IPB

Welcome Guest ( Log In | Register )

2 Pages V   1 2 >  
Reply to this topicStart new topic
> Matrix realistic?
Garrowolf
post Dec 12 2006, 10:01 AM
Post #1


Moving Target
**

Group: Members
Posts: 870
Joined: 2-October 06
From: Athens Ga
Member No.: 9,517



I have an interesting question for people.

How many people here think that Shadowrun has a realistic computer internet system?

I mean I realize that alot of people keep it because it sounds cool and all. But how many people actually think that computers will ever really work that way??

I'm not saying if it is a fun system or not. I'm not asking if people think that it represents well the cyberpunk novels written by the computer illiterate.

I'm asking if anyone actually thinks that Cybercombat and all that stuff ACTUALLY makes sense.

I know that wireless is actually around now BTW. I'm using it.

If so what parts make sense and what parts don't.

Go to the top of the page
 
+Quote Post
hobgoblin
post Dec 12 2006, 10:18 AM
Post #2


panda!
**********

Group: Members
Posts: 10,331
Joined: 8-March 02
From: north of central europe
Member No.: 2,242



the SR4 rules are more realistic then any previous edition.

stuff like personas, proactive defensive programs (IC) and more are not in any way realistic (yet). there are work done on agent, and they are features with the agents found in SR.

however, agents rely on, if not a machine, then atleast a computing monoculture. but with the developments in virtual machines and similar it may well be that a agent will be a virtual machine traveling the net. hell, i have long suspected that entertainment files in SR are not dumb files (MP3, MPEG4, DOC) but data wrapped in a program somehow.

in any case, the SR4 matrix rules have moved beyond the matrix that gibson envisioned in his sprawl trilogy. way beyond in many ways.
Go to the top of the page
 
+Quote Post
ShadowDragon
post Dec 12 2006, 10:28 AM
Post #3


Moving Target
**

Group: Members
Posts: 393
Joined: 20-June 06
Member No.: 8,754



70 years ago most people would say things like computers or the internet aren't realistic, so who are we to say the SR matrix is unrealistic.
Go to the top of the page
 
+Quote Post
Jürgen Hubert
post Dec 12 2006, 10:42 AM
Post #4


Moving Target
**

Group: Members
Posts: 104
Joined: 26-February 02
Member No.: 1,453



Network security is probably unrealistically weak. Real world hacking with anything but "brute force" attempts that only work on systems where the admins didn't know what they were doing take quite a long time and often require some sort of social networking that allow you to gain or guess passwords.

There's also some doubt whether it is possible to have that much bandwidth over wireless connection - there's a risk that we will hit limitations imposed by the laws of physics before we reach that - but who knows how wireless technology develops in the future...

However, I think it is very much possible that we will see Augmented Reality or the equivalent in the future - probably much earlier than in the SR timeline, too.
Go to the top of the page
 
+Quote Post
hobgoblin
post Dec 12 2006, 11:01 AM
Post #5


panda!
**********

Group: Members
Posts: 10,331
Joined: 8-March 02
From: north of central europe
Member No.: 2,242



QUOTE
There's also some doubt whether it is possible to have that much bandwidth over wireless connection - there's a risk that we will hit limitations imposed by the laws of physics before we reach that - but who knows how wireless technology develops in the future...


that depends on how much data AR and VR use. there used to be a standard called UMS or universal matrix standard. basically a library of animations, sounds and similar that was used to present the matrix. then came VR2.0 with its sculpted systems that had custom stuff.

there is also the human brain to factor in. often you do not need neon tiger detailed down to the pixel. it may well be that instead the simsense can trigger the brain to think about neon, tiger and similar, and the brain will create the experiences itself.

in some ways thats how written text or speech works. as long as we both understand the same language, i do not have to provide a image of said tiger, i just have to describe it using words and you will get a mental image of it.

hell, look at vector based graphics. or you average web page. rather then define every last pixel, one use codes to define where lines and similar start, end and how they are to be reshaped. the software that reads the file then use that to generate a image based on said codes. as long as all programs interpret the codes the same way, you get the same image.

one may say that a sculpted system use the same UMS codes in the background, but present a different interpretation of them. that may explain the conflict rules between a sculpted system and a reality filter in older SR rules.
Go to the top of the page
 
+Quote Post
Blade
post Dec 12 2006, 12:12 PM
Post #6


Runner
******

Group: Members
Posts: 3,009
Joined: 25-September 06
From: Paris, France
Member No.: 9,466



Latency is also an issue. At the VR high speed, high ping should be as much worse as it is in an online game. And that, theoretically, can't be fixed. Your data can't travel faster than the speed of light.

