IPB

Welcome Guest ( Log In | Register )

3 Pages V  < 1 2 3 >  
Reply to this topicStart new topic
> The Drone Hacker, How to build it?
The Jopp
post Apr 17 2007, 11:30 AM
Post #26


Runner
******

Group: Members
Posts: 2,925
Joined: 26-February 02
Member No.: 948



I think you understand it perfectly, except the password part. Check out page 215 for Passcodes (Authorized Access), that explains a lot of my reasoning. You can have public nodes (webpages/forums) that requires passwords to enter and that means that some nodes MUST be hacked unless you have the correct passcode.

Exploit and hacking is needed to get through and that was the main point, to buy time because you must start hacking a lot earlier, in a node designed for intrusion defense where you have multiple agents/IC that runs constant Analyze tests for just that event instead of the node you WANT to hack.

Its main strength is that you cannot HACK the main commlink directly. SR4 requires you to have access to the Node in order to hack it and unless it has its own signal you must be inside the node that provides it with a matrix connection.

In order to reach the first Node you must get through the router (commlink 2) Yes, it allows data traffic from the main commlink but also ONLY for that commcode. Any other Commcode, persona, icon or agent needs a passcode to get inside, and the main commlink must verify it with another code.

Once that commlink HAS been hacked it’s no biggie to hack the second one – but it requires a second hacking test.

Oh, just thought on something else, these are the layers of defense in this case:

Hidden Signal
Encrypted Signal
Linked Password (Legal Access to B)
Commlink B
Password (Legal Access to A)
Commlink A

The above buys time and increases the risk for someone trying to hack from B to A getting caught.

References:
Network Security (Page 223 SR4)
Hacking and Accounts (Page 221 SR4)
Authorized Access (Page 215 SR4)
Go to the top of the page
 
+Quote Post
maeel
post Apr 17 2007, 04:28 PM
Post #27


Moving Target
**

Group: Members
Posts: 239
Joined: 21-August 05
Member No.: 7,586



u can take an example from reallife:

if a hacker attacks your Computer some firewalls offer the option to diplay the hackers id. However this id is an ip of the hackers ISP, in order to identify the hacker u have to ask the service provider to tell you who had this ip at the time of the attack, or you hack the ISP Server.

Same goes for comlinks, do not assume that everybodys comlink is a router for everybody elses comlink, that would be to much traffic for any wireless device , dedicated satellites excluded. Wireless comunication requires a wired infrastructure like cellular phones do today.
This infrastrcture includes Server (hosts) that forward the requests to the net (basically other servers) and will also forward the results of your request back to your computer (comlink). A command or code and even an attack is such a request.

The big difference between a comlink and a host is that a host is basically a server (it serves information), which is why u can hack it from the net, a comlink however does not serve information to the net, so in order to hack it u would either hack its ISP first to get to it, or you attack it directly by intercepting and spoofing its wireless signals with next infrastructure antenna.

QUOTE
Comcodes
Everyone using the Matrix has a personal commcode, or
Matrix address—the equivalent of a cell phone number or
email address—to which their calls and messages are directed.
Your commcode is usually registered with a paid Matrix service
provider, though numerous free (if unreliable) and anonymous
shadow-sites offer the same service. Hackers and shadowrunners—
and other criminals—typically pay extra for the anonymity
and extra security of a black commcode.
When you’re online (and when aren’t you?), your commlink
is usually set to automatically link to your provider(s)
so that all calls and messages are immediately forwarded to
you. You can choose to cut this link and “run silent” in order
to avoid the risk of someone tracing that link to your current
whereabouts (meaning your messages will be stored until retrieved
later).


QUOTE
Intercept Traffic
In order to intercept traffic between any two nodes or users,
you must first have access to a node that the traffic passes
through. For example, to intercept a comcall between a Mr.
Johnson and his lackey, you either need to compromise one of
their commlinks or gain access to the Matrix nodes that the
comcall passes through (which could be a challenge unto itself ).
Note that this action only applies to traffic passing through a
wired medium; for wireless traffic, see Intercepting Wireless
Signal, p. 225. The gamemaster may also require you to succeed
in a Computer + Browse Test to locate the traffic flow you seek
to intercept.


