IPB

Welcome Guest ( Log In | Register )

3 Pages V  < 1 2 3 >  
Reply to this topicStart new topic
> More Matrix/Hacking Woes, I hate the matrix, I really do.
Draco18s
post Mar 4 2009, 06:27 AM
Post #26


Immortal Elf
**********

Group: Members
Posts: 10,289
Joined: 2-October 08
Member No.: 16,392



Given that Browse is a client side application, and that services such as Google don't exist anymore, I stopped applying sense to the "decrypt after hacking in" issue.
Go to the top of the page
 
+Quote Post
Ryu
post Mar 4 2009, 06:58 AM
Post #27


Awakened Asset
********

Group: Members
Posts: 4,464
Joined: 9-April 05
From: AGS, North German League
Member No.: 7,309



QUOTE (KCKitsune @ Mar 4 2009, 07:24 AM) *
Quick question for everyone: I know having a rating 6 firewall is a must, but what about Encrypt? If you have a rating 6 Encrypt program encrypting everything on your PAN, won't that slow down an enemy hacker as well? I mean wouldn't he need to hack through your firewall first and then decrypt everything. Or it the other way around?

Outside combat, Encryption will just require another program (Decrypt) from the hacker. Inside combat, the delay of at least one turn might be huge - so runners at least should have encryption. There is also the saying about "locks keeping honest men honest", but given that we are talking runners...

As for when you decrypt, I canĀ“t find an explicit quote right now, but would say that you decrypt first, use second. Decrypt node, hack, decrypt file, read.
Go to the top of the page
 
+Quote Post
Dream79
post Mar 4 2009, 07:06 AM
Post #28


Target
*

Group: Members
Posts: 73
Joined: 24-February 09
Member No.: 16,911



QUOTE (KCKitsune @ Mar 4 2009, 06:24 AM) *
Quick question for everyone: I know having a rating 6 firewall is a must, but what about Encrypt? If you have a rating 6 Encrypt program encrypting everything on your PAN, won't that slow down an enemy hacker as well? I mean wouldn't he need to hack through your firewall first and then decrypt everything. Or it the other way around?

Well if someone is trying to listen in on your teams communications or visa versa, the hacker would first have to detect wireless node (assuming it's hidden, Electronic Warfare + Scan Extended Test with a threshold of probably 4) then decrypt the signal (Decrypt + Response (Encryption x2,1 combat turn) extended test) and finally intercept wireless signal (Electronic Warfare + Sniffer (3)) to listen to communications on a hidden wireless node as an example.
Go to the top of the page
 
+Quote Post
KCKitsune
post Mar 4 2009, 07:09 AM
Post #29


Neophyte Runner
*****

Group: Members
Posts: 2,188
Joined: 9-February 08
From: Boiling Springs
Member No.: 15,665



QUOTE (Ryu @ Mar 4 2009, 01:58 AM) *
As for when you decrypt, I canĀ“t find an explicit quote right now, but would say that you decrypt first, use second. Decrypt node, hack, decrypt file, read.


So having a rating 6 Encrypt on your commlink with a Rating 6 firewall/Rating 5 system would make the hacker's job a whole lot tougher. Add in IC with all the bells and whistles that you can get and you should be good to go... for a least a round or two (IMG:style_emoticons/default/wobble.gif)
Go to the top of the page
 
+Quote Post
Medicineman
post Mar 4 2009, 08:21 AM
Post #30


Shooting Target
****

Group: Members
Posts: 1,748
Joined: 25-January 05
From: Good ol' Germany
Member No.: 7,015



And if you add the analysis 5 program the intruding Hacker might well be detected and kicked out (IMG:style_emoticons/default/wink.gif)
Plus If you only allow admin accounts on your Comlinks it'll be even more difficult for the Hacker
And Hacking on the fly is so troublesome that most Hackers won't bother anymore

