![]() |
![]() ![]() |
![]() |
![]() ![]()
Post
#1
|
|
Target ![]() Group: Members Posts: 11 Joined: 4-August 09 From: Seattle Sprawl Member No.: 17,469 ![]() |
I want to have a comlink that my group's hacker might take some damage hacking in to. He will have it in his possession for a couple of hours, so he can take his time. Should I just make it firewall 6 and then have an agent with attack or blackout? Would that even be slightly difficult? I want him to get in; just actually have to stress a bit doing it.
Thanks |
|
|
![]()
Post
#2
|
|
Running Target ![]() ![]() ![]() Group: Members Posts: 1,000 Joined: 30-May 09 From: Germany Member No.: 17,225 ![]() |
Litter all the data with seperate Databombs. He needs time and sometimes he HAS to roll bad and some of them will blow up (and maybe take the data with it). Nice black IC and normal IC mixed.
So he has a choice: take his time and not be "hot" but so he loses more data (because fewer dice on his side). Or make it personal and go in hot and have nice hot ICE in his face. |
|
|
![]()
Post
#3
|
|
Immortal Elf ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 10,289 Joined: 2-October 08 Member No.: 16,392 ![]() |
You could also be a dick and slave it to another comlink. It by no means would keep him out, but it would force another roll against another firewall, and you can databomb the ports too (data bomb into the first comlink, then another into the second).
Also put some super high encryption and databombs liberally over a completely unimportant folder structure making him waste some time (or health) finding out it was pointless. |
|
|
![]()
Post
#4
|
|
jacked in ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Group: Admin Posts: 9,424 Joined: 26-February 02 Member No.: 463 ![]() |
Always keep your valuable data on a datachip not attached to the matrix, or inside your head. (IMG:style_emoticons/default/biggrin.gif)
Anyways, Encryption, Data Bombs and some Attack IC certainly will make things more tricky. Bye Thanee |
|
|
![]()
Post
#5
|
|
Moving Target ![]() ![]() Group: Members Posts: 695 Joined: 2-January 07 From: He has here a minute ago... Member No.: 10,514 ![]() |
24 hour encryption would slow him down at least that long. Doesn't make for a dramatic hack, but it could lead to some tense moments as the group looks for a place to lay low while the hacker does his thing. There's no telling what the commlink is doing during that time as well, so at the least he'll have to keep it shielded or jammed.
|
|
|
![]()
Post
#6
|
|
Moving Target ![]() ![]() Group: Members Posts: 186 Joined: 4-May 08 From: Brazil Member No.: 15,955 ![]() |
Don't use a commlink. Use a Datalock to store your data. This way they can only get it from your COLD DEAD BODY
|
|
|
![]()
Post
#7
|
|
Great Dragon ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Group: Dumpshocked Posts: 5,087 Joined: 3-October 09 From: Kohle, Stahl und Bier Member No.: 17,709 ![]() |
Self-destruct function which is triggered when performing certain actions on the link, like opening the file "my secret plans.txt". Everybody expects databombs, but the good old thermite charge still catches people by surprise.
|
|
|
![]()
Post
#8
|
|
Moving Target ![]() ![]() Group: Members Posts: 186 Joined: 4-May 08 From: Brazil Member No.: 15,955 ![]() |
Great one. (IMG:style_emoticons/default/smile.gif)
|
|
|
![]()
Post
#9
|
|
Great Dragon ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 5,537 Joined: 27-August 06 From: Albuquerque NM Member No.: 9,234 ![]() |
If you have physical access (without anyone watching you or caring if the device bounces) to a device it's over. You can just copy a raw image of the device and then work on a copy of that.
In the real world this is what drive encryption defends against, but that doesn't work in SR. |
|
|
![]() ![]() |
![]() |
Lo-Fi Version | Time is now: 11th March 2025 - 10:33 AM |
Topps, Inc has sole ownership of the names, logo, artwork, marks, photographs, sounds, audio, video and/or any proprietary material used in connection with the game Shadowrun. Topps, Inc has granted permission to the Dumpshock Forums to use such names, logos, artwork, marks and/or any proprietary materials for promotional and informational purposes on its website but does not endorse, and is not affiliated with the Dumpshock Forums in any official capacity whatsoever.