IPB

Welcome Guest ( Log In | Register )

2 Pages V  < 1 2  
Reply to this topicStart new topic
> Threaded stealth and spiders
GoldenAri
post Jun 21 2007, 02:02 PM
Post #26


Moving Target
**

Group: Members
Posts: 198
Joined: 26-December 03
Member No.: 5,935



QUOTE
Actually Sprites are matrix objects, once compiled they exist in node they were created and tend to follow the TM. ( Unless sent on a remote service or after a failed attempt to register it and it goes free.)


If that were the case then why aren't they subject to the limits of the node they are on?
Go to the top of the page
 
+Quote Post
Cheops
post Jun 21 2007, 04:28 PM
Post #27


Shooting Target
****

Group: Members
Posts: 1,512
Joined: 26-February 02
Member No.: 392



QUOTE (Blog)
the TM itself is a living persona. The sprites are linked to your persona. Therefore anything your connected to they can exist in (which is why they 'disappear' when you leave node that you told one to idle in).

Threading is a free action.

I'm starting to wonder if I'm the only person that has been playing a Technomancer like a summoner. Hey crack sprite go to town and find me an exploit to system A with admin rights. A few moments/hours later it returns with a valid exploit method. TM logs in using that exploit. Hey data sprite make me an account here, I'll assist! (just remember to bury it with stenography). Log out then log back in as a valid Admin just in time to cancel any alerts previously tripped. Then go about your business as a valid user.

Or at least thats how I do my hacking.

Hmmm...never thought of doing that before.

In my games I say that sprites are separate icons with their own (albeit garbled) AID. Thus the TM couldn't log on with the access that the Crack sprite gains. Also, I NEVER used Probe with the Crack sprites. They live to crack security so "real resonance entities" do it on the fly. This meant that for all but the most powerful Crack sprites they raise an alert that was then suppressed.

Your bit of brilliance is Stenography. None of us ever thought of that. Bravissimo! :notworthy:

As for TMs using a commlink and their persona I'm okay with it. However, that'd be 2 different entities so you'd need separate access for the commlink and it's programs wouldn't work on the living persona. Also, whichever one isn't being used would just sit there and potentially get wailed on by security.

Hmm...didn't notice the errata for the actions. Now the TM is faster. I'd say that they are even better than hackers now. With 2 registered rating 3 sprites of the appropriate type you could take a rating 0 CF and say: Free Action, Thread; Simple action, assist; Simple action, sustain. You'd now have the CF at 3+(Software+Resonance) for 3 combat turns without taking a -2 penalty. All it costs you is 6 hours and 1 initiative pass. Interesting...
Go to the top of the page
 
+Quote Post
Eleazar
post Jun 21 2007, 04:38 PM
Post #28


Moving Target
**

Group: Members
Posts: 398
Joined: 16-August 06
Member No.: 9,130



I think there is a fundamental SR4 mechanic I am misunderstanding about stealth.

On the Fly, Mechanic A:
IC keep on rolling pilot rating+analyze until they obtain hits=stealth on a single roll only. If I had a rating 5 stealth and they only had 4 dice on this roll it would be impossible for them to detect me.
On the Fly, Mechanic B:
IC roll for an extended test with the threshold being my stealth. They roll each time until they pile up hits=stealth.

Which of these is right? Are they both wrong? How is this properly handled?
Go to the top of the page
 
+Quote Post
hobgoblin
post Jun 21 2007, 05:09 PM
Post #29


panda!
**********

Group: Members
Posts: 10,331
Joined: 8-March 02
From: north of central europe
Member No.: 2,242



second one is the correct one.
Go to the top of the page
 
+Quote Post
sunnyside
post Jun 21 2007, 07:59 PM
Post #30


Neophyte Runner
*****

Group: Members
Posts: 2,377
Joined: 31-December 06
Member No.: 10,502



I'm not so sure you can use stegonography that way. The point of it is hiding data so it can't be found. So when the system looks up your account...nothing.

Also if something hacks in on the fly it gets through, but doesn't get a passcode or anything (though probing usually does).

Still you could get in without hacking by using a rating 6 courier sprite with browse and exploit. It could hack in, find the security logs, and edit them to get you in. If the admin list is databombed you'd need to send the crack sprite in after all.

Actually given the exceptional ability of technomancers to communicate without interception with sprites they might be able to do what needs doing for you remotely.

If a courier does edit you in remember a couple things.

-if you log in as an authorised user if the system tries to disconnect you you just roll hacking not hacking+exploit. Meaning you're pretty much gone if the system wants you gone.

-patroling IC and more typically spiders may notice something fishy about you. For example the spider may know the guys who have admin access and you aren't one of them.

-some systems also require passkeys / RFIDs to get in. I suppose in many cases you could just tell the system that this account doesn't need one, but I'd work fast if I were you.

Still having your sprites hack for you isn't a bad idea at all. Works much better than with agents where you never know if the system detected them and is now using the intercept traffic rules to feed you garbage while a trace has already completed(which by the way, is what I have systems and spiders generally do if they would realistically have the software).

Question, and I want to say the answers out there I just can't find it. Can sprites be tracked back to the TM like an agent? I'm pretty sure the answer is yes. They certainly have a data trail heading back to the TM (what all those images and files are going over).
Go to the top of the page
 
+Quote Post
Wasabi
post Jun 22 2007, 06:41 PM
Post #31


Running Target
***

Group: Members
Posts: 1,251
Joined: 11-September 04
From: GA
Member No.: 6,651



QUOTE (sunnyside)
They certainly have a data trail heading back to the TM (what all those images and files are going over).

