Creating a THOR node |
Creating a THOR node |
Jul 19 2007, 05:26 PM
Post
#26
|
|||||
Running Target Group: Members Posts: 1,246 Joined: 8-June 07 Member No.: 11,869 |
See my posts above.
|
||||
|
|||||
Jul 19 2007, 05:26 PM
Post
#27
|
|||
Genuine Artificial Intelligence Group: Members Posts: 4,019 Joined: 12-June 03 Member No.: 4,715 |
There is no control system. It's a bluff that you hope nobody is crazy enough to call. :D |
||
|
|||
Jul 19 2007, 05:31 PM
Post
#28
|
|
Cybernetic Blood Mage Group: Members Posts: 3,472 Joined: 11-March 06 From: Northeastern Wyoming Member No.: 8,361 |
Aye Buster, I liked your idea of a dedicated communications network enough that I made mention of it in an Edit of my Node writeup, but even with such a network, it's still possible, albeit harder to hack your way into a Thor Platform.
|
|
|
Jul 19 2007, 05:42 PM
Post
#29
|
|
Awakened Asset Group: Members Posts: 4,464 Joined: 9-April 05 From: AGS, North German League Member No.: 7,309 |
The device is located on the orbital platform and the list does not require regular updates. It´s more like a single code in an envelope in the CEOs personal safe anyway.
|
|
|
Jul 19 2007, 05:47 PM
Post
#30
|
|
Cybernetic Blood Mage Group: Members Posts: 3,472 Joined: 11-March 06 From: Northeastern Wyoming Member No.: 8,361 |
Umm, oookkk. The idea of not being able to change your launch-codes as needed and quickly is just scary to me. And still, exactly what type of device are you using to check in the first place?
|
|
|
Jul 19 2007, 06:00 PM
Post
#31
|
|
Shooting Target Group: Members Posts: 1,965 Joined: 26-February 02 From: Edinburgh, Scotland Member No.: 2,032 |
Well, first you need to consider the price of the various hardware and software you're talking about, and consider the price of making them manned with the normal security parameters against normal attack.
If they're connected somehow, it'd be via direct connections, and wouldn't be via one direct connection. There would be multiples that would all need to be hacked simultaneously. If they're manned, employees would be screened psychologically and physically at delta clinics and would be initially chosen for their loyalty. As the Thor systems are in space, they've already got protection against magical interference that ground-based operations do not have. Note: Making them turn themselves off at the first sign of danger is not an option. Otherwise, the opponent might just send a bunch of hackers at the target and watch as they get creamed but the attack is prevented. I think that any rating beyond 7 represents ahead-of-the game stuff, and I'd happily give key stuff in military environments ratings of 7 or above. Sure, it can be experimental or task-centric, but when military budgets are involved and teams of scientists work on something dedicated you get a lot out of it. Weren't the Colossus code-cracking machines from WW2 supposedly still better than some modern computers at cracking codes, even though they were running on valves? That's an old story, I wouldn't be surprised if it had been surpassed nowadays, but IMHO ratings of 7 or above are fair game for 'unreasonable' hardware and software. If you must, consider what multiple rating 6 machines would be like working together towards the same task, or make the hacker make their rolls twice and say they're having to hack-in both ways simultaneously. Stack the odds against the hacker, it is possible. |
|
|
Jul 19 2007, 06:05 PM
Post
#32
|
|
Awakened Asset Group: Members Posts: 4,464 Joined: 9-April 05 From: AGS, North German League Member No.: 7,309 |
A ROM+RAM-device that has the list in ROM and requires a copy of the "user-list" written into its RAM once per round. If that doesn´t happen or results in a different copy, alert is triggered.
