IPB
X   Site Message
(Message will auto close in 2 seconds)

Welcome Guest ( Log In | Register )

2 Pages V  < 1 2  
Reply to this topicStart new topic
> Chaining Comlinks
Tarantula
post Jun 15 2006, 03:21 PM
Post #26


Dragon
********

Group: Members
Posts: 4,664
Joined: 21-September 04
From: Arvada, CO
Member No.: 6,686



Another benefit is it makes it much easier to stock IC and other nastys inside a rebroadcast commlink like that, while still allowing your drone to run the autosofts it needs.
Go to the top of the page
 
+Quote Post
The Jopp
post Jun 16 2006, 08:42 AM
Post #27


Runner
******

Group: Members
Posts: 2,925
Joined: 26-February 02
Member No.: 948



There's another way of taking control over drones as well. Lets assume that you do not have the programs needed for spoofing the signal or that you do not have the ability to hack it.

Intercept Wireless Signal (Page 225)

With this you can intercept a signal from/to a drone by locating it first and then make an EDIT test to rewrite its orders.

This would work best with prewritten orders that you just send over to the drone.

"shutdown"
"New Subscriber list"

etc..

The best way to defend against this kind of attack would be to have a specifik order on your drones: "Confirmation of last order from Master Commlink"

The order would be for the drone to doublecheckl the order with the original commlink by a specifik passcode from it. This way the attacker editing the signal would have to know the codes as well or the drone would ignore the fake command.
Go to the top of the page
 
+Quote Post
Samaels Ghost
post Jun 16 2006, 12:38 PM
Post #28


Moving Target
**

Group: Members
Posts: 984
Joined: 15-June 06
Member No.: 8,717



QUOTE (The Jopp)

The order would be for the drone to doublecheckl the order with the original commlink by a specifik passcode from it. This way the attacker editing the signal would have to know the codes as well or the drone would ignore the fake command.

But then the Hacker would just have to listen in on confirmation call backs and he can accurately edit an order but has commlink access codes.
Go to the top of the page
 
+Quote Post
GrinderTheTroll
post Jun 16 2006, 05:31 PM
Post #29


Shooting Target
****

Group: Members
Posts: 1,754
Joined: 9-July 04
From: Modesto, CA
Member No.: 6,465



The convienence of wireless requires you to trust that your message will be received with perfect integrity. The only way to guarantee its integrity (since that information can be altered and duplicated) is to not use a wireless interface. The same argument applies to wired connections, however, there now exists a physical element to overcome by tapping the signal.

Interestingly in the field of Quantum Mechanics there is talk of being able to create a Quantum message that if observed destroys the message thus providing complete message integrity if it's intercepted.
Go to the top of the page
 
+Quote Post
Lebo77
post Jun 16 2006, 07:20 PM
Post #30


Moving Target
**

Group: Members
Posts: 133
Joined: 8-September 05
Member No.: 7,718



QUOTE (GrinderTheTroll)
The convienence of wireless requires you to trust that your message will be received with perfect integrity. The only way to guarantee its integrity (since that information can be altered and duplicated) is to not use a wireless interface. The same argument applies to wired connections, however, there now exists a physical element to overcome by tapping the signal.

Interestingly in the field of Quantum Mechanics there is talk of being able to create a Quantum message that if observed destroys the message thus providing complete message integrity if it's intercepted.

There are many ways to ensure that the message is recieved correctly. If you are worried only about random coruption then a checksum is sufficent. If you are worried that someone is going to mess with your signal you can use digital signature technology to ensure the data gets passed correctly. Useing public-key crypto you don't even need a secure channel for key exchange. (But if you have your own drone you presumeably don't need this.)

Quantum Mechanichal comunication is interesting in theory, but I have not heard that it has been made cannon in SR-land. Doing so woudl make deckers fairly useless.
Go to the top of the page
 
+Quote Post
TBRMInsanity
post Jun 22 2006, 01:44 PM
Post #31


Running Target
***

Group: Members
Posts: 1,002
Joined: 22-April 06
From: Canada
Member No.: 8,494



Why not just run a hight level encrypt/decrypt program for the authentication of orders. It may slow your response down a bit but you will have a more secure network.
Go to the top of the page
 
+Quote Post

2 Pages V  < 1 2
Reply to this topicStart new topic

 



RSS Lo-Fi Version Time is now: 12th April 2022 - 07:04 PM

Topps, Inc has sole ownership of the names, logo, artwork, marks, photographs, sounds, audio, video and/or any proprietary material used in connection with the game Shadowrun. Topps, Inc has granted permission to the Dumpshock Forums to use such names, logos, artwork, marks and/or any proprietary materials for promotional and informational purposes on its website but does not endorse, and is not affiliated with the Dumpshock Forums in any official capacity whatsoever.