More Matrix/Hacking Woes, I hate the matrix, I really do. |
More Matrix/Hacking Woes, I hate the matrix, I really do. |
Mar 4 2009, 06:27 AM
Post
#26
|
|
Immortal Elf Group: Members Posts: 10,289 Joined: 2-October 08 Member No.: 16,392 |
Given that Browse is a client side application, and that services such as Google don't exist anymore, I stopped applying sense to the "decrypt after hacking in" issue.
|
|
|
Mar 4 2009, 06:58 AM
Post
#27
|
|
Awakened Asset Group: Members Posts: 4,464 Joined: 9-April 05 From: AGS, North German League Member No.: 7,309 |
Quick question for everyone: I know having a rating 6 firewall is a must, but what about Encrypt? If you have a rating 6 Encrypt program encrypting everything on your PAN, won't that slow down an enemy hacker as well? I mean wouldn't he need to hack through your firewall first and then decrypt everything. Or it the other way around? Outside combat, Encryption will just require another program (Decrypt) from the hacker. Inside combat, the delay of at least one turn might be huge - so runners at least should have encryption. There is also the saying about "locks keeping honest men honest", but given that we are talking runners... As for when you decrypt, I canĀ“t find an explicit quote right now, but would say that you decrypt first, use second. Decrypt node, hack, decrypt file, read. |
|
|
Mar 4 2009, 07:06 AM
Post
#28
|
|
Target Group: Members Posts: 73 Joined: 24-February 09 Member No.: 16,911 |
Quick question for everyone: I know having a rating 6 firewall is a must, but what about Encrypt? If you have a rating 6 Encrypt program encrypting everything on your PAN, won't that slow down an enemy hacker as well? I mean wouldn't he need to hack through your firewall first and then decrypt everything. Or it the other way around? Well if someone is trying to listen in on your teams communications or visa versa, the hacker would first have to detect wireless node (assuming it's hidden, Electronic Warfare + Scan Extended Test with a threshold of probably 4) then decrypt the signal (Decrypt + Response (Encryption x2,1 combat turn) extended test) and finally intercept wireless signal (Electronic Warfare + Sniffer (3)) to listen to communications on a hidden wireless node as an example. |
|
|
Mar 4 2009, 07:09 AM
Post
#29
|
|
Neophyte Runner Group: Members Posts: 2,188 Joined: 9-February 08 From: Boiling Springs Member No.: 15,665 |
As for when you decrypt, I canĀ“t find an explicit quote right now, but would say that you decrypt first, use second. Decrypt node, hack, decrypt file, read. So having a rating 6 Encrypt on your commlink with a Rating 6 firewall/Rating 5 system would make the hacker's job a whole lot tougher. Add in IC with all the bells and whistles that you can get and you should be good to go... for a least a round or two (IMG:style_emoticons/default/wobble.gif) |
|
|
Mar 4 2009, 08:21 AM
Post
#30
|
|
Shooting Target Group: Members Posts: 1,748 Joined: 25-January 05 From: Good ol' Germany Member No.: 7,015 |
And if you add the analysis 5 program the intruding Hacker might well be detected and kicked out (IMG:style_emoticons/default/wink.gif)
Plus If you only allow admin accounts on your Comlinks it'll be even more difficult for the Hacker And Hacking on the fly is so troublesome that most Hackers won't bother anymore Hough! Medicineman |
|
|
Mar 4 2009, 08:38 AM
Post
#31
|
|
Awakened Asset Group: Members Posts: 4,464 Joined: 9-April 05 From: AGS, North German League Member No.: 7,309 |
And if you add the analysis 5 program the intruding Hacker might well be detected and kicked out (IMG:style_emoticons/default/wink.gif) Plus If you only allow admin accounts on your Comlinks it'll be even more difficult for the Hacker And Hacking on the fly is so troublesome that most Hackers won't bother anymore Hough! Medicineman ... in combat. TheyĀ“ll try to cause havoc with spoof instead, or by giving commands to previously hacked nodes. |
