IPB

Welcome Guest ( Log In | Register )

3 Pages V  < 1 2 3  
Reply to this topicStart new topic
> Unwired PDF: a small and fast review, I am not a native english speaker ...
Tycho
post Jun 29 2008, 12:17 PM
Post #51


Moving Target
**

Group: Members
Posts: 285
Joined: 22-April 06
From: Stuttgart, Germany
Member No.: 8,495



the best solution for this might be:

You pay the full amount of money at chargen, regardless the way you acquired the software (you also pay for 2nd hand Ware, even if you cut them out of your enemies body). If you have an appropriate SIN and licence you can choose to have the software registered or not. If you don't, the software is considered to be not registered (illigal, freeware or selfcoded).

At chargen you pay BP for worth of the Equipment , which you are starting with, not the price you actually have payed. So a Stealth 5 Program is worth 5k aka 1BP, even if you coded it yourself, you cracked it, someone donated it to you or you downloaded it from a freeware network.

cya,
Tycho
Go to the top of the page
 
+Quote Post
Rotbart van Dain...
post Jun 29 2008, 12:31 PM
Post #52


Hoppelhäschen 5000
*********

Group: Members
Posts: 5,807
Joined: 3-January 04
Member No.: 5,951



That's about what I had in mind - I just focused on the case where the player building the character didn't have Unwired and thus didn't made that choice. In that case, as there were no Datatrail & Track penalties against the character, it has to be unregistered software.
Go to the top of the page
 
+Quote Post
Tycho
post Jun 29 2008, 01:22 PM
Post #53


Moving Target
**

Group: Members
Posts: 285
Joined: 22-April 06
From: Stuttgart, Germany
Member No.: 8,495



Yes, for Players without Unwired, there should be a paragraph in the BBB that explains this issue:

something like:
If you have an appropriate SIN (and licence for R rated Programs), you can choose to register your software, which means you will get regular updates, as long as your software is copy protected. On the downside registered programs will leave a suspicious data track, which makes it easier to track you. On the other hand, without the patches and updates your programs become less effective over time (see Unwired p. X, Y and Z für Degradation, Registering and Piracy vs Legal Software).

cya
Tycho
Go to the top of the page
 
+Quote Post
Rotbart van Dain...
post Jun 29 2008, 01:53 PM
Post #54


Hoppelhäschen 5000
*********

Group: Members
Posts: 5,807
Joined: 3-January 04
Member No.: 5,951



Nope, there shouldn't. The main should just work without referring to Unwired - and it does, in this case.

It's up to Unwired only to make sure this does not cause headaches.
Go to the top of the page
 
+Quote Post
crizh
post Jun 29 2008, 07:06 PM
Post #55


Runner
******

Group: Members
Posts: 2,666
Joined: 29-February 08
From: Scotland
Member No.: 15,722



QUOTE (Tycho @ Jun 29 2008, 01:17 PM) *
you also pay for 2nd hand Ware, even if you cut them out of your enemies body


Yeah, but you only pay half the standard price.

Cracked software has a downside, just like second hand ware, and carries a discount, just like second hand ware, there's no real reason you should not get both qualities if purchasing it at Chargen.
Go to the top of the page
 
+Quote Post
Aaron
post Jun 30 2008, 01:07 AM
Post #56


Mr. Johnson
******

Group: Dumpshocked
Posts: 3,148
Joined: 27-February 06
From: UCAS
Member No.: 8,314



QUOTE (Tycho @ Jun 26 2008, 12:26 PM) *
1. strong encryption:
A strong encrypted node is very difficult (if not impossible) to hack, when you stuck some days to decrypt the encryption. As suggested in the other Tread, strong encryption should be limited to Files.

I disagree. In fact, I'm willing to bet that, using the rules as written, you can come up with at least one way to gain an account in a maxed-out encrypted node in under twenty-four hours; consider it a challenge.

There's a hint in the spoiler if you'd like one.
[ Spoiler ]

Go to the top of the page
 
+Quote Post
Aaron
post Jun 30 2008, 01:10 AM
Post #57


Mr. Johnson
******

Group: Dumpshocked
Posts: 3,148
Joined: 27-February 06
From: UCAS
Member No.: 8,314



QUOTE (De Badd Ass @ Jun 28 2008, 01:58 PM) *
In Real Life, there are SOTA ways to distinquish between a human and an agent, and SOTA ways for an agent to fool a system that is not SOTA.

That's a darn good point. One could have IC running in a node (or a spider) that checks out incoming icons to see whether they're agents or personae. And, of course, agents may run Stealth for themselves.
Go to the top of the page
 
+Quote Post
crizh
post Jun 30 2008, 01:18 AM
Post #58


Runner
******

Group: Members
Posts: 2,666
Joined: 29-February 08
From: Scotland
Member No.: 15,722



QUOTE (Aaron @ Jun 30 2008, 02:07 AM) *
I disagree. In fact, I'm willing to bet that, using the rules as written, you can come up with at least one way to gain an account in a maxed-out encrypted node in under twenty-four hours; consider it a challenge.

There's a hint in the spoiler if you'd like one.
[ Spoiler ]



Umm, use an Electric Kitsune to out-fox it?

No?

