Data Bombs and Spoof |
Data Bombs and Spoof |
Aug 15 2011, 04:26 PM
Post
#1
|
|
Moving Target Group: Members Posts: 210 Joined: 4-August 11 From: Vicinity Houston Member No.: 34,911 |
(crossposted at Shadowrun4 forum)
I'm requesting a rules check as it looks to me as though there's a defense against (some) spoofing. Put a databomb on the access port. As I read the rules, to issue a command (with the access ID) the node must be accessed. Now I'd not put this on devices that have a wide range of interaction. Putting them on the slaved drones and other devices, however, looks to me like a nice way to cover the only weakness of slaved devices -- their vulnerability to spoof attacks. However, I'm still learning and could be wrong, so I'm asking for a doublecheck. Thanks. |
|
|
Aug 15 2011, 04:38 PM
Post
#2
|
|
Running, running, running Group: Dumpshocked Posts: 2,220 Joined: 18-October 04 From: North Carolina Member No.: 6,769 |
MM, i dont think so, since the DB only goes off if someone is unauthorized, if they spoof and succeed they're authorized, however,i would say if they spoof and fail, then it could go boom
|
|
|
Aug 15 2011, 05:09 PM
Post
#3
|
|
Moving Target Group: Members Posts: 210 Joined: 4-August 11 From: Vicinity Houston Member No.: 34,911 |
No, you set a different passcode for the data bomb.
QUOTE When you [set a data bomb], you must choose the rating for the data bomb (up to the rating of the Data Bomb program), whether or not it will delete the file or crash the node to which it is attached when activated as a secondary effect, and the passcode required to deactivate it. and QUOTE If the passcode is used, the data bomb does not activate and remains attached to the file or node. On the other hand I maybe found the answer, in the middle of those two quotes. QUOTE The way a data bomb triggers depends on whether it is attached to a file or a node: it activates when a file is accessed, or when an icon logs onto a node, respectively, without using the data bomb’s passcode. The question is whether spoofing is logging on for that single command. Just as with hacking on the fly and probing it has to deal with a firewall check. Unlike either, a failure means no alert as the command is considered 'just a bad packet' and discarded. I know that as GM I'll have to make up my own mind, but I'm looking for some clarity for basis. at this point probably not, but the possibility... |
|
|
Aug 15 2011, 06:16 PM
Post
#4
|
|
Runner Group: Dumpshocked Posts: 2,801 Joined: 2-September 09 From: Moscow, Russia Member No.: 17,589 |
I'd say no, it's doesn't count as a login - after all, you're not hacking the node's login mechanism, and while spoofing a slaved device you can't as a result login to the node it's slaved to. But ymmv.
|
|
|
Aug 15 2011, 06:32 PM
Post
#5
|
|
Runner Group: Dumpshocked Posts: 2,946 Joined: 1-June 09 From: Omaha Member No.: 17,234 |
Databombs only affect you if your logging in, if your spoofing your not logging in. By design slaving is vulnerable to spoofing there should not be a 100% foolproof unhackable system anyway.
|
|
|
Aug 15 2011, 07:38 PM
Post
#6
|
|
Moving Target Group: Members Posts: 210 Joined: 4-August 11 From: Vicinity Houston Member No.: 34,911 |
Lurker, this wouldn't make it unhackable.
It would just make it a bit more difficult/risky to spoof. (grin) |
|
|
Aug 15 2011, 08:36 PM
Post
#7
|
|
Advocatus Diaboli Group: Members Posts: 13,994 Joined: 20-November 07 From: USA Member No.: 14,282 |
Spoofing is not logging in. It's touchless. Even if the data bomb could go off, there's literally nothing there for it to hit.
|
|
|
Aug 15 2011, 09:32 PM
Post
#8
|
|
Running, running, running Group: Dumpshocked Posts: 2,220 Joined: 18-October 04 From: North Carolina Member No.: 6,769 |
hurray for right answer, wrong reason (IMG:style_emoticons/default/biggrin.gif)
|
|
|
Lo-Fi Version | Time is now: 24th April 2024 - 12:38 AM |
Topps, Inc has sole ownership of the names, logo, artwork, marks, photographs, sounds, audio, video and/or any proprietary material used in connection with the game Shadowrun. Topps, Inc has granted permission to the Dumpshock Forums to use such names, logos, artwork, marks and/or any proprietary materials for promotional and informational purposes on its website but does not endorse, and is not affiliated with the Dumpshock Forums in any official capacity whatsoever.