IPB

Welcome Guest ( Log In | Register )

13 Pages V  « < 3 4 5 6 7 > »   
Reply to this topicStart new topic
> Stupid Question, Again on agents
Kiyote
post Feb 7 2007, 10:06 PM
Post #101


Target
*

Group: Members
Posts: 24
Joined: 20-December 05
Member No.: 8,083



QUOTE (kigmatzomat)
QUOTE (Kiyote)
QUOTE (kigmatzomat)
Remember, agents are legitimate bits of application used by power users the world around, not just hackers.  Agents don't work if they have to upload themselves to other servers to get anything done.  If I want my agent to go do a datasearch for everything on GlobalDynamX there is no freaking way that Google, Yahoo, AltaVista, and GlobalDynamX are going to let my agent load onto their system.  Not happening. 


Actually, letting agents onto their node just may be what Google, Yahoo, AltaVista, and GlobalDynamX are going to do.


QUOTE (SR4 RAW pg. 215)

Note that many nodes also have public access areas (or may be entirely public)—the Matrix equivalent of websites.


Okay, no. Accessing a host is different from uploading executable code. When you access a website, the system generates some information and sends it to your browser; you respond by clicking, requesting additional data using a particularly limited format.

Some sites may have some degree of application functionality but that was coded by the site owners and at no point do you upload an .exe/.pl/.asp/.vb/.bin/.dll file to the web site server.

The same goes for a matrix site, it sends VR data to your Comm, you move the AR interface/think motions so the comm sends those motions back in the VRml format and the server generates the next round of data. Again, the ONLY executables were specifically placed there by the company or are inherent in the VR interface (animations, movement, physics, lighting, etc).


That is a decent explanation for a web server, however I cannot find anywhere in the RAW that implies that a server/client data connection still exists or is used. Everything in the RAW is done by moving your persona from one node to the next. That means a logon request, getting through the firewall, and then accessing the node. There is no "Get Node Webpage" free/simple/complex action that allows for that kind of direct access transfer of data.

Maybe I'm just missing something obvious here, but my impressions were that the data was not sent back to your Commlink, but to your persona via the persona's icon. It is the persona which is your interface to the Matrix and the icon is your physical location on the Matrix. Your commlink is just a node where you jacked in from. Heck, it may not even be a Commlink, but could be your residential terminal, or a terminal at the Corp your breaking into.

The text from the RAW that I quoted stated that a node can have public access areas or even be completely public access. That reads to me like it is saying that an area of the node is open to public access, and you need to connect to the node to access that area. If it were saying what you seem to think it says, I would expect it to say "Date/Icons/Programs/whatever on a node can be publicly accessed". You are saying that the information on a node can be publicly accessed remotely (from another node), if setup for it. I think the raw is saying that the node itself can be public accessed if setup for it, and that information on the node can be accessible from that public access area.



Go to the top of the page
 
+Quote Post
Dashifen
post Feb 7 2007, 10:06 PM
Post #102


Technomancer
********

Group: Retired Admins
Posts: 4,638
Joined: 2-October 02
From: Champaign, IL
Member No.: 3,374



mfb, I'm having a hard time understanding how the post you just made doesn't contradict the post you made earlier:

QUOTE
QUOTE (SR4 page 231)

If your persona icon crashes, you are immediately disconnected from the Matrix.


can't imagine what else other than your commlink would be disconnected when you crash.


Its been my, and I think cetiah's, assertion that just cause your icon crashes does not indicate your commlink crashing which you seem to agree with in your most recent post but disagree with in the post quoted herein.
Go to the top of the page
 
+Quote Post
ShadowDragon8685
post Feb 7 2007, 10:07 PM
Post #103


Horror
*********

Group: Members
Posts: 5,322
Joined: 15-June 05
From: BumFuck, New Jersey
Member No.: 7,445



Ugh.