i hope this clears it up.
Go to the top of the page
 
+Quote Post
Jaid
post Apr 17 2007, 09:32 PM
Post #28


Great Dragon
*********

Group: Members
Posts: 7,089
Joined: 4-October 05
Member No.: 7,813



right... so what you're saying is that i can buy myself some RFID tags (1 nuyen per 20) a firewall program (rating 6, of course) for 3,000 nuyen, and use an encrypt program (we'll assume rating 5 for chargen, so 500 nuyen) on all of those RFID tags... oh, and add in the cost of some fiberoptic cable (however much it is, i doubt that it's much more expensive than, say, myomeric cable... 20 nuyen per meter...)

the result? anyone who wants to hack my commlink has to go through some stupidly large number of encrypted firewall 6 RFIDs (i assume device rating of 1 otherwise... arguably, stealth and security tags should be higher). heck, why not run an analyse program on it to increase it's dicepool... not that it matters.

the important thing is that you're eventually going to glitch or critically glitch, no matter how big your dice pool is, because i can make you hack into 500 nodes before you get into my actual commlink. and sooner or later, if i set up enough nodes, you'll get detected. it will happen at some point or another.

of course, on the other hand, no company, no matter how much of a cheapskate they are, is going to have anything less defending their nodes... i mean, it's costing *maybe* as much as 300 nuyen for some crazy impenetrable defense hardware, and the software can conveniently be copied as much as they like. even if they don't own a legitimate master copy, you can bet there are matrix security companies offering their services who will... so you can forget about hacking anything, pretty much, because it just isn't going to happen.
Go to the top of the page
 
+Quote Post
Rotbart van Dain...
post Apr 17 2007, 09:34 PM
Post #29


Hoppelhäschen 5000
*********

Group: Members
Posts: 5,807
Joined: 3-January 04
Member No.: 5,951



That's correct. See the black box on p. 223.
Go to the top of the page
 
+Quote Post
maeel
post Apr 17 2007, 09:49 PM
Post #30


Moving Target
**

Group: Members
Posts: 239
Joined: 21-August 05
Member No.: 7,586



Wrong, RFID are powered by wireless, they are offline without it, secondly you would have to hardwire them, which should prove quite challenging, since it is a closed circuit with microscopic (possibly nanoscopic) scale.
Go to the top of the page
 
+Quote Post
Wasabi
post Apr 17 2007, 09:54 PM
Post #31


Running Target
***

Group: Members
Posts: 1,251
Joined: 11-September 04
From: GA
Member No.: 6,651



Sure, I see how you're explaining it now. I usually sit ont he LTG or on the matrix gateway outside the host waiting for intruders like a bouncer outside his nightclub but sure, you could have a second host and then require a passcode/passkey/exploit test to gain access. Of course, once you auithenticate you're immune to being detected as an intruder unless additional monitoring/measures are taken. If you hack in as Security access or Admin access you just create a legit account, backdate its creation, and then log out of the exploited access and log in using legit access. Then you're no longer in danger of being discovered in that node and can even dump the sprites in the other node by killing its matrix connection. I dont see a huge advantage but I'll concede that it's valid according to RAW.

In the end it makes an intruder no less able to screw the contents up and makes the defenders have to spread out more. If access were ALWAYS challenged for authentication at a chokepoint the delay created might make for good detection but as you describe it I'm not so convinced it'd be a deterrant to a hacker or even do more than slow them down a tad. Heck, take over the first (outer) node and then use it to determine all the passcodes coming in so you gather them all up. I wonder how many folks use the same passcode in multiple nodes. For that matter gather up the biometric signals and reproduce their retinal/finger prints by uploading them from saved copies as often as you like. At worst you might have to edit them in to bypass temp sensors on palm readers, etc.
Go to the top of the page
 
+Quote Post
Rotbart van Dain...
post Apr 17 2007, 10:02 PM
Post #32


Hoppelhäschen 5000
*********

Group: Members
Posts: 5,807
Joined: 3-January 04
Member No.: 5,951



QUOTE (maeel)
Wrong, RFID are powered by wireless, they are offline without it, secondly you would have to hardwire them, which should prove quite challenging, since it is a closed circuit with microscopic (possibly nanoscopic) scale.

That is a minor detail, as this example can be replicated with other kind of cheap appliances.

Keep in mind that you could also simply order such a setup.
Go to the top of the page
 
+Quote Post
Wasabi
post Apr 17 2007, 10:08 PM
Post #33


Running Target
***

Group: Members
Posts: 1,251
Joined: 11-September 04
From: GA
Member No.: 6,651



What sort of Build/Repair roll is necessary for a homemade, hardwired RFID that already costs less than a small fry at McSoyShack? Maybe 2 hits? :-)
Go to the top of the page
 
+Quote Post
maeel
post Apr 17 2007, 10:49 PM
Post #34


Moving Target
**

Group: Members
Posts: 239
Joined: 21-August 05
Member No.: 7,586



I was just pointing out that RFIDs are a poor example.

