IPB

Welcome Guest ( Log In | Register )

 
Reply to this topicStart new topic
> Networking Tricks, Creating safer wireless networks
Samaels Ghost
post Jun 16 2006, 02:14 PM
Post #1


Moving Target
**

Group: Members
Posts: 984
Joined: 15-June 06
Member No.: 8,717



In SR3 there were all kinds of neat tricks to protect a system. Reading Target:Matrix tricks like chokepoints and vanishing SANs seem to be the only plausible way to protect Shadowland networks. What would Shadowland do to create a secure wireless system?

What tricks have you thought up to protect your personal commlinks, team communication, Corporate systems, etc?

I've thought about using AR RFID tag spam to produce Vis mods on opponents. I'm not claiming it's original, just that it might be a good idea to spring on opponents using AR Image links or other such things.
Go to the top of the page
 
+Quote Post
James McMurray
post Jun 16 2006, 02:15 PM
Post #2


Great Dragon
*********

Group: Members
Posts: 5,430
Joined: 10-January 05
From: Fort Worth, Texas
Member No.: 6,957



One of the few and easiest ways to make your wireless system incredibly safe is to remove it from the wireless world.
Go to the top of the page
 
+Quote Post
Samaels Ghost
post Jun 16 2006, 02:17 PM
Post #3


Moving Target
**

Group: Members
Posts: 984
Joined: 15-June 06
Member No.: 8,717



That effectively makes it a hardline system.

Oh, the wireless inhibiting wallpaint and what not I already know about, of course. I'm itching for new stuff.
Go to the top of the page
 
+Quote Post
neon_samurai
post Jun 16 2006, 03:00 PM
Post #4


Target
*

Group: Members
Posts: 14
Joined: 31-May 06
Member No.: 8,630



I think some people over thinking all this...

The way I see it, most of your cyberware needs not be attached to your commlink or the wireless world at all. There was talk some time ago about people hacking a commlink and shutting of Wired Reflexes, or turning a cyber arm against the owner. Why would those two items even be attached to the commlink?

Realyy the only things I can see attaching would be visual links (to share tactical data between team members), a biomonitor (for the combat medic), and maybe a few non critical systems here and there. I cannot think of a reason to connect a cyber limb.

Here's a question though...

Say I have goggles and a smartlink system. Can I have my goggles setup on my commlink to get info from the team, but have my smartlink set to "SEND ONLY" mode. That way I'd get all the info from my smartlink in my goggles, but a hacker would be unable to deactivate the smartlink (although he could just reboot the goggles)

Anyway, my 2 nuyen
Go to the top of the page
 
+Quote Post
Samaels Ghost
post Jun 16 2006, 03:10 PM
Post #5


Moving Target
**

Group: Members
Posts: 984
Joined: 15-June 06
Member No.: 8,717



QUOTE (neon_samurai)
I think some people over thinking all this...

The way I see it, most of your cyberware needs not be attached to your commlink or the wireless world at all. There was talk some time ago about people hacking a commlink and shutting of Wired Reflexes, or turning a cyber arm against the owner. Why would those two items even be attached to the commlink?

Realyy the only things I can see attaching would be visual links (to share tactical data between team members), a biomonitor (for the combat medic), and maybe a few non critical systems here and there. I cannot think of a reason to connect a cyber limb.

Here's a question though...

Say I have goggles and a smartlink system. Can I have my goggles setup on my commlink to get info from the team, but have my smartlink set to "SEND ONLY" mode. That way I'd get all the info from my smartlink in my goggles, but a hacker would be unable to deactivate the smartlink (although he could just reboot the goggles)

Anyway, my 2 nuyen

Im not talking about protecting cyberware or accessories, Im talking about just protecting a system.

And if you set a smart link to SEND ONLY you wouldn't be able to eject clips, change firing modes or change the vision filters on your Smartgun's camera.
Go to the top of the page
 
+Quote Post
Teulisch
post Jun 16 2006, 03:24 PM
Post #6


Moving Target
**

Group: Members
Posts: 565
Joined: 7-January 04
Member No.: 5,965



Well, it depends. IF your team has a hacker, then he will be actively defending the team from matrix threats, much like the mage does counterspelling and banishing.