Hough!
Medicineman
Go to the top of the page
 
+Quote Post
Ryu
post Mar 4 2009, 08:38 AM
Post #31


Awakened Asset
********

Group: Members
Posts: 4,464
Joined: 9-April 05
From: AGS, North German League
Member No.: 7,309



QUOTE (Medicineman @ Mar 4 2009, 09:21 AM) *
And if you add the analysis 5 program the intruding Hacker might well be detected and kicked out (IMG:style_emoticons/default/wink.gif)
Plus If you only allow admin accounts on your Comlinks it'll be even more difficult for the Hacker
And Hacking on the fly is so troublesome that most Hackers won't bother anymore

Hough!
Medicineman

... in combat. TheyĀ“ll try to cause havoc with spoof instead, or by giving commands to previously hacked nodes.
Go to the top of the page
 
+Quote Post
KCKitsune
post Mar 4 2009, 09:07 AM
Post #32


Neophyte Runner
*****

Group: Members
Posts: 2,188
Joined: 9-February 08
From: Boiling Springs
Member No.: 15,665



QUOTE (Medicineman @ Mar 4 2009, 03:21 AM) *
And if you add the analysis 5 program the intruding Hacker might well be detected and kicked out (IMG:style_emoticons/default/wink.gif)
Plus If you only allow admin accounts on your Comlinks it'll be even more difficult for the Hacker
And Hacking on the fly is so troublesome that most Hackers won't bother anymore

Hough!
Medicineman


Iris Anti-virus... the only way to fly. get both Analyze 5 and Purge 5 for the program load of one program. Run that as Ergonomic and Optimized 2 and you can run it on a Rating 3 Agent.
Go to the top of the page
 
+Quote Post
Medicineman
post Mar 4 2009, 09:34 AM
Post #33


Shooting Target
****

Group: Members
Posts: 1,748
Joined: 25-January 05
From: Good ol' Germany
Member No.: 7,015



QUOTE (Ryu @ Mar 4 2009, 03:38 AM) *
... in combat. TheyĀ“ll try to cause havoc with spoof instead, or by giving commands to previously hacked nodes.


You're right; ... In Combat (IMG:style_emoticons/default/wink.gif)

@KCKitsune
So much Unwired to read, so few time

with an added Dance
Medicineman
Go to the top of the page
 
+Quote Post
Ryu
post Mar 4 2009, 12:53 PM
Post #34


Awakened Asset
********

Group: Members
Posts: 4,464
Joined: 9-April 05
From: AGS, North German League
Member No.: 7,309



QUOTE (Medicineman @ Mar 4 2009, 10:34 AM) *
You're right; ... In Combat (IMG:style_emoticons/default/wink.gif)

I know you meant that, no worries. (IMG:style_emoticons/default/wink.gif) (IMG:style_emoticons/default/smile.gif)
Go to the top of the page
 
+Quote Post
Browncoatone
post Mar 4 2009, 01:09 PM
Post #35


Moving Target
**

Group: Members
Posts: 228
Joined: 5-January 09
Member No.: 16,733



Hacking somebody's cyber eyes in real time looks so cool when the major does it, but the rest of us mortals should just toss a grenade and be done with it. A lot less dice that way.
Go to the top of the page
 
+Quote Post
Ryu
post Mar 4 2009, 02:05 PM
Post #36


Awakened Asset
********

Group: Members
Posts: 4,464
Joined: 9-April 05
From: AGS, North German League
Member No.: 7,309



You could hack the cybereyes as combat preparation (hacking does not require LOS), and "change a linked device mode" in combat. Most guards should have rating 3 or 4 commlinks, and admin accounts on those are not impossible to hack. Messing with the video data would be a real-time edit operation.
Go to the top of the page
 
+Quote Post
hobgoblin
post Mar 4 2009, 03:25 PM
Post #37


panda!
**********

Group: Members
Posts: 10,331
Joined: 8-March 02
From: north of central europe
Member No.: 2,242



QUOTE (Ryu @ Mar 4 2009, 09:38 AM) *
... in combat. TheyĀ“ll try to cause havoc with spoof instead, or by giving commands to previously hacked nodes.