I hope when they come up with Virtual Realities 4.0, they give us a complete overview of Matrix 2.0 network architecture, and explicitly explain this stuff.
Go to the top of the page
 
+Quote Post
cetiah
post Feb 7 2007, 10:10 PM
Post #104


Moving Target
**

Group: Members
Posts: 745
Joined: 2-January 07
From: Los Angeles, CA
Member No.: 10,510



QUOTE (mfb)
QUOTE (cetiah)
(1)If this were to happen, the comlink would no longer be protecting your PAN. (2)This means your firewall and all your IC are offline, too. (3)They would no longer be protecting any of your devices from incoming hackers. (4) Further, your programs and files would be immune to being accessed by hackers.

for the love of mike.

1. no, your PAN is not "unprotected" when your commlink goes down, it's offline. the individual devices are up and running, but they aren't communicating with anything because you've turned off their ability to do so when you set up your PAN--if you didn't, then your commlink's not protecting anything.

2. yes, your Firewall and IC are both offline. this doesn't matter, because your commlink is offline, and is therefore immune to Matrix intrusion.

3. your individual devices are immune to hackers while your commlink is offline, because unless you're an idiot, your individual devices have had their wireless capabilities disabled, so that they can only be accessed via skinlink through your commlink. if your devices haven't had their wireless connectivity disabled, then they're prone to being hacked whether your commlink is online or not.

4. and lastly, yes, if your commlink is offline, your files are indeed immune to being accessed by hackers. i don't need to point out chapter and verse because there isn't any, because those effects are the logical consequence of your commlink being offline. show me in the book where it says that if you die, your heart stops beating.

having your connection to a particular node severed != getting kicked offline. if you are banned from a website, that doesn't cause Firefox to lock up--you just can't access that website anymore.

Okay, if this is your opinion, then the whole discussion between you and I is just a misunderstanding. You use "comlink goes offline" and I use "you are disconnected from the Matrix" but it sounds like we're saying the same thing.

It started with me trying to explain to Frank that a Persona and your comlink's Node are two very different things. A persona can be crashed through cybercombat, but nowhere does it say the node also crashes.

I mentioned that your node can still be hacked even though your persona was crashed in cybercombat, and that was the point where you objected. Apparently, you thought I meant hacked from the Matrix, which wouldn't make sense if you weren't connected to the Matrix anymore. I meant just wirelessly. Your persona is crashed, but your comlink is still functioning and its node can be hacked (locally, not through the Matrix). So the node stays unaffected while the persona is crashed. Thus, the persona and the node are two different things... which is what I was trying to explain.

But I think we both agree that if you are defeated in cybercombat, then nothing from the Matrix can hack you because you are not connected to the Matrix. But my argument was that the node is still there when the persona isn't. And independant IC operating on that node (that is, IC independant of your persona) still continue to function on that node.
Go to the top of the page
 
+Quote Post
cetiah
post Feb 7 2007, 10:12 PM
Post #105


Moving Target
**

Group: Members
Posts: 745
Joined: 2-January 07
From: Los Angeles, CA
Member No.: 10,510



QUOTE (ShadowDragon8685 @ Feb 7 2007, 05:07 PM)
Ugh.

I hope when they come up with Virtual Realities 4.0, they give us a complete overview of Matrix 2.0 network architecture, and explicitly explain this stuff.

Really? I'm kind of dreading that. As Frank pointed out in another thread, it will most likely be contradicting the core rules (and maybe itself) in pretty significant ways.
Go to the top of the page
 
+Quote Post
kigmatzomat
post Feb 7 2007, 10:13 PM
Post #106


Moving Target
**

Group: Members
Posts: 914
Joined: 26-August 05
From: Louisville, KY (Well, Memphis, IN technically but you won't know where that is.)
Member No.: 7,626



QUOTE (cetiah)
QUOTE
Okay, no. Accessing a host is different from uploading executable code. When you access a website, the system generates some information and sends it to your browser; you respond by clicking, requesting additional data using a particularly limited format.


Actually, many programs and servers are starting to explore this concept of using computer agents to provide a variety of functions as it travels to other people's hosts. I've been researching this concept in reaction to some of the posts on this thread, and I was surprised how much progress has been made in this area. In addition to the security concerns of protecting a host from malicious agents, a great deal of work and study is going into protecting an agent from malicious hosts. It sounds almost sci-fi-ish.




