IPB
X   Site Message
(Message will auto close in 2 seconds)

Welcome Guest ( Log In | Register )

2 Pages V   1 2 >  
Reply to this topicStart new topic
> Safe decryption,, the powerful rating 1 comlink.
Edward
post May 16 2006, 08:32 AM
Post #1


Neophyte Runner
*****

Group: Members
Posts: 2,073
Joined: 23-August 04
Member No.: 6,587



Safe decryption, the powerful rating 1 comlink.

Having stolen encrypted data file to decrypt at my leisure I am concerned that it could contain IC or a data bomb, not trusting myself to notice such I load the file onto a cheep rating 1 comlink along with a rating 1 decrypt utility. With some effort (using low end decrypt prog) I crack open the file. The ice or data bomb attempts to run but the system is already running the maximum number of programs.

I see 3 possible outcomes.

The IC runes, the comlinks response drops to 0,

the system may crash or continue to run will all programs (including IC) working at rating 0, thus nothing bad happens to me or my file while I deal with the IC based on my skill alone.

The system crashes and with luck I got an idea of where the IC/data bomb is giving me an advantage when I try again (I copied the file).

The IC/data bomb fails to run at all because there is no runtime available, i can now read the file at my leisure while the IC waits for the system resources it needs to fry my brain.

What do you good people think of this.

Edward
Go to the top of the page
 
+Quote Post
Ryu
post May 16 2006, 09:28 AM
Post #2


Awakened Asset
********

Group: Members
Posts: 4,464
Joined: 9-April 05
From: AGS, North German League
Member No.: 7,309



I think it is option 4: You fail to open the file. Nothing happens.

Reason: Running the data bomb is part of the process of opening the file. You either can or you can´t do that. If you can open the file, the databomb runs and does its work. (One could allow for opening the file anyway, but something better than "MS whatever" should prevent that. In that case option 2 with no information gained)

Regarding copying the file: How? Copy should be a form of access - the bomb should be triggered at that stage.
Go to the top of the page
 
+Quote Post
Serbitar
post May 16 2006, 09:29 AM
Post #3


Running Target
***

Group: Members
Posts: 1,498
Joined: 4-August 05
From: ADL
Member No.: 7,534



1st: decryption rules are broken
2nd: fix decryption rules (to something like a treshold of 4 x encryption rating)
3rd: you can (optionally, but this is a MUST) only roll "dice" times in RAW (I would fix that to "skill" times)
4th: With a comlink of 1 you can only roll 2 (response+decryption)dice 2 times, to a maximum number of 4 hits. This comlink is at best going to crack an encryption of 1.
(With my house rule, you roll Logic+Hacking with a maximum number of "hacking" rolls and a maximum number of "decryption" hits per roll, so thats 6 hits with hacking 6 and decryption 1)

Rules exploit fixed.
Go to the top of the page
 
+Quote Post
Dranem
post May 16 2006, 09:30 AM
Post #4


Running Target
***

Group: Members
Posts: 1,000
Joined: 17-November 05
From: Halifax, Canada
Member No.: 7,975



If copying the file would have triggered the Data Bomb, then it would have triggered in the node he originally found it in.
Go to the top of the page
 
+Quote Post
Witness
post May 16 2006, 09:35 AM
Post #5


Moving Target
**

Group: Members
Posts: 681
Joined: 28-February 06
From: UK
Member No.: 8,319



Agreed. But I rule that copying would trigger a data bomb. Otherwise it's just too easy for a hacker to go into a node, copy everything, then retire to a safe distance and pick over it at leisure.
Go to the top of the page
 
+Quote Post
hobgoblin
post May 16 2006, 10:02 AM
Post #6


panda!
**********

Group: Members
Posts: 10,331
Joined: 8-March 02
From: north of central europe
Member No.: 2,242



i would say that the ice runs and beats the crap out of the hackers persona. but then i have my own interpetation about how the response drop works...
Go to the top of the page
 
+Quote Post
The Jopp
post May 16 2006, 10:28 AM
Post #7


Runner
******

Group: Members
Posts: 2,925
Joined: 26-February 02
Member No.: 948



I would rule that trying to access the file in ANY way would trigger the databomb unless it was found and disabled. The databomb should have exploded within the node he was active in if he tried to copy it.