Wasabi:

Just one example, hacker A pissed off hacker B in the matrix, so hacker B tries to locate his meat to send over his pals. he succeeds until he reaches the host of hacker As ISP. In order to triangulate hacker A he has to hack into the ISP for security rights (+3). The big problem is that it is a F**CKING ISP host, meaning it will be controlled pretty good, because ISPs know that there are hackers and in fact these are what they dislike the most. Once hacker B has succeeded he can try to hack hacker As commlink.

Chaining commlinks will not stop other hackers but will slow them down and increase the chance that they fail. Chaining should be capped by response though.

Another problem i find much more disturbing is layered encryption.
The setup:
H:Hacker
D:drone
commlink HA: encryption A wired to
commlink HB: encryption B connects wireless to

commlink DB: decryption B wired to
commlink DA: decryption A

normaly u just juggle the encrypted code around until it makes sense, which wont work here because code B never makes sense because it is still encrypted...

so while normal decryption takes "encryption rating x 2, 1 Combat turn) to break this encryption i would suggest "encryption rating x 2², 1 Combat turn).
Go to the top of the page
 
+Quote Post
Narmio
post Apr 17 2007, 10:52 PM
Post #35


Moving Target
**

Group: Members
Posts: 171
Joined: 5-February 05
Member No.: 7,053



In order to hack my commlink, first you must hack.... Every single one of these toasters I am carrying! Ahahaha!

Incidentally, they also give some impact armour. And wonderful mid-fight snacking opportunities.

Seriously, guys, stop and think for a moment what this will do to the game. Jopp, you're describing a very specific two-commlink setup, but the rules you're claiming for it cover a million RFID tags or a bandolier of kitchen appliances just as easily.

My experience is that, when the proverbial excreta impacts with the ventilation, players start looking for an edge. Maybe he'll want to route his hax through another comm, then after the dust has settled, what motivation has he got to go back to two? Three? Four?

Unhackable hackers versus unhackable corporate facilities? Millions of nodes to game with? Do you actually want to do this?
Go to the top of the page
 
+Quote Post
laughingowl
post Apr 17 2007, 11:03 PM
Post #36


Moving Target
**

Group: Members
Posts: 615
Joined: 26-February 02
Member No.: 1,895



QUOTE
What does subscribing/slaving a device mean, in terms of access/hacking? If a device is subscribed to someone else's commlink, can you hack/spoof that device directly, or do you need to hack the commlink first? If a group of devices were subscribed in a daisy-chain together, could you hack the last device directly, or would you need to hack them all in successive order?

The act of subscribing is merely the act of creating and maintaining a connection between two nodes. Subscribing does not automatically grant access to a node (unless it happens to be a public all-access node) -- that is the purview of accounts. Subscribing is essentially the "handshake" that occurs between two nodes, a protocol check and very basic form of authentication so that each node knows it's connecting with the right other node.

Slaving isn't really covered in the basic rules (you'll see more about this in Unwired), but it essentially counts as instructing one node to only communicate and take orders from another node (or nodes). The instruction to slave a node can only come from someone with admin privileges.

In the basic rules, subscribing and slaving have no effect on hacking or spoofing commands. The act of hacking and/or spoofing is presumed to incorporate an impersonation of a legitimate connection (that's why you need a successful Matrix Perception Test before you can spoof a command). You will likely see an advanced/optional rule in Unwired that makes hacking/spoofing a slaved node trickier.

This means that even if multiple nodes are daisy-chained together, each subscribed or slaved to the next, you don't need to hack/spoof them all in order to hack/spoof the last one -- you can go straight to the last node and attempt to hack/spoof it.

Note that if a node that has other nodes slaved to it (we'll call this the master node) is hacked, then the hacker has open access to the slaved nodes as well (i.e., he does not need to hack them).



Reposted since it seems not to be read.

The FAQ makes this pretty clear.

1) 'subscribing' is not granting you any persmissions. It is establishing a connection.

QUOTE
The act of subscribing is merely the act of creating and maintaining a connection between two nodes. Subscribing does not automatically grant access to a node



2) By the basic rules is something is on the matrix it is 'on the matrix'. It is either Isolated 'totally seperate' or you can access it directly.

