My Assistant
![]() ![]() |
Aug 19 2011, 10:05 PM
Post
#1
|
|
|
Neophyte Runner ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 2,211 Joined: 14-October 10 Member No.: 19,113 |
If I am a hacker and I am being hassled by a drone that is being slaved from elsewhere what are my options and what die do I roll?
The SR4a rule book has a long list of matrix actions, but I am a little confused when it comes to which ones to use. My current belief is that I have two options: Option 1: Hack on the fly
Option 2: Spoof
The problem with option 2 seems that it takes ages, which isn't the way that the fluff reads. Is there a simpler way to deal with the drone, other than getting lots of ranks of heavy weapons? |
|
|
|
Aug 19 2011, 10:32 PM
Post
#2
|
|
|
Runner ![]() ![]() ![]() ![]() ![]() ![]() Group: Dumpshocked Posts: 2,946 Joined: 1-June 09 From: Omaha Member No.: 17,234 |
Once you've hacked the master you don't need to spoof, you are for all intents and purposes the master.
The system doesn't do a very good job representing how hacking is "fast as thought" when it still moves int eh same IP system as everyone else which is why spoof is only a nominal time savigns in most cases. Usually you want to spoof drones or other objects that arn't slaved to their parent. |
|
|
|
Aug 19 2011, 11:36 PM
Post
#3
|
|
|
Moving Target ![]() ![]() Group: Members Posts: 210 Joined: 4-August 11 From: Vicinity Houston Member No.: 34,911 |
Minor error as I understand the rules. You don't have to hack the master node to spoof the drone.
If he's in the same node, you have to find him (hidden node) then make a Matrix Perception test (SR4A 228) If he isn't running stealth, then besides him being an idiot your hits from Computer + Analyze determine how many pieces of information you can get. One of those pieces is "Access ID". If he is running stealth it's an opposed test: his Hacking+Stealth against your matrix perception. You need to get net hits to get that Access ID. If he's not in your node you have to trace him. However, once you find him you know his Access ID (page 232). Again, no hacking of the master node is required. Now the hard question is under what conditions the Master is in your node. I've seen multiple discussions, some rather acrimonious. My general rule at this time is that if he's in the same general physical location as you (same building) he's "in" the same node. If he's running a gateway or two between the drone and himself you aren't in the same node. But it's a lot easier than you thought to get the Access ID, and once you have that sending the spoof is (relatively) easy. |
|
|
|
Aug 20 2011, 01:11 AM
Post
#4
|
|
|
Running Target ![]() ![]() ![]() Group: Members Posts: 1,272 Joined: 22-June 10 From: Omaha. NE Member No.: 18,746 |
Note that a slaved non-peripheral has to be spoofed as Admin and therefore spoofed at -6 dice.
Spoofing is simply not worth it. Too much work for too little result post-Unwired. |
|
|
|
Aug 20 2011, 02:02 AM
Post
#5
|
|
|
Moving Target ![]() ![]() Group: Members Posts: 210 Joined: 4-August 11 From: Vicinity Houston Member No.: 34,911 |
Shouldn't that be that the drone gets +6 for the opposed test?