I'm not arguing against agents or mobile code. My example above includes an agent moving from system to system. With that stated, I am abso-fragging-lutely unwilling to accept that public hosts will alow unknown code execution from rank and file users. It would be java in reverse, with the host executing code provided by the client. It's an administration nightmare and barring some earthshaking concept of worthiness that should immediately be patented, I do not accept it as plausible.

I find idea of it in today's world to be somewhere between foolish and ludicrous. I really wouldn't accept it in SR 2050 when mobile code (virus) destroyed the net in Crash 1.0. I most definitely, undeniably, and irreconcilably refuse to accept it as plausible post Crash 2.0, when mobile code anhiliated the net again.

SR4 has sufficient computing power in the world that there's no need to allow users to run agents on their systems. Only particularly overworked people will have the need for their agents to run on something other than their own Comm. Users can have agents do all the work from their comm while they sleep/eat/get their groove on.
Go to the top of the page
 
+Quote Post
cetiah
post Feb 7 2007, 10:16 PM
Post #107


Moving Target
**

Group: Members
Posts: 745
Joined: 2-January 07
From: Los Angeles, CA
Member No.: 10,510



QUOTE (kigmatzomat @ Feb 7 2007, 05:13 PM)
QUOTE (cetiah)
QUOTE
Okay, no. Accessing a host is different from uploading executable code. When you access a website, the system generates some information and sends it to your browser; you respond by clicking, requesting additional data using a particularly limited format.


Actually, many programs and servers are starting to explore this concept of using computer agents to provide a variety of functions as it travels to other people's hosts. I've been researching this concept in reaction to some of the posts on this thread, and I was surprised how much progress has been made in this area. In addition to the security concerns of protecting a host from malicious agents, a great deal of work and study is going into protecting an agent from malicious hosts. It sounds almost sci-fi-ish.




I'm not arguing against agents or mobile code. My example above includes an agent moving from system to system. With that stated, I am abso-fragging-lutely unwilling to accept that public hosts will alow unknown code execution from rank and file users. It would be java in reverse, with the host executing code provided by the client. It's an administration nightmare and barring some earthshaking concept of worthiness that should immediately be patented, I do not accept it as plausible.

I find idea of it in today's world to be somewhere between foolish and ludicrous. I really wouldn't accept it in SR 2050 when mobile code (virus) destroyed the net in Crash 1.0. I most definitely, undeniably, and irreconcilably refuse to accept it as plausible post Crash 2.0, when mobile code anhiliated the net again.

SR4 has sufficient computing power in the world that there's no need to allow users to run agents on their systems. Only particularly overworked people will have the need for their agents to run on something other than their own Comm. Users can have agents do all the work from their comm while they sleep/eat/get their groove on.

And yet its here. It's happening. Deal with it.

(As I said, there are security issues. But no one's saying, "Uggh. Security issues. Let's just give up." There are techniques and tricks to verifying remote code, and other suggestions on how to improve network security in a mobile-host environment including having an environment that limits the functioning of these agents. And the benefits for mobile-agent networks are extraordinary. Take a read through those links. It's fascinating stuff.)
Go to the top of the page
 
+Quote Post
DireRadiant
post Feb 7 2007, 10:16 PM
Post #108


The Dragon Never Sleeps
*********

Group: Admin
Posts: 6,924
Joined: 1-September 05
Member No.: 7,667



I find the following to be helpful for me in thinking about how personas work in the matrix..

P. 218

"ACCESSING MULTIPLE NODES
It’s common practice for Matrix users to connect to more
than one node at the same time—this is just a matter of switching
between open windows. Th ere is no penalty to switch your
attention between accessed nodes, but you can only act in one
node at a time (meaning each action only applies to one node).
Th ere is also a limit to how many nodes you can access at once:
you can only connect to a maximum of System x 2 nodes at any
one time.
If there’s ever any need to make a test for a persona in a
node that the user has accessed but is not currently “active”
in (in other words, his attention is focused on his persona’s
activities in another node), then the tests should only use the
appropriate program rating or computer attribute, and not the
user’s skill.
Note that your icon appears in each node you access, and
each “copy” icon may be attacked in Matrix combat. It is extremely
bad news to be attacked in more than one node at
once, as you have to divide your attention between two fi ghts
(see p. 232). Any Matrix damage infl icted upon your persona’s
Condition Monitor aff ects all of the “copies” of your persona
icon simultaneously.

