IPB

Welcome Guest ( Log In | Register )

2 Pages V  < 1 2  
Reply to this topicStart new topic
> GM Advice, Technomancer
nightslasthero
post Jan 23 2012, 06:32 PM
Post #26


Target
*

Group: Members
Posts: 46
Joined: 25-December 11
Member No.: 46,578



There is a wheel chair in one of the books that could be used for the character when he needs to move around. I like the concept though and thought about doing it once, but in the end it seemed to be a bit to problematic over the long run. Makes good for a one shot game, but for a long extended game it could be problematic.

I like most of the advice that was given, though I think going after sensative data could be problematic. Though if a file is on a non wireless connected computer, then I wouldn't expect wifi inhibitors to be present. Getting traced is going to be the issue, since if you suceed in one trace attempt the character is effectively dead.

He should have some contacts. He should probably have a bodyguard or someone in addition to his cartaker that can relocate his body in a dire situation. Namely he shoudlnt' expect his caretaker to be able to defend him against threats and get him to saftey.

However, this coudl make an interesting encounter. As he should have a drone on standby at his coffin motel in the event of emergencies, having to jump into the drone to take care of things back home while the team needs him woudl be interesting.

I would say to not cut him any slack with the trace. Let him know that he is likely dead if one of the trace attempts work.
Go to the top of the page
 
+Quote Post
Tymeaus Jalynsfe...
post Jan 23 2012, 07:34 PM
Post #27


Prime Runner Ascendant
**********

Group: Members
Posts: 17,568
Joined: 26-March 09
From: Aurora, Colorado
Member No.: 17,022



QUOTE (nightslasthero @ Jan 23 2012, 11:32 AM) *
I would say to not cut him any slack with the trace. Let him know that he is likely dead if one of the trace attempts work.


At that point, a Proxie is your friend. (IMG:style_emoticons/default/smile.gif)
Go to the top of the page
 
+Quote Post
Irion
post Jan 23 2012, 09:16 PM
Post #28


Neophyte Runner
*****

Group: Members
Posts: 2,236
Joined: 27-July 10
Member No.: 18,860



QUOTE
I would say to not cut him any slack with the trace. Let him know that he is likely dead if one of the trace attempts work.

Actually, he just needs to make it look like somebody broke in his network.
They won't find hacking software in his house...
Go to the top of the page
 
+Quote Post
NorthernWolf
post Jan 23 2012, 09:17 PM
Post #29


Target
*

Group: Members
Posts: 32
Joined: 9-January 12
From: Ontario, Canada
Member No.: 46,890



All great ideas, and thanks for the advice, but too much work on both sides in retrospect. Fact is we can barely figure out Matrix rules, nevermind go into this much complexity.

Cheers.
Go to the top of the page
 
+Quote Post
Sengir
post Jan 23 2012, 09:51 PM
Post #30


Great Dragon
*********

Group: Dumpshocked
Posts: 5,090
Joined: 3-October 09
From: Kohle, Stahl und Bier
Member No.: 17,709



QUOTE (UmaroVI @ Jan 23 2012, 07:02 PM) *
I'm not sure what you intend to reference on UW 55. That explains some things you cannot do without a subscription; one of them is enter a node in AR or VR. Yes, that is true. Ergo, you cannot enter a node in AR or VR with only a public account; you need at least a User account.

In other words it makes no sense, hence ignore the offending rule

QUOTE
Oh, I thought you thought you had discovered the slave daisy-chain. That's actually much easier to hack and contains an enormously pointless amount of wasted money. Here's how you hack it: walk up to the server, put in an optical tap or wireless adapter, hack it.

Firewall concepts don't protect against an intruder with physical access. Captain Obvious called, he wants his job back...
Go to the top of the page
 
+Quote Post
BishopMcQ
post Jan 23 2012, 11:54 PM
Post #31


The back-up plan
**********

Group: Retired Admins
Posts: 8,423
Joined: 15-January 03
From: San Diego
Member No.: 3,910



QUOTE (Irion @ Jan 23 2012, 01:16 PM) *
Actually, he just needs to make it look like somebody broke in his network.
They won't find hacking software in his house...

That might work if it's the cops. If you tripped the security on a Renraku black project by having your buddies string some repeater drones and an optical tap, then got traced, the Red Samurai team will probably shoot first and do divinations on your corpse. (This is an extreme example, but really it comes down to who you pissed off enough to make them find your meat.)

