IPB

Welcome Guest ( Log In | Register )

4 Pages V  « < 2 3 4  
Reply to this topicStart new topic
> Spoof, trojans and the unplug virus, Disabling smartguns and cyberware
Karoline
post Aug 6 2010, 12:27 PM
Post #76


Great Dragon
*********

Group: Members
Posts: 5,679
Joined: 19-September 09
Member No.: 17,652



QUOTE (hobgoblin @ Aug 6 2010, 07:17 AM) *
or for that matter showing up with something like a fake FBI badge and ordering people around based on that.

Yep, this is basically spoof. The matrix equivalent to con.
Go to the top of the page
 
+Quote Post
Voran
post Aug 6 2010, 12:42 PM
Post #77


Running Target
***

Group: Members
Posts: 1,405
Joined: 23-February 04
From: Honolulu, HI
Member No.: 6,099



I guess what I'm wondering, does the spoof program (since its a program) count as a potential vector by which a trojan can access your own node? In this case, as noted, the node is the smartlink command functions that have instead been layered with said trojans. The intention is a trapped door, even if you flash a fake id to open it up, the act of opening it up sets off the trap right? Or is that out of the realm of whats possible via matrix?

Kinda like oldschool tar-baby or something
Go to the top of the page
 
+Quote Post
hobgoblin
post Aug 6 2010, 12:50 PM
Post #78


panda!
**********

Group: Members
Posts: 10,331
Joined: 8-March 02
From: north of central europe
Member No.: 2,242



as the persona doing the spoofing do not need to be inside the target node at the time of the spoof, there is no way for any virus to infect the spoof program (trojans are potential virus carriers, not viruses themselves. Their name comes from the trojan horse).
Go to the top of the page
 
+Quote Post
Voran
post Aug 6 2010, 04:08 PM
Post #79


Running Target
***

Group: Members
Posts: 1,405
Joined: 23-February 04
From: Honolulu, HI
Member No.: 6,099



QUOTE (hobgoblin @ Aug 6 2010, 07:50 AM) *
as the persona doing the spoofing do not need to be inside the target node at the time of the spoof, there is no way for any virus to infect the spoof program (trojans are potential virus carriers, not viruses themselves. Their name comes from the trojan horse).


eh, so not even worth trying to bug your own peripheral stuff then. Unless someone was trying to full hack your smartgun node, but then I guess you'd just load IC instead.
Go to the top of the page
 
+Quote Post
hobgoblin
post Aug 6 2010, 05:41 PM
Post #80


panda!
**********

Group: Members
Posts: 10,331
Joined: 8-March 02
From: north of central europe
Member No.: 2,242



or equip it with a externally accessible off switch.
Go to the top of the page
 
+Quote Post

4 Pages V  « < 2 3 4
Reply to this topicStart new topic

 



RSS Lo-Fi Version Time is now: 10th February 2025 - 05:18 AM

Topps, Inc has sole ownership of the names, logo, artwork, marks, photographs, sounds, audio, video and/or any proprietary material used in connection with the game Shadowrun. Topps, Inc has granted permission to the Dumpshock Forums to use such names, logos, artwork, marks and/or any proprietary materials for promotional and informational purposes on its website but does not endorse, and is not affiliated with the Dumpshock Forums in any official capacity whatsoever.