|
|
Mar 4 2009, 09:07 AM
Post
#32
|
|
Neophyte Runner Group: Members Posts: 2,188 Joined: 9-February 08 From: Boiling Springs Member No.: 15,665 |
And if you add the analysis 5 program the intruding Hacker might well be detected and kicked out (IMG:style_emoticons/default/wink.gif) Plus If you only allow admin accounts on your Comlinks it'll be even more difficult for the Hacker And Hacking on the fly is so troublesome that most Hackers won't bother anymore Hough! Medicineman Iris Anti-virus... the only way to fly. get both Analyze 5 and Purge 5 for the program load of one program. Run that as Ergonomic and Optimized 2 and you can run it on a Rating 3 Agent. |
|
|
Mar 4 2009, 09:34 AM
Post
#33
|
|
Shooting Target Group: Members Posts: 1,748 Joined: 25-January 05 From: Good ol' Germany Member No.: 7,015 |
... in combat. TheyĀ“ll try to cause havoc with spoof instead, or by giving commands to previously hacked nodes. You're right; ... In Combat (IMG:style_emoticons/default/wink.gif) @KCKitsune So much Unwired to read, so few time with an added Dance Medicineman |
|
|
Mar 4 2009, 12:53 PM
Post
#34
|
|
Awakened Asset Group: Members Posts: 4,464 Joined: 9-April 05 From: AGS, North German League Member No.: 7,309 |
You're right; ... In Combat (IMG:style_emoticons/default/wink.gif) I know you meant that, no worries. (IMG:style_emoticons/default/wink.gif) (IMG:style_emoticons/default/smile.gif) |
|
|
Mar 4 2009, 01:09 PM
Post
#35
|
|
Moving Target Group: Members Posts: 228 Joined: 5-January 09 Member No.: 16,733 |
Hacking somebody's cyber eyes in real time looks so cool when the major does it, but the rest of us mortals should just toss a grenade and be done with it. A lot less dice that way.
|
|
|
Mar 4 2009, 02:05 PM
Post
#36
|
|
Awakened Asset Group: Members Posts: 4,464 Joined: 9-April 05 From: AGS, North German League Member No.: 7,309 |
You could hack the cybereyes as combat preparation (hacking does not require LOS), and "change a linked device mode" in combat. Most guards should have rating 3 or 4 commlinks, and admin accounts on those are not impossible to hack. Messing with the video data would be a real-time edit operation.
|
|
|
Mar 4 2009, 03:25 PM
Post
#37
|
|
panda! Group: Members Posts: 10,331 Joined: 8-March 02 From: north of central europe Member No.: 2,242 |
... in combat. TheyĀ“ll try to cause havoc with spoof instead, or by giving commands to previously hacked nodes. indeed, send a spoof is the right way to go in combat. having smartgun secure themselves or eject ammo is a nice trick... and i guess one could spoof cybereyes to shut down, or show diagonostic patterns (IMG:style_emoticons/default/wink.gif) not deadly, but highly distracting. |
|
|
Mar 4 2009, 03:26 PM
Post
#38
|
|
panda! Group: Members Posts: 10,331 Joined: 8-March 02 From: north of central europe Member No.: 2,242 |
Hacking somebody's cyber eyes in real time looks so cool when the major does it, but the rest of us mortals should just toss a grenade and be done with it. A lot less dice that way. i do not recall that ever being done mid-combat. as part of a conversation that one can tell will lead to problems, sure, but not while bullets or fists are flying... |
|
|
Mar 4 2009, 03:40 PM
Post
#39
|
|
Running Target Group: Members Posts: 1,002 Joined: 22-April 06 From: Canada Member No.: 8,494 |
I've often wondered this in SR4. If your a strict Vehicle Rigger (ie you only link up to your vehicle when your in it and thus don't need an extended network to like all the devices, a datajack (or VCR in the "good old days") will suffice). Are there any rules that allow a vehicle rigger to close off external connections (thus reducing hacking into the vehicle) but still maintaining the menatl link with the vehicle? To a long time Rigger character player this seems to be the biggest nerf of the archtype that was done in SR4 (along with merging riggers and deckers together to create hackers).
