My Assistant
![]() ![]() |
Jul 19 2011, 11:08 PM
Post
#76
|
|
|
Running Target ![]() ![]() ![]() Group: Members Posts: 1,190 Joined: 31-May 09 From: London, UK Member No.: 17,229 |
I can see your point, but if such a functionality is required:
1) there is no reason to link it with modes. Active, Passive and Hidden are privacy settings. What happens in case of network threat in a high-security area? You switch to Passive and get arrested for not broadcasting your SIN? 2) it has to be automated. You are talking about a handful of geeks duct-taping the net by hand in heroic times. The Matrix is a world-wide network connecting billions of users. It might be a bit optimistic to trust the users to detect when something is going wrong and decide to switch to Passive. Routers themselves would be concerned too, and they do not have a user to tell them to switch modes. 3) it has to be dynamic. If your example was transposed into the Matrix, switching to Passive would not have helped at all because the failure came from one of the trusted nodes, so it would have been in all the white lists. The key was to identify the threat and remove it from the routing tables. The typical Matrix user would just have been helpless. 4) such network-wide threats do not exist per RAW. There are a lot of possible attacks on nodes but no way to mess with the mesh itself, apart from area jamming. Nodes can be taken down, the mesh cannot. MSPs do provide access points, but those have no effect in game: everyone enjoys the same matrix connectivity whether they have an MSP or not (in urban areas at least). If the mesh structure was less dense with dedicated routers, then it should be possible to isolate any area by attacking its routers. Botnets provide the power to attack multiple targets at once. |
|
|
|
Jul 20 2011, 02:34 AM
Post
#77
|
|
|
Runner ![]() ![]() ![]() ![]() ![]() ![]() Group: Dumpshocked Posts: 2,946 Joined: 1-June 09 From: Omaha Member No.: 17,234 |
I think a more productive item at this point would be splitting a thread on what service to MSP's actually provide.
|
|
|
|
Jul 20 2011, 02:42 AM
Post
#78
|
|
|
Advocatus Diaboli ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 13,994 Joined: 20-November 07 From: USA Member No.: 14,282 |
Why? It's in the book. They provide email addresses, cloud storage, cruddy programs. The're Google.
|
|
|
|
Jul 20 2011, 02:57 AM
Post
#79
|
|
|
Runner ![]() ![]() ![]() ![]() ![]() ![]() Group: Dumpshocked Posts: 2,946 Joined: 1-June 09 From: Omaha Member No.: 17,234 |
I guess because even though I know it's not realistic a part of my mind just rebels at the thought of how the SR4 matrix system works without making runners (and everyoen else) basicly traceable all the time. Just the simple act of making sure you can receive phone calls would make you trace bait.
|
|
|
|
Jul 20 2011, 03:00 AM
Post
#80
|
|
|
Advocatus Diaboli ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 13,994 Joined: 20-November 07 From: USA Member No.: 14,282 |
That's in the books, too. You don't need an MSP at all, nor the convenient commcodes they do provide. Also, there are shadow MSPs and disposable commcodes.
|
|
|
|
Jul 20 2011, 03:30 AM
Post
#81
|
|
|
Man Behind the Curtain ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Group: Admin Posts: 14,868 Joined: 2-July 89 From: End of the Yellow-Brick Road Member No.: 3 |
Just the simple act of making sure you can receive phone calls would make you trace bait. This was the second part of my thinking that brought up the whole hidden nodes are not connected to the matrix. Once your go passive, triangulation from towers should be able to lock down your position pretty tightly. This brings me back to the repeater drone I had posed some questions about several weeks ago.Also, there are shadow MSPs and disposable commcodes. This solves one of the big corps being able to directly get you, as long as the shadow MSP you use isn't actually owned by the corp you're running against once all the shell companies are squeezed out of the middle. Ah... the possibilities for corporate subterfuge are endless to the devious GM.. (IMG:style_emoticons/default/spin.gif)
|
|
|
|
Jul 20 2011, 03:37 AM
Post
#82
|
|
|
Advocatus Diaboli ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 13,994 Joined: 20-November 07 From: USA Member No.: 14,282 |
And that's the fun of Shadowrun. (IMG:style_emoticons/default/smile.gif)
|
|
|
|
Jul 20 2011, 10:22 AM
Post
#83
|
|
|
Running Target ![]() ![]() ![]() Group: Members Posts: 1,190 Joined: 31-May 09 From: London, UK Member No.: 17,229 |
I guess because even though I know it's not realistic a part of my mind just rebels at the thought of how the SR4 matrix system works without making runners (and everyoen else) basicly traceable all the time. Just the simple act of making sure you can receive phone calls would make you trace bait. Maybe there are no routing tables and routes are always computed on the fly? It could make sense: given the dynamic structure of the mesh, routes should not last long, so better not bother until you actually need them. So no one makes sure that you can receive calls until someone tries to call you. But that does not change much: someone who wants to track you just has to send you a message and follow the route it takes. |
|
|
|
Jul 20 2011, 12:35 PM
Post
#84
|
|
|
Running Target ![]() ![]() ![]() Group: Members Posts: 1,272 Joined: 22-June 10 From: Omaha. NE Member No.: 18,746 |
While I see runners as being traceable, I see the issue being, "Which one of the billions(?) of commlinks on the mesh do we trace?".
