IPB

Welcome Guest ( Log In | Register )

 
Reply to this topicStart new topic
> Need help with a comlink., Trying to make it hard to hack.
faustaff
post Jan 22 2010, 06:16 PM
Post #1


Target
*

Group: Members
Posts: 11
Joined: 4-August 09
From: Seattle Sprawl
Member No.: 17,469



I want to have a comlink that my group's hacker might take some damage hacking in to. He will have it in his possession for a couple of hours, so he can take his time. Should I just make it firewall 6 and then have an agent with attack or blackout? Would that even be slightly difficult? I want him to get in; just actually have to stress a bit doing it.

Thanks
Go to the top of the page
 
+Quote Post
Summerstorm
post Jan 22 2010, 06:32 PM
Post #2


Running Target
***

Group: Members
Posts: 1,000
Joined: 30-May 09
From: Germany
Member No.: 17,225



Litter all the data with seperate Databombs. He needs time and sometimes he HAS to roll bad and some of them will blow up (and maybe take the data with it). Nice black IC and normal IC mixed.

So he has a choice: take his time and not be "hot" but so he loses more data (because fewer dice on his side). Or make it personal and go in hot and have nice hot ICE in his face.
Go to the top of the page
 
+Quote Post
Draco18s
post Jan 22 2010, 06:52 PM
Post #3


Immortal Elf
**********

Group: Members
Posts: 10,289
Joined: 2-October 08
Member No.: 16,392



You could also be a dick and slave it to another comlink. It by no means would keep him out, but it would force another roll against another firewall, and you can databomb the ports too (data bomb into the first comlink, then another into the second).

Also put some super high encryption and databombs liberally over a completely unimportant folder structure making him waste some time (or health) finding out it was pointless.
Go to the top of the page
 
+Quote Post
Thanee
post Jan 22 2010, 07:47 PM
Post #4


jacked in
**********

Group: Admin
Posts: 8,959
Joined: 26-February 02
Member No.: 463



Always keep your valuable data on a datachip not attached to the matrix, or inside your head. (IMG:style_emoticons/default/biggrin.gif)

Anyways, Encryption, Data Bombs and some Attack IC certainly will make things more tricky.

Bye
Thanee
Go to the top of the page
 
+Quote Post
otakusensei
post Jan 22 2010, 08:20 PM
Post #5


Moving Target
**

Group: Members
Posts: 695
Joined: 2-January 07
From: He has here a minute ago...
Member No.: 10,514



24 hour encryption would slow him down at least that long. Doesn't make for a dramatic hack, but it could lead to some tense moments as the group looks for a place to lay low while the hacker does his thing. There's no telling what the commlink is doing during that time as well, so at the least he'll have to keep it shielded or jammed.
Go to the top of the page
 
+Quote Post
Garou
post Jan 23 2010, 12:21 PM
Post #6


Moving Target
**

Group: Members
Posts: 186
Joined: 4-May 08
From: Brazil
Member No.: 15,955



Don't use a commlink. Use a Datalock to store your data. This way they can only get it from your COLD DEAD BODY
Go to the top of the page
 
+Quote Post
Sengir
post Jan 23 2010, 04:07 PM
Post #7


Great Dragon
*********

Group: Dumpshocked
Posts: 5,082
Joined: 3-October 09
From: Kohle, Stahl und Bier
Member No.: 17,709



Self-destruct function which is triggered when performing certain actions on the link, like opening the file "my secret plans.txt". Everybody expects databombs, but the good old thermite charge still catches people by surprise.
Go to the top of the page
 
+Quote Post
Garou
post Jan 23 2010, 04:58 PM
Post #8


Moving Target
**

Group: Members
Posts: 186
Joined: 4-May 08
From: Brazil
Member No.: 15,955



Great one. (IMG:style_emoticons/default/smile.gif)
Go to the top of the page
 
+Quote Post
kzt
post Jan 23 2010, 08:38 PM
Post #9


Great Dragon
*********

Group: Members
Posts: 5,537
Joined: 27-August 06
From: Albuquerque NM
Member No.: 9,234



If you have physical access (without anyone watching you or caring if the device bounces) to a device it's over. You can just copy a raw image of the device and then work on a copy of that.

In the real world this is what drive encryption defends against, but that doesn't work in SR.
Go to the top of the page
 
+Quote Post

Reply to this topicStart new topic

 



RSS Lo-Fi Version Time is now: 14th April 2024 - 07:44 AM

Topps, Inc has sole ownership of the names, logo, artwork, marks, photographs, sounds, audio, video and/or any proprietary material used in connection with the game Shadowrun. Topps, Inc has granted permission to the Dumpshock Forums to use such names, logos, artwork, marks and/or any proprietary materials for promotional and informational purposes on its website but does not endorse, and is not affiliated with the Dumpshock Forums in any official capacity whatsoever.