My Assistant
![]() ![]() |
Jul 15 2010, 01:40 AM
Post
#26
|
|
|
Prime Runner Ascendant ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 17,568 Joined: 26-March 09 From: Aurora, Colorado Member No.: 17,022 |
i would say that the matrix rules would become more interesting to more people if one could do something quickly. Like say virtually slapping someone from across the room (without it taking several minutes of setup that is). the minimum times on matrix extended tests are basically silly. Why? Do you have an Example that might help to illustrate your point? (IMG:style_emoticons/default/wobble.gif) Keep the Faith |
|
|
|
Jul 15 2010, 01:42 AM
Post
#27
|
|
|
Moving Target ![]() ![]() Group: Members Posts: 111 Joined: 2-September 05 From: Canada Member No.: 7,672 |
Daisy chaining multiple commlinks so a hacker is forced to defeat several layers of defenses is another good idea. -np Hahaha, this exact trick was brought up in Unwired actually. You should read the response, it's great... basically it's a newb trick that doesn't actually work. (IMG:style_emoticons/default/smile.gif) |
|
|
|
Jul 15 2010, 02:15 AM
Post
#28
|
|
|
panda! ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 10,331 Joined: 8-March 02 From: north of central europe Member No.: 2,242 |
Why? Do you have an Example that might help to illustrate your point? (IMG:style_emoticons/default/wobble.gif) Keep the Faith hack on the fly is a complex action pr roll in a extended test with the target firewall as treshold. in that time alone, how much lead can a samurai put into the same target, or how many spells can a mage deliver? and even after that your limited to rebooting the targets hardware unless he happens to use hot sim VR at the time (highly unlikely). |
|
|
|
Jul 15 2010, 02:15 AM
Post
#29
|
|
|
Old Man Jones ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Group: Dumpshocked Posts: 4,415 Joined: 26-February 02 From: New York Member No.: 1,699 |
Hahaha, this exact trick was brought up in Unwired actually. You should read the response, it's great... basically it's a newb trick that doesn't actually work. (IMG:style_emoticons/default/smile.gif) That's talking about a hacker using multiple layers of commlinks while hacking to try and buffer himself against IC. It doesn't work because if you're facing an IC, your icon is there and as such the IC has a direct connection to your brain, no matter how many commlinks you've chained through. I am referring to using it as a defense AGAINST being hacked, by putting several firewalls between you and the hacker. There's no direct connection in this case, the intruder has to overcome each little closed box before accessing the next. -karma |
|
|
|
Jul 15 2010, 02:44 AM
Post
#30
|
|
|
Prime Runner Ascendant ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 17,568 Joined: 26-March 09 From: Aurora, Colorado Member No.: 17,022 |
hack on the fly is a complex action pr roll in a extended test with the target firewall as treshold. in that time alone, how much lead can a samurai put into the same target, or how many spells can a mage deliver? and even after that your limited to rebooting the targets hardware unless he happens to use hot sim VR at the time (highly unlikely). But I really do not see that as being silly, at least in my opinion... it is going to take a hacker longer to perform a hack than it is for the Street Sam (or Mage) to kill an opponent... that is only logical... as for the Complex Action and Target Firewall... 2 Passes will generally get you into a Rating 6 Firewall (by Buying Successes) assuming that you have a Dice Pool of 12 (which is very easy to actually acquire)... Those exceptional Hackers/Technomancers, who have a few more Dice to play with, can expect to do that on average rolls, and can actually get in in a Single Complex Action if they roll well, or have Edge to spend... Why would you not try to impede their communications? Or their tactical network, or Spoof the COmmunications to your benefit, or any number of other options rather than hacking someone who is likely dead by the time you hack their equipment? There are a ton of things that hte Hacker can do in teh same time frame that the Mage/Sam are killing things... If your Hacker is only trying to hack comlinks and turn off cyber (or whatever) they should really consider broadening their field a bit... Hacking Comlinks is not an action for trhe Hacker during combat... that is what they do before combat ever commences... Keep the Faith |
|
|
|
Jul 15 2010, 02:45 AM
Post
#31
|
|
|
Advocatus Diaboli ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 13,994 Joined: 20-November 07 From: USA Member No.: 14,282 |
The problem there is the same as it always it: security versus usefulness (connectivity). If you want your cool computer to connect out to anything to do its job… oops. (IMG:style_emoticons/default/smile.gif) It's a good strategy option, but a limited one (like everything).
