IPB
X   Site Message
(Message will auto close in 2 seconds)

Welcome Guest ( Log In | Register )

4 Pages V  « < 2 3 4  
Reply to this topicStart new topic
> Comlink modes and AR, You want rich AR, you have to be in Active Mode
Traul
post Jul 19 2011, 11:08 PM
Post #76


Running Target
***

Group: Members
Posts: 1,190
Joined: 31-May 09
From: London, UK
Member No.: 17,229



I can see your point, but if such a functionality is required:

1) there is no reason to link it with modes. Active, Passive and Hidden are privacy settings. What happens in case of network threat in a high-security area? You switch to Passive and get arrested for not broadcasting your SIN?

2) it has to be automated. You are talking about a handful of geeks duct-taping the net by hand in heroic times. The Matrix is a world-wide network connecting billions of users. It might be a bit optimistic to trust the users to detect when something is going wrong and decide to switch to Passive. Routers themselves would be concerned too, and they do not have a user to tell them to switch modes.

3) it has to be dynamic. If your example was transposed into the Matrix, switching to Passive would not have helped at all because the failure came from one of the trusted nodes, so it would have been in all the white lists. The key was to identify the threat and remove it from the routing tables. The typical Matrix user would just have been helpless.

4) such network-wide threats do not exist per RAW. There are a lot of possible attacks on nodes but no way to mess with the mesh itself, apart from area jamming. Nodes can be taken down, the mesh cannot. MSPs do provide access points, but those have no effect in game: everyone enjoys the same matrix connectivity whether they have an MSP or not (in urban areas at least). If the mesh structure was less dense with dedicated routers, then it should be possible to isolate any area by attacking its routers. Botnets provide the power to attack multiple targets at once.
Go to the top of the page
 
+Quote Post
LurkerOutThere
post Jul 20 2011, 02:34 AM
Post #77


Runner
******

Group: Dumpshocked
Posts: 2,946
Joined: 1-June 09
From: Omaha
Member No.: 17,234



I think a more productive item at this point would be splitting a thread on what service to MSP's actually provide.
Go to the top of the page
 
+Quote Post
Yerameyahu
post Jul 20 2011, 02:42 AM
Post #78


Advocatus Diaboli
**********

Group: Members
Posts: 13,994
Joined: 20-November 07
From: USA
Member No.: 14,282



Why? It's in the book. They provide email addresses, cloud storage, cruddy programs. The're Google.
Go to the top of the page
 
+Quote Post
LurkerOutThere
post Jul 20 2011, 02:57 AM
Post #79


Runner
******

Group: Dumpshocked
Posts: 2,946
Joined: 1-June 09
From: Omaha
Member No.: 17,234



I guess because even though I know it's not realistic a part of my mind just rebels at the thought of how the SR4 matrix system works without making runners (and everyoen else) basicly traceable all the time. Just the simple act of making sure you can receive phone calls would make you trace bait.
Go to the top of the page
 
+Quote Post
Yerameyahu
post Jul 20 2011, 03:00 AM
Post #80


Advocatus Diaboli
**********

Group: Members
Posts: 13,994
Joined: 20-November 07
From: USA
Member No.: 14,282



That's in the books, too. You don't need an MSP at all, nor the convenient commcodes they do provide. Also, there are shadow MSPs and disposable commcodes.
Go to the top of the page
 
+Quote Post
Redjack
post Jul 20 2011, 03:30 AM
Post #81


Man Behind the Curtain
**********

Group: Admin
Posts: 14,868
Joined: 2-July 89
From: End of the Yellow-Brick Road
Member No.: 3



QUOTE (LurkerOutThere @ Jul 19 2011, 09:57 PM) *
Just the simple act of making sure you can receive phone calls would make you trace bait.
This was the second part of my thinking that brought up the whole hidden nodes are not connected to the matrix. Once your go passive, triangulation from towers should be able to lock down your position pretty tightly. This brings me back to the repeater drone I had posed some questions about several weeks ago.