The basic limitation is "a matrix node". I´d have the sattelite on a PAN with a group of comlinks that are hardwired to each other and connected to the sattelite via LASER. The comlink-network is NOT connected to the matrix and sitting in a secure room in corporate HQ. Straight out forget entering this system without admin-accesscodes known beforehand. Any activity on the datajack-ports has to be legitimated in the first round else it is considered an attack. No probing the system. Remember the list of THOR owners and think about the security involved at HQ itself. |
|
|
Jul 19 2007, 06:17 PM
Post
#33
|
|
Target Group: Members Posts: 7 Joined: 21-June 06 Member No.: 8,756 |
Actually, I'd probably just have it non-wireless accessable (on site only and only at one terminal), and make it so you would need a special socket in your datajack along with the datajack needing specific hardware (think Omega cyberdeck from 3E Shadowrun Companion).
|
|
|
Jul 19 2007, 06:19 PM
Post
#34
|
|
Cybernetic Blood Mage Group: Members Posts: 3,472 Joined: 11-March 06 From: Northeastern Wyoming Member No.: 8,361 |
Well personally I figure that any corp big enough to even think about owning a Thor Platform is big enough not to worry about little things like copy protection (I figure that they have access to a copy of the Source Code used to make the software that everyone else is buying.), so you are basically looking at hardware costs plus whatever salary a Decker capable of coding non-copy protected ( Rating 6 ) software brings in. *Edit* And they would already want to have the Decker on staff even without worrying about protecting their Thor Platforms so that isn't really an added cost. */Edit*
<><><><><> Ryu, if the list isn't in orbit then you are leaving your system open to Buster's "drone-in-the-middle" attack. And you know that you simply can't have a direct laser connection from Corp HQ to your Thor Platform, you have to also have relay stats in orbit that can also be spoofed. No, although you will want some decent ground-based security, you also need to make sure that everything in orbit is capable of standing on it's own two feet. <><><><><> Coren, sure but unless your Thor Platforms are manned then a signal has to be sent to orbit at some time. |
|
|
Jul 19 2007, 06:24 PM
Post
#35
|
|||
Great Dragon Group: Members Posts: 5,537 Joined: 27-August 06 From: Albuquerque NM Member No.: 9,234 |
The other element could be you store the rounds without their operating code. If you access the system you can fire it, but it's inert. It just fall out of the launch canister. To effectively deliver the round you need to access the totally seperate system that takes a northing, easting and elevation and produces a cryptographically sealed guidiance program that is good for 10 seconds. This is generated in a totally seperate system that is equally hardened, and if an alarm is detected on either they are both shut down until it is resolved and all the nodes and weapons are verified clean. |
||
|
|||
Jul 19 2007, 06:25 PM
Post
#36
|
|||
Great Dragon Group: Members Posts: 5,430 Joined: 10-January 05 From: Fort Worth, Texas Member No.: 6,957 |
True, they probably shouldn't be set to turn off the instance any trouble is detected, but should almost certainly be set to turn off the instant trouble is detected at or beyond node 5 out of 100 (or whatever arbitrary number of intervening nodes you pick). Since all of those nodes have top notch security, any trouble past that is a definite sign of a persistent and extremely capable enemy. |
||
|
|||
Jul 19 2007, 06:27 PM
Post
#37
|
|
Cybernetic Blood Mage Group: Members Posts: 3,472 Joined: 11-March 06 From: Northeastern Wyoming Member No.: 8,361 |
Hmm, very interesting point kzt, but what workaround do the corps have in place for the next corp war? Surely they aren't going to allow a rival corp the ability to shut down their Thor Platforms by purposely tripping alarms in either system?
|
|
|
Jul 19 2007, 06:30 PM
Post
#38
|
|
Awakened Asset Group: Members Posts: 4,464 Joined: 9-April 05 From: AGS, North German League Member No.: 7,309 |
I have the list in orbit, have fun getting there. And I´m willing to have a dedicated relay network in orbit, guarded as before and communicating via directional channels with individual THORs. I like that even better than linking straight to a THOR.
