IPB

Welcome Guest ( Log In | Register )

 
Reply to this topicStart new topic
> Stealth Program, How does it interact with the system?
evilgoattea
post May 27 2009, 03:01 PM
Post #1


Moving Target
**

Group: Members
Posts: 105
Joined: 19-March 08
From: Athens, NY
Member No.: 15,794



I was running a matrix session for the hacker in my shadowrun group recently and the question came up. How does stealth interact with the system it is in? For example: Does Stealth make you invisible to everything in the system? Or does stealth make you appear as a non threat to the system?
Go to the top of the page
 
+Quote Post
BlueMax
post May 27 2009, 03:04 PM
Post #2


Running Target
***

Group: Members
Posts: 1,336
Joined: 25-February 08
From: San Mateo CA
Member No.: 15,708



Ideally, it would make it so the system doesnt see you.

As for looking harmless, that may be more in the realm of Spoof.

BlueMax
Go to the top of the page
 
+Quote Post
Dragnar
post May 27 2009, 03:06 PM
Post #3


Moving Target
**

Group: Members
Posts: 386
Joined: 28-November 08
From: Germany
Member No.: 16,638



It makes you look really unimportant, as if you are some kind of automated background process or something.
There is no such thing as being invisible in the matrix: If the node truly doesn't know you're there, you wouldn't be able to "see" anything or interact with anything in it, as that's reliant on the node and other devices giving you the info you want.
Go to the top of the page
 
+Quote Post
Malachi
post May 27 2009, 04:14 PM
Post #4


Running Target
***

Group: Members
Posts: 1,228
Joined: 24-July 07
From: Canada
Member No.: 12,350



Agreed. Stealth makes you look like a legitimate, and boring, icon or process in the system.
Go to the top of the page
 
+Quote Post
DireRadiant
post May 27 2009, 04:24 PM
Post #5


The Dragon Never Sleeps
*********

Group: Admin
Posts: 6,924
Joined: 1-September 05
Member No.: 7,667



Anytime something is looking for you in with Computer + Analyze

"If your target is intentionally trying to hide from you,
this becomes an Opposed Test, with the target rolling
Hacking + Stealth (or Firewall + Stealth for programs/
nodes). As a rule, anything running a Stealth program is
considered to be hiding."


Anytime you Hack on the Fly

"Each time you make a test to hack in, however, the target
node also gets to make a free Analyze + Firewall (Stealth)
Extended Test."

Anytime you Probe the Target

"Similar to hacking on the fl y, the target node gets one free
Analyze + Firewall Test when you make the actual intrusion.
Th e threshold for this test equals your full Stealth program rating."

And

"Stealth is a clever hacker program that attempts to make
the hacker as ā€œinvisibleā€? as possible to other system processes by
obfuscating his activities, erasing system tracks, and mimicking
authorized traffic."

So it certainly looks more like the camouflage type of "Invisibility".
Go to the top of the page
 
+Quote Post

Reply to this topicStart new topic

 



RSS Lo-Fi Version Time is now: 26th April 2024 - 06:28 AM

Topps, Inc has sole ownership of the names, logo, artwork, marks, photographs, sounds, audio, video and/or any proprietary material used in connection with the game Shadowrun. Topps, Inc has granted permission to the Dumpshock Forums to use such names, logos, artwork, marks and/or any proprietary materials for promotional and informational purposes on its website but does not endorse, and is not affiliated with the Dumpshock Forums in any official capacity whatsoever.