My Assistant
![]() ![]() |
Jul 14 2010, 12:58 PM
Post
#1
|
|
|
Moving Target ![]() ![]() Group: Members Posts: 104 Joined: 17-August 09 Member No.: 17,514 |
I haven't seen this come up in our discussions here recently and I haven't seen it reviewed in the rules.
Example: Hacker hacks a node and enters. While in the node IC/a spider beats him in an opposed stealth+hacking vs. computer+analyze. the hacker knows he's been found out and leaves the node. Later that day he sneaks back into the node. the same spider/IC is still there. does the spider/IC automatically succeed on his matrix perception test to see our hacker? Or maybe he has a bonus to his pool? Also, when you're running stealth and you attack another icon that has not succeeded in perceiving you, does your icon appear to them or has your icon "melded into the background of data traffic, escaping notice." looking for all answers, RAW and not. Thanks! |
|
|
|
Jul 14 2010, 01:22 PM
Post
#2
|
|
|
Immortal Elf ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 10,289 Joined: 2-October 08 Member No.: 16,392 |
RAW says nothing on both of these.
In fact, the hacker could get spotted, move away to another node, and come back and theoretically have the same odds of being "invisible" that same IC again. |
|
|
|
Jul 14 2010, 02:03 PM
Post
#3
|
|
|
Running Target ![]() ![]() ![]() Group: Members Posts: 1,290 Joined: 23-January 07 From: Seattle, USA Member No.: 10,749 |
I'd imagine you'd have to change your access id before stealth would work again.
|
|
|
|
Jul 14 2010, 02:11 PM
Post
#4
|
|
|
Target ![]() Group: Members Posts: 91 Joined: 6-July 10 Member No.: 18,795 |
I'd imagine you'd have to change your access id before stealth would work again. That is a very good house rule, and a handy "spontaneous on-the-fly" ruling for a con game. Back out, dump/reroute your current access code to prevent traces, do a quick hack+software to change your ID, and head back in. The system will probably be in "active mode" or "alert mode", but he's not automatically spotted. Makes it work like "in the meat" versus some guards, which is (I think) the objective of the current edition's hacking rules. |
|
|
|
Jul 14 2010, 02:25 PM
Post
#5
|
|
|
Immortal Elf ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 10,289 Joined: 2-October 08 Member No.: 16,392 |
I'd imagine you'd have to change your access id before stealth would work again. And there's a handy dandy piece of vehicle equipment (Arsenal) that you can get that "changes the access ID of the node on a regular basis." Best (IMG:style_emoticons/default/nuyen.gif) 200 ever spent. |
|
|
|
Jul 14 2010, 03:06 PM
Post
#6
|
|
|
Target ![]() Group: Members Posts: 91 Joined: 6-July 10 Member No.: 18,795 |
I dunno... that's good for preventing long-term history examinations and for short-term dodges, but if someone does tag you, all they have to do is put a program in a node that you frequent and watch for patterns.
Seeing "123456a" log off from all nodes simultaneously and "123456b" log on to the exact same nodes half a second later is rather obvious. If it just changes your code every time you log off completely, that's one thing. But even that's not foolproof. If you really want to make it hard for people to track you, buy "erased". There aren't any essential qualities for hacker-types, at least not in the core. |
|
|
|
![]() ![]() |
|
Lo-Fi Version | Time is now: 12th April 2022 - 07:42 AM |
Topps, Inc has sole ownership of the names, logo, artwork, marks, photographs, sounds, audio, video and/or any proprietary material used in connection with the game Shadowrun. Topps, Inc has granted permission to the Dumpshock Forums to use such names, logos, artwork, marks and/or any proprietary materials for promotional and informational purposes on its website but does not endorse, and is not affiliated with the Dumpshock Forums in any official capacity whatsoever.