A "normal" security drone with rating 4 gets to roll 14 dice. All you need is one hit for the spoof to succeed. If you're a hacker (TM or mundane) I'd think you could get a few dice of an edge. |
|
|
|
Aug 20 2011, 07:50 AM
Post
#6
|
|
|
Neophyte Runner ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 2,211 Joined: 14-October 10 Member No.: 19,113 |
QUOTE Shouldn't that be that the drone gets +6 for the opposed test? No the hacker gets -6. see quote below. QUOTE Note that a slaved non-peripheral has to be spoofed as Admin and therefore spoofed at -6 dice I don't understand this point. I read the section p98-99 in Unwired, and I believe that you are mis applying it (watch the flame wars start!). Note also that you don't like the result of your interpretation, and with it are implying that spoofing is useless. I propose to you that actually spoofing might still be useful. So lets look at the relevant bits (p55 Unwired): QUOTE One node, the slave, may be linked to another node, the master. In this setup, the master is given full admin access to the slave. When slaving a node to a master, the slaved node does not accept any Matrix connections from any other node but the master and instantly forwards any connection attempts to the master. OK that's simple. The slave now has given up all security and delegated it to the master. Any commands from the master have full admin priviledges. This doesn't mean that you need an admin account on the master. As a corporate drone rigger slaving all your drones through a hardened hacker heavy node, try asking for admin priviledges to that node and see what happens to you. A curt "Over your dead body" is probably the nicest thing, and an investigation by the security goons is far more likely. You don't let users have Admin access unless they need it, and then you rearchitect your entire system to minimize the new gaping security hole. QUOTE Spoofing commands from a user with security or admin privileges is more difficult, just as is with hacking in and obtaining an account with such privileges. Apply a dice pool modifier to the hacker for the Opposed Test equal to –3 for spoofing security privileges or –6 for spoofing admin privileges OK that's clear enough. If I am logged into the master, as an admin (on master) then spoofing commands to the drone needs to be at -6. If I am logged in to the master as a normal user, then I just need normal user level spoofing This view is mildly supported by the following (p98). It is supported in that this is the section on what you can do with spoofing different accounts. Given that drones are usually slaved using them as an example of a difference between admin and users would be pointless. QUOTE If you are spoofing commands to a drone, pretending to be the controlling rigger, you could certainly instruct the drone to log that rigger off or slave that drone to your commlink instead (since the controlling rigger would have privileges to do that). To add, alter, or delete an account, you would almost certainly need to spoof a command from someone with admin privileges. Many legitimate users have limits on what they can do with their accounts, and security- or safety-conscious spiders can and do program agents, drones, and nodes to ignore certain orders. Now lets examine the impact of this interpretation:
I like these game effects.
|
|
|
|
Aug 20 2011, 08:34 AM
Post
#7
|
|
|
Running Target ![]() ![]() ![]() Group: Members Posts: 1,150 Joined: 15-December 09 Member No.: 17,968 |
Minor error as I understand the rules. You don't have to hack the master node to spoof the drone. If he's in the same node, you have to find him (hidden node) then make a Matrix Perception test (SR4A 228) If he isn't running stealth, then besides him being an idiot your hits from Computer + Analyze determine how many pieces of information you can get. One of those pieces is "Access ID". If he is running stealth it's an opposed test: his Hacking+Stealth against your matrix perception. You need to get net hits to get that Access ID. If he's not in your node you have to trace him. However, once you find him you know his Access ID (page 232). Again, no hacking of the master node is required. Now the hard question is under what conditions the Master is in your node. I've seen multiple discussions, some rather acrimonious. My general rule at this time is that if he's in the same general physical location as you (same building) he's "in" the same node. If he's running a gateway or two between the drone and himself you aren't in the same node. But it's a lot easier than you thought to get the Access ID, and once you have that sending the spoof is (relatively) easy. Who's this 'he' you're referring to? You need the AID of the master node (the node to which the drone is slaved) and nodes cannot take advantage of the stealth program and cannot be "in your node". |
|
|
|
Aug 20 2011, 09:16 AM
Post
#8
|
|
|
Running Target ![]() ![]() ![]() Group: Members Posts: 1,150 Joined: 15-December 09 Member No.: 17,968 |
OK that's clear enough. If I am logged into the master, as an admin (on master) then spoofing commands to the drone needs to be at -6. If I am logged in to the master as a normal user, then I just need normal user level spoofing Nope. If you're logged into the master with admin privileges you don't need to spoof. Spoofing is an alternative to hacking into the master node. The slaved drone will consider any command coming from the master node to have admin privileges, so if you're in the master node all you need there is sufficient privileges to send commands to the drone. This is determined by the configuration of the master node and would usually be security-level, but could be any (even public-level). As per Suoq's post, any spoof command attempt to a non-peripheral slaved node is at -6 because the master node has admin privileges and admin-issued commands are harder to impersonate. The reason peripherals do not have this penalty (and kudos to Suoq because it took me a fair bit of digging to find he was not wrong like I thought) is that they only ever have admin accounts but these accounts are treated as standard accounts for security purposes. Now lets examine the impact of this interpretation:
This is not the case either I'm afraid. Unwired p.99: "Spoofing commands from a user with security or admin privileges is more difficult...". It's the access level of the user, not the command, and since the master of a slaved device has admin privileges all commands have at the -6 penalty. Only if the drone is not slaved would you be able to reduce this penalty (to -3 if the AID you've nabbed has security access and no penalty if it has user access). Only legitmate commands can be spoofed. Unwired p.99: "Spoofing commands for for actions that are illegal for those access privileges is simply not possible". This makes perfect sense when you think about it - you're pretending to be someone from whom the drone will accept certain commands, so giving a non-legitimate command won't work for you any more than it would for the guy you're pretending to be. Now a slaved drone only accepts commands from the master node and the master node has admin privileges, but sometimes there are things that even admins are not allowed to do. -6 to spoof a slaved drone is a pretty big help. |
|
|
|
Aug 20 2011, 09:42 AM
Post
#9
|
|
|
Running Target ![]() ![]() ![]() Group: Members Posts: 1,290 Joined: 23-January 07 From: Seattle, USA Member No.: 10,749 |
Honestly, if you've slaved your drones to your 'link you've already broken the rules of good matrix security. A slaved node forwards all attempts to access it to it's master node, which gives the hacker the access ID of the master node, thus allowing the hacker to spoof the node.