|
|
|
|
Jul 15 2010, 02:48 AM
Post
#32
|
|
|
Prime Runner Ascendant ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 17,568 Joined: 26-March 09 From: Aurora, Colorado Member No.: 17,022 |
That's talking about a hacker using multiple layers of commlinks while hacking to try and buffer himself against IC. It doesn't work because if you're facing an IC, your icon is there and as such the IC has a direct connection to your brain, no matter how many commlinks you've chained through. I am referring to using it as a defense AGAINST being hacked, by putting several firewalls between you and the hacker. There's no direct connection in this case, the intruder has to overcome each little closed box before accessing the next. -karma Which can be quite brutal if the Multi-Layer PAN is constructed with High-level Security in Mind... It is a rare Hacker/Technomancer that can penetrate all the way to my Cranial Comlink, for that very reason... Multiple Layers, 3 Deep, with judicious use of Security Programs, Agents, IC, and a Decent System Alert Response Configuration... (IMG:style_emoticons/default/wobble.gif) Keep the Faith |
|
|
|
Jul 15 2010, 03:11 AM
Post
#33
|
|
|
Advocatus Diaboli ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 13,994 Joined: 20-November 07 From: USA Member No.: 14,282 |
Unless, of course, you're using it as a commlink. (IMG:style_emoticons/default/smile.gif) In which case there are direct routes in. You can't get out without giving ways in.
|
|
|
|
Jul 15 2010, 03:14 AM
Post
#34
|
|
|
Moving Target ![]() ![]() Group: Members Posts: 155 Joined: 7-July 10 Member No.: 18,799 |
Which can be quite brutal if the Multi-Layer PAN is constructed with High-level Security in Mind... It is a rare Hacker/Technomancer that can penetrate all the way to my Cranial Comlink, for that very reason... Multiple Layers, 3 Deep, with judicious use of Security Programs, Agents, IC, and a Decent System Alert Response Configuration... (IMG:style_emoticons/default/wobble.gif) Keep the Faith I also love to use cranial commlinks like a router, segregating everything that is important from each other. Keep your guns/cybereyes/personal commlink all connected via a skinlinked commlink who is not wifi-enabled and has a big 'ole anti-hacker mentality. Then, via optical cable, run a second/third/whatever commlink about your person, either active or passive, but without making the direct connection to all your expensive but potentially hackable devices. Not only does it provide many layers of separation, it also grants a little security through obscurity (feh) and helps keep your commlink and your matrix persona segregated. Someone blows up your wireless commlink? Oh well, the guns still go bang. True, it is expensive, but in theory your skinlink commlink doesn't have to be very powerful. I'd probably optimize it for analyze and run an agent with a powerful analyze program, connected to a display/image link. If the system hits active alert, you pull the plug (on the wireless connection). |
|
|
|
Jul 15 2010, 03:29 AM
Post
#35
|
|
|
Moving Target ![]() ![]() Group: Members Posts: 312 Joined: 3-March 10 Member No.: 18,237 |
This sounds pretty cool, I hope you are able to get this working and share it with the public. I would love to see it.
|
|
|
|
Jul 15 2010, 03:37 AM
Post
#36
|
|
|
Moving Target ![]() ![]() Group: Members Posts: 155 Joined: 7-July 10 Member No.: 18,799 |
In the vein of 'sams/mages kill things faster than you can hack them', I'd like to point out that hackers/TMs can hack things they can't see directly, etc. The sam can shoot any darn fool who steps out into the alley, but I am killing suckers with their household drones while they hide in the basement. Or busting up their tac net. Or firing their underbarrel grenade launchers in narrow corridors. Or posting the nude trid-pics of their secret dwarven mistresses onto public forums. And so forth...
|
|
|
|
Jul 15 2010, 06:35 AM
Post
#37
|
|
|
Runner ![]() ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 2,705 Joined: 5-October 09 From: You are in a clearing Member No.: 17,722 |
Spoof is a combat weapon. Exploit is an Infiltration tool. You can spoof over and over again until you get a hit.