Netcat is kicking ass in an online game when her
team calls her up needing some legwork. She doesn’t
want to let the pre-teen cyber-warriors she’s squashing
off-the-hook, so she keeps playing but also takes a
quick second to open a new window to access a public
database and start searching. Halfway through her
third victory, she finds a clue in the database that
points to a file in a corporate network. She doesn’t
want to waste time, so she fires up a link to the network
and starts probing it for weaknesses. She can
tell it’ll be a long night, so she also connects to her
kitchen at home and instructs it to prepare dinner.
With a System rating of 6, Netcat can access 12 nodes
this way simultaneously
."
Go to the top of the page
 
+Quote Post
kigmatzomat
post Feb 7 2007, 10:41 PM
Post #109


Moving Target
**

Group: Members
Posts: 914
Joined: 26-August 05
From: Louisville, KY (Well, Memphis, IN technically but you won't know where that is.)
Member No.: 7,626



QUOTE (Kiyote)
That is a decent explanation for a web server, however I cannot find anywhere in the RAW that implies that a server/client data connection still exists or is used. Everything in the RAW is done by moving your persona from one node to the next. That means a logon request, getting through the firewall, and then accessing the node. There is no "Get Node Webpage" free/simple/complex action that allows for that kind of direct access transfer of data.


Your persona is a remote represenation of your comm/workstation/etc. It can exist on multiple remote systems simultaneously according to RAW (p.118, I believe, in the section aptly called "accessing multiple systems.")

However you only have one persona, it is shared across all remote hosts. Given that you only have one persona while being on multiple systems and that your persona's attributes are based on your comm/workstation/abacus rather than the remote server, obviously the persona is running on your local comm while maintaining a client/server connection.

As for the "get node webpage" action, it's unnecessary since it is rolled into the concept of the VR interface. You say "connect to GlobalDynamX" and, ta daah, you are in the public portion of their matrix site. It will have some VR metaphor, probably their office or something, and you can pick up the virtual documents (read the "web pages") or go through the virtual security door (with some username/password challenge) to the private system. The matrix is essentially VRML but before VRML was a term anyone knew.

QUOTE

Maybe I'm just missing something obvious here, but my impressions were that the data was not sent back to your Commlink, but to your persona via the persona's icon.


Your Persona is a particular bit of software that runs on some piece of physical hardware. The Hardware in question is usually your comm and virtually always in immediate physical proximity to you. I say "virtually" always because some joker will come up with a thousand foot long data cable or wifi "cantenna."

The Persona is essentially your avatar, an icon with a particular "skin" that represents you. The matrix is very similar to a game of Quake. You have a default environment (home map) as your theme. You connect to a remote server. Your computer actually renders the environment to you as well as other people. It bases the actions of the other people on the information relayed from the host server, which is itself basing the other people's appearance & actions on the information provided by their computer.


QUOTE

The text from the RAW that I quoted stated that a node can have public access areas or even be completely public access. That reads to me like it is saying that an area of the node is open to public access, and you need to connect to the node to access that area. If it were saying what you seem to think it says, I would expect it to say "Date/Icons/Programs/whatever on a node can be publicly accessed". You are saying that the information on a node can be publicly accessed remotely (from another node), if setup for it. I think the raw is saying that the node itself can be public accessed if setup for it, and that information on the node can be accessible from that public access area.


I agree that information on the node can be accessed by the public. I agree that it is possible for someone to create a completely public server, intentionally or otherwise, that allows remote code exploits. I've known of intentionally wide open systems that allowed anything to be done to/with them but they were CD-based machines with no logs that rebooted nightly for the explicit use of people with questionable motives.