If the drone is unslaved, you either need to brute force hack your way in(which carries risks and you can always cybercombat them out of your drone if they do get in), or they have to use sniffer to try to figure out which access ID is controlling the drone, which takes time...time in which you can use the drone to kill the hacker. |
|
|
|
Aug 20 2011, 09:42 AM
Post
#10
|
|
|
Running Target ![]() ![]() ![]() Group: Members Posts: 1,150 Joined: 15-December 09 Member No.: 17,968 |
Option 1: Hack on the fly
This is correct except for the third point, which should be simply removed. There are lots of different restrictions the master node may have on who can make it command the slave, but needing to spoof the slave is not one of them. Option 2: Spoof
This is also correct, but before you can trace the master node you need to get a read on it. Without hacking into the slave node (which is impossible) you can't perceive the master node's icon so you need to capture the the wireless signal and run a trace on that. It gets even more complicated in that the master and slave may well not be communicating with each other at the time (in fact they usually won't if the drone pilot is at all trusted to operate independently). It's like in the story Game Set Match (might be SR4a only) where Slamm-O! gets the drone's attention in meat space to trick it inot sending a communication to the rigger so that he could run a trace on the signal after capturing it. Stealth is not an issue because with slaving you're after the AID of a node not an icon. I don't believe nodes can perform the Redirect Trace action either. |
|
|
|
Aug 20 2011, 10:55 AM
Post
#11
|
|
|
Neophyte Runner ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 2,211 Joined: 14-October 10 Member No.: 19,113 |
QUOTE This is correct except for the third point, which should be simply removed. There are lots of different restrictions the master node may have on who can make it command the slave, but needing to spoof the slave is not one of them. Gotcha. Command should just do it. (or jumping in...) QUOTE This is also correct, but before you can trace the master node you need to get a read on it. Without hacking into the slave node (which is impossible) you can't perceive the master node's icon so you need to capture the the wireless signal and run a trace on that. It gets even more complicated in that the master and slave may well not be communicating with each other at the time (in fact they usually won't if the drone pilot is at all trusted to operate independently). It's like in the story Game Set Match (might be SR4a only) where Slamm-O! gets the drone's attention in meat space to trick it inot sending a communication to the rigger so that he could run a trace on the signal after capturing it. Stealth is not an issue because with slaving you're after the AID of a node not an icon. I don't believe nodes can perform the Redirect Trace action either. * The drone is almost certainly sending a picture back to the operator. * Good point on the stealth. QUOTE Honestly, if you've slaved your drones to your 'link you've already broken the rules of good matrix security. A slaved node forwards all attempts to access it to it's master node, which gives the hacker the access ID of the master node, thus allowing the hacker to spoof the node. If the drone is unslaved, you either need to brute force hack your way in(which carries risks and you can always cybercombat them out of your drone if they do get in), or they have to use sniffer to try to figure out which access ID is controlling the drone, which takes time...time in which you can use the drone to kill the hacker. I don't understand this point, sorry. I have to slave the drones to something... and that gives the access ID of the master node. Slaving means that they are much more resiliant to hacking and as far as I can see exactly as vulnerable to spoofing as they were before. QUOTE This is not the case either I'm afraid. Unwired p.99: "Spoofing commands from a user with security or admin privileges is more difficult...". It's the access level of the user, not the command, and since the master of a slaved device has admin privileges all commands have at the -6 penalty. Only if the drone is not slaved would you be able to reduce this penalty (to -3 if the AID you've nabbed has security access and no penalty if it has user access). I quoted this too and had a different interpretation as I said above. The user on the master does NOT have an admin account (unless they don't care about security) so to spoof them I don't need admin spoofing. The drone has basically given over it's security needs to the master...and will accept any old thing. The point of the rule about admin spoofing is to make it hard to do something that need admin privileges. |
|
|
|
Aug 20 2011, 11:31 AM
Post
#12
|
|
|
Running Target ![]() ![]() ![]() Group: Members Posts: 1,150 Joined: 15-December 09 Member No.: 17,968 |
I quoted this too and had a different interpretation as I said above. The user on the master does NOT have an admin account (unless they don't care about security) so to spoof them I don't need admin spoofing. The drone has basically given over it's security needs to the master...and will accept any old thing. The point of the rule about admin spoofing is to make it hard to do something that need admin privileges. But the user you are spoofing is the master node, not someone with access to the master node. The slave won't listen to the security rigger's AID any more than it will listen to yours. It will only take orders from the AID of the master node and the only difference is that the spider can command the master node to command the slave whilst you have to pretend your node is the master node. |
|
|
|
Aug 20 2011, 12:52 PM
Post
#13
|
|
|
Neophyte Runner ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 2,211 Joined: 14-October 10 Member No.: 19,113 |
It's OK I have stated my case which is a strong one. I understand your point but believe you are wrong (and have quoted why). More I don't like the game effect (as a GM, player or game designer) of you being correct.