Though Spoof rules are kind of dumb. -3 dice and -6 dice depending on the access level needed to execute the command? You're spoofing another user's matrix ID. If they don't have access to do something, then it should't happen, and if they do have access, then the command should be followed without any added difficulty. Dumb dumb dumb. BTW, another good security tip is to have a dedicated Agent just to run Redirect Trace actions 4evrs. Track attempts then become an uphill battle and it keeps your ID safer, longer. PS I had tried to start a Matrix VR environments superthread before. I'll link to that here. |
|
|
|
Jul 15 2010, 07:06 AM
Post
#38
|
|
|
Great Dragon ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 5,537 Joined: 27-August 06 From: Albuquerque NM Member No.: 9,234 |
I guess I have two questions for the community: Is there any way to realistically secure a basic commlink in this system, and is there anyone who isn't disappointed in the simplification of VR? Depends on what you mena by "secure a basic comlink". You can essentially execute drop-out via subscription lists. Frank noted other approaches: "then people will simply make their systems unhackable by any of a number of architectural means (you can enjoy yourself in Unwired by slaving your sat uplink to your comlink, connecting them with a cable, turning the wireless off on the comlink master and then laughing like a lunatic according to page 55 - all wireless attempts at exploit have to go through the comlink which they automatically fail at, and any spoof attempts also automatically fail because there's no wireless communication to listen to so you can't have perceived the Access ID of the Master and the cheese stands alone)." |
|
|
|
Jul 15 2010, 12:41 PM
Post
#39
|
|
|
Advocatus Diaboli ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 13,994 Joined: 20-November 07 From: USA Member No.: 14,282 |
Nothing so special about that. Now you're stuck with a sat-only connection. Again, you've made a tradeoff. Possibly it's a good tradeoff for your needs, possibly it's a bad one. Why would you even need to slave the uplink, though?
|
|
|
|
Jul 15 2010, 06:01 PM
Post
#40
|
|
|
Running Target ![]() ![]() ![]() Group: Members Posts: 1,228 Joined: 24-July 07 From: Canada Member No.: 12,350 |
"then people will simply make their systems unhackable by any of a number of architectural means (you can enjoy yourself in Unwired by slaving your sat uplink to your comlink, connecting them with a cable, turning the wireless off on the comlink master and then laughing like a lunatic according to page 55 - all wireless attempts at exploit have to go through the comlink which they automatically fail at, and any spoof attempts also automatically fail because there's no wireless communication to listen to so you can't have perceived the Access ID of the Master and the cheese stands alone)." I never agreed with Frank's assessment of this. All his slaved Satlink system would get you is preventing people from hacking into you by spotting your physical location and accessing you directly. If you are actually doing something with that Commlink connected to a Satlink on the Matrix, then your persona from that commlink is out on the Matrix "somewhere" doing "something." In that case, your Persona can be perceived and traced back to its source, at which time a counter-hack can be initiated. The rules in Unwired say that any attempt to access a slaved device automatically redirect to the master, therefore attempting to hack the Satlink just means a hack against the master commlink. Bottom line: if you have opened your commlink up to any sort of two-way communication with the Matrix-at-large then you are hackable. End of story. Side note: if you would also like a detailed explanation of why Frank's "you can experience the Matrix without a commlink" system doesn't work you can read it here. |
|
|
|
Jul 15 2010, 09:04 PM
Post
#41
|
|
|
Deus Absconditus ![]() ![]() ![]() ![]() ![]() ![]() Group: Dumpshocked Posts: 2,742 Joined: 1-September 03 From: Downtown Seattle, UCAS Member No.: 5,566 |
Yeah, that's the way it should be working. Frank's interpretation of some of the rules are a little wacky, to say the least.
|
|
|
|
Jul 16 2010, 12:13 AM
Post
#42
|
|
|
panda! ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 10,331 Joined: 8-March 02 From: north of central europe Member No.: 2,242 |
my understanding is that frank basically took the mage as the zero point, and observed how far "behind" the hacker was, then built rules to life the hacker to the level of the mage. Or at least, that seems to have been his MO when doing other kinds of rules work around the net.