QUOTE (Yerameyahu @ Jul 19 2011, 10:00 PM) *
Also, there are shadow MSPs and disposable commcodes.
This solves one of the big corps being able to directly get you, as long as the shadow MSP you use isn't actually owned by the corp you're running against once all the shell companies are squeezed out of the middle. Ah... the possibilities for corporate subterfuge are endless to the devious GM.. (IMG:style_emoticons/default/spin.gif)
Go to the top of the page
 
+Quote Post
Yerameyahu
post Jul 20 2011, 03:37 AM
Post #82


Advocatus Diaboli
**********

Group: Members
Posts: 13,994
Joined: 20-November 07
From: USA
Member No.: 14,282



And that's the fun of Shadowrun. (IMG:style_emoticons/default/smile.gif)
Go to the top of the page
 
+Quote Post
Traul
post Jul 20 2011, 10:22 AM
Post #83


Running Target
***

Group: Members
Posts: 1,190
Joined: 31-May 09
From: London, UK
Member No.: 17,229



QUOTE (LurkerOutThere @ Jul 20 2011, 03:57 AM) *
I guess because even though I know it's not realistic a part of my mind just rebels at the thought of how the SR4 matrix system works without making runners (and everyoen else) basicly traceable all the time. Just the simple act of making sure you can receive phone calls would make you trace bait.

Maybe there are no routing tables and routes are always computed on the fly? It could make sense: given the dynamic structure of the mesh, routes should not last long, so better not bother until you actually need them. So no one makes sure that you can receive calls until someone tries to call you. But that does not change much: someone who wants to track you just has to send you a message and follow the route it takes.
Go to the top of the page
 
+Quote Post
suoq
post Jul 20 2011, 12:35 PM
Post #84


Running Target
***

Group: Members
Posts: 1,272
Joined: 22-June 10
From: Omaha. NE
Member No.: 18,746



While I see runners as being traceable, I see the issue being, "Which one of the billions(?) of commlinks on the mesh do we trace?".

Personal setup I'm sure the GM will grill me on sometime in the home campaign:
Mr. Johnson gets the disposable commlink if he wants to leave messages. That commlink is left off except when I want to check messages. When the job is done, the commlink gets burned. Yes, it's traceable, but not easily and only during the job and only if Mr. Johnson says he needs a way to contact us in-mission.

Fake ID commlink. The commlink that says, "Yes, I'm Emmanuel Goldstein". Active in active areas, passive in passive areas unless I'm building more fake id data, off on a run, nothing unusual except a decent firewall. Yes, it's traceable, but if they're trying to trace Emmanuel Goldstein, I've already screwed up horribly.

The Job Commlink. The one running the tacsoft, the hacker software, etc. Hidden constantly. The bad news is that there's this expectation that fixers can call me 24/7 and they might as well use this phone since it's the one my PAN is on. If this is the one being traced then I've screwed up on-the-job.

Assumptions:
1) This isn't Missions where Mr Johnson and his daughter and the people you're running away from all get your commlink number by fiat.
2) There's a messaging service. If Mr. Johnson needs to be able to contact me live 24/7 we'll as a group talk about opsec and comfort levels and how much we trust Mr. Johnson.
3) The firewall on the Job Commlink is already doing stuff to make this commlink as untraceable as possible and swapping out hardware and giving fixers a new number every week isn't worth it. If I should have a fixer only commlink, I'm cool with that and can make the investment. Every way I work it, the fixer's need to contact my job persona seems to be the hole in the defense.
Go to the top of the page
 
+Quote Post
Redjack
post Jul 20 2011, 12:52 PM
Post #85


Man Behind the Curtain
**********

Group: Admin
Posts: 14,868
Joined: 2-July 89
From: End of the Yellow-Brick Road
Member No.: 3



The firewall is doing stuff to protect the com, not make it un-traceable.