In the real world we could perform an experiment and see which view was correct. In rules we can only read and reread the rules and predict the consequences. Having done that I prefer my interpretation of RAW to yours. I understand that you feel yours is better, but I just don't like the impact on the game which is all negative. |
|
|
|
Aug 20 2011, 02:27 PM
Post
#14
|
|
|
Target ![]() Group: Members Posts: 64 Joined: 15-August 11 Member No.: 35,833 |
A slaved node does forward any attempts to access it, but you still have to pull a perception check to gain the AccessID. The redirect isn't a Track program so you don't get the auto-benefit of a Trace action. And a smart rigger that's using slaves is probably going to have a Stealth program running on his commlink.
Slaving is useful, but has it's drawbacks. Pros: *Much less resource-intensive. Tacnets can be run off the master without requiring everything else to run it's own copy. The matrix defenses of the slaves need not all be jacked up to protect from hacking, just the master, which is often a spider's home, and allows for concentrated IC. Cons: *Makes finding the rigger's node easier, allowing spoofing attempts faster as you don't need an extended test to track them anymore, just a perception check after being forwarded over. *Eggs in one basket. If the 'more secure' node does get hacked, it's all hacked. *Still limited by the master's Subscription limits. Slaving isn't really a big gain in security or anything. It's about effeciency and resource management. It's cheaper to use base drones and slave a few to the rigger then it is to buff up thier individual systems. Although it's still likely limited to small teams due to typical subscription limits be relatively small. |
|
|
|
Aug 20 2011, 04:17 PM
Post
#15
|
|
|
Running Target ![]() ![]() ![]() Group: Members Posts: 1,150 Joined: 15-December 09 Member No.: 17,968 |
|
|
|
|
Aug 20 2011, 06:32 PM
Post
#16
|
|
|
Running Target ![]() ![]() ![]() Group: Members Posts: 1,290 Joined: 23-January 07 From: Seattle, USA Member No.: 10,749 |
A slaved node does forward any attempts to access it, but you still have to pull a perception check to gain the AccessID. The redirect isn't a Track program so you don't get the auto-benefit of a Trace action. And a smart rigger that's using slaves is probably going to have a Stealth program running on his commlink. Slaving is useful, but has it's drawbacks. Pros: *Much less resource-intensive. Tacnets can be run off the master without requiring everything else to run it's own copy. The matrix defenses of the slaves need not all be jacked up to protect from hacking, just the master, which is often a spider's home, and allows for concentrated IC. Cons: *Makes finding the rigger's node easier, allowing spoofing attempts faster as you don't need an extended test to track them anymore, just a perception check after being forwarded over. *Eggs in one basket. If the 'more secure' node does get hacked, it's all hacked. *Still limited by the master's Subscription limits. Slaving isn't really a big gain in security or anything. It's about effeciency and resource management. It's cheaper to use base drones and slave a few to the rigger then it is to buff up thier individual systems. Although it's still likely limited to small teams due to typical subscription limits be relatively small. That's pretty much the point I was making(and a good hacker should be able to make that perception check easily). Slaving is great for the devices in your PAN, but the security vulnerabilities can easily outweigh the benefits if you're using it with drones are others commlinks. If you have the resources, putting a good firewall and analyze program on drones is a much better option, and you can even keep an instance of your persona on board to brainfry anyone who tries to break in. |
|
|
|
Aug 20 2011, 07:28 PM
Post
#17
|
|
|
panda! ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 10,331 Joined: 8-March 02 From: north of central europe Member No.: 2,242 |
This thread reminds me that the interaction between trace and access id is a bit wonky. This because supposedly access id is used as the connection address (much like a ip address on the net). As such, one should be able to pluck the access id out of the traffic generated by any node. Yet one only learn the access ID at the end of the trace (unless one have made a matrix perception test towards the trace target beforehand and asked for the ID that way).