indeed, send a spoof is the right way to go in combat. having smartgun secure themselves or eject ammo is a nice trick...

and i guess one could spoof cybereyes to shut down, or show diagonostic patterns (IMG:style_emoticons/default/wink.gif)

not deadly, but highly distracting.
Go to the top of the page
 
+Quote Post
hobgoblin
post Mar 4 2009, 03:26 PM
Post #38


panda!
**********

Group: Members
Posts: 10,331
Joined: 8-March 02
From: north of central europe
Member No.: 2,242



QUOTE (Browncoatone @ Mar 4 2009, 02:09 PM) *
Hacking somebody's cyber eyes in real time looks so cool when the major does it, but the rest of us mortals should just toss a grenade and be done with it. A lot less dice that way.

i do not recall that ever being done mid-combat. as part of a conversation that one can tell will lead to problems, sure, but not while bullets or fists are flying...
Go to the top of the page
 
+Quote Post
TBRMInsanity
post Mar 4 2009, 03:40 PM
Post #39


Running Target
***

Group: Members
Posts: 1,002
Joined: 22-April 06
From: Canada
Member No.: 8,494



I've often wondered this in SR4. If your a strict Vehicle Rigger (ie you only link up to your vehicle when your in it and thus don't need an extended network to like all the devices, a datajack (or VCR in the "good old days") will suffice). Are there any rules that allow a vehicle rigger to close off external connections (thus reducing hacking into the vehicle) but still maintaining the menatl link with the vehicle? To a long time Rigger character player this seems to be the biggest nerf of the archtype that was done in SR4 (along with merging riggers and deckers together to create hackers).
Go to the top of the page
 
+Quote Post
Malachi
post Mar 4 2009, 03:52 PM
Post #40


Running Target
***

Group: Members
Posts: 1,228
Joined: 24-July 07
From: Canada
Member No.: 12,350



QUOTE (TBRMInsanity @ Mar 4 2009, 11:40 AM) *
I've often wondered this in SR4. If your a strict Vehicle Rigger (ie you only link up to your vehicle when your in it and thus don't need an extended network to like all the devices, a datajack (or VCR in the "good old days") will suffice). Are there any rules that allow a vehicle rigger to close off external connections (thus reducing hacking into the vehicle) but still maintaining the menatl link with the vehicle? To a long time Rigger character player this seems to be the biggest nerf of the archtype that was done in SR4 (along with merging riggers and deckers together to create hackers).

I'm not entirely clear what you're getting at, but I'm going to give it a try. If a "old school Rigger" wants to operate his vehicle from inside of it, with a wired connection (via datajack) then he can safely turn off the wireless on the vehicle and have it be secure that way. If he still wants to control it while on the move and such, then what you are describing would be "slaving" the vehicle to your Commlink. Thus, your vehicle would not respond to any commands unless they came from your Commlink's Access ID. This can be defeated by a Spoof if someone manages to find your Commlink's Access ID, so it's not impenetrable, but it is fairly secure.
Go to the top of the page
 
+Quote Post
InfinityzeN
post Mar 4 2009, 03:53 PM
Post #41


Moving Target
**

Group: Members
Posts: 992
Joined: 23-December 08
From: the Tampa Sprawl
Member No.: 16,707



I always found it funny how in unwired where it is talking about hacking cyberware, it actually says something along the lines of "externally accessable cyberware does not use wireless" then goes on to talk about hacking a cyberarm on the next page.

Now I don't know about you, but a cyberlimb is about as externally accessable as you can get, meaning all control is done by DNI, full diagnostics requires a wire (this is the make the limb do stuff), and the only wireless will be a couple of RFID Chips reporting diag info but having no actual connection to any controls. Same thing for cybereyes and ears too. Only stuff fully inside the person (wired reflexes) could be hacked wirelessly and then *ONLY* if the person didn't get them with no wireless (optionally with RFID Chip wireless diag reporters).

