more questions about the matrix |
more questions about the matrix |
Mar 9 2010, 03:51 AM
Post
#26
|
|
Prime Runner Ascendant Group: Members Posts: 17,568 Joined: 26-March 09 From: Aurora, Colorado Member No.: 17,022 |
although thinking from current real life situations it still doesn't make sense since most of these corps could afford a backup server or 2 so they could afford to power cycle the gateway machines to implement the 24 hour encryption over a course of time without any onsite interruption... but we'll assume this is too cost prohibitive or ineffective for some reason. Well, the biggest criticism of the hacking rules for Shadowrun is that they are unrealistic... Having worked in the Industry for a few years (15 or so) I can understand this criticism... however, if you were to implement what many on these forums consider "adequate" security procedures, you would effectively eliminate 3 of the most interesting character archtypes in the game... The Hacker, Technomancer and Rigger... as a result, they went a different route in the game world... this route provided somewhat effective security that is ultimately "just not enough." It is effectively just a speed bump (though it can be pretty damn effective one) to the intruding Hackers... Hackers WILL eventually break into a system, given enough time Hackers/Technomancers at the top of their games can be challenged, without having to completely overpower the newbie hacker... yes, a Rating 6 System should be tough, and it may seem that that is not actually the case... but even with the programs that I use (generally rated 6), and the skills I use (All rated at 3 by the way, after all I am a professional) I have been challenged fairly well (many will argue that it is because my dice pools are not in the high teens, but that is another topic entirely)... Hacks are not just a cake walk, and higher level environments are still challenging, even if I was to obtain skills rated at 6... Layered defenses are the way to go in Shadowrun... not a single node with uber protection, but a multitude of nodes, each with their own unique twists applied. A well though out system can still be very difficult, as defense in depth is always a better strategy than an impenetrable wall (which is exceedingly costly). Layered defenses eliminate the time advantage that Hackers possess... if they have to spend all of their time breaking through the various layers, it will give the Target System more time to marshall its defenses, and thus protect its own assets. Simple steps, like Data Bombing every access port, are a very effective tool... and any time a Hacker fails to notice on of these little surprises, he gets a fairly rude awakening (After all, A Rating 5 Databomb provides a 5d6 (or 5*1d6 if you prefer) Rude Awakening, which is generally enough to offline the hacking attempt, or at least make him very, very wary of continuing) as well as possibly alerrting the System that a Hacking attempt is underway. Keep the Faith |
|
|
Mar 9 2010, 08:02 AM
Post
#27
|
|
Running Target Group: Members Posts: 1,026 Joined: 13-February 10 Member No.: 18,155 |
Of note, data bombs can also be used offensively. With black or psychotrophic data bombs, you can pretty much be a virtual mad bomber by planting them willy nilly among an unsuspecting node and not giving out the passwords. (IMG:style_emoticons/default/biggrin.gif)
Oh hey, with that in mind, if you can trick an IC, agent, or similar program to try accessing a bombed node/file, they'd take damage too, right? |
|
|
Mar 9 2010, 08:19 AM
Post
#28
|
|
Moving Target Group: Members Posts: 123 Joined: 19-February 10 From: Bakersfield, CA Member No.: 18,179 |
Of note, data bombs can also be used offensively. With black or psychotrophic data bombs, you can pretty much be a virtual mad bomber by planting them willy nilly among an unsuspecting node and not giving out the passwords. (IMG:style_emoticons/default/biggrin.gif) Oh hey, with that in mind, if you can trick an IC, agent, or similar program to try accessing a bombed node/file, they'd take damage too, right? As someone who plays the hacker in my current SR group, I can say without reservation that I hate Data Bombs. They add One More Thing to eat up my precious IPs. That's not to say that they don't have their place -- just that it's Yet Another Matrix Rule that can be used by a GM to make the Matrix-based player a non-factor in any run. (There's nothing quite like ensuring that I have 5 IPs and being able to *actually* do something once every two combat turns because Every Goram Thing in the Matrix is Encrypted and Data Bombed™. I blame everyone on the Internet who points out that it would be irresponsible to not encrypt and data bomb basically anything that might be accessed via the Matrix. |