That said, I think this goes to the conversation about what does an MSP do for you (re:messaging service)? MSPs, legit or shadow, can offer drop boxes for messages, etc. From your single com, you have accounts with a dozen MSPs, each one with a separate *identity*. You fixer contacts you via your account with MSP #1, Mom & family via MSP#2, your street contact via MSP#3, etc.

I agree that only in the most extreme circumstances is someone going to try to track you down to your com via your connections to the matrix and even then 99.9999% will simply not be able to do it. As a counter to that, I see another service provided by shadow MSPs is to proxy your calls so that in the example above, if your fixed had the connections and inclination to burn you, his trace leads to a node in Paris, France despite the fact you are sitting 3 blocks down the street from him.
Go to the top of the page
 
+Quote Post
Mardrax
post Jul 20 2011, 01:08 PM
Post #86


Running Target
***

Group: Members
Posts: 1,083
Joined: 13-December 10
From: Rotterdam, The Netherlands
Member No.: 19,228



Proxy services are a separate service from MSPs, as detailed in Unwired.
Go to the top of the page
 
+Quote Post
LurkerOutThere
post Jul 20 2011, 01:22 PM
Post #87


Runner
******

Group: Dumpshocked
Posts: 2,946
Joined: 1-June 09
From: Omaha
Member No.: 17,234



I think the one thing people are failing to connect on here is in this setting hacking is explicitly possible. If i get someones comcode I just start hacking the MSP's. How hard that is likely depends on your GM but I have a really hard time envisioning most individual MSP nodes higher then a 6, eight at the highest so it's just a matter of time and trouble to breach a runners MSP network once you get their comcode

Personally because as a player I'm very interested in Hackers/technos in games information security starts to come up a lot. Now there are certain playability changes that needs to be made, the threshold 15 to find all hidden nodes kinda needs to be modified, but other then that I think there is a fun aspect of the game to explore there.
Go to the top of the page
 
+Quote Post
Yerameyahu
post Jul 20 2011, 01:43 PM
Post #88


Advocatus Diaboli
**********

Group: Members
Posts: 13,994
Joined: 20-November 07
From: USA
Member No.: 14,282



But, again, commcodes aren't a requirement. That's just another part of the fun (really!) quagmire of the matrix.
Go to the top of the page
 
+Quote Post
LurkerOutThere
post Jul 20 2011, 01:48 PM
Post #89


Runner
******

Group: Dumpshocked
Posts: 2,946
Joined: 1-June 09
From: Omaha
Member No.: 17,234



True, the same could be said for access ID, if someone pulls the access ID on your device while your sitting at a cafe they can essentially track you physically until you change ID's.
Go to the top of the page
 
+Quote Post
Redjack
post Jul 20 2011, 01:52 PM
Post #90


Man Behind the Curtain
**********

Group: Admin
Posts: 14,868
Joined: 2-July 89
From: End of the Yellow-Brick Road
Member No.: 3



QUOTE (Mardrax @ Jul 20 2011, 08:08 AM) *
Proxy services are a separate service from MSPs, as detailed in Unwired.
But it is a service that could/can be provided by a shadow MSP.

QUOTE (LurkerOutThere @ Jul 20 2011, 08:22 AM) *
I think the one thing people are failing to connect on here is in this setting hacking is explicitly possible.
Agreed. Kind of like the real world: You can have the best security in the world, be a security consultant to the NSA and have a group of hackers post your email and source code all over the Internet.. Then months later, the FBI raids members of that same hacking group.
Go to the top of the page
 
+Quote Post
Traul
post Jul 20 2011, 01:56 PM
Post #91


Running Target
***

Group: Members
Posts: 1,190
Joined: 31-May 09
From: London, UK
Member No.: 17,229



QUOTE (LurkerOutThere @ Jul 20 2011, 02:22 PM) *
I think the one thing people are failing to connect on here is in this setting hacking is explicitly possible. If i get someones comcode I just start hacking the MSP's. How hard that is likely depends on your GM but I have a really hard time envisioning most individual MSP nodes higher then a 6, eight at the highest so it's just a matter of time and trouble to breach a runners MSP network once you get their comcode