If you hook your eyes/ears to the group PAN to share info, its simple enough to create a small subscriber list, with only one member actualy dealing with external sources (the hacker). so anyone that wants to hack Sam, needs to hack the chokepoint that is the teams matrix specialist. that makes dealing with a balanced team much more difficult.

The best use of AR, may well be to network so my team-mates SL guns show me where they point, so i can avoid crossfire. To show me a map of the area im in, with locations of where we know the enemy to be. It's a lot like use wallhacks in counterstrike to see the enemy through walls.

now, if your solo, and you need your commlink on ghost mode... yes theres some risk. all you can really do is get a good firewall.

I think one good idea, is simply to have any and all incoming trafic show a note in your visual feild. So if hacker A gets into my commlink, I get a note. i dont recognize the adress, so i can now take an action to see whats going on with my commlink. If i think it necessary i can turn it off. The only problem here is you can get a lot of false positives. but better safe than sorry...
Go to the top of the page
 
+Quote Post
Aaron
post Jun 16 2006, 03:55 PM
Post #7


Mr. Johnson
******

Group: Dumpshocked
Posts: 3,148
Joined: 27-February 06
From: UCAS
Member No.: 8,314



Don't forget Analyze. It's a commlink's first line of defense against intrusion.
Go to the top of the page
 
+Quote Post
Samaels Ghost
post Jun 16 2006, 04:05 PM
Post #8


Moving Target
**

Group: Members
Posts: 984
Joined: 15-June 06
Member No.: 8,717



Not neccesarily a networking trick but....

Dumping active Agents into your enemy's node would be a great way to sap their Response, would it not? Your subscription limits go up to 12 so that's 12 independant agents.

Getting them all running on yours first would be the problem...
Go to the top of the page
 
+Quote Post
James McMurray
post Jun 16 2006, 04:05 PM
Post #9


Great Dragon
*********

Group: Members
Posts: 5,430
Joined: 10-January 05
From: Fort Worth, Texas
Member No.: 6,957



so much for talking about secure systems. This thread my hold the record for fastest off topic discussion. 3 Posts has probably been beat before though. It sounds like such a small number until the realization that this is dumpshock sinks in. :)
Go to the top of the page
 
+Quote Post
Samaels Ghost
post Jun 16 2006, 04:07 PM
Post #10


Moving Target
**

Group: Members
Posts: 984
Joined: 15-June 06
Member No.: 8,717



Any suggestions then McMurray? it would be much appreciated :D
Go to the top of the page
 
+Quote Post
Platinum
post Jun 16 2006, 04:17 PM
Post #11


Running Target
***

Group: Members
Posts: 1,095
Joined: 26-February 02
From: Ontari-airee-o
Member No.: 1,115



Places like shadowland are now hosted on albino technomancer l33t b01s.
if they are getting attacked they just put on their tinfoil hats.
Go to the top of the page
 
+Quote Post
Samaels Ghost
post Jun 16 2006, 04:26 PM
Post #12


Moving Target
**

Group: Members
Posts: 984
Joined: 15-June 06
Member No.: 8,717



Har Har :rotfl:

Technos don't have 'internal memory', they have to use external storage.

If you were just trying to make a joke, i apologize for taking it too seriously
Go to the top of the page
 
+Quote Post
Lagomorph
post Jun 16 2006, 04:31 PM
Post #13


Moving Target
**

Group: Members
Posts: 834
Joined: 30-June 03
Member No.: 4,832



Unfortunately, by the rules and what is described in the fluff, little can be done. They make no mention of matrix choke points, and all the other good stuff.

The problem with wireless is that you don't just have the option of attacking the comm directly, you also can do man in the middle attacks, intercepting and then spoofing commands, which by the rules basically bypasses all of the defenses on a commlink.