Would the most straight forward method not be to break the Signals Encryption and then intercept the traffic until you can pick the Nodes Encryption key from someone's log in traffic?
Go to the top of the page
 
+Quote Post
Aaron
post Jun 30 2008, 02:12 AM
Post #59


Mr. Johnson
******

Group: Dumpshocked
Posts: 3,148
Joined: 27-February 06
From: UCAS
Member No.: 8,314



QUOTE (crizh @ Jun 29 2008, 07:18 PM) *
Umm, use an Electric Kitsune to out-fox it?

*headkeyboauyhjn*

QUOTE
Would the most straight forward method not be to break the Signals Encryption and then intercept the traffic until you can pick the Nodes Encryption key from someone's log in traffic?

Good answer. Not the only one, though, and not the one the hint might lead one to find.
Go to the top of the page
 
+Quote Post
Sombranox
post Jun 30 2008, 03:37 AM
Post #60


Moving Target
**

Group: Members
Posts: 206
Joined: 19-January 08
Member No.: 15,368



QUOTE (Aaron @ Jun 29 2008, 09:07 PM) *
I disagree. In fact, I'm willing to bet that, using the rules as written, you can come up with at least one way to gain an account in a maxed-out encrypted node in under twenty-four hours; consider it a challenge.

There's a hint in the spoiler if you'd like one.
[ Spoiler ]


Have the pornomancer in the group talk some idiot worker out of their account information and passcodes despite any communications protocols put in place by security? Valid account would bypass encryption by having the encryption key
Go to the top of the page
 
+Quote Post
Rotbart van Dain...
post Jun 30 2008, 02:26 PM
Post #61


Hoppelhäschen 5000
*********

Group: Members
Posts: 5,807
Joined: 3-January 04
Member No.: 5,951



QUOTE (Aaron @ Jun 30 2008, 03:07 AM) *
I disagree. In fact, I'm willing to bet that, using the rules as written, you can come up with at least one way to gain an account in a maxed-out encrypted node in under twenty-four hours; consider it a challenge.

Strong encryption isn't really there to make corporate servers unhackable.
It's there to make your comlink, cyberware and drones unhackable.

Because you are the only one that knows the key, enter it directly and only seldomly.
Go to the top of the page
 
+Quote Post
Aaron
post Jul 1 2008, 06:08 PM
Post #62


Mr. Johnson
******

Group: Dumpshocked
Posts: 3,148
Joined: 27-February 06
From: UCAS
Member No.: 8,314



QUOTE (Sombranox @ Jun 29 2008, 09:37 PM) *
Have the pornomancer in the group talk some idiot worker out of their account information and passcodes despite any communications protocols put in place by security? Valid account would bypass encryption by having the encryption key

I like it.
Go to the top of the page
 
+Quote Post
Ryu
post Jul 1 2008, 07:22 PM
Post #63


Awakened Asset
********

Group: Members
Posts: 4,464
Joined: 9-April 05
From: AGS, North German League
Member No.: 7,309



If the node has traffic, I´ll beat signal encryption and spoof a "Backup file to" order.
Go to the top of the page
 
+Quote Post
RunnerPaul
post Jul 1 2008, 07:56 PM
Post #64


Neophyte Runner
*****

Group: Members
Posts: 2,086
Joined: 26-February 02
Member No.: 364



QUOTE (Sombranox @ Jun 29 2008, 10:37 PM) *
Have the pornomancer in the group talk some idiot worker out of their account information and passcodes despite any communications protocols put in place by security? Valid account would bypass encryption by having the encryption key


"Hi, name is Werner Brandes. My voice is my passport. Verify Me."
Go to the top of the page
 
+Quote Post
crizh
post Jul 1 2008, 08:04 PM
Post #65


Runner
******

Group: Members
Posts: 2,666
Joined: 29-February 08
From: Scotland
Member No.: 15,722



QUOTE (RunnerPaul @ Jul 1 2008, 08:56 PM) *
"Hi, name is Werner Brandes. My voice is my passport. Verify Me."



Hahahahahahahahaha!!!
Go to the top of the page
 
+Quote Post
Aaron
post Jul 1 2008, 08:27 PM
Post #66


Mr. Johnson
******

Group: Dumpshocked
Posts: 3,148
Joined: 27-February 06
From: UCAS
Member No.: 8,314



Too many secrets.
Go to the top of the page
 
+Quote Post
crizh
post Jul 1 2008, 08:44 PM
Post #67


Runner
******

Group: Members
Posts: 2,666
Joined: 29-February 08
From: Scotland
Member No.: 15,722



QUOTE (Aaron @ Jul 1 2008, 09:27 PM) *
Too many secrets.


Ahhh, the oldies are always the best...
Go to the top of the page
 
+Quote Post

3 Pages V  < 1 2 3
Reply to this topicStart new topic

 



RSS Lo-Fi Version Time is now: 6th September 2025 - 03:16 AM

Topps, Inc has sole ownership of the names, logo, artwork, marks, photographs, sounds, audio, video and/or any proprietary material used in connection with the game Shadowrun. Topps, Inc has granted permission to the Dumpshock Forums to use such names, logos, artwork, marks and/or any proprietary materials for promotional and informational purposes on its website but does not endorse, and is not affiliated with the Dumpshock Forums in any official capacity whatsoever.