IPB

Welcome Guest ( Log In | Register )

 
Reply to this topicStart new topic
> Hacking Question (Team Network), yes, another one...
JustSix
post Oct 15 2007, 06:22 PM
Post #1


Target
*

Group: Members
Posts: 15
Joined: 7-March 06
Member No.: 8,341



Hopefully this hasn't been asked yet, but I've got a question about teams and their commlinks. I'm still getting my head wrapped around SR4 Matrix rules, and this is something I could use help with.

Say you've got a team with a hacker on it. The hacker has a buffed commlink, while the rest of the team have average/crap commlinks. What would be the advantages to subscribing the team's commlinks to the hacker's commlink, creating a team network? Would opposing hackers need to crack the hacker's commlink before they could mess with the other team members' commlinks? Are the average/crap commlinks any more or less secure than before?

Any help would be appreciated...
Go to the top of the page
 
+Quote Post
DireRadiant
post Oct 15 2007, 06:28 PM
Post #2


The Dragon Never Sleeps
*********

Group: Admin
Posts: 6,924
Joined: 1-September 05
Member No.: 7,667



Use Search, the older then 30 days option is always good.

Check the FAQ

There is an advantage to having the team subscribe to the better commlink, but it's more of a case of making monitoring the network easier, and reacting to hacks easier.

Any of the commlinks can be hacked directly regardless, but to compromise the entire network requires hacking the Hackers commlink. Hacking one of the weaker ones is just going to temporarily disable that one until the Hacker fixes or protects it.

One thing to think about when modeling Matrix Nodes is that Nodes = Network, so you can see that adding a single device can quite easily have no impact to the ease to which the entire network is hacked.
Go to the top of the page
 
+Quote Post
Dashifen
post Oct 15 2007, 06:59 PM
Post #3


Technomancer
********

Group: Retired Admins
Posts: 4,638
Joined: 2-October 02
From: Champaign, IL
Member No.: 3,374



Much of the SR4 Matrix is up to the interpretation of the GM and I think this is one of those situations. The biggest advantage that I usually provide a team in my games which networks their commlinks together behind the hacker's commlink is that the hacker can set their Analyze program to watch the entire network. Since the hacker's commlink is usually as strong as that character can make it, this can provide a better sentinel against intrusion than each individual commlink running their own Analyze at a lower rating.
Go to the top of the page
 
+Quote Post
deek
post Oct 15 2007, 07:50 PM
Post #4


Shooting Target
****

Group: Members
Posts: 1,706
Joined: 30-June 06
From: Fort Wayne, IN
Member No.: 8,814



Yup, GM interpretation...

And my interpretation is to simplify the runner's linked comms down to a single node...and that being the hacker's comm. So, I don't allow these "weaker" comms to be hacked unless they have access to the hacker's first, and thus accessed the "team node".

But then again, I like to abstract things down like this, YMMV.
Go to the top of the page
 
+Quote Post
kzt
post Oct 15 2007, 08:08 PM
Post #5


Great Dragon
*********

Group: Members
Posts: 5,537
Joined: 27-August 06
From: Albuquerque NM
Member No.: 9,234



QUOTE (deek)
And my interpretation is to simplify the runner's linked comms down to a single node...and that being the hacker's comm. So, I don't allow these "weaker" comms to be hacked unless they have access to the hacker's first, and thus accessed the "team node".

As long as the other team members can't get phone calls while linked that's reasonable. If they can, they are being directly accessed from the outside. And more than just phone calls can directly access them. Increasing security always impacts functionality.
Go to the top of the page
 
+Quote Post
deek
post Oct 15 2007, 08:18 PM
Post #6


Shooting Target
****

Group: Members
Posts: 1,706
Joined: 30-June 06
From: Fort Wayne, IN
Member No.: 8,814



kzt, I understand where you are coming from there, but I don't see it the same way for my campaign. I view the networking functionality of a commlink as different than the phone functionality.

So, someone cannot call a person and use that "connection" to hack said commlink. Agree with it or not, that is just how we do it in our group.
Go to the top of the page
 
+Quote Post
Cheops
post Oct 15 2007, 08:52 PM
Post #7


Shooting Target
****

Group: Members
Posts: 1,512
Joined: 26-February 02
Member No.: 392



@Just Six:

One of the advantages that no one has mentioned yet are the access of information. With everyone hooked up like that you can get visual from your teammates' positions, live feeds from their SL and other senses, and your hacker can paint all the combatants so you know who's friendly and who isn't.