It also depends if he's running a nexus with a bunch of pirated software and unrestricted Agents vs just the CFs in his head and a few manservant drones to keep the place tidy.
Go to the top of the page
 
+Quote Post
Udoshi
post Jan 24 2012, 12:01 AM
Post #32


Runner
******

Group: Members
Posts: 2,782
Joined: 28-August 09
Member No.: 17,566



QUOTE (UmaroVI @ Jan 23 2012, 11:02 AM) *
I'm not sure what you intend to reference on UW 55. That explains some things you cannot do without a subscription; one of them is enter a node in AR or VR. Yes, that is true. Ergo, you cannot enter a node in AR or VR with only a public account; you need at least a User account.


False. unwired doesn't contradict the log on action. You gain a subscription at the time you enter the node.

QUOTE (Sengir @ Jan 23 2012, 09:21 AM) *
Take 50 commlinks and daisy-chain them via cable. The first in the chain connects to the matrix, the last to your server, the others just to their neighbors in the chain. The result is that your server now is unhackable unless somebody hacks all 50 commlinks one after another...


Not True. This is covered by the FAQ. Chain-slaving just forwards you to the last. Regular links mesh network you to whichever one you want.
What you really want is a gateway node from unwired.


QUOTE (UmaroVI @ Jan 22 2012, 08:15 PM) *
Another thing to keep in mind: hacking into a node requires either a subscription, or mutual signal range. If you don't already have a subcription (which you need a User, Security, or Admin account for, normally), and you're outside mutual signal range, you can't get in.


Umaro, going back to the original arguement that started this chain of discussion.... While I know the matrix rules are a convoluted piece of shit, I'm fairly sure you've got the wrong of it, possibly misremembering some rules.
So put up your quotes. You've intrigued me, and I want to see exactly why you think this doesn't work.
Go to the top of the page
 
+Quote Post
Tymeaus Jalynsfe...
post Jan 24 2012, 12:07 AM
Post #33


Prime Runner Ascendant
**********

Group: Members
Posts: 17,568
Joined: 26-March 09
From: Aurora, Colorado
Member No.: 17,022



QUOTE (Udoshi @ Jan 23 2012, 05:01 PM) *
Not True. This is covered by the FAQ. Chain-slaving just forwards you to the last. Regular links mesh network you to whichever one you want.
What you really want is a gateway node from unwired.


Sengir never mentioned slaving. He is talking about running each comlink as a hardwired Gateway Node to the next comlink, with a Wireless Access point at the outermost Comlink Node. So, in his case, he is absolutely correct. (IMG:style_emoticons/default/smile.gif)

Go to the top of the page
 
+Quote Post
Udoshi
post Jan 24 2012, 12:15 AM
Post #34


Runner
******

Group: Members
Posts: 2,782
Joined: 28-August 09
Member No.: 17,566



Yeah, I got that slaving wasn't necessarily involved.
My second sentence onward obviously wasn't worded clearly enough.
Go to the top of the page
 
+Quote Post
UmaroVI
post Jan 24 2012, 12:50 AM
Post #35


Shooting Target
****

Group: Members
Posts: 1,700
Joined: 1-July 10
Member No.: 18,778



QUOTE (Udoshi @ Jan 23 2012, 07:01 PM) *
False. unwired doesn't contradict the log on action. You gain a subscription at the time you enter the node.

What do you think the statement I quoted from UW 52 means, then?

QUOTE (Udoshi @ Jan 23 2012, 07:01 PM) *
Umaro, going back to the original arguement that started this chain of discussion.... While I know the matrix rules are a convoluted piece of shit, I'm fairly sure you've got the wrong of it, possibly misremembering some rules.
So put up your quotes. You've intrigued me, and I want to see exactly why you think this doesn't work.

QUOTE (SR4A p235)
In order to hack a node, you must either be within mutual Signal range of the target node’s device or have an open subscription with the node through the Matrix.


"Mutual signal range" is pretty clear as to what it means.

"Have an open subscription with the node through the Matrix" confuses people sometimes, but it definitely means you must be subscribed to the node. "Through the matrix" means that if you ARE subscribed to the node already, you don't need mutual signal range. Thus if, for example, you have a User account in a node, you can subscribe with that, then meet the "open subscription" option for hacking, and proceed to use hacking to hack yourself an Admin account.

If you have neither mutual signal range, nor do you already have way to subscribe (setting aside the question of whether you need User+ to subscribe, or whether Public suffices), you can't use Hacking on the Fly or Probing to get one.

Go to the top of the page
 
+Quote Post
Golgoth
post Jan 24 2012, 03:42 AM
Post #36


Target
*

Group: Members
Posts: 78
Joined: 31-May 09
From: Fairfax, VA
Member No.: 17,228



I haven't even opened my books in quite some time, but can't you get a subscription purely through the Matrix? IE: I want to order something from the local pizzeria, but I am outside of the 'mutual signal range'. All I need to do is find the Matrix address, log on (opening a subscription) and bam, I'm in. From there, if I was a dirty little hacker, I could, well, hack.