QUOTE
In the basic rules, subscribing and slaving have no effect on hacking or spoofing commands. The act of hacking and/or spoofing is presumed to incorporate an impersonation of a legitimate connection (that's why you need a successful Matrix Perception Test before you can spoof a command). You will likely see an advanced/optional rule in Unwired that makes hacking/spoofing a slaved node trickier.


3) To continue this line. Chaining doesn't help. If a node (doesn't specify wireless/wired/or meta-magic-mumbo-jumbo-techno-crypticed) is connected it can be reached, without having to go through intermediary nodes. You do so by 'pretending' to be a legitimate user. Pwnzyou is not attempting to access your Commlink, rather it appears as if Zurich-Orbital Refund Department is attempting to access your commlink.

QUOTE
This means that even if multiple nodes are daisy-chained together, each subscribed or slaved to the next, you don't need to hack/spoof them all in order to hack/spoof the last one -- you can go straight to the last node and attempt to hack/spoof it.

Note that if a node that has other nodes slaved to it (we'll call this the master node) is hacked, then the hacker has open access to the slaved nodes as well (i.e., he does not need to hack them)



You may not like it (I have some problems with it). You may think it really couldnt work like that in a 'real' world; however, until Unwired comes out, by RAW that is the rules.

Peace
Go to the top of the page
 
+Quote Post
Wasabi
post Apr 17 2007, 11:11 PM
Post #37


Running Target
***

Group: Members
Posts: 1,251
Joined: 11-September 04
From: GA
Member No.: 6,651



Although it could be house ruled differently using a Trace program does indeed get you the physical jackpoint of the victim. ["Track Action", BBB p219]

The largest vulnerability of a multihost/chained system is locating an intruder. They needn't go to the end of the chain to decrypt. They just have a dozen agents spread through the first three nodes taking as long as they like to decrypt the datastream while the hacker flies cover. If an inner node is being a problem and you have admin rights on a outer node, simply invalidate the other passcodes and let the owner hack his own node. Then as soon he does, manually set off an alarm. Hack his node, initate a reboot, log off, and let him spend his time not taking dumpshock.

Multi-node schemes are colorful but not "all that and a bag of chips".
Go to the top of the page
 
+Quote Post
maeel
post Apr 17 2007, 11:55 PM
Post #38


Moving Target
**

Group: Members
Posts: 239
Joined: 21-August 05
Member No.: 7,586



I think it is save to assume that subscription is only necessary for wireless connected devices. Reallife example: your mobile phones bluetooth headset needs to be subscribed to your phone, while your cable headset does not.

Narmio: go ahead with your toasters, just make sure the power cable is long enough.. :rotfl:
But seriously if a GM allows chaining and i see no reason not to, he should also cap it.

Wasabi: i dont understand what you mean.. mind to elaborate?
Go to the top of the page
 
+Quote Post
Rotbart van Dain...
post Apr 17 2007, 11:57 PM
Post #39


Hoppelhäschen 5000
*********

Group: Members
Posts: 5,807
Joined: 3-January 04
Member No.: 5,951



QUOTE (Narmio)
Seriously, guys, stop and think for a moment what this will do to the game.

Won't somebody please think of the children?
Go to the top of the page
 
+Quote Post
Wasabi
post Apr 18 2007, 12:29 AM
Post #40


Running Target
***

Group: Members
Posts: 1,251
Joined: 11-September 04
From: GA
Member No.: 6,651



maeel:
What I'm saying is that if an intruder wants to listen in he can do it anywhere along the 'pipe' and the 'pipe's length aids the intruder.
Go to the top of the page
 
+Quote Post
maeel
post Apr 18 2007, 01:17 AM
Post #41


Moving Target
**

Group: Members
Posts: 239
Joined: 21-August 05
Member No.: 7,586



Ok, i think i know what you mean, keep in mind my example only applies to connections between two identical chains.
The point i was trying to make is that multilayered encryption poses a much bigger problem in game terms than chaining does. Theoretically you could simply run two encryption programs on one commlink. The time to decrypt does not increase linear with the layers of encryption, but possibly exponentialy if not worse.
if allowed by the GM this has to capped (system? response?)
Go to the top of the page
 
