IPB

Welcome Guest ( Log In | Register )

 
Reply to this topicStart new topic
> Encryption and stealth, quick matrix questions
lunavoco
post Feb 3 2012, 07:44 PM
Post #1


Target
*

Group: Members
Posts: 72
Joined: 4-March 10
Member No.: 18,241



Further attempts to understand the matrix rules. sigh.

1) I want to hack into a johnson's PAN. I'm pretty sure that it exists, but running in Hidden mode. SR4A 230 gives me the process for Detect Hidden Node, E. Warfare + Scan (4). If's he's actively running a stealth program does the test change? I could have sworn his stealth affected this in some way...

2) If two members of a team communicate using an encryption and they have differeing Encryption Program ratings, is signal encrypted at the lowest of the two for the purposes of my decryption attempts?
Go to the top of the page
 
+Quote Post
Draco18s
post Feb 3 2012, 07:46 PM
Post #2


Immortal Elf
**********

Group: Members
Posts: 10,289
Joined: 2-October 08
Member No.: 16,392



QUOTE (lunavoco @ Feb 3 2012, 02:44 PM) *
Further attempts to understand the matrix rules. sigh.

1) I want to hack into a johnson's PAN. I'm pretty sure that it exists, but running in Hidden mode. SR4A 230 gives me the process for Detect Hidden Node, E. Warfare + Scan (4). If's he's actively running a stealth program does the test change? I could have sworn his stealth affected this in some way...

2) If two members of a team communicate using an encryption and they have differeing Encryption Program ratings, is signal encrypted at the lowest of the two for the purposes of my decryption attempts?


1) No, his stealth program doesn't help.
Also, if you know WHERE his pan is (say, "within 3 feet of his body") you get a bonus

2) Lowest.
Go to the top of the page
 
+Quote Post
NiL_FisK_Urd
post Feb 3 2012, 07:51 PM
Post #3


Moving Target
**

Group: Members
Posts: 881
Joined: 13-November 11
From: Vienna, Austria
Member No.: 43,494



2) I would say highest, or the rating of the one who is initiating the encrypted comm.

QUOTE (SR4A p.229)
Encrypt Action (Encrypt Program)
You encrypt a file, set of files, node, or communication link. You also choose a passcode that you or another user can use to decrypt the file. You may encrypt multiple files together into a single archive file. You
may also attach a data bomb (p. 233) to an encrypted file.


There is no statement that both sides of the communication need an encrypt program.
Go to the top of the page
 
+Quote Post
lunavoco
post Feb 3 2012, 07:57 PM
Post #4


Target
*

Group: Members
Posts: 72
Joined: 4-March 10
Member No.: 18,241



Ok, followup Question: If the johnson's got his signal encrypted, do i need to decrypt before i innitiate a hack on the fly attempt? Or is my understanding off and you only need to Decrypt when spoofing (ie, not actually moving yourself into his comlink?)

Go to the top of the page
 
+Quote Post
NiL_FisK_Urd
post Feb 3 2012, 08:02 PM
Post #5


Moving Target
**

Group: Members
Posts: 881
Joined: 13-November 11
From: Vienna, Austria
Member No.: 43,494



No, you dont need to decrypt his signal to hack on the fly, unless he has encrypted his whole comlink. You would need to decrypt if you want to perform a "intercept wireless traffic" action.
Go to the top of the page
 
+Quote Post
Draco18s
post Feb 3 2012, 08:07 PM
Post #6


Immortal Elf
**********

Group: Members
Posts: 10,289
Joined: 2-October 08
Member No.: 16,392



QUOTE (NiL_FisK_Urd @ Feb 3 2012, 03:02 PM) *
You would need to decrypt if you want to perform a "intercept wireless traffic" action.


Which is what he's trying to do:

QUOTE
If two members of a team communicate using an encryption...
Go to the top of the page
 
+Quote Post
lunavoco
post Feb 3 2012, 08:20 PM
Post #7


Target
*

Group: Members
Posts: 72
Joined: 4-March 10
Member No.: 18,241



The follow up question was pointg back to the 1) Johnson scenario.