|
|
Mar 9 2010, 08:29 AM
Post
#29
|
|
Running Target Group: Members Posts: 1,026 Joined: 13-February 10 Member No.: 18,155 |
As someone who plays the hacker in my current SR group, I can say without reservation that I hate Data Bombs. They add One More Thing to eat up my precious IPs. That's not to say that they don't have their place -- just that it's Yet Another Matrix Rule that can be used by a GM to make the Matrix-based player a non-factor in any run. (There's nothing quite like ensuring that I have 5 IPs and being able to *actually* do something once every two combat turns because Every Goram Thing in the Matrix is Encrypted and Data Bombed™. I blame everyone on the Internet who points out that it would be irresponsible to not encrypt and data bomb basically anything that might be accessed via the Matrix. Yeah, I know the feeling. This is why I find a hacker with some rigging background to be a bit more fun. It gives him something to do if the local matrix is too much of a PITA to do more than just crash/jam the local net wholesale. Pre-run hacking clears the issue up pretty well though, and data bombs behind wi-fi inhibiting paint should be less common as you won't have every Tom, Dick, and Jane trying to hack into at all hours of the day. |
|
|
Mar 11 2010, 12:30 AM
Post
#30
|
|
Runner Group: Dumpshocked Posts: 2,801 Joined: 2-September 09 From: Moscow, Russia Member No.: 17,589 |
Why would a Singularity Encore IC not work... it reactivates programs that have been deactivated... says so right in the description... it would not work while it is being deactivated, sine it happens (or not) in a single pass, but once the program goes down, the IC can Reactivate it on its turn... I am pretty sure that a system will notice when a program goes down, as those are generally tracked (ie... they are allocated a slot in the response limit, when that slot free's up, the system knows that the program has stopped running, and the SE can then reactivate it)... simplified explanation, I know, but essentially what happens as descriptive... Keep the Faith Because it checks if a running program is crashed, and acts on that, while Data Bombs don't count as running while planted, and I'm not sure if count as crashed when disarmed (can't see why would they - after all, disarming can be just pretending you're a legitimate user after all). |
|
|
Mar 11 2010, 02:10 AM
Post
#31
|
|
Prime Runner Ascendant Group: Members Posts: 17,568 Joined: 26-March 09 From: Aurora, Colorado Member No.: 17,022 |
Because it checks if a running program is crashed, and acts on that, while Data Bombs don't count as running while planted, and I'm not sure if count as crashed when disarmed (can't see why would they - after all, disarming can be just pretending you're a legitimate user after all). Actually... A crashed program is no longer running... it has been crashed... at which point, the Singularity can re-initialize the program... A Data Bomb Program (a reactive Attack Program) can only be "activated" if it is running (even if it is in a "passive" state)... "Running" is a state that can de detected (A Matrix Perception test will do this for you if you are penetrating the node), and I would argue that the owner would notice the absense of it in the "List" of running Programs if it was defused, if he chose to look (Sort of like looking at the Task Manager in Windows)... Regardless of how the IC detects the state of the program, it can use the Run Program/Agent action (Since the last time I checked, Data Bomb is a Program)... As for a legitimate user, they do not have to "Defuse" the Data Bomb (They have the passcode), much like the owner of an Encrypted File System does not have to decrypt his node to work within it... he has the Encryption Key, and that will allow him to access it without turning off the Encryption. Keep the Faith |
|
|
Mar 11 2010, 03:02 AM
Post
#32
|
|
Runner Group: Dumpshocked Posts: 2,801 Joined: 2-September 09 From: Moscow, Russia Member No.: 17,589 |
I direct you to the FAQ again. A data bomb only counts as running when it has been activated. When it's just sitting there, it's not running (and not eating up resources), and thus my argument proceeds that a default Singularity Encore can't detect if it's still there. And yes, if it could detect if it's still there, it could launch another if this one is disarmed.