In fact, RFID chips that don't have any control of the Ware but pass on diag info would make *FAR* more sense for most pieces of ware then any type of Diagnostic Control and are totally allowed under RAW. I read it as the standard for anything where direct access is easy and a moderately common option for everything else (some pieces of ware are helped by being wireless). So that pretty much by default shuts out 99% of ware hacking, since runners will almost always select the more secure option by default.

*******************************

Next up, secuirty. Skinlink everything, get a bunch of 'Non-standard freq' modules [Personal Opinion: I rule that even if you detect it, without a module yourself you can't send any signal in that range.] and use those combined with being in hidden mode. Your even harder to detect then just being in hidden mode and even if detected most likely the people detecting you won't have equipment that can send and recieve in the freq range your using.

You need extra security? Switch to throat mikes and radios (again using a 'Non-standard freq' module) while turning the wireless on your Commlink off unless you work through you Commlink (Hackers & Riggers, I'm looking at you here).
Go to the top of the page
 
+Quote Post
KCKitsune
post Mar 4 2009, 03:53 PM
Post #42


Neophyte Runner
*****

Group: Members
Posts: 2,188
Joined: 9-February 08
From: Boiling Springs
Member No.: 15,665



I guess it's a good thing that I clustered my other cyberware and then slaved that cluster to my commlink. I have the following as a commlink

Response 5, System 5, Firewall 6, Encrypt 6 (Ergonomic and Optimized 1), and an Agent 3 with Bells & Whistles*.

* = Attack 3, Armor 3, Expert Offense 3 (Ergonomic), Cascade 3 (Ergonomic), Iris Anti-Virus (Ergonomic & Optimized 2), & Virtual Person (question about this below).


Question: A virtual person is listed as follows in the BBB:

QUOTE
Simulate your favorite person! Whether it's your ex-boyfriend or your favorite sim starlet, just access or upload their personal data, modify it as you see fit, and project the person into your life just like the real deal. This program only simulates one person at a time, and the realism in behavior depends on the amount of data given as well as the processing power of your commlink - best results are achieved with a growing assortment of download-able sim-persons (including sim stars like Tracy Monroe and Neko-Katz).


Does this mean that if you have the time and/or know someone that you can make a sorta Pseudo-AI by linking a Virtual Person with an Agent? Even more so if you can add in the Adaptability Autosoft.
Go to the top of the page
 
+Quote Post
Kanada Ten
post Mar 4 2009, 04:05 PM
Post #43


Beetle Eater
********

Group: Dumpshocked
Posts: 4,797
Joined: 3-June 02
From: Oblivion City
Member No.: 2,826



QUOTE (KCKitsune @ Mar 4 2009, 09:53 AM) *
Does this mean that if you have the time and/or know someone that you can make a sorta Pseudo-AI by linking a Virtual Person with an Agent? Even more so if you can add in the Adaptability Autosoft.

I have to believe that linking them would be effortless. Even buying agents and vehicles with pre-loaded persons should be standard gimmicks for software and car manufacturers.
Go to the top of the page
 
+Quote Post
TBRMInsanity
post Mar 4 2009, 04:19 PM
Post #44


Running Target
***

Group: Members
Posts: 1,002
Joined: 22-April 06
From: Canada
Member No.: 8,494



QUOTE (Malachi @ Mar 4 2009, 09:52 AM) *
I'm not entirely clear what you're getting at, but I'm going to give it a try. If a "old school Rigger" wants to operate his vehicle from inside of it, with a wired connection (via datajack) then he can safely turn off the wireless on the vehicle and have it be secure that way. If he still wants to control it while on the move and such, then what you are describing would be "slaving" the vehicle to your Commlink. Thus, your vehicle would not respond to any commands unless they came from your Commlink's Access ID. This can be defeated by a Spoof if someone manages to find your Commlink's Access ID, so it's not impenetrable, but it is fairly secure.


