Stealth Program, How does it interact with the system? |
Stealth Program, How does it interact with the system? |
May 27 2009, 03:01 PM
Post
#1
|
|
Moving Target Group: Members Posts: 105 Joined: 19-March 08 From: Athens, NY Member No.: 15,794 |
I was running a matrix session for the hacker in my shadowrun group recently and the question came up. How does stealth interact with the system it is in? For example: Does Stealth make you invisible to everything in the system? Or does stealth make you appear as a non threat to the system?
|
|
|
May 27 2009, 03:04 PM
Post
#2
|
|
Running Target Group: Members Posts: 1,336 Joined: 25-February 08 From: San Mateo CA Member No.: 15,708 |
Ideally, it would make it so the system doesnt see you.
As for looking harmless, that may be more in the realm of Spoof. BlueMax |
|
|
May 27 2009, 03:06 PM
Post
#3
|
|
Moving Target Group: Members Posts: 386 Joined: 28-November 08 From: Germany Member No.: 16,638 |
It makes you look really unimportant, as if you are some kind of automated background process or something.
There is no such thing as being invisible in the matrix: If the node truly doesn't know you're there, you wouldn't be able to "see" anything or interact with anything in it, as that's reliant on the node and other devices giving you the info you want. |
|
|
May 27 2009, 04:14 PM
Post
#4
|
|
Running Target Group: Members Posts: 1,228 Joined: 24-July 07 From: Canada Member No.: 12,350 |
Agreed. Stealth makes you look like a legitimate, and boring, icon or process in the system.
|
|
|
May 27 2009, 04:24 PM
Post
#5
|
|
The Dragon Never Sleeps Group: Admin Posts: 6,924 Joined: 1-September 05 Member No.: 7,667 |
Anytime something is looking for you in with Computer + Analyze
"If your target is intentionally trying to hide from you, this becomes an Opposed Test, with the target rolling Hacking + Stealth (or Firewall + Stealth for programs/ nodes). As a rule, anything running a Stealth program is considered to be hiding." Anytime you Hack on the Fly "Each time you make a test to hack in, however, the target node also gets to make a free Analyze + Firewall (Stealth) Extended Test." Anytime you Probe the Target "Similar to hacking on the fl y, the target node gets one free Analyze + Firewall Test when you make the actual intrusion. Th e threshold for this test equals your full Stealth program rating." And "Stealth is a clever hacker program that attempts to make the hacker as āinvisibleā? as possible to other system processes by obfuscating his activities, erasing system tracks, and mimicking authorized traffic." So it certainly looks more like the camouflage type of "Invisibility". |
|
|
Lo-Fi Version | Time is now: 26th April 2024 - 06:28 AM |
Topps, Inc has sole ownership of the names, logo, artwork, marks, photographs, sounds, audio, video and/or any proprietary material used in connection with the game Shadowrun. Topps, Inc has granted permission to the Dumpshock Forums to use such names, logos, artwork, marks and/or any proprietary materials for promotional and informational purposes on its website but does not endorse, and is not affiliated with the Dumpshock Forums in any official capacity whatsoever.