What is decryption if not acquiring a key similar to that of a legitimate owner via cryptoanalysis? By the same logic, what is disarming a data bomb if not finding the passcode? |
|
|
Mar 11 2010, 04:40 AM
Post
#33
|
|
Prime Runner Ascendant Group: Members Posts: 17,568 Joined: 26-March 09 From: Aurora, Colorado Member No.: 17,022 |
I direct you to the FAQ again. A data bomb only counts as running when it has been activated. When it's just sitting there, it's not running (and not eating up resources), and thus my argument proceeds that a default Singularity Encore can't detect if it's still there. And yes, if it could detect if it's still there, it could launch another if this one is disarmed. What is decryption if not acquiring a key similar to that of a legitimate owner via cryptoanalysis? By the same logic, what is disarming a data bomb if not finding the passcode? The FAQ is extremely outdated... So resorting to the FAQ does you no real good... And if Matrix Perception Can detect a Data Bomb, it is active... and the rules state that Matrix Perception can indeed detect a Data Bomb... ergo, it is running... therefore your default argument does not work... If the Data Bomb was NOT active, it could not go off in the pass that it was bypassed (ie. you access the file, the databomb loads, and then goes off next pass)... That is obviously not how it works, therefore the data bomb must indeed be active... the Data Bomb is like an Attack Program... if you do not have it loaded, you cannot use it to attack... pretty simple I would think... Keep the Faith |
|
|
Mar 11 2010, 10:30 AM
Post
#34
|
|
Runner Group: Dumpshocked Posts: 2,801 Joined: 2-September 09 From: Moscow, Russia Member No.: 17,589 |
How does the way programs are run has changed since the FAQ was written?
Do you notice that if you say that armed Data Bombs count as running, they should be eating up your processor limit? |
|
|
Mar 12 2010, 02:37 AM
Post
#35
|
|
Prime Runner Ascendant Group: Members Posts: 17,568 Joined: 26-March 09 From: Aurora, Colorado Member No.: 17,022 |
How does the way programs are run has changed since the FAQ was written? Do you notice that if you say that armed Data Bombs count as running, they should be eating up your processor limit? And indeed they do, at our table at least... 1 slot for each bomb on the system... Are you saying that they don't? Please cite a source for me if that is the case... Keep the Faith |
|
|
Mar 12 2010, 02:41 AM
Post
#36
|
|
Runner Group: Dumpshocked Posts: 2,801 Joined: 2-September 09 From: Moscow, Russia Member No.: 17,589 |
FAQ.
|
|
|
Mar 12 2010, 02:45 AM
Post
#37
|
|
Prime Runner Ascendant Group: Members Posts: 17,568 Joined: 26-March 09 From: Aurora, Colorado Member No.: 17,022 |
|
|
|
Mar 12 2010, 05:50 AM
Post
#38
|
|
Runner Group: Dumpshocked Posts: 2,801 Joined: 2-September 09 From: Moscow, Russia Member No.: 17,589 |
It's still an official document written by the developer. Please point out the recent changes in the system invalidating that particular bit.
|
|
|
Mar 12 2010, 06:38 AM
Post
#39
|
|
Runner Group: Members Posts: 2,705 Joined: 5-October 09 From: You are in a clearing Member No.: 17,722 |
It could easily be a process on standby. Code waiting to be activated shouldn't be considered active code..
