![]() |
![]() ![]() |
![]() |
![]()
Post
#1
|
|
Target ![]() Group: Members Posts: 29 Joined: 9-February 05 Member No.: 7,073 ![]() |
Hey, I've got kind of a complex question regarding cyberware and its link to the Matrix.
Much like a hacker/technomancer can take over someone's drones, is it possible for them to also take over someone else's cyberware? I admit to having only skimmed the rules thus far, but it's a question I'm sure will come up. How exactly would someone hack into a piece of cyberware to control it? Through the owner's PAN/Commlink first? Would it be at least two separate tests (one for commlink, one for cyberware)? |
|
|
![]()
Post
#2
|
|
Moving Target ![]() ![]() Group: Members Posts: 125 Joined: 22-June 07 Member No.: 11,979 ![]() |
Err, we've been discussing it in several threads now. Choose one.
|
|
|
![]()
Post
#3
|
|
Shooting Target ![]() ![]() ![]() ![]() Group: Members Posts: 1,711 Joined: 15-June 06 Member No.: 8,716 ![]() |
everything has wifi, even people's underwear. So everything can be hacked if the target is careless enough to leave them exposed.
two ways to hack a guy cyber: 1. The target is a retard and has it subbed to his comm. The hacker then hacks the targets comm and has access from there. 2. the hacker is within 0 signal range (a couple of meters) and can skip the commlink and go straight for the goodies. ways to stop it: 1. turn all the wifi on the cyber you want to keep safe OFF. Uhh thats the only way i know of to stop it lol. Some things I have read hinted at just making the stuff run in hidden mode but hidden stuff can be hacked still so I dont know how that is safe. |
|
|
![]()
Post
#4
|
|
Moving Target ![]() ![]() Group: Members Posts: 125 Joined: 22-June 07 Member No.: 11,979 ![]() |
You could try putting a really nice firewall on it. Talk to the resident hacker.
|
|
|
![]()
Post
#5
|
|||
Target ![]() Group: Members Posts: 29 Joined: 9-February 05 Member No.: 7,073 ![]() |
Nah, I like creating my own threads to just add to the confusion. I'm subversive to your sensibilities that way. |
||
|
|||
![]()
Post
#6
|
|||
panda! ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 10,331 Joined: 8-March 02 From: north of central europe Member No.: 2,242 ![]() |
some ice may help to. hmm, i wonder. if a pan is one whole node, and a limb is part of said pan, would any patroling ice go after anyone trying to hack the limb? could save on the ice costs (if your not a dirty thieving pirate that is). |
||
|
|||
![]()
Post
#7
|
|
Cybernetic Blood Mage ![]() ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 3,472 Joined: 11-March 06 From: Northeastern Wyoming Member No.: 8,361 ![]() |
Well personally I've always been fond of using a Betagrade skinlink capable Datajack as a really nasty chokepoint to the rest of my ware when I actually have a reason to connect my cyber to my wireless PAN as opposed to my seperate skinlinked PAN. :cyber:
|
|
|
![]() ![]() |
![]() |
Lo-Fi Version | Time is now: 31st May 2025 - 11:10 PM |
Topps, Inc has sole ownership of the names, logo, artwork, marks, photographs, sounds, audio, video and/or any proprietary material used in connection with the game Shadowrun. Topps, Inc has granted permission to the Dumpshock Forums to use such names, logos, artwork, marks and/or any proprietary materials for promotional and informational purposes on its website but does not endorse, and is not affiliated with the Dumpshock Forums in any official capacity whatsoever.