Don't forget about the unhackable Resonance link. Its not using a program or technology its just automagical communication. :-)
Go to the top of the page
 
+Quote Post
sunnyside
post Jun 22 2007, 07:08 PM
Post #32


Neophyte Runner
*****

Group: Members
Posts: 2,377
Joined: 31-December 06
Member No.: 10,502



I'm away from the book at the moment but I think the issue with the link isn't that it doesn't exist, it's that it can't be spoofed/edited because it's got a little bit of whatever that "resonance" stuff is, and the TM/sprite would notice if things didn't match up.

I don't think that it can't be sniffed. What I don't know is if you can track someone from something like that.

I.e lets say I know I've got a target that likes to make calls to a little island somewhere, and I happen to know that the island has one centralized node with a satalite uplink that provides service to the entire island. So I hack that node and sniff around until a call comes through. The target didn't visit the node I'm in par se. Their traffic is just being routed through it. Am I now able to use a track program on them? I'm thinking yes.
Go to the top of the page
 
+Quote Post
Cheops
post Jun 22 2007, 07:33 PM
Post #33


Shooting Target
****

Group: Members
Posts: 1,512
Joined: 26-February 02
Member No.: 392



QUOTE (sunnyside)
I.e lets say I know I've got a target that likes to make calls to a little island somewhere, and I happen to know that the island has one centralized node with a satalite uplink that provides service to the entire island. So I hack that node and sniff around until a call comes through. The target didn't visit the node I'm in par se. Their traffic is just being routed through it. Am I now able to use a track program on them? I'm thinking yes.

Yes but you'd have to make a Matrix Perception on them when they are talking on the phone and get 1 success to learn their access ID. Then you could track them as long as they are still on the phone.

Hacking on the fly still has to generate some sort of account otherwise you couldn't get security or admin access (there'd be no difference). Hmm...you are right about the system being confused by Stenography. Oh well, cool while it lasted.

As to the other points sunnyside had, yes they are an issue. However, an IC might not be smart enough to know what to do with an entity that doens't have a proper AID and admins might not check their admin list every few minutes. If you aren't doing anything that your access doesn't allow then there shouldn't really be any red flags.

TMs may only be tracked by other Resonance beings. Makes TMs hell for security to deal with. You should be able to sniff a TM if you can intercept one of his current active wireless communications. You just can't hack his end and his AID again comes up as garbage (unless you are also a TM).
Go to the top of the page
 
+Quote Post
sunnyside
post Jun 22 2007, 09:20 PM
Post #34


Neophyte Runner
*****

Group: Members
Posts: 2,377
Joined: 31-December 06
Member No.: 10,502



Is there something I missed in raw about resonance beings not being able to be tracked? Does that apply to TMs as well? If so that's a huge huge boost compared to being trackable.

Actually even if it is just that sprites are untrackable it's a massive thing. Usually the reason you can't just hack all the livelong day with agents is that something could go wrong and you get found in real life. Even if you run the agent off of a seperate node you eventually have to hook up with them and they could have been followed etc.

If sprites are immune to that it means you can hack remotly with sprites at zero real life risk. There is nothing that can go wrong aside from not getting whatever you were after and losing your sprite.

I guess even if the TM is trackable through the sprite connection they could still just send sprites out purely remotly. Since a sprite can't be hacked/spoofed there isn't any risk in that.

I guess maybe that means that TMs really are like mages in the physical world. The only way to deal with them is to have your own.
Go to the top of the page
 
+Quote Post
Cheops
post Jun 23 2007, 12:26 AM
Post #35


Shooting Target
****

Group: Members
Posts: 1,512
Joined: 26-February 02
Member No.: 392



QUOTE (sunnyside)
I guess maybe that means that TMs really are like mages in the physical world. The only way to deal with them is to have your own.

You are correct. TMs and sprites are untraceable.

Yes, TMs can only be truly beaten by other TMs. You can stop a TM but you can't figure out where he is and send a strike team. Unfortunately, according to the fluff corporations can't really use their own TMs since they are rare, and people aren't fully aware of them yet (wait for emergence).
Go to the top of the page
 
+Quote Post
sunnyside
post Jun 23 2007, 12:43 AM
Post #36


Neophyte Runner
*****

Group: Members
Posts: 2,377
Joined: 31-December 06
Member No.: 10,502



Can anyone back that up in the book? Especially for the TM themselves?

aha page 235

"Like agents, a sprite’s datatrail also connects back to the technomancer’s
datatrail."

Sure looks like they're traceable from that.
Go to the top of the page
 
+Quote Post
Cheops
post Jun 23 2007, 12:55 AM
Post #37


Shooting Target
****

Group: Members
Posts: 1,512
Joined: 26-February 02
Member No.: 392



QUOTE (sunnyside)
Can anyone back that up in the book? Especially for the TM themselves?

aha page 235

"Like agents, a sprite’s datatrail also connects back to the technomancer’s
datatrail."

Sure looks like they're traceable from that.

hoho...looks like I may have thought of this one incorrectly. I believed that Matrix Signatures (p 237) included for the purposes of tracking. Looks like TMs can be traced.
Go to the top of the page
 
+Quote Post

2 Pages V  < 1 2
Reply to this topicStart new topic

 



RSS Lo-Fi Version Time is now: 16th August 2025 - 03:23 AM

Topps, Inc has sole ownership of the names, logo, artwork, marks, photographs, sounds, audio, video and/or any proprietary material used in connection with the game Shadowrun. Topps, Inc has granted permission to the Dumpshock Forums to use such names, logos, artwork, marks and/or any proprietary materials for promotional and informational purposes on its website but does not endorse, and is not affiliated with the Dumpshock Forums in any official capacity whatsoever.