|
|
|
|
Aug 20 2011, 07:38 PM
Post
#18
|
|
|
Target ![]() Group: Members Posts: 64 Joined: 15-August 11 Member No.: 35,833 |
For your basic PAN of peripheral devices, you can also hook them together as a Cluster (which acts as a single node) then slave that cluster to your commlink and only use up a single subscription slot.
And if you're feeling a bit silly, you can cluster mutliple commlinks together and effectively bump up the number of programs you can run without slowing down. Just gotta cluster 3+ links to make it happen. (hello IC-spamming commlink super-cluster of silly expensiveness!) Now here's a related item where I haven't been able to peg down a definate answer. If I want to upgrade the firewall on my drones, do I have to purchase it seperately, or can I crack one firewall software package and copy it to them all for free? (then mess with fighting the degredation and all that jazz). Unwired pg94 clearly shows it can indeed be cracked, however... System is described in more detail in Unwired pg 52 as being device-specific much like Pilot programs. Firewall is never touched on directly one way or the other that I have found. The assumption becomes that it is not device specific as I have yet to find anyplace where it says it is, although the other 3 matrix attributes are all device-specific, so that gives me doubt on the assumption. So, is Firewall device-specific as well, or more universal and copyable? |
|
|
|
Aug 20 2011, 07:41 PM
Post
#19
|
|
|
Running Target ![]() ![]() ![]() Group: Members Posts: 1,290 Joined: 23-January 07 From: Seattle, USA Member No.: 10,749 |
For your basic PAN of peripheral devices, you can also hook them together as a Cluster (which acts as a single node) then slave that cluster to your commlink and only use up a single subscription slot. And if you're feeling a bit silly, you can cluster mutliple commlinks together and effectively bump up the number of programs you can run without slowing down. Just gotta cluster 3+ links to make it happen. (hello IC-spamming commlink super-cluster of silly expensiveness!) Now here's a related item where I haven't been able to peg down a definate answer. If I want to upgrade the firewall on my drones, do I have to purchase it seperately, or can I crack one firewall software package and copy it to them all for free? (then mess with fighting the degredation and all that jazz). Unwired pg94 clearly shows it can indeed be cracked, however... System is described in more detail in Unwired pg 52 as being device-specific much like Pilot programs. Firewall is never touched on directly one way or the other that I have found. The assumption becomes that it is not device specific as I have yet to find anyplace where it says it is, although the other 3 matrix attributes are all device-specific, so that gives me doubt on the assumption. So, is Firewall device-specific as well, or more universal and copyable? If you crack the firewall it would start being subject to program degradation, so careful with that. I don't know how specific firewalls are, but I imagine you can't just copy the one you use on your 'link, you'd at least need one designed to work on a pilot program. |
|
|
|
Aug 20 2011, 07:50 PM
Post
#20
|
|
|
panda! ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 10,331 Joined: 8-March 02 From: north of central europe Member No.: 2,242 |
Regarding my earlier comment about Trace and Access ID, a closer reading of matrix perception produced something interesting.