Last Question: do I have to complete the Encrypt action once for every communication out of my 'link, or is there a way I can just toggle it on similar to modern Wi-Fi encryptions?

Wait, you can encrypt your whole comlink? Is there any reason why a reasonably paranoid person wouldn't encrypt the whole thing and use it noramlly?
Go to the top of the page
 
+Quote Post
bobbaganoosh
post Feb 3 2012, 08:24 PM
Post #8


Moving Target
**

Group: Validating
Posts: 132
Joined: 10-November 10
From: San Diego, Aztlan
Member No.: 19,165



As long as you don't forget the key used to decrypt it, there isn't really any reason for a "reasonably paranoid" person not to encrypt an entire commlink, as well as all of the peripheral devices (goggles, smartgun, ultrawideband radar, etc).
Go to the top of the page
 
+Quote Post
Aerospider
post Feb 3 2012, 08:39 PM
Post #9


Running Target
***

Group: Members
Posts: 1,150
Joined: 15-December 09
Member No.: 17,968



Wouldn't encrypting your signal make life a bit difficult? How would you tell the autocab what the passcode is? Or the barman? Or the beat cop checking SINs of passer-bys?
Go to the top of the page
 
+Quote Post
Draco18s
post Feb 3 2012, 08:46 PM
Post #10


Immortal Elf
**********

Group: Members
Posts: 10,289
Joined: 2-October 08
Member No.: 16,392



QUOTE (Aerospider @ Feb 3 2012, 03:39 PM) *
Wouldn't encrypting your signal make life a bit difficult? How would you tell the autocab what the passcode is? Or the barman? Or the beat cop checking SINs of passer-bys?


Simultaneous encrypted communication versus unencrypted communication.

Computers in the real world do this all the time.
Go to the top of the page
 
+Quote Post
lunavoco
post Feb 3 2012, 08:47 PM
Post #11


Target
*

Group: Members
Posts: 72
Joined: 4-March 10
Member No.: 18,241



QUOTE (Aerospider @ Feb 3 2012, 03:39 PM) *
Wouldn't encrypting your signal make life a bit difficult? How would you tell the autocab what the passcode is? Or the barman? Or the beat cop checking SINs of passer-bys?

That's where i was going with that, but i wasn't able to articulate it.

So, run a secondary comlink with you sin-of-the-day on it and Encrypt your personal one?
Go to the top of the page
 
+Quote Post
Lantzer
post Feb 3 2012, 09:37 PM
Post #12


Moving Target
**

Group: Members
Posts: 693
Joined: 26-March 03
Member No.: 4,335



Note that if he is running stealth, I think you have to detect his encryption before you can decode it. check out the rules for the stealth program and matrix perception. It can really slow down your hacking attempt (compared to not having stealth).
Go to the top of the page
 
+Quote Post
Draco18s
post Feb 3 2012, 09:40 PM
Post #13


Immortal Elf
**********

Group: Members
Posts: 10,289
Joined: 2-October 08
Member No.: 16,392



QUOTE (Lantzer @ Feb 3 2012, 04:37 PM) *
Note that if he is running stealth, I think you have to detect his encryption before you can decode it. check out the rules for the stealth program and matrix perception. It can really slow down your hacking attempt (compared to not having stealth).


That is not how that works. Stealth (program) hides your matrix icon.
Go to the top of the page
 
+Quote Post
Aerospider
post Feb 3 2012, 09:52 PM
Post #14


Running Target
***

Group: Members
Posts: 1,150
Joined: 15-December 09
Member No.: 17,968



QUOTE (Draco18s @ Feb 3 2012, 09:40 PM) *
That is not how that works. Stealth (program) hides your matrix icon.