+Quote Post
Wasabi
post Apr 18 2007, 01:36 AM
Post #42


Running Target
***

Group: Members
Posts: 1,251
Joined: 11-September 04
From: GA
Member No.: 6,651



A hacker is limited in how many programs can be loaded at once but a TM isn't limited on how many Complex Forms he can load at once. ACK!
Go to the top of the page
 
+Quote Post
maeel
post Apr 18 2007, 01:58 AM
Post #43


Moving Target
**

Group: Members
Posts: 239
Joined: 21-August 05
Member No.: 7,586



A TM could compile a sprite to use its hash power...
Go to the top of the page
 
+Quote Post
The Jopp
post Apr 18 2007, 07:00 AM
Post #44


Runner
******

Group: Members
Posts: 2,925
Joined: 26-February 02
Member No.: 948



QUOTE (Wasabi)
I dont see a huge advantage but I'll concede that it's valid according to RAW.

I agree, it isn’t THAT much of an advantage but since a hacker is limited by his response regarding active programs you can load beef up the commlink with higher defenses by using more agents without dropping the response. A Response 5 Commlink can have 9 active rating 4 programs, and since agents are limited to 4 it’s a good number to use. So my regular setup is the following:

Rating 6 Firewall
Encryption (Signal) (If they try to hack the signal)
Encryption (Device) (Must decrypt before hacking)
Databomb (Device) (Must defuse before hacking)
Analyze (Around the clock surveillance)
Agent 1
Agent 1 Analyze (Counts as an active program by FAQ when agent uses it)
Agent 2
Agent 2 Analyze
Agent 3 (on standby and will start Analyzing and report to user if Databomb is disabled)

It’s not über but it is above professional rating of a by-the-book hacker (rating 3)

That means that I can run a hacking setup with 9 programs not dedicated for defensive measures like above.

Ok, lots will say that this is no good hacker with “only” rating 4 programs and no rating 6 whatnot but I don’t really care since the hacker got the skills for the job and above average hardware.
Go to the top of the page
 
+Quote Post
Narmio
post Apr 18 2007, 07:20 AM
Post #45


Moving Target
**

Group: Members
Posts: 171
Joined: 5-February 05
Member No.: 7,053



QUOTE (Rotbart van Dainig)
QUOTE (Narmio @ Apr 18 2007, 12:52 AM)
Seriously, guys, stop and think for a moment what this will do to the game.

Won't somebody please think of the children?

Children? Perfect!

A whole line of them, all with implanted commlinks and a skinlink unit, all holding hands, with a hacker at the end. In order to stop me, you must first hack Mrs Mugwirth's first grade class!

But thanks to the FAQ-poster. That line about "if it's on the matrix, it's on the matrix" is always how I've run it.
Go to the top of the page
 
+Quote Post
The Jopp
post Apr 18 2007, 07:39 AM
Post #46


Runner
******

Group: Members
Posts: 2,925
Joined: 26-February 02
Member No.: 948



QUOTE (Narmio)

But thanks to the FAQ-poster. That line about "if it's on the matrix, it's on the matrix" is always how I've run it.

I do agree to that in a sense but in regards to nodes, especially wired nodes it all comes down to the fact that you DO have to hack those you do not have access to.

Why on earth would corporations have tiered networks otherwise if the hacker can just go directly to the source and ignore all the security hosts/nodes that are supposed to stand before it.

It would be like teleporting directly into fort knox to open the big safe (node 4) and ignore the huge fence with guards surrounding it (node 1) the locked gate to the building with two huge dogs (node 2) and finally the guardroom that stands between the gate and the vault door (node 3).

NOTHING is “on” the matrix, it’s all on nodes as the matrix is built on nodes, there is no supernode that stores all the matrix. It can be wired or it can be wireless and IF you can find the signal to a wireless node, sure, you can hack it directly, otherwise you have to take the long route.

The main reason no-one sits with X amounts of beefed up nodes is the hassle of passcodes, clearances, networking problems and not to mention support staff for all those nodes.