What I find annoying is that Databombs aren't that scary, they do Rating boxes of damage, that's a maximum of six boxes of damage. I'd rather see that they did Rating X2 boxes so that even low yield bombs would actually make you sweat when disarming them.
Go to the top of the page
 
+Quote Post
Serbitar
post May 16 2006, 10:34 AM
Post #8


Running Target
***

Group: Members
Posts: 1,498
Joined: 4-August 05
From: ADL
Member No.: 7,534



I think, the fact that they can trigger an alarm is THE most dangerous thing. Secondly, they destroy the data file, wich is the main use of the bomb. The data-bomb would be useful even without any damage. The damage is just an additional gimmick.
Go to the top of the page
 
+Quote Post
The Jopp
post May 16 2006, 11:52 AM
Post #9


Runner
******

Group: Members
Posts: 2,925
Joined: 26-February 02
Member No.: 948



QUOTE (Serbitar)
I think, the fact that they can trigger an alarm is THE most dangerous thing. Secondly, they destroy the data file, wich is the main use of the bomb. The data-bomb would be useful even without any damage. The damage is just an additional gimmick.

Hmm, yea, I guess - but it would be nice with databombs that are just there to inflict damage. :grinbig:
Go to the top of the page
 
+Quote Post
Aaron
post May 16 2006, 01:54 PM
Post #10


Mr. Johnson
******

Group: Dumpshocked
Posts: 3,148
Joined: 27-February 06
From: UCAS
Member No.: 8,314



QUOTE (Witness)
Agreed. But I rule that copying would trigger a data bomb.

According to the hymnal, that which triggers a Data Bomb is decided when it is set. Thus, it could go off when the file is accessed, copied, edited, or even analyzed.
Go to the top of the page
 
+Quote Post
The Jopp
post May 16 2006, 02:16 PM
Post #11


Runner
******

Group: Members
Posts: 2,925
Joined: 26-February 02
Member No.: 948



Hmm, according to the RAW it does say when "Accessed". This should mean that any action involving the file in question like copying, moving etc would make the file to go off.

Matrix perception tests are not an action that would trigger the bomb since you are just looking at it, albeit a bit closer.

But here's the funny side of it. If you have Admin access (and IF the admin access include private files) you COULD use the admin access to copy the file to a crappy commlink.

EDIT: Admins should have the right to move files, it would be quite inconvenient to have a few hundred files scattered around to suddenly go *pop* when they start moving to a new server... :grinbig:
Go to the top of the page
 
+Quote Post
Glayvin34
post May 16 2006, 03:36 PM
Post #12


Moving Target
**

Group: Members
Posts: 351
Joined: 17-February 06
From: San Francisco
Member No.: 8,275



It doesn't take a complex action for Data Bombs to go off like it does for normal programs, they happen instantly then disappear. So it seems to be that the Data Bomb program isn't actually running. It ran when it installed the Bomb, then whoever installed the Bomb left. So the Data Bomb's Effects aren't programs.
The presence of a encrypted file doesn't mean that Encrypt is running, so a data bomb that goes off isn't a full program, just a self-contained file.
But that's just me. :grinbig:
Go to the top of the page
 
+Quote Post
Edward
post May 16 2006, 04:41 PM
Post #13


Neophyte Runner
*****

Group: Members
Posts: 2,073
Joined: 23-August 04
Member No.: 6,587



Copying would trigger a data bomb only if the data bomb is not encrypted. (Bomb added after encryption). This was described in SR4 in a side bar on IC and encryption

On a rating 1 system you would be rolling hacking + program (1) if you have hacking 5 that is 6 dice 6 times, 36 dice will open pretty much any file.

Glayvin34’s interpretation could be correct, it is also posable that the passage I read aplyed only to IC not to databombs.

This would mean it is only necessary for programs with encrypted IC, not encrypted data bombs.

Edward
Go to the top of the page
 
+Quote Post
Aaron
post May 16 2006, 05:08 PM
Post #14


Mr. Johnson
******

Group: Dumpshocked
Posts: 3,148
Joined: 27-February 06
From: UCAS
Member No.: 8,314



QUOTE (Glayvin34)
It doesn't take a complex action for Data Bombs to go off like it does for normal programs, they happen instantly then disappear. So it seems to be that the Data Bomb program isn't actually running.