I disagree that it is likely, plausible, rational, or even probable that it would be the case in actual implementation outside of the Shadow community.
Go to the top of the page
 
+Quote Post
kigmatzomat
post Feb 7 2007, 10:48 PM
Post #110


Moving Target
**

Group: Members
Posts: 914
Joined: 26-August 05
From: Louisville, KY (Well, Memphis, IN technically but you won't know where that is.)
Member No.: 7,626



QUOTE (cetiah)
And yet its here.  It's happening.  Deal with it.

(As I said, there are security issues.  But no one's saying, "Uggh. Security issues.  Let's just give up."  There are techniques and tricks to verifying remote code, and other suggestions on how to improve network security in a mobile-host environment including having an environment that limits the functioning of these agents.  And the benefits for mobile-agent networks are extraordinary.  Take a read through those links.  It's fascinating stuff.)


I'm familiar with remote agents. I think they have value...eventually. But my base arguement is not specifically security but that it is unnecessary. In today's world it's being used for Grid computing and other high-end applications where more CPU power is necessary and it is worthwhile to have code that essentially self-tunes itself.

Why, in 2060, when everyone has the equivalent of a Fairlight Excaliber in their pocket, would it be necessary to have code migrate from server to server? What advantage does it give to either the agent-owner or the host owner? What is the advantage to Google? What is the advantage to Fuchi?

IF there's no advantage, why would anyone put up with the (surmountable) security hassle? Give me a justifiable advantage that isn't solved easier and cheaper by providing a company comm with a higher rating.
Go to the top of the page
 
+Quote Post
Serbitar
post Feb 7 2007, 10:55 PM
Post #111


Running Target
***

Group: Members
Posts: 1,498
Joined: 4-August 05
From: ADL
Member No.: 7,534



\signed
Go to the top of the page
 
+Quote Post
kigmatzomat
post Feb 7 2007, 11:00 PM
Post #112


Moving Target
**

Group: Members
Posts: 914
Joined: 26-August 05
From: Louisville, KY (Well, Memphis, IN technically but you won't know where that is.)
Member No.: 7,626



?
Go to the top of the page
 
+Quote Post
cetiah
post Feb 7 2007, 11:00 PM
Post #113


Moving Target
**

Group: Members
Posts: 745
Joined: 2-January 07
From: Los Angeles, CA
Member No.: 10,510



QUOTE (kigmatzomat @ Feb 7 2007, 05:48 PM)
QUOTE (cetiah)
And yet its here.  It's happening.  Deal with it.

(As I said, there are security issues.  But no one's saying, "Uggh. Security issues.  Let's just give up."  There are techniques and tricks to verifying remote code, and other suggestions on how to improve network security in a mobile-host environment including having an environment that limits the functioning of these agents.  And the benefits for mobile-agent networks are extraordinary.  Take a read through those links.  It's fascinating stuff.)


I'm familiar with remote agents. I think they have value...eventually. But my base arguement is not specifically security but that it is unnecessary. In today's world it's being used for Grid computing and other high-end applications where more CPU power is necessary and it is worthwhile to have code that essentially self-tunes itself.

Why, in 2060, when everyone has the equivalent of a Fairlight Excaliber in their pocket, would it be necessary to have code migrate from server to server? What advantage does it give to either the agent-owner or the host owner? What is the advantage to Google? What is the advantage to Fuchi?

IF there's no advantage, why would anyone put up with the (surmountable) security hassle? Give me a justifiable advantage that isn't solved easier and cheaper by providing a company comm with a higher rating.

"Consider the case of a traveller wishing to arrange a trip from a town outside London to a city on the East Coast of the USA. This is the sort of activity – surely – that agent researchers promise people will be able to delegate to their personal travel software agents, in the same vein as we do to our human secretaries. Today, it is still largely the case that the secretary would consult other human travel agents, who in turn contact yet others to arrange your flight and itinerary. These others include hotel agents, railway agents, rental car agents, etc. However with much of the information now being found online, but being owned by different stakeholders who all want to make money from the information and service, the promise is that your personal travel agent (PTA) will negotiate with other software agents representing the interests of the different stakeholders. This way, your itinerary gets generated with minimal or possibly without any human intervention, unless changes to the itinerary are required. This is truly a multi-agent problem wherein the inter-operation of separately developed and self-interested agents provide a service beyond the capability of any agent in the set up, and in the process all or most gain financially. Economically speaking, all these agents have comparative advantages over each other due to specialisation, and trading their services is good for all. This lofty goal generates some critical challenges that the hype of software agents and many papers in the literature cast aside. We describe some of the main problems next, and comment on how far the challenges they pose have been realised."