This. It doesn't even make you invisible, just innocuous (though it amounts to the same).
Go to the top of the page
 
+Quote Post
Fortinbras
post Feb 3 2012, 11:36 PM
Post #15


Moving Target
**

Group: Members
Posts: 772
Joined: 12-December 07
From: Fort Worth, Texas
Member No.: 14,589



QUOTE (lunavoco @ Feb 3 2012, 03:44 PM) *
2) If two members of a team communicate using an encryption and they have differeing Encryption Program ratings, is signal encrypted at the lowest of the two for the purposes of my decryption attempts?


As a GM I would rule that once you hit the Target Number of the lowest Encryption you could see everything that user sends, but not what the higher users sends until you reach his TN.
I don't know if this is represented by RAW, but getting only half a conversation for a few turns is a cool narrative trick and, I feel, adds to the fun of the game and is therefore superior to interpretations of the RAW.
But that's just me.
Go to the top of the page
 
+Quote Post
Lantzer
post Feb 4 2012, 03:41 AM
Post #16


Moving Target
**

Group: Members
Posts: 693
Joined: 26-March 03
Member No.: 4,335



QUOTE (Draco18s @ Feb 3 2012, 10:40 PM) *
That is not how that works. Stealth (program) hides your matrix icon.


Not from what I see here in 4A under matrix perception.

To analyse a matrix icon, node, program, etc, you have to make matrix perceptiion test (with Analyze icon/node)
The hits you get determine how much information you can get on that icon with that test.
A target icon with a stealth program reduces your hits with an opposed test.
You need this information to tell you if the icon is ecrypted, or has a data bomb, or even whether the icon represents a user or a program or a node (there's a list of what each net hit can tell you).

You can't deal with an icon's defenses until you've identified them. For example, flip to the next page and look up the "disarm data bomb" paragraph. If you can't see it you can't disarm it.
This is why I suggest that a stealth program is useful to slow down a hacking attempt. It will take the hacker more time to get all the hits he needs to get all the information he needs to crack your security. Without a stealth progam, the hacker can probably get all the hits he needs on the first test, because there is no opposed roll.


Also, (what you mentioned) if your net perception hits are zero, you lose the icon in the data traffic.
Go to the top of the page
 
+Quote Post
Midas
post Feb 4 2012, 03:58 AM
Post #17


Moving Target
**

Group: Members
Posts: 662
Joined: 25-May 11
Member No.: 30,406



QUOTE (Fortinbras @ Feb 3 2012, 11:36 PM) *
As a GM I would rule that once you hit the Target Number of the lowest Encryption you could see everything that user sends, but not what the higher users sends until you reach his TN.
I don't know if this is represented by RAW, but getting only half a conversation for a few turns is a cool narrative trick and, I feel, adds to the fun of the game and is therefore superior to interpretations of the RAW.
But that's just me.

Makes perfect sense to me. Communications from the lower rating encryption should be easier to decrypt.
Go to the top of the page
 
+Quote Post
Tymeaus Jalynsfe...
post Feb 4 2012, 04:08 AM
Post #18


Prime Runner Ascendant
**********

Group: Members
Posts: 17,568
Joined: 26-March 09
From: Aurora, Colorado
Member No.: 17,022



QUOTE (Midas @ Feb 3 2012, 08:58 PM) *
Makes perfect sense to me. Communications from the lower rating encryption should be easier to decrypt.


The problem is that in Signals Communications and encryption, you cannot communicate between communications units if you are using two seperate encryption shcemes (At least not from my experience). Both ends must be running the same scheme.

In this case, I would rate the Encrtyption at the lowest of the two on the subscription. They must be using equivalent (the same) Encryption to encrypt their communications signals. It is really not that big of an issue, though, as Encryption is a Common Use Program, and is relatively cheap. *shrug*
Though I am pretty sure this is not really addressed in the books, it only makes a bit of sense; at least from my experience running an encrypted Tactical Network in the Marine Corps (While I was in the First Gulf War). Been a Lot of years, though, and things may have changed a bit since then.
Go to the top of the page
 