To take an analogy from Battlestar Galactica. The humans over time developed internal networks with no outside connections (this was due to the fact that the Cylons were too good at hacking their ships and making them useless in battle). I see the same problem (not as bad but similar) with riggers in SR4. If you had a LAN that didn't extend outside of the vehicle your in then there would be no risk of someone hacking your vehicle and causing you to drive into a ditch. Most riggers should have a tricked out comlink making hacking hard but it seems like a unnessesary risk when you don't need external connections in the first place.
Go to the top of the page
 
+Quote Post
Red-ROM
post Mar 4 2009, 04:21 PM
Post #45


Shooting Target
****

Group: Members
Posts: 1,756
Joined: 17-January 09
From: Va Beach , CAS
Member No.: 16,787



sure, you can turn off the remote access and plug your datajack into your car. and you can get the VCR cyberware, but that seems kind of limiting for your character. no drones or secondary vehicles? I guess you could do that with little investment of points and branch out as a medic or weapons expert or investigator or something.
Go to the top of the page
 
+Quote Post
mercurywave
post Mar 4 2009, 05:01 PM
Post #46


Target
*

Group: Members
Posts: 27
Joined: 3-March 09
From: Da Barrens
Member No.: 16,931



QUOTE (Dream79 @ Mar 3 2009, 11:06 PM) *
Well if someone is trying to listen in on your teams communications or visa versa, the hacker would first have to detect wireless node (assuming it's hidden, Electronic Warfare + Scan Extended Test with a threshold of probably 4) then decrypt the signal (Decrypt + Response (Encryption x2,1 combat turn) extended test) and finally intercept wireless signal (Electronic Warfare + Sniffer (3)) to listen to communications on a hidden wireless node as an example.


First...yay first post!!

Second, is this possible for a rigger to accomplish hacking communications through his slaved drone? If so does he have to be jumped in or remote controlling it? or can it be done passively without interrupting the actions of the drone's turn?
Go to the top of the page
 
+Quote Post
Wombat
post Mar 4 2009, 05:47 PM
Post #47


Moving Target
**

Group: Members
Posts: 116
Joined: 16-February 09
From: Seattle Metroplex, Tacoma District, UCAS
Member No.: 16,883



This is from several posts back, but what the hell...

QUOTE (Degausser @ Mar 3 2009, 02:30 PM) *
I more meant that you would look like a dufus moving your hands around while nothing was in front of you, but I guess that kind of behavior wouldn't be too weird if AR gloves were common, now that I think about it.

You could always have a holoprojector putting out a visual display and manipulate that wit AR gloves. Not quite as weird as moving your hands around in the air with nothing else there.


QUOTE (Degausser @ Mar 3 2009, 02:30 PM) *
I more meant that, it would be a pain to try and do stuff with your comlink if you couldn't issue mental commands. Sure, you could look cool doing impressions of the control Center in 'Minority report' but on a run, if you need to wave your arms around every time you want to subvocally message your friends, that could be pretty darn annoying. I was just wondering if there was something out there that could let mages manipulate their comlinks as easy as people with Datajacks. Seems to me there would be a big market for that.

If you've got goggles or glasses you could "install retinal scanners" or some such thing that determines where you are looking on your image link and allow you to manipulate the interface with blinking. Essentially turning your eyeball into a modern day mouse.
Go to the top of the page
 
+Quote Post
Degausser
post Mar 4 2009, 05:56 PM
Post #48


Moving Target
**

Group: Members
Posts: 380
Joined: 19-May 07
Member No.: 11,698



QUOTE (TBRMInsanity @ Mar 4 2009, 11:40 AM) *
I've often wondered this in SR4. If your a strict Vehicle Rigger (ie you only link up to your vehicle when your in it and thus don't need an extended network to like all the devices, a datajack (or VCR in the "good old days") will suffice). Are there any rules that allow a vehicle rigger to close off external connections (thus reducing hacking into the vehicle) but still maintaining the menatl link with the vehicle? To a long time Rigger character player this seems to be the biggest nerf of the archtype that was done in SR4 (along with merging riggers and deckers together to create hackers).