My guess would be that a Data Bomb actually executable instructions to an operating system, either the hacker's or an agent's virtual machine. That way it can still munge up a system without actually running itself.
Go to the top of the page
 
+Quote Post
Aaron
post May 16 2006, 05:15 PM
Post #15


Mr. Johnson
******

Group: Dumpshocked
Posts: 3,148
Joined: 27-February 06
From: UCAS
Member No.: 8,314



QUOTE (Edward)
On a rating 1 system you would be rolling hacking + program (1) if you have hacking 5 that is 6 dice 6 times, 36 dice will open pretty much any file.

At the risk of looking dumb (nothing new, really), and not having the rules in front of me, isn't Decrypting done with Response + Decrypt?
Go to the top of the page
 
+Quote Post
Kremlin KOA
post May 16 2006, 05:21 PM
Post #16


Shooting Target
****

Group: Members
Posts: 1,590
Joined: 11-September 04
Member No.: 6,650



computer + decrypt actually
Go to the top of the page
 
+Quote Post
Aaron
post May 16 2006, 05:22 PM
Post #17


Mr. Johnson
******

Group: Dumpshocked
Posts: 3,148
Joined: 27-February 06
From: UCAS
Member No.: 8,314



That's it, I'm gettin' me the PDF ...
Go to the top of the page
 
+Quote Post
Rotbart van Dain...
post May 16 2006, 05:46 PM
Post #18


Hoppelhäschen 5000
*********

Group: Members
Posts: 5,807
Joined: 3-January 04
Member No.: 5,951



QUOTE (Kremlin KOA @ May 16 2006, 07:21 PM)
computer + decrypt actually

Not at all - it would be Hacking + Decrypt as it's a Hacking Program... but the actual rules use Response + Decrypt.
Go to the top of the page
 
+Quote Post
Teulisch
post May 16 2006, 05:53 PM
Post #19


Moving Target
**

Group: Members
Posts: 565
Joined: 7-January 04
Member No.: 5,965



actualy, decrypt uses the electronic warfare skill, not hacking.

this is an important skill, as it means a non-computer person who specializes in comunications equipment can still encrypt/decrypt broadcast transmissions without need for any real understanding of computers and hacking.

a rigger, for instance, will have a high electronic warfare, but probably will have little use for hacking.

so you roll Electronic warefare+Encrypt/Decrypt. this skill has no default, so the unskilled should not be able to perform this action.
Go to the top of the page
 
+Quote Post
Aaron
post May 16 2006, 05:55 PM
Post #20


Mr. Johnson
******

Group: Dumpshocked
Posts: 3,148
Joined: 27-February 06
From: UCAS
Member No.: 8,314



QUOTE (Rotbart van Dainig)
... but the actual rules use Response + Decrypt.

Oh. Well, I'm gettin' it anyway.
Go to the top of the page
 
+Quote Post
Rotbart van Dain...
post May 16 2006, 05:57 PM
Post #21


Hoppelhäschen 5000
*********

Group: Members
Posts: 5,807
Joined: 3-January 04
Member No.: 5,951



QUOTE (Teulisch)
actualy, decrypt uses the electronic warfare skill, not hacking.

I stand corrected - Defuse uses Hacking, though...

QUOTE (Teulisch)
so you roll Electronic warefare+Encrypt/Decrypt. this skill has no default, so the unskilled should not be able to perform this action.

Not quite:

The Program is required and can run alone. And the actual rules for Decryption rely on Response.
Go to the top of the page
 
+Quote Post
Witness
post May 16 2006, 06:01 PM
Post #22


Moving Target
**

Group: Members
Posts: 681
Joined: 28-February 06
From: UK
Member No.: 8,319



QUOTE (Edward)
Copying would trigger a data bomb only if the data bomb is not encrypted. (Bomb added after encryption). This was described in SR4 in a side bar on IC and encryption

I can't find this reference, though on p222 it does say:
QUOTE (p222)
IC programs may be encrypted with sensitive files, so that when the files are decrypted, the IC will verify the user’s identity and attack or destroy the file if they are not authorized.