This was taken from the following website, a paper on "The Potential Benefits of Software Agent Technology for British Telecommunication Laboraties, by Hyacinth S. Nwana and Divine T. Ndumu for their Applies Research and Technology department.

(The author advises against agent research, by the way, saying there has been very little real progress in this area.)
Go to the top of the page
 
+Quote Post
cetiah
post Feb 7 2007, 11:01 PM
Post #114


Moving Target
**

Group: Members
Posts: 745
Joined: 2-January 07
From: Los Angeles, CA
Member No.: 10,510



QUOTE (Serbitar)
\signed

QUOTE (kigmatzomat @ Feb 7 2007, 06:00 PM)
?

That's not Serbitar, it's just his agent checking in with us. In my custom house rules we call them 'rats'.

Go to the top of the page
 
+Quote Post
kigmatzomat
post Feb 7 2007, 11:07 PM
Post #115


Moving Target
**

Group: Members
Posts: 914
Joined: 26-August 05
From: Louisville, KY (Well, Memphis, IN technically but you won't know where that is.)
Member No.: 7,626



QUOTE (cetiah)
Massive snippage

This was taken from the following website, a paper on "The Potential Benefits of Software Agent Technology for British Telecommunication Laboraties, by Hyacinth S. Nwana and Divine T. Ndumu for their Applies Research and Technology department.


Valid reasons. Now tell me why the code has to EXECUTE on those systems as compared to on a CPU that you own.

I can write a stupid agent. It will read web pages looking for keywords, follow links, download documents, etc and run on my PC the whole time. I have friends who have Ebay snipers to purchase items for them during the frantic last minute bidding process.

Tell me what is the value in having it execute on other systems. Don't tell me why agents are good, I already know. Tell me why anyone would let me run my agent on their hardware. Tell me why I would need my agent to run on their hardware.

Go to the top of the page
 
+Quote Post
cetiah
post Feb 7 2007, 11:12 PM
Post #116


Moving Target
**

Group: Members
Posts: 745
Joined: 2-January 07
From: Los Angeles, CA
Member No.: 10,510



QUOTE (kigmatzomat @ Feb 7 2007, 06:07 PM)
QUOTE (cetiah)
Massive snippage

This was taken from the following website, a paper on "The Potential Benefits of Software Agent Technology for British Telecommunication Laboraties, by Hyacinth S. Nwana and Divine T. Ndumu for their Applies Research and Technology department.


Valid reasons. Now tell me why the code has to EXECUTE on those systems as compared to on a CPU that you own.

I can write a stupid agent. It will read web pages looking for keywords, follow links, download documents, etc and run on my PC the whole time. I have friends who have Ebay snipers to purchase items for them during the frantic last minute bidding process.

Tell me what is the value in having it execute on other systems. Don't tell me why agents are good, I already know. Tell me why anyone would let me run my agent on their hardware. Tell me why I would need my agent to run on their hardware.

Alright. You win. I can't respond to that without opening up whole other areas of discussion (introducing ideas that have not only been disagreed with before, but "officially" shot down as not existing in SR).

So what was your point? I thought it was that agents are bad. Is it just that RAW is bad? Or Tron-like VR is bad?

(It's still a fascinating read, btw.)
Go to the top of the page
 
+Quote Post
eidolon
post Feb 7 2007, 11:17 PM
Post #117


ghostrider
********

Group: Retired Admins
Posts: 4,196
Joined: 16-May 04
Member No.: 6,333



QUOTE (cetiah @ Feb 7 2007, 05:01 PM)
QUOTE (Serbitar)
\signed

QUOTE (kigmatzomat @ Feb 7 2007, 06:00 PM)
?