Matrix combat isn't that unrealistic because it's about finding weaknesses in the targeted program/system to crash it (which is how you'd do today to crash a program). It's just that the matrix representation makes it look like combat, which is far better for player enjoyment.

Overall, the matrix security and the hacking methods shares a lot with today's network security. The big difference is that hacking is easier in shadowrun than in today's world (for example encryption can be broken easily) but that's not absurd and that could happen.

The whole idea of persona that travel in nodes, as opposed to having just the data travelling between your node and the remote node, is a big difference and may not be totally realistic. But it can't be avoided in a cyberpunk setting.
Go to the top of the page
 
+Quote Post
hyzmarca
post Dec 12 2006, 02:07 PM
Post #7


Midnight Toker
**********

Group: Members
Posts: 7,686
Joined: 4-July 04
From: Zombie Drop Bear Santa's Workshop
Member No.: 6,456



yes, it is perfectly realistic that instead of a smooth command-line interface or window-browsing we'll resort to an impossibly clunky VR system that can kill you if you aren't careful. It is also perfectly realistic that hub-topology broadcast networks will give way to trap-maze topology reverse-token networks. :please:
Go to the top of the page
 
+Quote Post
Serbitar
post Dec 12 2006, 02:55 PM
Post #8


Running Target
***

Group: Members
Posts: 1,498
Joined: 4-August 05
From: ADL
Member No.: 7,534



I think the only aspect that is not realistic is the way that security works. Security in real life is not about IC, but the race to continously fix exploits.

In real life matrix security has 0 to do with processor power.

But I think the SR4 matrix fluff concept is very well done.
Go to the top of the page
 
+Quote Post
mfb
post Dec 12 2006, 03:12 PM
Post #9


Immortal Elf
**********

Group: Members
Posts: 11,410
Joined: 1-October 03
From: Pittsburgh
Member No.: 5,670



hee hee hee hee hoo hoo ho ho ho ha ha ha ha ha ha ha ha ha ha! the SR4 Matrix is a bit better than the SR1-3 Matrix, but overall, don't look to SR for realistic computing.
Go to the top of the page
 
+Quote Post
ixombie
post Dec 12 2006, 03:15 PM
Post #10


Moving Target
**

Group: Members
Posts: 271
Joined: 18-April 06
Member No.: 8,481



In 2070, we'll see whether it's realistic... Just be patient :P
Go to the top of the page
 
+Quote Post
blakkie
post Dec 12 2006, 03:36 PM
Post #11


Dragon
********

Group: Members
Posts: 4,718
Joined: 14-September 02
Member No.: 3,263



Basically....what mfb said. Sure there is going to be some fabulous advances over the intervining decades. But there are some fundamental problems with SR's computing that require wild physics handwaving.

P.S. In 2070 I'd be 102 years old. I'd love to be able rationally evaluate the difference between SR's computer systems and 70's contemporary computing, even if it ment being wrong not expecting SR to be within a sniff of it. :P
Go to the top of the page
 
+Quote Post
Lovesmasher
post Dec 12 2006, 03:50 PM
Post #12


Moving Target
**

Group: Members
Posts: 147
Joined: 4-December 06
From: Chicago, IL
Member No.: 10,193



QUOTE (Jürgen Hubert)
Network security is probably unrealistically weak. Real world hacking with anything but "brute force" attempts that only work on systems where the admins didn't know what they were doing take quite a long time and often require some sort of social networking that allow you to gain or guess passwords.

There's also some doubt whether it is possible to have that much bandwidth over wireless connection - there's a risk that we will hit limitations imposed by the laws of physics before we reach that - but who knows how wireless technology develops in the future...

However, I think it is very much possible that we will see Augmented Reality or the equivalent in the future - probably much earlier than in the SR timeline, too.

It's too early for me to look stuff up in the book, but I'm pretty sure the book says that they had to make security less realistic so that hackers could breach security in minutes or seconds instead of months or weeks.
Go to the top of the page
 
+Quote Post
hobgoblin
post Dec 12 2006, 04:49 PM
Post #13


panda!
**********

Group: Members
Posts: 10,331
Joined: 8-March 02
From: north of central europe
Member No.: 2,242



QUOTE (Serbitar)
I think the only aspect that is not realistic is the way that security works. Security in real life is not about IC, but the race to continously fix exploits.

im sure that if they could kill you using software and get away with it, they would invest in IC rather then fixing buffer overflow errors (99% of the security problems come from those. and yes, i made that statistic up on the spot)...
Go to the top of the page
 
