IPB

Welcome Guest ( Log In | Register )

 
Reply to this topicStart new topic
> Multiple users executing trace
galenbd
post Jul 8 2011, 02:00 PM
Post #1


Moving Target
**

Group: Members
Posts: 506
Joined: 5-October 10
Member No.: 19,098



Is it possible for two hackers to individually trace a user, sharing data between them? Would that actually reduce the time?

I've been looking around for this for two days, both in the manuals and here on Dumpshock. I suspect search skilz are weak. If it's documented, a book and page reference would be appreciated.

Galen
Go to the top of the page
 
+Quote Post
Tymeaus Jalynsfe...
post Jul 8 2011, 02:21 PM
Post #2


Prime Runner Ascendant
**********

Group: Members
Posts: 17,568
Joined: 26-March 09
From: Aurora, Colorado
Member No.: 17,022



QUOTE (galenbd @ Jul 8 2011, 08:00 AM) *
Is it possible for two hackers to individually trace a user, sharing data between them? Would that actually reduce the time?

I've been looking around for this for two days, both in the manuals and here on Dumpshock. I suspect search skilz are weak. If it's documented, a book and page reference would be appreciated.

Galen


Use a Teamwork Test... (IMG:style_emoticons/default/smile.gif)
Go to the top of the page
 
+Quote Post
Aria
post Jul 9 2011, 12:11 PM
Post #3


Dragon
********

Group: Dumpshocked
Posts: 4,258
Joined: 9-March 10
From: The Citadel
Member No.: 18,267



In a similar vein, is it possible to preempt a trace attempt (I now spoofing your data trail only works on an active trace...)?

There used to be ways of logging onto the matrix through satellites etc to foil trace attempts but it's a little less cut and dried in a wifi world isn't it? Other than a stealth program can you make it harder to track your icon back to your precious commlink?
Go to the top of the page
 
+Quote Post
Teulisch
post Jul 9 2011, 03:48 PM
Post #4


Moving Target
**

Group: Members
Posts: 565
Joined: 7-January 04
Member No.: 5,965



proxy server, unwired p. 104

with this, they run a trace and then need to find the access log. so you want to have those logs go away as quickly as possible. and you can raise the tracking threshold by 4 for every -1 your willing to take to response.

so if you have 3 proxy servers, you set it to look like your hacking from location X, and route through Y and Z. your at -2 response, +8 threshold to be tracked, and once they find you they still need an access log. you could simply not have such data recorded, or plant false logs to direct them somewhere else entirely. it can be very difficult to trace a hacker who knows what hes doing.
Go to the top of the page
 
+Quote Post
Summerstorm
post Jul 10 2011, 04:14 AM
Post #5


Running Target
***

Group: Members
Posts: 1,000
Joined: 30-May 09
From: Germany
Member No.: 17,225



Also "Satellite Link". I think same page... or in the vicinity at least. It has a MASSIVE drawback on speed. (Was it half response or something...?)

There are two levels, one is the fast low-orbit satellite (not much response loss. but only available for 30 minutes and has a locating window of a few kilometers.

And the other is just straight up orbital: You can't be located for sure, because you could be in a HUGE area.
Go to the top of the page
 
+Quote Post

Reply to this topicStart new topic

 



RSS Lo-Fi Version Time is now: 29th April 2024 - 09:08 AM

Topps, Inc has sole ownership of the names, logo, artwork, marks, photographs, sounds, audio, video and/or any proprietary material used in connection with the game Shadowrun. Topps, Inc has granted permission to the Dumpshock Forums to use such names, logos, artwork, marks and/or any proprietary materials for promotional and informational purposes on its website but does not endorse, and is not affiliated with the Dumpshock Forums in any official capacity whatsoever.