That's not Serbitar, it's just his agent checking in with us. In my custom house rules we call them 'rats'.

My assumption is that Serby is following posts that he finds particularly agreeable with \signed to indicate that he agrees, and/or would have said the same thing.

Just a guess.
Go to the top of the page
 
+Quote Post
kigmatzomat
post Feb 7 2007, 11:21 PM
Post #118


Moving Target
**

Group: Members
Posts: 914
Joined: 26-August 05
From: Louisville, KY (Well, Memphis, IN technically but you won't know where that is.)
Member No.: 7,626



The point I was originally trying to make was that Agents do not need to upload themselves to other systems. There is no RAW that says so and that there is no logical reason for it.

The side arguements, AFAIK, were to further justify that agents frequently hopped from system to system, an idea that I have hopefully dismantled as being pointlessly complex.
Go to the top of the page
 
+Quote Post
cetiah
post Feb 7 2007, 11:30 PM
Post #119


Moving Target
**

Group: Members
Posts: 745
Joined: 2-January 07
From: Los Angeles, CA
Member No.: 10,510



QUOTE (kigmatzomat)
The point I was originally trying to make was that Agents do not need to upload themselves to other systems. There is no RAW that says so and that there is no logical reason for it.

The side arguements, AFAIK, were to further justify that agents frequently hopped from system to system, an idea that I have hopefully dismantled as being pointlessly complex.

Oh. No.
"Access" in RAW means you have an icon there. For your persona to access a node, it must have a persona icon there. That's how firewalls protect a node; they prevent the persona from entering.

A hacker access multiple nodes has multiple icons. That's quoted in the section you are referring to.

Independant agents exist as independant icons. They, too, travel to any node they want to access.

Further, only personas can access multiple nodes. It never says anything about agents. Presumably, this is because agents have to be loaded onto a particular node to act independantly of a hacker's persona.
Go to the top of the page
 
+Quote Post
Cheops
post Feb 7 2007, 11:30 PM
Post #120


Shooting Target
****

Group: Members
Posts: 1,512
Joined: 26-February 02
Member No.: 392



QUOTE (kigmatzomat)
The point I was originally trying to make was that Agents do not need to upload themselves to other systems. There is no RAW that says so and that there is no logical reason for it.

The side arguements, AFAIK, were to further justify that agents frequently hopped from system to system, an idea that I have hopefully dismantled as being pointlessly complex.

\signed ;)
Go to the top of the page
 
+Quote Post
cetiah
post Feb 7 2007, 11:31 PM
Post #121


Moving Target
**

Group: Members
Posts: 745
Joined: 2-January 07
From: Los Angeles, CA
Member No.: 10,510



QUOTE (Cheops @ Feb 7 2007, 06:30 PM)
\signed  ;)

It's those damn rats again. They're such a nuissance.
Go to the top of the page
 
+Quote Post
Serbitar
post Feb 7 2007, 11:33 PM
Post #122


Running Target
***

Group: Members
Posts: 1,498
Joined: 4-August 05
From: ADL
Member No.: 7,534



QUOTE (cetiah)
QUOTE (Serbitar)
\signed

QUOTE (kigmatzomat @ Feb 7 2007, 06:00 PM)
?

That's not Serbitar, it's just his agent checking in with us. In my custom house rules we call them 'rats'.

Hehe.

\signed = I agree.
Go to the top of the page
 
+Quote Post
Serbitar
post Feb 7 2007, 11:34 PM
Post #123


Running Target
***

Group: Members
Posts: 1,498
Joined: 4-August 05
From: ADL
Member No.: 7,534



QUOTE (eidolon @ Feb 8 2007, 12:17 AM)

My assumption is that Serby is following posts that he finds particularly agreeable with \signed to indicate that he agrees, and/or would have said the same thing.

Just a guess.