|
|
|
Mar 4 2009, 03:52 PM
Post
#40
|
|
Running Target Group: Members Posts: 1,228 Joined: 24-July 07 From: Canada Member No.: 12,350 |
I've often wondered this in SR4. If your a strict Vehicle Rigger (ie you only link up to your vehicle when your in it and thus don't need an extended network to like all the devices, a datajack (or VCR in the "good old days") will suffice). Are there any rules that allow a vehicle rigger to close off external connections (thus reducing hacking into the vehicle) but still maintaining the menatl link with the vehicle? To a long time Rigger character player this seems to be the biggest nerf of the archtype that was done in SR4 (along with merging riggers and deckers together to create hackers). I'm not entirely clear what you're getting at, but I'm going to give it a try. If a "old school Rigger" wants to operate his vehicle from inside of it, with a wired connection (via datajack) then he can safely turn off the wireless on the vehicle and have it be secure that way. If he still wants to control it while on the move and such, then what you are describing would be "slaving" the vehicle to your Commlink. Thus, your vehicle would not respond to any commands unless they came from your Commlink's Access ID. This can be defeated by a Spoof if someone manages to find your Commlink's Access ID, so it's not impenetrable, but it is fairly secure. |
|
|
Mar 4 2009, 03:53 PM
Post
#41
|
|
Moving Target Group: Members Posts: 992 Joined: 23-December 08 From: the Tampa Sprawl Member No.: 16,707 |
I always found it funny how in unwired where it is talking about hacking cyberware, it actually says something along the lines of "externally accessable cyberware does not use wireless" then goes on to talk about hacking a cyberarm on the next page.
Now I don't know about you, but a cyberlimb is about as externally accessable as you can get, meaning all control is done by DNI, full diagnostics requires a wire (this is the make the limb do stuff), and the only wireless will be a couple of RFID Chips reporting diag info but having no actual connection to any controls. Same thing for cybereyes and ears too. Only stuff fully inside the person (wired reflexes) could be hacked wirelessly and then *ONLY* if the person didn't get them with no wireless (optionally with RFID Chip wireless diag reporters). In fact, RFID chips that don't have any control of the Ware but pass on diag info would make *FAR* more sense for most pieces of ware then any type of Diagnostic Control and are totally allowed under RAW. I read it as the standard for anything where direct access is easy and a moderately common option for everything else (some pieces of ware are helped by being wireless). So that pretty much by default shuts out 99% of ware hacking, since runners will almost always select the more secure option by default. ******************************* Next up, secuirty. Skinlink everything, get a bunch of 'Non-standard freq' modules [Personal Opinion: I rule that even if you detect it, without a module yourself you can't send any signal in that range.] and use those combined with being in hidden mode. Your even harder to detect then just being in hidden mode and even if detected most likely the people detecting you won't have equipment that can send and recieve in the freq range your using. You need extra security? Switch to throat mikes and radios (again using a 'Non-standard freq' module) while turning the wireless on your Commlink off unless you work through you Commlink (Hackers & Riggers, I'm looking at you here). |
|
|
Mar 4 2009, 03:53 PM
Post
#42
|
|
Neophyte Runner Group: Members Posts: 2,188 Joined: 9-February 08 From: Boiling Springs Member No.: 15,665 |
I guess it's a good thing that I clustered my other cyberware and then slaved that cluster to my commlink. I have the following as a commlink
