![]() |
![]() ![]() |
![]() |
![]()
Post
#51
|
|
Moving Target ![]() ![]() Group: Members Posts: 285 Joined: 22-April 06 From: Stuttgart, Germany Member No.: 8,495 ![]() |
the best solution for this might be:
You pay the full amount of money at chargen, regardless the way you acquired the software (you also pay for 2nd hand Ware, even if you cut them out of your enemies body). If you have an appropriate SIN and licence you can choose to have the software registered or not. If you don't, the software is considered to be not registered (illigal, freeware or selfcoded). At chargen you pay BP for worth of the Equipment , which you are starting with, not the price you actually have payed. So a Stealth 5 Program is worth 5k aka 1BP, even if you coded it yourself, you cracked it, someone donated it to you or you downloaded it from a freeware network. cya, Tycho |
|
|
![]()
Post
#52
|
|
Hoppelhäschen 5000 ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 5,807 Joined: 3-January 04 Member No.: 5,951 ![]() |
That's about what I had in mind - I just focused on the case where the player building the character didn't have Unwired and thus didn't made that choice. In that case, as there were no Datatrail & Track penalties against the character, it has to be unregistered software.
|
|
|
![]()
Post
#53
|
|
Moving Target ![]() ![]() Group: Members Posts: 285 Joined: 22-April 06 From: Stuttgart, Germany Member No.: 8,495 ![]() |
Yes, for Players without Unwired, there should be a paragraph in the BBB that explains this issue:
something like: If you have an appropriate SIN (and licence for R rated Programs), you can choose to register your software, which means you will get regular updates, as long as your software is copy protected. On the downside registered programs will leave a suspicious data track, which makes it easier to track you. On the other hand, without the patches and updates your programs become less effective over time (see Unwired p. X, Y and Z für Degradation, Registering and Piracy vs Legal Software). cya Tycho |
|
|
![]()
Post
#54
|
|
Hoppelhäschen 5000 ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 5,807 Joined: 3-January 04 Member No.: 5,951 ![]() |
Nope, there shouldn't. The main should just work without referring to Unwired - and it does, in this case.
It's up to Unwired only to make sure this does not cause headaches. |
|
|
![]()
Post
#55
|
|
Runner ![]() ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 2,666 Joined: 29-February 08 From: Scotland Member No.: 15,722 ![]() |
you also pay for 2nd hand Ware, even if you cut them out of your enemies body Yeah, but you only pay half the standard price. Cracked software has a downside, just like second hand ware, and carries a discount, just like second hand ware, there's no real reason you should not get both qualities if purchasing it at Chargen. |
|
|
![]()
Post
#56
|
|
Mr. Johnson ![]() ![]() ![]() ![]() ![]() ![]() Group: Dumpshocked Posts: 3,148 Joined: 27-February 06 From: UCAS Member No.: 8,314 ![]() |
1. strong encryption: A strong encrypted node is very difficult (if not impossible) to hack, when you stuck some days to decrypt the encryption. As suggested in the other Tread, strong encryption should be limited to Files. I disagree. In fact, I'm willing to bet that, using the rules as written, you can come up with at least one way to gain an account in a maxed-out encrypted node in under twenty-four hours; consider it a challenge. There's a hint in the spoiler if you'd like one. [ Spoiler ] |
|
|
![]()
Post
#57
|
|
Mr. Johnson ![]() ![]() ![]() ![]() ![]() ![]() Group: Dumpshocked Posts: 3,148 Joined: 27-February 06 From: UCAS Member No.: 8,314 ![]() |
In Real Life, there are SOTA ways to distinquish between a human and an agent, and SOTA ways for an agent to fool a system that is not SOTA. That's a darn good point. One could have IC running in a node (or a spider) that checks out incoming icons to see whether they're agents or personae. And, of course, agents may run Stealth for themselves. |
|
|
![]()
Post
#58
|
|
Runner ![]() ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 2,666 Joined: 29-February 08 From: Scotland Member No.: 15,722 ![]() |
