![]() |
![]() ![]() |
![]() |
![]()
Post
#1
|
|
Moving Target ![]() ![]() Group: Members Posts: 147 Joined: 6-March 10 Member No.: 18,253 ![]() |
If my hacker is posting video on JackPoint, what skills do I need in order to perform a back trace on the comments? If those comments are threatening, what is my dice pool modifier for reporting them to the Cyber Police? What are the consequences, and will they ever be the same?
|
|
|
![]()
Post
#2
|
|
Runner ![]() ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 3,179 Joined: 10-June 10 From: St. Louis, UCAS/CAS Border Member No.: 18,688 ![]() |
Offhand, an Edge roll with a threshold of six to avoid incurring FastJack's wrath. (IMG:style_emoticons/default/nyahnyah.gif)
|
|
|
![]()
Post
#3
|
|
Moving Target ![]() ![]() Group: Members Posts: 172 Joined: 26-July 10 Member No.: 18,852 ![]() |
You can trace them if they did not hack the log and edit it to remove their traces. If you are successful in tracing them back you will only find the location of the node from which they launched their hack. But they could be anywhere in wireless range of that node. The best way to trace them is to do so while they are online.
|
|
|
![]()
Post
#4
|
|
Runner ![]() ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 2,782 Joined: 28-August 09 Member No.: 17,566 ![]() |
Is everyone just forgetting about the first rule of jackpoint?
|
|
|
![]()
Post
#5
|
|
Moving Target ![]() ![]() Group: Members Posts: 195 Joined: 31-January 10 Member No.: 18,100 ![]() |
What's Jackpoint? (IMG:style_emoticons/default/wink.gif)
|
|
|
![]()
Post
#6
|
|
Moving Target ![]() ![]() Group: Members Posts: 558 Joined: 23-June 10 Member No.: 18,749 ![]() |
so far, people are failing to catch on to this meme.
|
|
|
![]()
Post
#7
|
|
Running Target ![]() ![]() ![]() Group: Members Posts: 1,451 Joined: 21-April 03 From: Austin, TX Member No.: 4,488 ![]() |
|
|
|
![]()
Post
#8
|
|
Moving Target ![]() ![]() Group: Members Posts: 147 Joined: 6-March 10 Member No.: 18,253 ![]() |
|
|
|
![]()
Post
#9
|
|
Moving Target ![]() ![]() Group: Members Posts: 155 Joined: 7-July 10 Member No.: 18,799 ![]() |
If my hacker is posting video on JackPoint, what skills do I need in order to perform a back trace on the comments? If those comments are threatening, what is my dice pool modifier for reporting them to the Cyber Police? What are the consequences, and will they ever be the same? I see what you did there. |
|
|
![]() ![]() |
![]() |
Lo-Fi Version | Time is now: 5th July 2025 - 08:18 AM |
Topps, Inc has sole ownership of the names, logo, artwork, marks, photographs, sounds, audio, video and/or any proprietary material used in connection with the game Shadowrun. Topps, Inc has granted permission to the Dumpshock Forums to use such names, logos, artwork, marks and/or any proprietary materials for promotional and informational purposes on its website but does not endorse, and is not affiliated with the Dumpshock Forums in any official capacity whatsoever.