That being said, agents make a great defensive measure. If you can run two, make one a detect agent to find the intruder, and the other an attack agent. That along with a firewall is the best you can do with out turning wireless off.

Another trick is having multiple commlinks, one public and one hidden, the hidden one connecting to your gear, and the public one looking obvious and weak so hackers will go for the ruse.

QUOTE
There was talk some time ago about people hacking a commlink and shutting of Wired Reflexes, or turning a cyber arm against the owner.


There's talk about it because there is a reference to hacking some ones cyber arm and using it agaist them in the BBB.
Go to the top of the page
 
+Quote Post
Samaels Ghost
post Jun 16 2006, 04:32 PM
Post #14


Moving Target
**

Group: Members
Posts: 984
Joined: 15-June 06
Member No.: 8,717



BBB?
Go to the top of the page
 
+Quote Post
Lagomorph
post Jun 16 2006, 04:34 PM
Post #15


Moving Target
**

Group: Members
Posts: 834
Joined: 30-June 03
Member No.: 4,832



BBB = Big Black Book, SR4 main book.
Go to the top of the page
 
+Quote Post
Samaels Ghost
post Jun 16 2006, 04:37 PM
Post #16


Moving Target
**

Group: Members
Posts: 984
Joined: 15-June 06
Member No.: 8,717



oops. now im hip to the lingo....
Go to the top of the page
 
+Quote Post
Geekkake
post Jun 16 2006, 04:41 PM
Post #17


Moving Target
**

Group: Members
Posts: 475
Joined: 13-March 06
From: dusty Mexican borderlands
Member No.: 8,372



Fact of the matter is, we're not really gonna get any solid, gear-based protection measures until Unwired, which is scheduled for, what, 2007? In theory?

Regarding cyberarms and such being omgtotally hax0red and introducing the "stop hitting yourself!" style of hacker offense, one needs to recall DNI, which is almost assuredly connected to the commlink and the arm itself. However, that introduces the whole argument about the existence of DNI, which we've beat to paste and beyond.

So, in some continuums (some people's groups - mine, for example), you can do it. In others, you can't. Choose wisely.
Go to the top of the page
 
+Quote Post
Lagomorph
post Jun 16 2006, 04:50 PM
Post #18


Moving Target
**

Group: Members
Posts: 834
Joined: 30-June 03
Member No.: 4,832



Yeah, in my group we outlawed the "stop hitting yourself" attack, out of general consensus that it was just dumb. Items that required wireless were still vulnerable, our hacker spoofed an opponents' guns eject command because it was smartlinked.
Go to the top of the page
 
+Quote Post
GrinderTheTroll
post Jun 16 2006, 05:07 PM
Post #19


Shooting Target
****

Group: Members
Posts: 1,754
Joined: 9-July 04
From: Modesto, CA
Member No.: 6,465



QUOTE (Samaels Ghost)
What tricks have you thought up to protect your personal commlinks, team communication, Corporate systems, etc?

Analyze is probably the biggest workhorse. It's your node's eye and ears, don't neglect it. Have it patrol the node/system and see what's coming online. As resource intensive as this sounds, I liken it to Virus Detetion or Spyware prevention software.

Scan each new persona/agent/icon for Hacker programs. Or have all system access require specific Access IDs to use the system. Trigger alerts accordingly.

Agents/IC that use Exploit to hack intruders. All sorts of things can be done like erase all data files (maybe just Corporate Files?) or Hacker programs, Scan traffic and send it someplace, edit it, insert messages like "Hi, my name is Runner X and I robbed Aztec on 6/15/2070" including a picutre or a video, etc.

Agents/IC that the unload lots of Agents/IC into a target node to reduce the target's Response rating (aka Denial of Service).

Nodes that rotate Access IDs by hacking themselves.

Requiring each node to have its own set of accounts forcing someone to hack each new node/system. Couple this with chokepoint style design and you've got quite and obstacle course.