+Quote Post
hobgoblin
post Dec 12 2006, 04:49 PM
Post #14


panda!
**********

Group: Members
Posts: 10,331
Joined: 8-March 02
From: north of central europe
Member No.: 2,242



whoa, double post because of a database connect error followed up by a mail error...
Go to the top of the page
 
+Quote Post
hobgoblin
post Dec 12 2006, 04:51 PM
Post #15


panda!
**********

Group: Members
Posts: 10,331
Joined: 8-March 02
From: north of central europe
Member No.: 2,242



QUOTE (Lovesmasher)
QUOTE (Jürgen Hubert @ Dec 12 2006, 04:42 AM)
Network security is probably unrealistically weak. Real world hacking with anything but "brute force" attempts that only work on systems where the admins didn't know what they were doing take quite a long time and often require some sort of social networking that allow you to gain or guess passwords.

There's also some doubt whether it is possible to have that much bandwidth over wireless connection - there's a risk that we will hit limitations imposed by the laws of physics before we reach that - but who knows how wireless technology develops in the future...

However, I think it is very much possible that we will see Augmented Reality or the equivalent in the future - probably much earlier than in the SR timeline, too.

It's too early for me to look stuff up in the book, but I'm pretty sure the book says that they had to make security less realistic so that hackers could breach security in minutes or seconds instead of months or weeks.

thats more or less what they said about encryption in the faq...
Go to the top of the page
 
+Quote Post
hobgoblin
post Dec 12 2006, 04:53 PM
Post #16


panda!
**********

Group: Members
Posts: 10,331
Joined: 8-March 02
From: north of central europe
Member No.: 2,242



QUOTE (hyzmarca)
yes, it is perfectly realistic that instead of a smooth command-line interface or window-browsing we'll resort to an impossibly clunky VR system that can kill you if you aren't careful. It is also perfectly realistic that hub-topology broadcast networks will give way to trap-maze topology reverse-token networks. :please:

thats what you get when management get mixed up in the decisions best left to the IT department...

or in other words, blame it on crash 1.0 and the corp led rebuilding of the net...
Go to the top of the page
 
+Quote Post
lorechaser
post Dec 12 2006, 06:19 PM
Post #17


Running Target
***

Group: Members
Posts: 1,333
Joined: 19-August 06
From: Austin
Member No.: 9,168



QUOTE (blakkie)
Basically....what mfb said. Sure there is going to be some fabulous advances over the intervining decades. But there are some fundamental problems with SR's computing that require wild physics handwaving.

P.S. In 2070 I'd be 102 years old. I'd love to be able rationally evaluate the difference between SR's computer systems and 70's contemporary computing, even if it ment being wrong not expecting SR to be within a sniff of it. :P

Ha! I'll only be 97!

To be fair, I fully expect 97 to be the new 67 in 2070.
Go to the top of the page
 
+Quote Post
ixombie
post Dec 12 2006, 06:20 PM
Post #18


Moving Target
**

Group: Members
Posts: 271
Joined: 18-April 06
Member No.: 8,481



Actually, the matrix wasn't created by the marketing ghouls, it was invented in response to an uber mega virus. The only way to fight it was to eschew traditional interfaces in favor of ASIST which let the deckers react at the speed of thought instead of the speed of their fingers.

I think the reason that ASIST became the standard is that it's a 100% intuitive way for people to integrate computers into their lives. They don't need to learn an OS, or really anything at all. They just point at what they want, walk over to the safe where secure data is stored, etc...
Go to the top of the page
 
+Quote Post
blakkie
post Dec 12 2006, 06:26 PM
Post #19


Dragon
********

Group: Members
Posts: 4,718
Joined: 14-September 02
Member No.: 3,263



QUOTE (hobgoblin @ Dec 12 2006, 10:51 AM)
QUOTE (Lovesmasher @ Dec 12 2006, 04:50 PM)
It's too early for me to look stuff up in the book, but I'm pretty sure the book says that they had to make security less realistic so that hackers could breach security in minutes or seconds instead of months or weeks.

thats more or less what they said about encryption in the faq...

Oh yeah, that's why I just hold my nose and look the other way when dealing with the rules. Because this is one of those cases where Realism™ would suck royally.
QUOTE
To be fair, I fully expect 97 to be the new 67 in 2070.