Assuming you run the kind of setup suoq described, if they got your comcode, then they got your fixer. Hacking the MSP might then not be easier than just setting a trap appointment in the meat or in the matrix.
Go to the top of the page
 
+Quote Post
Mardrax
post Jul 20 2011, 02:56 PM
Post #92


Running Target
***

Group: Members
Posts: 1,083
Joined: 13-December 10
From: Rotterdam, The Netherlands
Member No.: 19,228



I'd think them getting your primary comcode would lead to more anguish than being physically trackable. I'd start worrying about how much of your conversations, or at least call history, they've logged. Not to mention e-mail and whatnot.
Go to the top of the page
 
+Quote Post
Redjack
post Jul 20 2011, 03:03 PM
Post #93


Man Behind the Curtain
**********

Group: Admin
Posts: 14,868
Joined: 2-July 89
From: End of the Yellow-Brick Road
Member No.: 3



QUOTE (Mardrax @ Jul 20 2011, 09:56 AM) *
I'd think them getting your primary comcode would lead to more anguish than being physically trackable. I'd start worrying about how much of your conversations, or at least call history, they've logged. Not to mention e-mail and whatnot.
Last time my table-top group played, one of the players got their com hacked. She was on team net. The team found out after the hacker decided to try and take over the rigger's com, but tripped the firewall. Needless to say, they had been wondering how the bad guys had been one step ahead of them... Sadly for them, the opposition had already traced them to their safehouse. Pretty easy when you can access the GPS on the com. Everyone upgraded firewalls and analyze programs after that run.
Go to the top of the page
 
+Quote Post
LurkerOutThere
post Jul 20 2011, 03:49 PM
Post #94


Runner
******

Group: Dumpshocked
Posts: 2,946
Joined: 1-June 09
From: Omaha
Member No.: 17,234



I'm trying to nudge my team towards the line of thought that the hackers role in protecting the teams data is just as important (or at least as worthy of a little forethought) as the sam's and the mages in protecting their meat and their spirit. I'm going to houserule a few things to make it easier but i think it will improve the game. Should in theory make the ahcker more able to umbrella protect a team slaved up to him/her.
Go to the top of the page
 
+Quote Post
Redjack
post Jul 20 2011, 04:22 PM
Post #95


Man Behind the Curtain
**********

Group: Admin
Posts: 14,868
Joined: 2-July 89
From: End of the Yellow-Brick Road
Member No.: 3



The hacker realized that he fell down on the job and the team (playfully) let him know it.
Go to the top of the page
 
+Quote Post
Tymeaus Jalynsfe...
post Jul 20 2011, 06:04 PM
Post #96


Prime Runner Ascendant
**********

Group: Members
Posts: 17,568
Joined: 26-March 09
From: Aurora, Colorado
Member No.: 17,022



QUOTE (LurkerOutThere @ Jul 20 2011, 06:22 AM) *
Personally because as a player I'm very interested in Hackers/technos in games information security starts to come up a lot. Now there are certain playability changes that needs to be made, the threshold 15 to find all hidden nodes kinda needs to be modified, but other then that I think there is a fun aspect of the game to explore there.


Never forget that the Threshold STARTS at 15, it doesn't end there. (IMG:style_emoticons/default/smokin.gif)
Go to the top of the page
 
+Quote Post

4 Pages V  « < 2 3 4
Reply to this topicStart new topic

 



RSS Lo-Fi Version Time is now: 12th April 2022 - 05:54 AM

Topps, Inc has sole ownership of the names, logo, artwork, marks, photographs, sounds, audio, video and/or any proprietary material used in connection with the game Shadowrun. Topps, Inc has granted permission to the Dumpshock Forums to use such names, logos, artwork, marks and/or any proprietary materials for promotional and informational purposes on its website but does not endorse, and is not affiliated with the Dumpshock Forums in any official capacity whatsoever.