I had thought the mutual signal range would be for hacking someone's commlink, or hacking a wireless node that isn't connected to the rest of the world wide node. Hell, a commlink can also potentially be hacked in the above way, if it is active, right? I mean... I can hack your computer from my computer and we're both using wireless routers... Wouldn't that be something similar (I know, I know, reality /=Shadowrun).

I'll end my statement with: I haven't even opened my books in quite some time.
Go to the top of the page
 
+Quote Post
Midas
post Jan 24 2012, 04:26 AM
Post #37


Moving Target
**

Group: Members
Posts: 662
Joined: 25-May 11
Member No.: 30,406



QUOTE (NorthernWolf @ Jan 23 2012, 09:17 PM) *
All great ideas, and thanks for the advice, but too much work on both sides in retrospect. Fact is we can barely figure out Matrix rules, nevermind go into this much complexity.

Cheers.

Probably for the best, for now at least. Might be a cool concept to put on ice and revisit sometime when both you and your player are more savvy on the mess that is the matrix rules. As you can see from the disagreements brewing on your thread, the rules are pretty complex and full of contradictions ...
Go to the top of the page
 
+Quote Post
Sengir
post Jan 24 2012, 11:18 AM
Post #38


Great Dragon
*********

Group: Dumpshocked
Posts: 5,090
Joined: 3-October 09
From: Kohle, Stahl und Bier
Member No.: 17,709



QUOTE (Golgoth @ Jan 24 2012, 04:42 AM) *
I haven't even opened my books in quite some time, but can't you get a subscription purely through the Matrix? IE: I want to order something from the local pizzeria, but I am outside of the 'mutual signal range'. All I need to do is find the Matrix address, log on (opening a subscription) and bam, I'm in

What Umaro is talking about is a node with no public access...imagine Dumpshock just giving you a password prompt when not logged in, instead of letting you browse the forums and only asking for a PW if your want to post something.

In that case, logging on (=creating a subscription) is not possible without hacking. However, SR4A says that "In order to hack a node, you must either be within mutual Signal range of the target node’s device or have an open subscription with the node through the Matrix" (p. 235). So you need an open subscription to hack the node, but to get an open subscription you need to hack the node (IMG:style_emoticons/default/spin.gif)



To repeat myself: it makes no sense, hence ignore the offending rule. Of course I can deface a site from the other side of the globe, anything else would be mind-bogglingly stupid. With a bit of common sense, the Matrix really is no more complicated than the average samurai ("can I coat my bullets with X and then fire them in a ballistic arc over the wall?") (IMG:style_emoticons/default/wink.gif)
Go to the top of the page
 
+Quote Post
TP13
post Jan 25 2012, 12:02 AM
Post #39


Target
*

Group: Members
Posts: 26
Joined: 21-July 11
Member No.: 33,797



Umaro6 has the right of this per RAW. For the daisy chain I'm pretty sure you would also need to load your persona out of your comlink and into the last link in the chain if you wanted to hack from it. Also physically hacking into a node requires both an optical tap and a wireless adapter or the Skinlink echo and it does not bypass the firewall. If you want to ignore these rules that's up to you, but keep in mind the consequences.
Go to the top of the page
 
+Quote Post
Saint Sithney
post Jan 25 2012, 01:06 AM
Post #40


Runner
******

Group: Members
Posts: 2,705
Joined: 5-October 09
From: You are in a clearing
Member No.: 17,722



If you have a subscription to a device (like a drone or team member's commlink,) you have access to it's resources.

If you control a device within mutual signal range of the device you want to hack, then you should be considered to be in mutual signal range.

The entire matrix is organized as a distributed adhoc network. If traffic can't bounce from one device to the next and connections can't be forged through devices then the whole thing doesn't work.

Therefore, by the power of RAI > RAW, hack from home wins, wifi negation and wired networks not withstanding.
Go to the top of the page
 
+Quote Post

2 Pages V  < 1 2
Reply to this topicStart new topic

 



RSS Lo-Fi Version Time is now: 29th June 2025 - 04:19 AM

Topps, Inc has sole ownership of the names, logo, artwork, marks, photographs, sounds, audio, video and/or any proprietary material used in connection with the game Shadowrun. Topps, Inc has granted permission to the Dumpshock Forums to use such names, logos, artwork, marks and/or any proprietary materials for promotional and informational purposes on its website but does not endorse, and is not affiliated with the Dumpshock Forums in any official capacity whatsoever.