Personal setup I'm sure the GM will grill me on sometime in the home campaign: Mr. Johnson gets the disposable commlink if he wants to leave messages. That commlink is left off except when I want to check messages. When the job is done, the commlink gets burned. Yes, it's traceable, but not easily and only during the job and only if Mr. Johnson says he needs a way to contact us in-mission. Fake ID commlink. The commlink that says, "Yes, I'm Emmanuel Goldstein". Active in active areas, passive in passive areas unless I'm building more fake id data, off on a run, nothing unusual except a decent firewall. Yes, it's traceable, but if they're trying to trace Emmanuel Goldstein, I've already screwed up horribly. The Job Commlink. The one running the tacsoft, the hacker software, etc. Hidden constantly. The bad news is that there's this expectation that fixers can call me 24/7 and they might as well use this phone since it's the one my PAN is on. If this is the one being traced then I've screwed up on-the-job. Assumptions: 1) This isn't Missions where Mr Johnson and his daughter and the people you're running away from all get your commlink number by fiat. 2) There's a messaging service. If Mr. Johnson needs to be able to contact me live 24/7 we'll as a group talk about opsec and comfort levels and how much we trust Mr. Johnson. 3) The firewall on the Job Commlink is already doing stuff to make this commlink as untraceable as possible and swapping out hardware and giving fixers a new number every week isn't worth it. If I should have a fixer only commlink, I'm cool with that and can make the investment. Every way I work it, the fixer's need to contact my job persona seems to be the hole in the defense. |
|
|
|
Jul 20 2011, 12:52 PM
Post
#85
|
|
|
Man Behind the Curtain ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Group: Admin Posts: 14,868 Joined: 2-July 89 From: End of the Yellow-Brick Road Member No.: 3 |
The firewall is doing stuff to protect the com, not make it un-traceable.
That said, I think this goes to the conversation about what does an MSP do for you (re:messaging service)? MSPs, legit or shadow, can offer drop boxes for messages, etc. From your single com, you have accounts with a dozen MSPs, each one with a separate *identity*. You fixer contacts you via your account with MSP #1, Mom & family via MSP#2, your street contact via MSP#3, etc. I agree that only in the most extreme circumstances is someone going to try to track you down to your com via your connections to the matrix and even then 99.9999% will simply not be able to do it. As a counter to that, I see another service provided by shadow MSPs is to proxy your calls so that in the example above, if your fixed had the connections and inclination to burn you, his trace leads to a node in Paris, France despite the fact you are sitting 3 blocks down the street from him. |
|
|
|
Jul 20 2011, 01:08 PM
Post
#86
|
|
|
Running Target ![]() ![]() ![]() Group: Members Posts: 1,083 Joined: 13-December 10 From: Rotterdam, The Netherlands Member No.: 19,228 |
Proxy services are a separate service from MSPs, as detailed in Unwired.
|
|
|
|
Jul 20 2011, 01:22 PM
Post
#87
|
|
|
Runner ![]() ![]() ![]() ![]() ![]() ![]() Group: Dumpshocked Posts: 2,946 Joined: 1-June 09 From: Omaha Member No.: 17,234 |
I think the one thing people are failing to connect on here is in this setting hacking is explicitly possible. If i get someones comcode I just start hacking the MSP's. How hard that is likely depends on your GM but I have a really hard time envisioning most individual MSP nodes higher then a 6, eight at the highest so it's just a matter of time and trouble to breach a runners MSP network once you get their comcode
Personally because as a player I'm very interested in Hackers/technos in games information security starts to come up a lot. Now there are certain playability changes that needs to be made, the threshold 15 to find all hidden nodes kinda needs to be modified, but other then that I think there is a fun aspect of the game to explore there. |
|
|
|
Jul 20 2011, 01:43 PM
Post
#88
|
|
|
Advocatus Diaboli ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 13,994 Joined: 20-November 07 From: USA Member No.: 14,282 |
But, again, commcodes aren't a requirement. That's just another part of the fun (really!) quagmire of the matrix.
|
|
|
|
Jul 20 2011, 01:48 PM
Post
#89
|
|
|
Runner ![]() ![]() ![]() ![]() ![]() ![]() Group: Dumpshocked Posts: 2,946 Joined: 1-June 09 From: Omaha Member No.: 17,234 |
True, the same could be said for access ID, if someone pulls the access ID on your device while your sitting at a cafe they can essentially track you physically until you change ID's.