Essentially, it allows all the Players at the table to act on information known to any of the Characters. No more having to think "does my character know what that character knows? or is that out of game knowledge?"
Go to the top of the page
 
+Quote Post
Tarantula
post Oct 15 2007, 08:59 PM
Post #8


Dragon
********

Group: Members
Posts: 4,664
Joined: 21-September 04
From: Arvada, CO
Member No.: 6,686



deek: Do you allow someone to edit/spoof datastreams between the commlinks then?
Go to the top of the page
 
+Quote Post
deek
post Oct 16 2007, 12:50 PM
Post #9


Shooting Target
****

Group: Members
Posts: 1,706
Joined: 30-June 06
From: Fort Wayne, IN
Member No.: 8,814



Tarantula: Yeah, I do allow that as you can intercept the wireless signals, regardless of node. The reasoning I have behind that is that its basically one way communication. The datastream is not going two ways, its being intercepted and retransmitted. The hacker might notice a bit of a delay and want to investigate, though.

The thing I don't allow, is once the commlink is part of the team node, then another hacker must get into that node in order to affect the commlinks within it. The way I do that is that when looking for a node (with EW and Scan), you are only every going to find the single node, that of the hacker's commlink. So, you can't even see the other runners, as they aren't a node unto themselves.

Now someone will "see" that there is wireless traffic to the device, but that is between devices inside the node...
Go to the top of the page
 
+Quote Post
JustSix
post Oct 16 2007, 02:06 PM
Post #10


Target
*

Group: Members
Posts: 15
Joined: 7-March 06
Member No.: 8,341



Thanks for all the replies. Next time, I'll check the FAQ first...
Go to the top of the page
 
+Quote Post
Tarantula
post Oct 16 2007, 04:38 PM
Post #11


Dragon
********

Group: Members
Posts: 4,664
Joined: 21-September 04
From: Arvada, CO
Member No.: 6,686



Yeah... I don't buy that view. Good luck with it.
Go to the top of the page
 
+Quote Post
deek
post Oct 16 2007, 07:25 PM
Post #12


Shooting Target
****

Group: Members
Posts: 1,706
Joined: 30-June 06
From: Fort Wayne, IN
Member No.: 8,814



QUOTE (Tarantula)
Yeah... I don't buy that view. Good luck with it.

My players are fine with it...and honestly, that is all I care about.

Granted, if one of them brought it up and didn't think it was a good view, we'd talk it over and come to some end result that we all agreed with...but at this point, we are having good luck with the way its being run.
Go to the top of the page
 
+Quote Post
augurer
post Oct 16 2007, 08:25 PM
Post #13


Target
*

Group: Members
Posts: 56
Joined: 19-July 07
Member No.: 12,304



QUOTE (kzt @ Oct 15 2007, 03:08 PM)
QUOTE (deek @ Oct 15 2007, 12:50 PM)
And my interpretation is to simplify the runner's linked comms down to a single node...and that being the hacker's comm.  So, I don't allow these "weaker" comms to be hacked unless they have access to the hacker's first, and thus accessed the "team node".

As long as the other team members can't get phone calls while linked that's reasonable. If they can, they are being directly accessed from the outside. And more than just phone calls can directly access them. Increasing security always impacts functionality.

Why wouldn't others behind the "firewall" be able to receive phone calls (or anything else)? Essentially all data is just being routed by the hacker's commlink to the final recipient.

There's nothing in canon that talks about DNS etc, but the Matrix works very similar to current day internet in my games. The hacker can set up his commlink to act as a DNS for all the other team members' comm codes, and set up packet forwarding rules for each comm code that routes authorized/sanitized data to the appopriate person's NAT address.

From what I've read of the SR4 Matrix rules, there's essentially nothing there that really explains how layered security can/should work. Since the "vpn" that the hacker has set up is still wireless, a hacker can still scan for hidden networks and attempt to connect to one of the team's commlinks as usual... but the centralized DNS setup does allow the team member's to use commlinks with relatively low Signal values, and the hacker has to be within range (and find them by scanning for hidden nodes) of their Signal to do anything to their commlink directly
Go to the top of the page
 
+Quote Post
Redjack
post Oct 17 2007, 03:27 AM
Post #14


Man Behind the Curtain
**********

Group: Admin
Posts: 14,871
Joined: 2-July 89
From: End of the Yellow-Brick Road
Member No.: 3



The weak link breaks the chain.
My players had their team-net compromise in combat once when their street sam had his comlink (low firewall) hacked by a nearby hacker jumped into a fly-spy within PAN range of the sam. This did not give the hacker access to other nodes on the team net, but it did give them access to every video, audio and tactical feed coming into the sam's com. He then provided to his team the location of each of the team's runners.

They have also intercepted com signals and definitely learned the benefit of running an encryption program on their coms and their drones.
Go to the top of the page
 
+Quote Post

Reply to this topicStart new topic

 



RSS Lo-Fi Version Time is now: 26th April 2024 - 10:35 AM

Topps, Inc has sole ownership of the names, logo, artwork, marks, photographs, sounds, audio, video and/or any proprietary material used in connection with the game Shadowrun. Topps, Inc has granted permission to the Dumpshock Forums to use such names, logos, artwork, marks and/or any proprietary materials for promotional and informational purposes on its website but does not endorse, and is not affiliated with the Dumpshock Forums in any official capacity whatsoever.