IPB

Welcome Guest ( Log In | Register )

2 Pages V  < 1 2  
Reply to this topicStart new topic
> Matrix Rule Clarifications
Mardrax
post Dec 28 2010, 11:30 PM
Post #26


Running Target
***

Group: Members
Posts: 1,083
Joined: 13-December 10
From: Rotterdam, The Netherlands
Member No.: 19,228



Analyse is software, and hence unable to make calls of the 'dodgy' neomer.
It analyses something running Stealth, and based on the test outcome, reports wether or not the icon in question is doing something it shouldn't, based on user access rights, or lack thereof.

Infrastructure in place on a system is there to be used, and said use by authorised parties shouldn't be suspect -or objected to by Analyse, by default- unless a spider would specifically want that infrastructure watched, which would make it bait.

I tend to see Stealth as a way to make use of Analyse's scanning priority algorythm. Stack the office full of christmas trees with blinking lights, and chances are you won't see the man behind. Without him acting suspicious to avoid notice.
Go to the top of the page
 
+Quote Post
Saint Sithney
post Dec 28 2010, 11:36 PM
Post #27


Runner
******

Group: Members
Posts: 2,705
Joined: 5-October 09
From: You are in a clearing
Member No.: 17,722



This is software that occasionally breaks and becomes sentient enough to pass a Turing test.

I think you underestimate it.
Go to the top of the page
 
+Quote Post
DMiller
post Dec 29 2010, 01:21 AM
Post #28


Moving Target
**

Group: Dumpshocked
Posts: 681
Joined: 23-March 10
From: Japan
Member No.: 18,343



Thanks all, this is insightful.

I’ve always seen the Stealth Program to be the same for the Matrix as the Infiltration Skill in the meat-space. I do believe that the books support this view. That’s why I made the reference I did about a legit account not running Stealth.

However I can see both sides of the possible operations.

Again thanks all for the input.

-D
Go to the top of the page
 
+Quote Post
MikeKozar
post Jan 2 2011, 12:29 AM
Post #29


Moving Target
**

Group: Members
Posts: 557
Joined: 26-July 09
From: Kent, WA
Member No.: 17,426



I think I really like the idea of being stealthy or being legit as alternate modes of operation. It rewards the sort of legwork that Probing a Target is supposed to indicate, and makes it riskier to go hot.

To justify this, I might claim that if Analyse detects a user with malware, viruses, or exploitive hacker-softs loaded, the system security policy is to treat it as a compromised account. Obviously getting the list of running programs would involve beating the Stealth, but if the defender first beats the hacker's Stealth and then realizes that the persona is running Stealth, alarms might go off. Ditto if the persona has a running Attack program.

It's analogous to a 2011 sysadmin noticing BitTorrent traffic on a user's node. The user might be entirely legit and updating legal software, but company policy is to assume he has been rootkitted by pirates and is racking up lawsuits. Paranoia is a legitimate business plan, doubly so in 2074.

Speaking of which, Happy New Year, Dumpshock!
Go to the top of the page
 
+Quote Post
Draco18s
post Jan 2 2011, 12:44 AM
Post #30


Immortal Elf
**********

Group: Members
Posts: 10,289
Joined: 2-October 08
Member No.: 16,392



Just FYI: it takes an action for a spider/IC to run Analyze on a icon to figure out what programs its running.
(By RAW I believe it is 1 action to identify how many, then 1 action per each program to determine the program name/type).
Go to the top of the page
 
+Quote Post
MikeKozar
post Jan 2 2011, 01:00 AM
Post #31


Moving Target
**

Group: Members
Posts: 557
Joined: 26-July 09
From: Kent, WA
Member No.: 17,426



QUOTE (Draco18s @ Jan 1 2011, 04:44 PM) *
Just FYI: it takes an action for a spider/IC to run Analyze on a icon to figure out what programs its running.
(By RAW I believe it is 1 action to identify how many, then 1 action per each program to determine the program name/type).


It looks like you can get more information with more hits on the Matrix Perception test, but it's unclear how many is needed to uncover the info. I'm guessing I would have the Analyze accumulate hits, as follows:

1) Persona identified.
2) Running programs catalogued
3) Checking program for malware
4) Checking next program...

...so a hacker with multiple running programs, one of which is banned by system policy, would trigger an alert when the Analyse had accumulated 3-7 hits. This puts a lot of pressure on the hacker, but gives time to mess around before the system catches on.
Go to the top of the page
 
+Quote Post
Udoshi
post Jan 2 2011, 02:18 AM
Post #32


Runner
******

Group: Members
Posts: 2,782
Joined: 28-August 09
Member No.: 17,566



QUOTE (Draco18s @ Jan 1 2011, 05:44 PM) *
Just FYI: it takes an action for a spider/IC to run Analyze on a icon to figure out what programs its running.
(By RAW I believe it is 1 action to identify how many, then 1 action per each program to determine the program name/type).


Thats actually not strictly true. All analyzers have Automatic mode, which rolls your analyze score against every icon it can render.

Its a simple action to toggle it on and off, but that goes down to a Free(changed linked device mode) with DNI input. 4a 228 for details.

At least in my games, its the reason that hacking nodes with active IC patrols is a bad idea - every time you do something, all running analyzers get a chance to see past your stealth. I assume that all analyzers run in automatic, unless a user needs to look at something specific.


I mean, when you think about it, having the Analyze Icon action as the -sole- way to spot something is stupid. If it were so, even casual use of the matrix would be retarted.
'I want to check my mail!
'I analyze the login page. Then the username prompt. Then the password field. A free action to Transmit Data for my login details. Oh, now i have to spend a simple action to Log On. Now I can data search for my new mail, since its on a Specific System, thats a complex action... '
No, fuck that. Automatic rendering with Analyze programs makes so much more sense.

Go to the top of the page
 
+Quote Post

2 Pages V  < 1 2
Reply to this topicStart new topic

 



RSS Lo-Fi Version Time is now: 23rd April 2026 - 06:31 AM

Topps, Inc has sole ownership of the names, logo, artwork, marks, photographs, sounds, audio, video and/or any proprietary material used in connection with the game Shadowrun. Topps, Inc has granted permission to the Dumpshock Forums to use such names, logos, artwork, marks and/or any proprietary materials for promotional and informational purposes on its website but does not endorse, and is not affiliated with the Dumpshock Forums in any official capacity whatsoever.