Multiple users executing trace |
Multiple users executing trace |
Jul 8 2011, 02:00 PM
Post
#1
|
|
Moving Target Group: Members Posts: 506 Joined: 5-October 10 Member No.: 19,098 |
Is it possible for two hackers to individually trace a user, sharing data between them? Would that actually reduce the time?
I've been looking around for this for two days, both in the manuals and here on Dumpshock. I suspect search skilz are weak. If it's documented, a book and page reference would be appreciated. Galen |
|
|
Jul 8 2011, 02:21 PM
Post
#2
|
|
Prime Runner Ascendant Group: Members Posts: 17,568 Joined: 26-March 09 From: Aurora, Colorado Member No.: 17,022 |
Is it possible for two hackers to individually trace a user, sharing data between them? Would that actually reduce the time? I've been looking around for this for two days, both in the manuals and here on Dumpshock. I suspect search skilz are weak. If it's documented, a book and page reference would be appreciated. Galen Use a Teamwork Test... (IMG:style_emoticons/default/smile.gif) |
|
|
Jul 9 2011, 12:11 PM
Post
#3
|
|
Dragon Group: Dumpshocked Posts: 4,258 Joined: 9-March 10 From: The Citadel Member No.: 18,267 |
In a similar vein, is it possible to preempt a trace attempt (I now spoofing your data trail only works on an active trace...)?
There used to be ways of logging onto the matrix through satellites etc to foil trace attempts but it's a little less cut and dried in a wifi world isn't it? Other than a stealth program can you make it harder to track your icon back to your precious commlink? |
|
|
Jul 9 2011, 03:48 PM
Post
#4
|
|
Moving Target Group: Members Posts: 565 Joined: 7-January 04 Member No.: 5,965 |
proxy server, unwired p. 104
with this, they run a trace and then need to find the access log. so you want to have those logs go away as quickly as possible. and you can raise the tracking threshold by 4 for every -1 your willing to take to response. so if you have 3 proxy servers, you set it to look like your hacking from location X, and route through Y and Z. your at -2 response, +8 threshold to be tracked, and once they find you they still need an access log. you could simply not have such data recorded, or plant false logs to direct them somewhere else entirely. it can be very difficult to trace a hacker who knows what hes doing. |
|
|
Jul 10 2011, 04:14 AM
Post
#5
|
|
Running Target Group: Members Posts: 1,000 Joined: 30-May 09 From: Germany Member No.: 17,225 |
Also "Satellite Link". I think same page... or in the vicinity at least. It has a MASSIVE drawback on speed. (Was it half response or something...?)
There are two levels, one is the fast low-orbit satellite (not much response loss. but only available for 30 minutes and has a locating window of a few kilometers. And the other is just straight up orbital: You can't be located for sure, because you could be in a HUGE area. |
|
|
Lo-Fi Version | Time is now: 21st December 2024 - 06:53 PM |
Topps, Inc has sole ownership of the names, logo, artwork, marks, photographs, sounds, audio, video and/or any proprietary material used in connection with the game Shadowrun. Topps, Inc has granted permission to the Dumpshock Forums to use such names, logos, artwork, marks and/or any proprietary materials for promotional and informational purposes on its website but does not endorse, and is not affiliated with the Dumpshock Forums in any official capacity whatsoever.