neat idea, but if it sounds too good to be true then your enemy (and the entire hacker+SysOp community) has probably thought of it and made sure you can't do it, unless this is the very first time that anybody anywhere discovered this exploit. Or in metagame terms: your GM probably isn't going to allow you to get away with this! So play the rules in the spirit that they were intended! |
||||||
|
|
|||||||
May 16 2006, 06:44 PM
Post
#23
|
|||||
|
Moving Target ![]() ![]() Group: Members Posts: 371 Joined: 10-January 06 From: Regina Member No.: 8,145 |
Ok, chock up another confusing inconsistency in the rule book. Under the section title "Using Electronic Warfare Skill" the sub-heading "Encryption and Decryption" says:
However, later under "programs" the Decrypt Program is listed as being related to the Electronic Warfare skill:
The page reference there is to the above section. So, it seems Decrypt is "related" to the Electronic Warfare skill but you use Responce when you actually roll?
|
||||
|
|
|||||
May 16 2006, 06:50 PM
Post
#24
|
|||
|
Mr. Johnson ![]() ![]() ![]() ![]() ![]() ![]() Group: Dumpshocked Posts: 3,148 Joined: 27-February 06 From: UCAS Member No.: 8,314 |
Makes sense to me. Cryptanalysis (code breaking) is mostly a series of brute-force and semi-brute-force attacks on the encrypted data, trying to pull the information out of the hash. So, the more data you can work through in a given time (Response) and the better your attacks (Decrypt program), the faster you decrypt. |
||
|
|
|||
May 17 2006, 10:50 AM
Post
#25
|
|
|
Running Target ![]() ![]() ![]() Group: Members Posts: 1,498 Joined: 4-August 05 From: ADL Member No.: 7,534 |
I can just repeat myself:
1st: the encryption rules are broken 2nd: the response+decrypt thing may be realistic, but it is missleading as it is breaking SR4s system of skill+programme, that has already broken the attribute+skill system, again. Thats why I use logic+skill, with programme as hit limiter (just like spells). And my decryption test is: logic+electronic warfare (4xEcryption rating, 1 turn/1hour) with "electronic warfare" rolls. (turn or hour depends on whether it is real time encryption for communications or data encryption). Balanced, consistent, works. |
|
|
|
![]() ![]() |
|
Lo-Fi Version | Time is now: 13th April 2022 - 01:21 AM |
Topps, Inc has sole ownership of the names, logo, artwork, marks, photographs, sounds, audio, video and/or any proprietary material used in connection with the game Shadowrun. Topps, Inc has granted permission to the Dumpshock Forums to use such names, logos, artwork, marks and/or any proprietary materials for promotional and informational purposes on its website but does not endorse, and is not affiliated with the Dumpshock Forums in any official capacity whatsoever.