Another thing you can do is purposefully turn down your Comlink and Vehicle's Signal rating to 0. A rating zero equals 'a few feet' according to the book, meaning that a car would have to maintain several turns RIGHT NEXT TO YOU to hack it, something very difficult to do. On the down side, if they have a jammer, you are screwed.
Go to the top of the page
 
+Quote Post
InfinityzeN
post Mar 4 2009, 06:38 PM
Post #49


Moving Target
**

Group: Members
Posts: 992
Joined: 23-December 08
From: the Tampa Sprawl
Member No.: 16,707



passively.
Go to the top of the page
 
+Quote Post
counterveil
post Mar 4 2009, 07:38 PM
Post #50


Target
*

Group: Members
Posts: 85
Joined: 12-June 03
Member No.: 4,720



QUOTE (Red-ROM @ Mar 4 2009, 05:21 PM) *
sure, you can turn off the remote access and plug your datajack into your car. and you can get the VCR cyberware, but that seems kind of limiting for your character. no drones or secondary vehicles? I guess you could do that with little investment of points and branch out as a medic or weapons expert or investigator or something.


Yeah, I agree with this post. One of the cool non-hacking, every day things you can do with wireless is to activate your vehicle remotely, use the Pilot to drive to your location, open the door, and bang! - you're in the car. This is a really handy aspect of wireless driving/rigging that makes it difficult for a Rigger to truly turn off wireless - it's similar to the question of whether or not any given network has wireless, really. Convenience vs. Security - a tough choice.

If we turn to a "realistic" point of view, let's say that in a couple of years almost all new vehicles are equipped with bluetooth or wifi listeners that allow you to lock/unlock your car, locate it in a parking lot (yeah I forget where I park all the time!), pop the trunk only, or any of a number of daily activities. People would be all over that! Now imagine that all of a sudden a bunch of these cars get hacked. The nature of hackers is such that they like to share their exploits whether for fame, glory, money, or just plain "open source" mindset. Now you're going to have a bunch of cars with a known, exploitable flaw - just like websites, DNS, OSes, or whatever have you. The natural reaction of the manufacturer is to patch the flaw in some way, rendering the exploit unusable. Then the hackers find a new way in, this gets patched, and the cycle goes on. If cars keep getting jacked, no one is going to sit around waiting for it to keep happening - some kind of aggressive action is going to be taken to mitigate and reduce the carjacking.

How to replicate this in SR4? The way that SR4 works is essentially only Rating+{something} vs. Rating+{something}. This doesn't really replicate the natural progression of technology and the hacks-against-it to evolve to meet demand. I was thinking a lot about this the other day and came up with the following:

Software "degrades", or becomes less useless over time. Perhaps every month (or less in a fast-moving techno-literate society like the 6th world?), every software-based rating that a PC has decreases by 1. This reflects the tendency of the PCs opposition to increase their protective *and* offensive measures. This introduces what is essentially a software maintenance fee into the PCs' lives, much like maintaining lifestyle. In this scenario it becomes really cool to actually have software development skills in order to maintain your own gear and keep it up to date and bleeding-edge.

Hm...I think I might use that. Or maybe it's already in Unwired (still in the midst of reading it) and I've just made a redundant suggestion (IMG:style_emoticons/default/nyahnyah.gif)
Go to the top of the page
 
+Quote Post

3 Pages V  < 1 2 3 >
Reply to this topicStart new topic

 



RSS Lo-Fi Version Time is now: 24th November 2024 - 07:21 AM

Topps, Inc has sole ownership of the names, logo, artwork, marks, photographs, sounds, audio, video and/or any proprietary material used in connection with the game Shadowrun. Topps, Inc has granted permission to the Dumpshock Forums to use such names, logos, artwork, marks and/or any proprietary materials for promotional and informational purposes on its website but does not endorse, and is not affiliated with the Dumpshock Forums in any official capacity whatsoever.