Exactly. Is all about expressing your opinions. I really hate it when worthwile posts do not get the attention they deserve.
Go to the top of the page
 
+Quote Post
FrankTrollman
post Feb 7 2007, 11:34 PM
Post #124


Prime Runner
*******

Group: Banned
Posts: 3,732
Joined: 1-September 05
From: Prague, Czech Republic
Member No.: 7,665



The key point that mfb, kigmatzomat, Serbitar, and myself are making is that the node that a program is running on is not necessarily the node that it is acting upon.

The Persona, for example, is actually located on your commlink. However Icons of it appear on nodes it is accessing. This does not mean that the Persona has uploaded itself onto the new node and is now running its code there. The icon is simply a representation of the connection - the fact that information can pass between the node that the Persona is running on and the node it is accessing and back again.

Agents, as written, work exactly the same way. There is a node that it is running on. That's where the code physically is. But it can also access other nodes and send instructions to them. If it has an account (hacked or not), those instructions might even be followed.

-Frank
Go to the top of the page
 
+Quote Post
cetiah
post Feb 7 2007, 11:54 PM
Post #125


Moving Target
**

Group: Members
Posts: 745
Joined: 2-January 07
From: Los Angeles, CA
Member No.: 10,510



QUOTE
The key point that mfb, kigmatzomat, Serbitar, and myself are making is that the node that a program is running on is not necessarily the node that it is acting upon.


And you guys have pretty much got me agreeing with you that it should work this way, assuming the topography of the Matrix being the way it is and computers more-or-less working the way they do now.

I have no objections if you want to modify RAW and say it works this way.

QUOTE
The Persona, for example, is actually located on your commlink. However Icons of it appear on nodes it is accessing. This does not mean that the Persona has uploaded itself onto the new node and is now running its code there. The icon is simply a representation of the connection - the fact that information can pass between the node that the Persona is running on and the node it is accessing and back again.


Yes and no. Roughly from my 20+ readings of the rules since starting my participation in this thread and the amazingly dedicated discussions prompted by various posters here, this is the final "basic breakdown" I've come down to:

System = CPU
Response = overall speed, various hardware and software factors included
Persona = active memory
Node = harddrive
OS = OS. Sort of. OS is run off the node. OS runs the Persona. OS loads programs from the Node into the Persona.
AR/VR = a method of presenting icons
icons = user interface, or GUI
persona icon = the "active workspace" or "active window" that the user is viewing icons through.

QUOTE
Agents, as written, work exactly the same way. There is a node that it is running on. That's where the code physically is. But it can also access other nodes and send instructions to them. If it has an account (hacked or not), those instructions might even be followed.


Nope, Personas work this way but agents don't. According to RAW, independant agents are nothing more than independant icons moving around through the system and do not have a corresponding Persona. Agents do not work the same way as personas, and must be loaded onto a particular node to act independantly (i.e., conduct actions there without your persona). They cannot access multiple nodes at once; only Personas can. They cannot project icons onto other nodes; they ARE icons.

Personally, I think this is an oversight in RAW and creates sooo many problems. It would have made more sense just to say Agents have Personas, too. I guess this was to prevent Agents from loading other Agents; I don't know.

Also, as far as I can tell, Agents can't load programs. Or rather, they can't activate programs to load. Any programs an agent is carrying/running must be available in the comlink and loaded into a persona. Agents can also be loaded into a persona so that the agent can employ them. The agent can be loaded up with a copy of the program, and thereafter if the agent becomes independant it can continue to run the program, even if there is no longer a persona actively running that program.

I think it's all very complicated, but its RAW. If you want to house rule this stuff away, I don't mind.
Go to the top of the page
 
+Quote Post

13 Pages V  « < 3 4 5 6 7 > » 
Reply to this topicStart new topic

 



RSS Lo-Fi Version Time is now: 23rd February 2026 - 04:21 AM

Topps, Inc has sole ownership of the names, logo, artwork, marks, photographs, sounds, audio, video and/or any proprietary material used in connection with the game Shadowrun. Topps, Inc has granted permission to the Dumpshock Forums to use such names, logos, artwork, marks and/or any proprietary materials for promotional and informational purposes on its website but does not endorse, and is not affiliated with the Dumpshock Forums in any official capacity whatsoever.