|
|
|
Jul 19 2007, 06:36 PM
Post
#39
|
|||
Cybernetic Blood Mage Group: Members Posts: 3,472 Joined: 11-March 06 From: Northeastern Wyoming Member No.: 8,361 |
Yeah, and I'm back to;
Because even if they are locked up in your CEOs personal safe or in a secure room at Corp HQ, people still have to be able to actually get to them when needed, and any security system that is actually usable is also exploitable by nature. |
||
|
|||
Jul 19 2007, 06:39 PM
Post
#40
|
|||||||
Moving Target Group: Members Posts: 398 Joined: 16-August 06 Member No.: 9,130 |
Why wouldn't a spoofing test work for this? The most difficult thing it would require me to do is hijack one of these relay satellites. I don't even think scenarios like this were even meant to be covered by the SR4 rules. As far as SR4 goes, the only option would be a satellite link which is just a wireless signal 8. People are giving some great solutions but they actually have to be feasible within the rules since this is meant to be for SR4. |
||||||
|
|||||||
Jul 19 2007, 07:02 PM
Post
#41
|
|
Cybernetic Blood Mage Group: Members Posts: 3,472 Joined: 11-March 06 From: Northeastern Wyoming Member No.: 8,361 |
Well the way I see it, a simple spoofing test wouldn't work because a Thor Platform isn't the same as a drone which is designed to accept and execute commands instantly, in my example, spoofing would allow you to access the platform's node, but you still have to hack the nodes themselves in order to fire the weapon.
Basically it's the same reason I can't just spoof a corp system into giving me all of it's paydata as well as shuting down the security systems and opening the elevator doors for my team, I ahve to actually hack the systems and be able to Stealth (Or Crash) whatever IC/Security Deckers are standing in my way. |
|
|
Jul 19 2007, 07:15 PM
Post
#42
|
|||
Great Dragon Group: Members Posts: 5,537 Joined: 27-August 06 From: Albuquerque NM Member No.: 9,234 |
It's on an isolated network running just raw IP V6 with SSH and SCP over a crypto tunnel. Without the GUI nobody can hack it. :D :D |
||
|
|||
Jul 19 2007, 07:17 PM
Post
#43
|
|
Cybernetic Blood Mage Group: Members Posts: 3,472 Joined: 11-March 06 From: Northeastern Wyoming Member No.: 8,361 |
:eek: Umm, you want to run that by me again, in english this time? 8)
|
|
|
Jul 19 2007, 07:20 PM
Post
#44
|
|||
Moving Target Group: Members Posts: 398 Joined: 16-August 06 Member No.: 9,130 |
I think you and I came to a misunderstanding. That was in response to Busters scenario where the commands were being directly given from the satellites. So the relay satellites would be like a rigger controlling a drone. |
||
|
|||
Jul 19 2007, 07:24 PM
Post
#45
|
|||
Great Dragon Group: Members Posts: 5,537 Joined: 27-August 06 From: Albuquerque NM Member No.: 9,234 |
It's not running matrix protocols at all, and requires that you have physical access to one of the terminals. |
||
|
|||
Jul 19 2007, 07:26 PM
Post
#46
|
|
Cybernetic Blood Mage Group: Members Posts: 3,472 Joined: 11-March 06 From: Northeastern Wyoming Member No.: 8,361 |
Ok, yeah in that scenerio I agree, a single Spoof Test and you're ready to rain fiery destruction down upon your enemies, starting with one soon to be very crispy bunkered dragon. :cyber:
Talia Invierno does that count as a win for the runners? 8) |
|
|
Jul 19 2007, 07:29 PM
Post
#47
|
|
Running Target Group: Members Posts: 1,246 Joined: 8-June 07 Member No.: 11,869 |
I'm thinking that Thor platforms are strategic, rather than tactical weapons, so a few more milliseconds wouldn't matter in their security systems. This allows you to add a lot of layers of security to the system that you couldn't have in a drone.
Since each relay is potentially a weak link, I imagine that each relay satellite would be a cluster of nodes that have to be hacked through before moving on to the next relay. I'm thinking of the opening intro to the Get Smart TV show where Agent Smart has to go through a Rube Goldberg set of security doors before he gets to the trapdoor at the end of the complex. :D |
|
|
Jul 19 2007, 07:37 PM
Post
#48
|
|
Cybernetic Blood Mage Group: Members Posts: 3,472 Joined: 11-March 06 From: Northeastern Wyoming Member No.: 8,361 |
Ok, other then the near impossiblity of actually managing to hack into the system not once but twice, what would a runner have to do in order to code her own version of a guideance program?