|
|
|
|
Jul 16 2010, 03:10 AM
Post
#43
|
|
|
Prime Runner Ascendant ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 17,568 Joined: 26-March 09 From: Aurora, Colorado Member No.: 17,022 |
Unless, of course, you're using it as a commlink. (IMG:style_emoticons/default/smile.gif) In which case there are direct routes in. You can't get out without giving ways in. Sure you can... Just secure the access paths and you go a long way to keeping it clean... You may not be 100% secure, but you can sure slow someone down a lot if you really try... Keep the Faith |
|
|
|
Jul 16 2010, 03:13 AM
Post
#44
|
|
|
Advocatus Diaboli ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 13,994 Joined: 20-November 07 From: USA Member No.: 14,282 |
Sorry, no idea what that means. All ways out are ways in, that's the law. (IMG:style_emoticons/default/smile.gif)
|
|
|
|
Jul 16 2010, 03:17 AM
Post
#45
|
|
|
Moving Target ![]() ![]() Group: Members Posts: 155 Joined: 7-July 10 Member No.: 18,799 |
Sorry, no idea what that means. All ways out are ways in, that's the law. (IMG:style_emoticons/default/smile.gif) He's saying that out is a two step operation, so that in becomes a two step operation as well. This is like having two locked doors between your house and the street. However, every time you go outside to do something, you leave the two doors behind you. You are then effectively out in the open. |
|
|
|
Jul 16 2010, 03:17 AM
Post
#46
|
|
|
Prime Runner Ascendant ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 17,568 Joined: 26-March 09 From: Aurora, Colorado Member No.: 17,022 |
Sorry, no idea what that means. All ways out are ways in, that's the law. (IMG:style_emoticons/default/smile.gif) Some Laws are just suggestions... (IMG:style_emoticons/default/wobble.gif) Basically, I can use a system with full access and full communications out... any one, other than me, will have to defeat the many levels of security to access my pathways back in... sure, they may get in eventually, but then again, they may also take enough lethal feedback to kill them before they ever get close (After all, they only need tro miss one high Rated Data Bomb to be toast)... it really is not that hard to do... either way, you will have slowed them down; hopefully enough to complete what you were doing, and disappear from the matrix... Keep the Faith |
|
|
|
Jul 16 2010, 03:23 AM
Post
#47
|
|
|
Advocatus Diaboli ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 13,994 Joined: 20-November 07 From: USA Member No.: 14,282 |
Right, so it's a way in. That's what I said. (IMG:style_emoticons/default/smile.gif)
|
|
|
|
Jul 16 2010, 03:28 AM
Post
#48
|
|
|
Prime Runner Ascendant ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 17,568 Joined: 26-March 09 From: Aurora, Colorado Member No.: 17,022 |
Right, so it's a way in. That's what I said. (IMG:style_emoticons/default/smile.gif) Sure... but a very risky way in... which was whay I implied (poorly apparently)... (IMG:style_emoticons/default/wobble.gif) Keep the Faith |
|
|
|
Jul 16 2010, 07:31 AM
Post
#49
|
|
|
Moving Target ![]() ![]() Group: Members Posts: 946 Joined: 16-September 05 From: London Member No.: 7,753 |
Personally, a proper Decker in a fully wireless world is likely to switch it all off and only use cables...
|
|
|
|
Jul 16 2010, 01:28 PM
Post
#50
|
|
|
Old Man Jones ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Group: Dumpshocked Posts: 4,415 Joined: 26-February 02 From: New York Member No.: 1,699 |
Right, so it's a way in. That's what I said. (IMG:style_emoticons/default/smile.gif) The point is not to stop the hack. This is impossible, as you said, if there's a way out, there's a way in. The point is to make the hack take so much time and be so difficult & dangerous that by the time the hacker has breached your fifth level of defenses he has just enough time to say, "oh crap" as a bullet enters his brain. It's like securing a house. You can't stop someone who is determined to get in. You can only slow them down enough for other factors to com into play. -karma |
|
|
|
![]() ![]() |
|
Lo-Fi Version | Time is now: 12th April 2022 - 07:18 AM |
Topps, Inc has sole ownership of the names, logo, artwork, marks, photographs, sounds, audio, video and/or any proprietary material used in connection with the game Shadowrun. Topps, Inc has granted permission to the Dumpshock Forums to use such names, logos, artwork, marks and/or any proprietary materials for promotional and informational purposes on its website but does not endorse, and is not affiliated with the Dumpshock Forums in any official capacity whatsoever.