Sure, a hacker COULD be the commlink carrier OF DOOM and have them all connected but it would be too much hassle. Sure, he would be defended from attack but so what, there are TONS of things a node that is being hacked can do, and will do instead of hunting down a hacker. The only reason for sitting with it if he/she is paranoid of getting his Commlink hacked as it will not stop his persona getting attacked, his drones/agents spoofed or signal tapped.
Go to the top of the page
 
+Quote Post
Jaid
post Apr 18 2007, 11:36 AM
Post #47


Great Dragon
*********

Group: Members
Posts: 7,089
Joined: 4-October 05
Member No.: 7,813



the thing is, there are no rules given for tiered networks, or chokepoints, or anything like that. so far as we know, that could just as easily be an explanation of the difference between a node with firewall 1 and a node with firewall 6, rather than actually being represented by actual nodes.

and making stuff effectively unhackable is a problem with the game. arguing otherwise is like arguing that since a critter with immunity to normal weapons can still be harmed by magic, it wouldn't be unbalancing to the game if you just handed it out to everyone.

just because you can do other things to an unhackable node doesn't make it acceptable that the node is hackproof.
Go to the top of the page
 
+Quote Post
Rotbart van Dain...
post Apr 18 2007, 11:42 AM
Post #48


Hoppelhäschen 5000
*********

Group: Members
Posts: 5,807
Joined: 3-January 04
Member No.: 5,951



QUOTE (Jaid)
the thing is, there are no rules given for tiered networks, or chokepoints, or anything like that.

QUOTE (SR4v3 @ p 223, Network Security)
Not all networks are configured as mesh networks—many corporate systems, in fact, retain a traditional tiered network structure. In a tiered structure, some systems can only be accessed through another system first, with the most secure systems hiding behind several layers of security. These networks employ a wide variety of tricks to limit access, including high-security traffic chokepoints or vanishing, teleporting, secret trap-door, or one-way access nodes. Some of these systems and networks are only accessible from private grids or are entirely isolated from the Matrix.
Go to the top of the page
 
+Quote Post
The Jopp
post Apr 18 2007, 11:48 AM
Post #49


Runner
******

Group: Members
Posts: 2,925
Joined: 26-February 02
Member No.: 948



I do agree that it opens up a can of worms in regard to the endless node hacker with X amount of tiered commlinks that he has hidden about his person, but that is just ONE possible way of upping the defense.

Lets look at it from another view then, you skip the tiered node setup and just get 1+ extra commlinks with agents in it. They are all on standby and watch your commlink for intrusion 24/7 and runs constant Analyze too see if someone is stupid enough to hack it.

That is a perfectly valid wireless defence since your commlink is fully hackable but you have 4+ extra Analyze checks at the moment of intrusion and whoever hacked it will most likely be spotted.

We have then skipped the “extra” commlink but added a larger amount of agents from commlinks with a signal setting of zero which gives them an effective range of 0-3 meters so whoever hacks you wont pick up their signal,but they can connect to your commlink.

Add also that the agents have secondary offensive programs...
Go to the top of the page
 
+Quote Post
Sleepyman
post Apr 18 2007, 01:16 PM
Post #50


Target
*

Group: Members
Posts: 17
Joined: 10-April 07
Member No.: 11,421



QUOTE (The Jopp)
[QUOTE=Narmio,Apr 18 2007, 07:20 AM]
It would be like teleporting directly into fort knox to open the big safe (node 4) and ignore the huge fence with guards surrounding it (node 1) the locked gate to the building with two huge dogs (node 2) and finally the guardroom that stands between the gate and the vault door (node 3).

Hi All,
New GM here, struggling with matrix issues. Fun discussion.

I would rule that if Fort Knox never accepts data from the matrix, then all previous levels have to be hacked. On the other hand, if the characters find out that foolish guard likes to play WoW XII every evening from a terminal in Fort Knox, then the hacker only has to beat node 4, not the other nodes.

I see the point that is being made about intervening nodes checking everything out before passing it on, thereby enhancing security at the cost of response. Perhaps raising the threshold would be a way to account for the various analyze programs that are running in the intermediate nodes, and not add any dice rolls. Anything else already complicates a slow, confusing (at least to me) system.

Same thing if one of my players spent hard-earned nuyen for an arrangement like this, raise the threshold for intruders. Almost all electronic devices are supposed to be hackable but some are harder than others.
Sleepyman

Go to the top of the page
 
+Quote Post

3 Pages V  < 1 2 3 >
Reply to this topicStart new topic

 



RSS Lo-Fi Version Time is now: 16th April 2026 - 01:45 AM

Topps, Inc has sole ownership of the names, logo, artwork, marks, photographs, sounds, audio, video and/or any proprietary material used in connection with the game Shadowrun. Topps, Inc has granted permission to the Dumpshock Forums to use such names, logos, artwork, marks and/or any proprietary materials for promotional and informational purposes on its website but does not endorse, and is not affiliated with the Dumpshock Forums in any official capacity whatsoever.