|
|
|
|
Jul 20 2011, 01:52 PM
Post
#90
|
|
|
Man Behind the Curtain ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Group: Admin Posts: 14,868 Joined: 2-July 89 From: End of the Yellow-Brick Road Member No.: 3 |
Proxy services are a separate service from MSPs, as detailed in Unwired. But it is a service that could/can be provided by a shadow MSP.I think the one thing people are failing to connect on here is in this setting hacking is explicitly possible. Agreed. Kind of like the real world: You can have the best security in the world, be a security consultant to the NSA and have a group of hackers post your email and source code all over the Internet.. Then months later, the FBI raids members of that same hacking group.
|
|
|
|
Jul 20 2011, 01:56 PM
Post
#91
|
|
|
Running Target ![]() ![]() ![]() Group: Members Posts: 1,190 Joined: 31-May 09 From: London, UK Member No.: 17,229 |
I think the one thing people are failing to connect on here is in this setting hacking is explicitly possible. If i get someones comcode I just start hacking the MSP's. How hard that is likely depends on your GM but I have a really hard time envisioning most individual MSP nodes higher then a 6, eight at the highest so it's just a matter of time and trouble to breach a runners MSP network once you get their comcode Assuming you run the kind of setup suoq described, if they got your comcode, then they got your fixer. Hacking the MSP might then not be easier than just setting a trap appointment in the meat or in the matrix. |
|
|
|
Jul 20 2011, 02:56 PM
Post
#92
|
|
|
Running Target ![]() ![]() ![]() Group: Members Posts: 1,083 Joined: 13-December 10 From: Rotterdam, The Netherlands Member No.: 19,228 |
I'd think them getting your primary comcode would lead to more anguish than being physically trackable. I'd start worrying about how much of your conversations, or at least call history, they've logged. Not to mention e-mail and whatnot.
|
|
|
|
Jul 20 2011, 03:03 PM
Post
#93
|
|
|
Man Behind the Curtain ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Group: Admin Posts: 14,868 Joined: 2-July 89 From: End of the Yellow-Brick Road Member No.: 3 |
I'd think them getting your primary comcode would lead to more anguish than being physically trackable. I'd start worrying about how much of your conversations, or at least call history, they've logged. Not to mention e-mail and whatnot. Last time my table-top group played, one of the players got their com hacked. She was on team net. The team found out after the hacker decided to try and take over the rigger's com, but tripped the firewall. Needless to say, they had been wondering how the bad guys had been one step ahead of them... Sadly for them, the opposition had already traced them to their safehouse. Pretty easy when you can access the GPS on the com. Everyone upgraded firewalls and analyze programs after that run. |
|
|
|
Jul 20 2011, 03:49 PM
Post
#94
|
|
|
Runner ![]() ![]() ![]() ![]() ![]() ![]() Group: Dumpshocked Posts: 2,946 Joined: 1-June 09 From: Omaha Member No.: 17,234 |
I'm trying to nudge my team towards the line of thought that the hackers role in protecting the teams data is just as important (or at least as worthy of a little forethought) as the sam's and the mages in protecting their meat and their spirit. I'm going to houserule a few things to make it easier but i think it will improve the game. Should in theory make the ahcker more able to umbrella protect a team slaved up to him/her.
|
|
|
|
Jul 20 2011, 04:22 PM
Post
#95
|
|
|
Man Behind the Curtain ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Group: Admin Posts: 14,868 Joined: 2-July 89 From: End of the Yellow-Brick Road Member No.: 3 |
The hacker realized that he fell down on the job and the team (playfully) let him know it.
|
|
|
|
Jul 20 2011, 06:04 PM
Post
#96
|
|
|
Prime Runner Ascendant ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 17,568 Joined: 26-March 09 From: Aurora, Colorado Member No.: 17,022 |
Personally because as a player I'm very interested in Hackers/technos in games information security starts to come up a lot. Now there are certain playability changes that needs to be made, the threshold 15 to find all hidden nodes kinda needs to be modified, but other then that I think there is a fun aspect of the game to explore there. Never forget that the Threshold STARTS at 15, it doesn't end there. (IMG:style_emoticons/default/smokin.gif) |
|
|
|
![]() ![]() |
|
Lo-Fi Version | Time is now: 12th April 2022 - 05:54 AM |
Topps, Inc has sole ownership of the names, logo, artwork, marks, photographs, sounds, audio, video and/or any proprietary material used in connection with the game Shadowrun. Topps, Inc has granted permission to the Dumpshock Forums to use such names, logos, artwork, marks and/or any proprietary materials for promotional and informational purposes on its website but does not endorse, and is not affiliated with the Dumpshock Forums in any official capacity whatsoever.