Maybe, I would guess 87 as closer to the new 67. I imagine that it is reasonably possible that I'll make it to 102, I had 2 grandparents live into their 80's. However However their functioning level, physical and mental, for the last 2 to 3 years of their lives is why I through in the qualifier about being able to evaluate. ;)
Go to the top of the page
 
+Quote Post
kzt
post Dec 12 2006, 07:49 PM
Post #20


Great Dragon
*********

Group: Members
Posts: 5,537
Joined: 27-August 06
From: Albuquerque NM
Member No.: 9,234



QUOTE (Blade @ Dec 12 2006, 05:12 AM)
Overall, the matrix security and the hacking methods shares a lot with today's network security. The big difference is that hacking is easier in shadowrun than in today's world (for example encryption can be broken easily) but that's not absurd and that could happen.

Actually it is absurd. You can postulate quantum computers that break some public key systems (but not all) but assuming that they can be run an a handheld takes some doing.

Anyway, even with that, it doesn't allow you to attack symmetric key systems (like AES) very effectively. Even throwing absurd computing power at at you can't break a 256 bit system in less than geologic time. Somewhere I have the spreadsheet, but if you assume computers are a trillion times faster each, with 1024 dedicated crypto processors on each of 1024 processors with 1024 nodes attacking you can break it in a mere 23,000,000 years. It's 8*10^45 years if you go to 512 bit keys.

Assuming you do the keys right, which is actually a huge assumption. Crappy keys makes attacks much more possible. And most people, left to their own devices, will choose crappy keys.
Go to the top of the page
 
+Quote Post
KarmaInferno
post Dec 12 2006, 08:13 PM
Post #21


Old Man Jones
********

Group: Dumpshocked
Posts: 4,415
Joined: 26-February 02
From: New York
Member No.: 1,699



This is assuming social engineering doesn't work.

I had a fellow at a partner company give me a password to their secure network without hesitation because I called up and stated I was from Y company.

I could have gotten that company name info off the internet.

Fortunately for him I AM a legitimate user, but a lot of folks are just like him, no sense of security.


-karma
Go to the top of the page
 
+Quote Post
kzt
post Dec 12 2006, 08:33 PM
Post #22


Great Dragon
*********

Group: Members
Posts: 5,537
Joined: 27-August 06
From: Albuquerque NM
Member No.: 9,234



QUOTE (KarmaInferno @ Dec 12 2006, 01:13 PM)
This is assuming social engineering doesn't work.

I had a fellow at a partner company give me a password to their secure network without hesitation because I called up and stated I was from Y company.

I'd personally vastly prefer a hacking model that was based on social engineering like that, along with installing funky hardware or malware once you manage to gain access to areas you should never be allowed into.

An example:
Banking on Security
Go to the top of the page
 
+Quote Post
mfb
post Dec 12 2006, 08:53 PM
Post #23


Immortal Elf
**********

Group: Members
Posts: 11,410
Joined: 1-October 03
From: Pittsburgh
Member No.: 5,670



i'm right there with you on that, kzt. i think such a system could be just as fun as the current ez-haxx0r model. though, to break from my usual stance, i'm basically okay with SR's ez-haxx0r model, even though it's hilariously unrealistic. SR4, especially, is pretty easy to handwave and make pretend.
Go to the top of the page
 
+Quote Post
eidolon
post Dec 12 2006, 09:00 PM
Post #24


ghostrider
********

Group: Retired Admins
Posts: 4,196
Joined: 16-May 04
Member No.: 6,333



There's nothing saying that social engineering approaches don't work in SR, though. Outside the players/GM not knowing what it is, of course. And the group that does know what it is but hasn't tried that approach yet, well, go try it out! ;)
Go to the top of the page
 
+Quote Post
mfb
post Dec 12 2006, 09:02 PM
Post #25


Immortal Elf
**********

Group: Members
Posts: 11,410
Joined: 1-October 03
From: Pittsburgh
Member No.: 5,670



well, part of it would be doing things like gathering information on a human user so that you can create a list of possible passwords--combinations of birthdays, addresses, anniversaries, spouse/kids' names, etcetera. i'd definitely want to seem some hard rules in place before my players start running around guessing passwords willy-nilly.
Go to the top of the page
 
+Quote Post

2 Pages V   1 2 >
Reply to this topicStart new topic

 



RSS Lo-Fi Version Time is now: 24th April 2026 - 08:21 AM

Topps, Inc has sole ownership of the names, logo, artwork, marks, photographs, sounds, audio, video and/or any proprietary material used in connection with the game Shadowrun. Topps, Inc has granted permission to the Dumpshock Forums to use such names, logos, artwork, marks and/or any proprietary materials for promotional and informational purposes on its website but does not endorse, and is not affiliated with the Dumpshock Forums in any official capacity whatsoever.