If Stealth is being run, matrix perception becomes a opposed test (duh on me). As such, it may be down right impossible to get a accurate read on the icon (not sure why that would not be a immediate red flag by any sane node, but then i guess it could produce too many false alarms). In contrast, a trace can only be delayed via redirection, not defeated. So it may be a more reliable way of getting a Access ID from a cautious target. Also, the sidebar on page 53 connects the Access ID to the persona, not the node. So it is likely that all nodes have some identification separate from the Access ID to deal with routing. And this is the chain that Trace walks, independent of knowing the Access ID of the target or not. |
|
|
|
Aug 20 2011, 08:40 PM
Post
#21
|
|
|
Target ![]() Group: Members Posts: 64 Joined: 15-August 11 Member No.: 35,833 |
Regarding my earlier comment about Trace and Access ID, a closer reading of matrix perception produced something interesting. If Stealth is being run, matrix perception becomes a opposed test (duh on me). As such, it may be down right impossible to get a accurate read on the icon (not sure why that would not be a immediate red flag by any sane node, but then i guess it could produce too many false alarms). In contrast, a trace can only be delayed via redirection, not defeated. So it may be a more reliable way of getting a Access ID from a cautious target. Also, the sidebar on page 53 connects the Access ID to the persona, not the node. So it is likely that all nodes have some identification separate from the Access ID to deal with routing. And this is the chain that Trace walks, independent of knowing the Access ID of the target or not. Building on that, Trace can and will fail. Extended tests are not infinite. SR4 limited them to a number of tests equal to the dice pool. SR4A suggests a harsher option of reducing the dice pool by 1 on every successive test. If you glitch, you also lose 1d6 accumulated hits (if this brings you to zero total hits, you fail) on top of some other minor difficulty. If you critical glitch, you fail. On a Trace, Stealth also acts as a negative dice pool modifier, making it even more difficult to Track down a persona to snag that AccessID (and it makes glitches more likely). |
|
|
|
Aug 20 2011, 09:37 PM
Post
#22
|
|
|
Moving Target ![]() ![]() Group: Members Posts: 271 Joined: 5-July 11 From: Firebase Zulu Member No.: 32,769 |
Building on that, Trace can and will fail. Extended tests are not infinite. SR4 limited them to a number of tests equal to the dice pool. SR4A suggests a harsher option of reducing the dice pool by 1 on every successive test. If you glitch, you also lose 1d6 accumulated hits (if this brings you to zero total hits, you fail) on top of some other minor difficulty. If you critical glitch, you fail. On a Trace, Stealth also acts as a negative dice pool modifier, making it even more difficult to Track down a persona to snag that AccessID (and it makes glitches more likely). Please note the bold. It is not an automatic reduction. |
|
|
|
Aug 20 2011, 10:02 PM
Post
#23
|
|
|
Target ![]() Group: Members Posts: 64 Joined: 15-August 11 Member No.: 35,833 |
|
|
|
|
Aug 21 2011, 06:17 PM
Post
#24
|
|
|
Moving Target ![]() ![]() Group: Members Posts: 503 Joined: 3-May 08 Member No.: 15,949 |
If Stealth is being run, matrix perception becomes a opposed test (duh on me). As such, it may be down right impossible to get a accurate read on the icon (not sure why that would not be a immediate red flag by any sane node, but then i guess it could produce too many false alarms). Read the Stealth description. Stealth makes you look like an innocuous file or bit of line noise. If your Analyze fails, you don't get "i dunno, lol" you get "System Log Archive 2071-06-16". In a related story, a SUCCESSFUL Analyze might still give "System Log," which the scanner then tries to access to check something, blowing your cover. Same result. (IMG:style_emoticons/default/biggrin.gif) |
|
|
|
Aug 21 2011, 06:28 PM
Post
#25
|
|
|
Running Target ![]() ![]() ![]() Group: Members Posts: 1,019 Joined: 10-November 10 From: Annapolis Valley, Nova Scotia Member No.: 19,166 |
Read the Stealth description. Stealth makes you look like an innocuous file or bit of line noise. If your Analyze fails, you don't get "i dunno, lol" you get "System Log Archive 2071-06-16". In a related story, a SUCCESSFUL Analyze might still give "System Log," which the scanner then tries to access to check something, blowing your cover. Same result. (IMG:style_emoticons/default/biggrin.gif) SR4A 228 "Matrix Perception"- third paragraph QUOTE If your target is running a Stealth program, the Matrix
Perception test becomes an Opposed Test, with the target rolling Hacking + Stealth (or Firewall + Stealth for programs or nodes) |
|
|
|
![]() ![]() |
|
Lo-Fi Version | Time is now: 12th April 2022 - 08:23 PM |
Topps, Inc has sole ownership of the names, logo, artwork, marks, photographs, sounds, audio, video and/or any proprietary material used in connection with the game Shadowrun. Topps, Inc has granted permission to the Dumpshock Forums to use such names, logos, artwork, marks and/or any proprietary materials for promotional and informational purposes on its website but does not endorse, and is not affiliated with the Dumpshock Forums in any official capacity whatsoever.