Of course that doesn't mean a data bomb will only go off (if copied) if it was not encrypted first.

QUOTE (Aaron)
According to the hymnal, that which triggers a Data Bomb is decided when it is set. Thus, it could go off when the file is accessed, copied, edited, or even analyzed.

Agreed, but what kind of SysOp is going to protect a file in such a way that there's such an easy way around it? If you can copy a Data Bomb without any trouble and then spend all the time you want getting in to it (including copying it multiple times, so it doesn't even matter if one goes off and destroys the data) then the SysOp responsible deserves what he or she gets.

I guess the bottom line (with any of these sort of ideas) is: yes, it's a neat idea, but if it sounds too good to be true then your enemy (and the entire hacker+SysOp community) has probably thought of it and made sure you can't do it, unless this is the very first time that anybody anywhere discovered this exploit. Or in metagame terms: your GM probably isn't going to allow you to get away with this! So play the rules in the spirit that they were intended!
Go to the top of the page
 
+Quote Post
mdynna
post May 16 2006, 06:44 PM
Post #23


Moving Target
**

Group: Members
Posts: 371
Joined: 10-January 06
From: Regina
Member No.: 8,145



Ok, chock up another confusing inconsistency in the rule book. Under the section title "Using Electronic Warfare Skill" the sub-heading "Encryption and Decryption" says:
QUOTE (SR4 pg. 225)
Make a Decrypt + Response
(Encryption rating x 2, 1 Combat Turn) Extended Test to break
the encryption.
However, later under "programs" the Decrypt Program is listed as being related to the Electronic Warfare skill:
QUOTE (SR4 pg. 227)
Decrypt (Electronic Warfare)
Decrypt programs are designed to conduct a number of cipher-
busting attacks—from pattern analysis to brute-force dictionary
assaults to sophisticated mathematical tricks—to break
into an encrypted system or service. Use Decrypt programs for
Decrypt actions (p. 225).
The page reference there is to the above section. So, it seems Decrypt is "related" to the Electronic Warfare skill but you use Responce when you actually roll?
Go to the top of the page
 
+Quote Post
Aaron
post May 16 2006, 06:50 PM
Post #24


Mr. Johnson
******

Group: Dumpshocked
Posts: 3,148
Joined: 27-February 06
From: UCAS
Member No.: 8,314



QUOTE (mdynna)
So, it seems Decrypt is "related" to the Electronic Warfare skill but you use Responce when you actually roll?

Makes sense to me. Cryptanalysis (code breaking) is mostly a series of brute-force and semi-brute-force attacks on the encrypted data, trying to pull the information out of the hash. So, the more data you can work through in a given time (Response) and the better your attacks (Decrypt program), the faster you decrypt.
Go to the top of the page
 
+Quote Post
Serbitar
post May 17 2006, 10:50 AM
Post #25


Running Target
***

Group: Members
Posts: 1,498
Joined: 4-August 05
From: ADL
Member No.: 7,534



I can just repeat myself:

1st: the encryption rules are broken
2nd: the response+decrypt thing may be realistic, but it is missleading as it is breaking SR4s system of skill+programme, that has already broken the attribute+skill system, again.

Thats why I use logic+skill, with programme as hit limiter (just like spells). And my decryption test is:

logic+electronic warfare (4xEcryption rating, 1 turn/1hour) with "electronic warfare" rolls. (turn or hour depends on whether it is real time encryption for communications or data encryption). Balanced, consistent, works.
Go to the top of the page
 
+Quote Post

2 Pages V   1 2 >
Reply to this topicStart new topic

 



RSS Lo-Fi Version Time is now: 13th April 2022 - 12:38 AM

Topps, Inc has sole ownership of the names, logo, artwork, marks, photographs, sounds, audio, video and/or any proprietary material used in connection with the game Shadowrun. Topps, Inc has granted permission to the Dumpshock Forums to use such names, logos, artwork, marks and/or any proprietary materials for promotional and informational purposes on its website but does not endorse, and is not affiliated with the Dumpshock Forums in any official capacity whatsoever.