I disagree. In fact, I'm willing to bet that, using the rules as written, you can come up with at least one way to gain an account in a maxed-out encrypted node in under twenty-four hours; consider it a challenge. There's a hint in the spoiler if you'd like one. [ Spoiler ] Umm, use an Electric Kitsune to out-fox it? No? Would the most straight forward method not be to break the Signals Encryption and then intercept the traffic until you can pick the Nodes Encryption key from someone's log in traffic? |
|
|
![]()
Post
#59
|
|
Mr. Johnson ![]() ![]() ![]() ![]() ![]() ![]() Group: Dumpshocked Posts: 3,148 Joined: 27-February 06 From: UCAS Member No.: 8,314 ![]() |
Umm, use an Electric Kitsune to out-fox it? *headkeyboauyhjn* QUOTE Would the most straight forward method not be to break the Signals Encryption and then intercept the traffic until you can pick the Nodes Encryption key from someone's log in traffic? Good answer. Not the only one, though, and not the one the hint might lead one to find. |
|
|
![]()
Post
#60
|
|
Moving Target ![]() ![]() Group: Members Posts: 206 Joined: 19-January 08 Member No.: 15,368 ![]() |
I disagree. In fact, I'm willing to bet that, using the rules as written, you can come up with at least one way to gain an account in a maxed-out encrypted node in under twenty-four hours; consider it a challenge. There's a hint in the spoiler if you'd like one. [ Spoiler ] Have the pornomancer in the group talk some idiot worker out of their account information and passcodes despite any communications protocols put in place by security? Valid account would bypass encryption by having the encryption key |
|
|
![]()
Post
#61
|
|
Hoppelhäschen 5000 ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 5,807 Joined: 3-January 04 Member No.: 5,951 ![]() |
I disagree. In fact, I'm willing to bet that, using the rules as written, you can come up with at least one way to gain an account in a maxed-out encrypted node in under twenty-four hours; consider it a challenge. Strong encryption isn't really there to make corporate servers unhackable. It's there to make your comlink, cyberware and drones unhackable. Because you are the only one that knows the key, enter it directly and only seldomly. |
|
|
![]()
Post
#62
|
|
Mr. Johnson ![]() ![]() ![]() ![]() ![]() ![]() Group: Dumpshocked Posts: 3,148 Joined: 27-February 06 From: UCAS Member No.: 8,314 ![]() |
|
|
|
![]()
Post
#63
|
|
Awakened Asset ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 4,464 Joined: 9-April 05 From: AGS, North German League Member No.: 7,309 ![]() |
If the node has traffic, I´ll beat signal encryption and spoof a "Backup file to" order.
|
|
|
![]()
Post
#64
|
|
Neophyte Runner ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 2,086 Joined: 26-February 02 Member No.: 364 ![]() |
Have the pornomancer in the group talk some idiot worker out of their account information and passcodes despite any communications protocols put in place by security? Valid account would bypass encryption by having the encryption key "Hi, name is Werner Brandes. My voice is my passport. Verify Me." |
|
|
![]()
Post
#65
|
|
Runner ![]() ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 2,666 Joined: 29-February 08 From: Scotland Member No.: 15,722 ![]() |
|
|
|
![]()
Post
#66
|
|
Mr. Johnson ![]() ![]() ![]() ![]() ![]() ![]() Group: Dumpshocked Posts: 3,148 Joined: 27-February 06 From: UCAS Member No.: 8,314 ![]() |
Too many secrets.
|
|
|
![]()
Post
#67
|
|
Runner ![]() ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 2,666 Joined: 29-February 08 From: Scotland Member No.: 15,722 ![]() |
|
|
|
![]() ![]() |
![]() |
Lo-Fi Version | Time is now: 6th September 2025 - 03:16 AM |
Topps, Inc has sole ownership of the names, logo, artwork, marks, photographs, sounds, audio, video and/or any proprietary material used in connection with the game Shadowrun. Topps, Inc has granted permission to the Dumpshock Forums to use such names, logos, artwork, marks and/or any proprietary materials for promotional and informational purposes on its website but does not endorse, and is not affiliated with the Dumpshock Forums in any official capacity whatsoever.