|
|
|
Mar 13 2010, 12:41 AM
Post
#40
|
|
Prime Runner Ascendant Group: Members Posts: 17,568 Joined: 26-March 09 From: Aurora, Colorado Member No.: 17,022 |
It could easily be a process on standby. Code waiting to be activated shouldn't be considered active code.. You could go that route, sure... but looking around a bit... a piece of code cannot "activate" unless it is running some routine to detect the trigger response (you cannot "Attack" an Icon if you do not have a "Attack Program" loaded and running... and the Data Bomb is just a specialized, Autonomous Attack Program at its basic Function, one that always hits and inflicts damage, and is automatic if not defused)... as such, I classify that as "Running"... You cannot detect inactive and non-loaded programs with a simple Matrix Perception test, that requires browsing the contents of the file system (A Browse Test)... as such, if it is noticed by Matrix Perception, it MUST be running... Ergo, by that logic, Since Data Bombs are detected by Matrix Perception, they must be running... thus the intrpretation that it is active (at least in some way, shape or form) and thus the utilization of one of your program slots (measured for Response Degradation purposes)... And yes, I include my Data Bomb Programs in my Program Limits to measure response Degradation... it is a Program, that is active... Keep the Faith |
|
|
Mar 13 2010, 03:12 AM
Post
#41
|
|
Target Group: Members Posts: 61 Joined: 4-March 10 Member No.: 18,242 |
having no specific book ruling or example to site about whether or not to consider a databomb a running process or not
I think I'd prefer tymeaus's ruling for a couple reasons 1. if they weren't processes and could be thrown around willie nillie then why wouldn't every single node and file on the matrix come equipped with one by default, because it only deters hackers so why wouldn't it be built into every stock operating system. 2. if included as a process, on top of keeping every goon from running them everywhere, it would also prevent them from being widely used on commlinks in general because of the process cap, not a big deal for businesses / corps / any large entity as they all use nexi as the backbones of their matrix environment (atleast in every game i've been in) so databombing all critical files isn't that big of a deal. 3. and this is just a generality, but in my opinion, anything that even has a remote chance of dealing 36 DAMAGE and that's before options and the possibility of r7+ programs, should take up a process ... and that's my 2 sense |
|
|
Mar 13 2010, 11:45 AM
Post
#42
|
|
Runner Group: Dumpshocked Posts: 2,801 Joined: 2-September 09 From: Moscow, Russia Member No.: 17,589 |
A piece of code cannot "activate" unless it is running some routine to detect the trigger response (you cannot "Attack" an Icon if you do not have a "Attack Program" loaded and running... and the Data Bomb is just a specialized, Autonomous Attack Program at its basic Function, one that always hits and inflicts damage, and is automatic if not defused)... as such, I classify that as "Running"... There's absolutely no need to have a running process to detect the file being opened. A Data Bomb is basically a damaging code you unintentionally run once you open the file, same way, say, modern viruses can be launched when you access an infected file. |
|
|
Mar 13 2010, 04:35 PM
Post
#43
|
|
Prime Runner Ascendant Group: Members Posts: 17,568 Joined: 26-March 09 From: Aurora, Colorado Member No.: 17,022 |
There's absolutely no need to have a running process to detect the file being opened. A Data Bomb is basically a damaging code you unintentionally run once you open the file, same way, say, modern viruses can be launched when you access an infected file. I can see your point of view, I just do not agree with it... I prefer something to balance the program... and that is the point... it is a program, either it is running or it is not, if it is not running, then it does not go off... it balances out the potential abuses that inherently exist otherwise... As Makari pointed out so much more eloquently than I did... Thanks Makari... Keep the Faith |
|
|
Mar 13 2010, 05:29 PM
Post
#44
|
|
Runner Group: Members Posts: 2,899 Joined: 29-October 09 From: Leiden, the Netherlands Member No.: 17,814 |
There should be some consistency to it. Singularity Encore only checks running programs, so it only checks Data Bombs if those are running programs. If they are, they eat a program slot from the system.
You could go both ways as a spider: the data bombs on the most important files are Running, and protected by the SE. Noncritical ones aren't on the SE list to cut down on system load. |
|
|
Mar 13 2010, 05:32 PM
Post
#45
|
|
Prime Runner Ascendant Group: Members Posts: 17,568 Joined: 26-March 09 From: Aurora, Colorado Member No.: 17,022 |
There should be some consistency to it. Singularity Encore only checks running programs, so it only checks Data Bombs if those are running programs. If they are, they eat a program slot from the system. You could go both ways as a spider: the data bombs on the most important files are Running, and protected by the SE. Noncritical ones aren't on the SE list to cut down on system load. Though I prefer the Data Bomb to be running to be effective, That could definitely work... Keep the Faith |
|
|
Lo-Fi Version | Time is now: 18th January 2025 - 01:51 AM |
Topps, Inc has sole ownership of the names, logo, artwork, marks, photographs, sounds, audio, video and/or any proprietary material used in connection with the game Shadowrun. Topps, Inc has granted permission to the Dumpshock Forums to use such names, logos, artwork, marks and/or any proprietary materials for promotional and informational purposes on its website but does not endorse, and is not affiliated with the Dumpshock Forums in any official capacity whatsoever.