Require security or admin only accounts to access some nodes/systems.
Go to the top of the page
 
+Quote Post
Samaels Ghost
post Jun 16 2006, 06:43 PM
Post #20


Moving Target
**

Group: Members
Posts: 984
Joined: 15-June 06
Member No.: 8,717



No more nifty Matrix tricks? I'm sure there's more
Go to the top of the page
 
+Quote Post
James McMurray
post Jun 16 2006, 07:24 PM
Post #21


Great Dragon
*********

Group: Members
Posts: 5,430
Joined: 10-January 05
From: Fort Worth, Texas
Member No.: 6,957



QUOTE (Samaels Ghost)
oops. now im hip to the lingo....

Don't worry, there have been huge debates about whether people should use BBB because of how nonintuitive it is. the general consensus was that they shouldn't, but some people still like to confuse the newcomers. :)

And no, I have no suggestions. My group hate the "Decker Effect" so we generally NPC the hacker.
Go to the top of the page
 
+Quote Post
Samaels Ghost
post Jun 16 2006, 08:57 PM
Post #22


Moving Target
**

Group: Members
Posts: 984
Joined: 15-June 06
Member No.: 8,717



hymnal is pretty funny
Go to the top of the page
 
+Quote Post
Nim
post Jun 16 2006, 09:10 PM
Post #23


Moving Target
**

Group: Members
Posts: 244
Joined: 8-June 06
Member No.: 8,681



QUOTE (James McMurray)

Don't worry, there have been huge debates about whether people should use BBB because of how nonintuitive it is.

Non-intuitive...and of course, this edition's 'Big Black Book' is actually greenish-grey :)
Go to the top of the page
 
+Quote Post
Glayvin34
post Jun 17 2006, 01:06 AM
Post #24


Moving Target
**

Group: Members
Posts: 351
Joined: 17-February 06
From: San Francisco
Member No.: 8,275



I always run two or three non-wireless enabled commlinks behind my primary that are idle and loaded up with Agents. Then I can summon them as a free communication action instead of a complex action. Very useful for cybercombat or just when something seems amiss.

AND, most importantly, always take the Commlink specialty with your Hacking skill and the Analyze specialty with your Computer skill.
Go to the top of the page
 
+Quote Post
Cain
post Jun 17 2006, 04:02 AM
Post #25


Grand Master of Run-Fu
*********

Group: Dumpshocked
Posts: 6,840
Joined: 26-February 02
From: Tir Tairngire
Member No.: 178



You can always run multiple commlinks on yourself. Set all of your shadow-gear to skinlink-only, and let the rest be open. If someone decks your open gear, you can always shut it off. Just make sure that the stuff you put in the open looks nice, but isn't really important to you. For example, you can put a smartlinked pistol on a high-signal network, as well as a set of goggles, and then wear the goggles on your forehead and leave the pistol in your backpack. Your contacts, glasses, and smart-SMG are on a different commlink, all set to skinlink and with a deliberately reduced signal.

If you're a non-decker, then you can always run your own tiered network. Since everything in SR4 is wireless, and has a default Device Rating of 1, you can turn your clothes into a tiered-access setup. Each device can only be subscribed to 2 items-- in this case, the node "before" and "after" it. To stealthily infiltrate this setup, you have to go from node to node; if you try jumping it midstream, you'll cause the entire downline to suddenly drop off, alerting the user. And, natch, there's going to be Rating 1 Ice on every node-- not a major threat, but enough to seriously cramp a decker's style under these circumstances.
Go to the top of the page
 
+Quote Post

Reply to this topicStart new topic

 



RSS Lo-Fi Version Time is now: 28th April 2024 - 01:23 PM

Topps, Inc has sole ownership of the names, logo, artwork, marks, photographs, sounds, audio, video and/or any proprietary material used in connection with the game Shadowrun. Topps, Inc has granted permission to the Dumpshock Forums to use such names, logos, artwork, marks and/or any proprietary materials for promotional and informational purposes on its website but does not endorse, and is not affiliated with the Dumpshock Forums in any official capacity whatsoever.