Response 5, System 5, Firewall 6, Encrypt 6 (Ergonomic and Optimized 1), and an Agent 3 with Bells & Whistles*. * = Attack 3, Armor 3, Expert Offense 3 (Ergonomic), Cascade 3 (Ergonomic), Iris Anti-Virus (Ergonomic & Optimized 2), & Virtual Person (question about this below). Question: A virtual person is listed as follows in the BBB: QUOTE Simulate your favorite person! Whether it's your ex-boyfriend or your favorite sim starlet, just access or upload their personal data, modify it as you see fit, and project the person into your life just like the real deal. This program only simulates one person at a time, and the realism in behavior depends on the amount of data given as well as the processing power of your commlink - best results are achieved with a growing assortment of download-able sim-persons (including sim stars like Tracy Monroe and Neko-Katz). Does this mean that if you have the time and/or know someone that you can make a sorta Pseudo-AI by linking a Virtual Person with an Agent? Even more so if you can add in the Adaptability Autosoft. |
|
|
Mar 4 2009, 04:05 PM
Post
#43
|
|
Beetle Eater Group: Dumpshocked Posts: 4,797 Joined: 3-June 02 From: Oblivion City Member No.: 2,826 |
Does this mean that if you have the time and/or know someone that you can make a sorta Pseudo-AI by linking a Virtual Person with an Agent? Even more so if you can add in the Adaptability Autosoft. I have to believe that linking them would be effortless. Even buying agents and vehicles with pre-loaded persons should be standard gimmicks for software and car manufacturers. |
|
|
Mar 4 2009, 04:19 PM
Post
#44
|
|
Running Target Group: Members Posts: 1,002 Joined: 22-April 06 From: Canada Member No.: 8,494 |
I'm not entirely clear what you're getting at, but I'm going to give it a try. If a "old school Rigger" wants to operate his vehicle from inside of it, with a wired connection (via datajack) then he can safely turn off the wireless on the vehicle and have it be secure that way. If he still wants to control it while on the move and such, then what you are describing would be "slaving" the vehicle to your Commlink. Thus, your vehicle would not respond to any commands unless they came from your Commlink's Access ID. This can be defeated by a Spoof if someone manages to find your Commlink's Access ID, so it's not impenetrable, but it is fairly secure. To take an analogy from Battlestar Galactica. The humans over time developed internal networks with no outside connections (this was due to the fact that the Cylons were too good at hacking their ships and making them useless in battle). I see the same problem (not as bad but similar) with riggers in SR4. If you had a LAN that didn't extend outside of the vehicle your in then there would be no risk of someone hacking your vehicle and causing you to drive into a ditch. Most riggers should have a tricked out comlink making hacking hard but it seems like a unnessesary risk when you don't need external connections in the first place. |
|
|
Mar 4 2009, 04:21 PM
Post
#45
|
|
Shooting Target Group: Members Posts: 1,756 Joined: 17-January 09 From: Va Beach , CAS Member No.: 16,787 |
sure, you can turn off the remote access and plug your datajack into your car. and you can get the VCR cyberware, but that seems kind of limiting for your character. no drones or secondary vehicles? I guess you could do that with little investment of points and branch out as a medic or weapons expert or investigator or something.
|
|
|
Mar 4 2009, 05:01 PM
Post
#46
|
|
Target Group: Members Posts: 27 Joined: 3-March 09 From: Da Barrens Member No.: 16,931 |
Well if someone is trying to listen in on your teams communications or visa versa, the hacker would first have to detect wireless node (assuming it's hidden, Electronic Warfare + Scan Extended Test with a threshold of probably 4) then decrypt the signal (Decrypt + Response (Encryption x2,1 combat turn) extended test) and finally intercept wireless signal (Electronic Warfare + Sniffer (3)) to listen to communications on a hidden wireless node as an example. First...yay first post!! Second, is this possible for a rigger to accomplish hacking communications through his slaved drone? If so does he have to be jumped in or remote controlling it? or can it be done passively without interrupting the actions of the drone's turn? |
|
|
Mar 4 2009, 05:47 PM
Post
#47
|
|
Moving Target Group: Members Posts: 116 Joined: 16-February 09 From: Seattle Metroplex, Tacoma District, UCAS Member No.: 16,883 |
This is from several posts back, but what the hell...