I would assume that Thor Platforms have to be tested through dry runs once in a while, so a Decker should be able to get a peak at a sample during one of the tests since we are talking about a team that can find and get to a dragon's lair with no questions asked. ;) |
|
|
Jul 19 2007, 07:43 PM
Post
#49
|
|
Bushido Cowgirl Group: Members Posts: 5,782 Joined: 8-July 05 From: On the Double K Ranch a half day's ride out of Phlogiston Flats Member No.: 7,490 |
A Thor shot platform/command centre should be at the very least as difficult as cracking Zurich Orbital. Not only would the system be isolated from the outside, but, not having everything in one convenient gift wrapped package would add to the security.
@Adam & Ravor: Two (or more) Metahumans with the interlock passkeys inserted simultaneously would be an excellent failsafe, especially if they were aboard the orbital platform. This can even be layered. For one, you would have to go “up there� to deal with them, Second, hope the runners have Zero G experience or things could get pretty interesting in a hurry. Target Wastelands has a lot of good info on dealing with micro & zero G environments. One additional thing I do is have the runners perform a body test to not lose their lunch (this has even happened to trained astronauts in RL). Even if the test succeeded, I would have the PCs without Zero/Micro G training suffer the effects of nausea for a period of 24 hrs – (Body + Willpower). Of course the personnel aborad the station would have the proper conditioning & training. Finally, in space, “no one can hear the mage scream�. The platform itself would have it's own security measures as well. Platform Personnel would be armed with tasers, stun batons, and possibly dart/squirt pistols (as these would not cause a hull breach). Other measures could include low velocity flechette launchers (to rip holes in the space suits of intruders) concealed in strategic areas. The module would then be sealed off and either flooded with a neuro/stun toxin or if the owner is really sadistic, simply have the module's atmosphere vented out. These could either be manually triggered by the station's security operator and/or tied to access codes. There would be of course also be full fire control redundancy in the event the command facility is totally compromised. In a sense this can be a very nasty “insurance policy� if necessary. OK, dodge rolls – er – Edge attributes everyone… :grinbig: @Buster: To further reduce the risk of magical tampering I would also consider setting the ground based centre it in an area with a high background count or even possibly a mana void. Even if the team's mage got to one or more of the personnel on the outside, the spells would go have a good chance to *poof* once they entered the area. Barring that, at the very least, the centre would have a ward around it, and a hefty one at that (most likely ritually cast). Inside there would be all sorts of Magical countermeasures as well including FAB, UV mist emitters, patrolling spirits, and at least two Initiate Mages with another on "astral call". All personnel entering would also be routinely subjected to an astral screening at the initial chokepoint through a direct fibre optic link (e.g. a built in version of Mage Sight Goggles) to the security centre. @James: (on the topic of multiple nodes) My thoughts exactly especially if several of them are false leads. Of course these are still loaded with IC. |
|
|
Jul 19 2007, 08:29 PM
Post
#50
|
|
Cybernetic Blood Mage Group: Members Posts: 3,472 Joined: 11-March 06 From: Northeastern Wyoming Member No.: 8,361 |
Sure, the problem is that I'm having trouble imagining a manned Thor platform as being cost effective and the moment that you try to design an umanned platform then the old multiple key trick isn't nearly as effective anymore.
|
|
|
Lo-Fi Version | Time is now: 2nd January 2025 - 06:09 PM |
Topps, Inc has sole ownership of the names, logo, artwork, marks, photographs, sounds, audio, video and/or any proprietary material used in connection with the game Shadowrun. Topps, Inc has granted permission to the Dumpshock Forums to use such names, logos, artwork, marks and/or any proprietary materials for promotional and informational purposes on its website but does not endorse, and is not affiliated with the Dumpshock Forums in any official capacity whatsoever.