I more meant that you would look like a dufus moving your hands around while nothing was in front of you, but I guess that kind of behavior wouldn't be too weird if AR gloves were common, now that I think about it. You could always have a holoprojector putting out a visual display and manipulate that wit AR gloves. Not quite as weird as moving your hands around in the air with nothing else there. I more meant that, it would be a pain to try and do stuff with your comlink if you couldn't issue mental commands. Sure, you could look cool doing impressions of the control Center in 'Minority report' but on a run, if you need to wave your arms around every time you want to subvocally message your friends, that could be pretty darn annoying. I was just wondering if there was something out there that could let mages manipulate their comlinks as easy as people with Datajacks. Seems to me there would be a big market for that. If you've got goggles or glasses you could "install retinal scanners" or some such thing that determines where you are looking on your image link and allow you to manipulate the interface with blinking. Essentially turning your eyeball into a modern day mouse. |
|
|
Mar 4 2009, 05:56 PM
Post
#48
|
|
Moving Target Group: Members Posts: 380 Joined: 19-May 07 Member No.: 11,698 |
I've often wondered this in SR4. If your a strict Vehicle Rigger (ie you only link up to your vehicle when your in it and thus don't need an extended network to like all the devices, a datajack (or VCR in the "good old days") will suffice). Are there any rules that allow a vehicle rigger to close off external connections (thus reducing hacking into the vehicle) but still maintaining the menatl link with the vehicle? To a long time Rigger character player this seems to be the biggest nerf of the archtype that was done in SR4 (along with merging riggers and deckers together to create hackers). Another thing you can do is purposefully turn down your Comlink and Vehicle's Signal rating to 0. A rating zero equals 'a few feet' according to the book, meaning that a car would have to maintain several turns RIGHT NEXT TO YOU to hack it, something very difficult to do. On the down side, if they have a jammer, you are screwed. |
|
|
Mar 4 2009, 06:38 PM
Post
#49
|
|
Moving Target Group: Members Posts: 992 Joined: 23-December 08 From: the Tampa Sprawl Member No.: 16,707 |
passively.
|
|
|
Mar 4 2009, 07:38 PM
Post
#50
|
|
Target Group: Members Posts: 85 Joined: 12-June 03 Member No.: 4,720 |
sure, you can turn off the remote access and plug your datajack into your car. and you can get the VCR cyberware, but that seems kind of limiting for your character. no drones or secondary vehicles? I guess you could do that with little investment of points and branch out as a medic or weapons expert or investigator or something. Yeah, I agree with this post. One of the cool non-hacking, every day things you can do with wireless is to activate your vehicle remotely, use the Pilot to drive to your location, open the door, and bang! - you're in the car. This is a really handy aspect of wireless driving/rigging that makes it difficult for a Rigger to truly turn off wireless - it's similar to the question of whether or not any given network has wireless, really. Convenience vs. Security - a tough choice. If we turn to a "realistic" point of view, let's say that in a couple of years almost all new vehicles are equipped with bluetooth or wifi listeners that allow you to lock/unlock your car, locate it in a parking lot (yeah I forget where I park all the time!), pop the trunk only, or any of a number of daily activities. People would be all over that! Now imagine that all of a sudden a bunch of these cars get hacked. The nature of hackers is such that they like to share their exploits whether for fame, glory, money, or just plain "open source" mindset. Now you're going to have a bunch of cars with a known, exploitable flaw - just like websites, DNS, OSes, or whatever have you. The natural reaction of the manufacturer is to patch the flaw in some way, rendering the exploit unusable. Then the hackers find a new way in, this gets patched, and the cycle goes on. If cars keep getting jacked, no one is going to sit around waiting for it to keep happening - some kind of aggressive action is going to be taken to mitigate and reduce the carjacking. How to replicate this in SR4? The way that SR4 works is essentially only Rating+{something} vs. Rating+{something}. This doesn't really replicate the natural progression of technology and the hacks-against-it to evolve to meet demand. I was thinking a lot about this the other day and came up with the following: Software "degrades", or becomes less useless over time. Perhaps every month (or less in a fast-moving techno-literate society like the 6th world?), every software-based rating that a PC has decreases by 1. This reflects the tendency of the PCs opposition to increase their protective *and* offensive measures. This introduces what is essentially a software maintenance fee into the PCs' lives, much like maintaining lifestyle. In this scenario it becomes really cool to actually have software development skills in order to maintain your own gear and keep it up to date and bleeding-edge. Hm...I think I might use that. Or maybe it's already in Unwired (still in the midst of reading it) and I've just made a redundant suggestion (IMG:style_emoticons/default/nyahnyah.gif) |
|
|
Lo-Fi Version | Time is now: 24th November 2024 - 07:21 AM |
Topps, Inc has sole ownership of the names, logo, artwork, marks, photographs, sounds, audio, video and/or any proprietary material used in connection with the game Shadowrun. Topps, Inc has granted permission to the Dumpshock Forums to use such names, logos, artwork, marks and/or any proprietary materials for promotional and informational purposes on its website but does not endorse, and is not affiliated with the Dumpshock Forums in any official capacity whatsoever.