+Quote Post
Yerameyahu
post Feb 4 2012, 04:10 AM
Post #19


Advocatus Diaboli
**********

Group: Members
Posts: 13,994
Joined: 20-November 07
From: USA
Member No.: 14,282



It's important not to use reality with any of the matrix rules. (IMG:style_emoticons/default/biggrin.gif) By the crazy rules, it seems to be that one side has the program, and the other side has the password. If they happen to both be doing that in opposite directions, it doesn't change things.
Go to the top of the page
 
+Quote Post
Tymeaus Jalynsfe...
post Feb 4 2012, 04:38 AM
Post #20


Prime Runner Ascendant
**********

Group: Members
Posts: 17,568
Joined: 26-March 09
From: Aurora, Colorado
Member No.: 17,022



QUOTE (Yerameyahu @ Feb 3 2012, 09:10 PM) *
It's important not to use reality with any of the matrix rules. (IMG:style_emoticons/default/biggrin.gif) By the crazy rules, it seems to be that one side has the program, and the other side has the password. If they happen to both be doing that in opposite directions, it doesn't change things.


Yeah, I guess... Though Aesthetically, I woulod still err on the Lower of the two Encryption Programs. *Shrug*
Go to the top of the page
 
+Quote Post
Draco18s
post Feb 4 2012, 04:52 AM
Post #21


Immortal Elf
**********

Group: Members
Posts: 10,289
Joined: 2-October 08
Member No.: 16,392



QUOTE (Lantzer @ Feb 3 2012, 10:41 PM) *
Not from what I see here in 4A under matrix perception.

To analyse a matrix icon, node, program, etc, you have to make matrix perceptiion test (with Analyze icon/node)
The hits you get determine how much information you can get on that icon with that test.
A target icon with a stealth program reduces your hits with an opposed test.
You need this information to tell you if the icon is ecrypted, or has a data bomb, or even whether the icon represents a user or a program or a node (there's a list of what each net hit can tell you).

You can't deal with an icon's defenses until you've identified them. For example, flip to the next page and look up the "disarm data bomb" paragraph. If you can't see it you can't disarm it.
This is why I suggest that a stealth program is useful to slow down a hacking attempt. It will take the hacker more time to get all the hits he needs to get all the information he needs to crack your security. Without a stealth progam, the hacker can probably get all the hits he needs on the first test, because there is no opposed roll.


Also, (what you mentioned) if your net perception hits are zero, you lose the icon in the data traffic.


None of that deals with intercepting wireless traffic, which I'd like to point out, are RADIO WAVES, and can't be stealthed.
Go to the top of the page
 
+Quote Post
Fortinbras
post Feb 4 2012, 09:24 AM
Post #22


Moving Target
**

Group: Members
Posts: 772
Joined: 12-December 07
From: Fort Worth, Texas
Member No.: 14,589



QUOTE (lunavoco @ Feb 3 2012, 03:44 PM) *
1) I want to hack into a johnson's PAN. I'm pretty sure that it exists, but running in Hidden mode. SR4A 230 gives me the process for Detect Hidden Node, E. Warfare + Scan (4). If's he's actively running a stealth program does the test change? I could have sworn his stealth affected this in some way...

No, but a non-standard wireless link does.
Stealth is more of a hacker thing while detecting nodes and intercepting signals is more of a rigger thing.
While I don't find any precedent for it in the rules, you're welcome to add Stealth to the test if you want to. I wouldn't recommend it, though. It would make finding an enemy node once combat has begun a more time consuming process so your hacker feels useless for a few IPs while everybody else is slinging spells and shooting baddies.

QUOTE (Tymeaus Jalynsfein @ Feb 4 2012, 12:38 AM) *
Yeah, I guess... Though Aesthetically, I woulod still err on the Lower of the two Encryption Programs. *Shrug*

I can see that. I think I'd just say you can detect one side of the conversation because of the wibbly-wobbley, hacky-wackey thing someone invented with ASIST or something like that. As I said, narrative flavour I dig; nothing more.
Go to the top of the page
 
+Quote Post
Lantzer
post Feb 5 2012, 01:44 AM
Post #23


Moving Target
**

Group: Members
Posts: 693
Joined: 26-March 03
Member No.: 4,335



QUOTE (Draco18s @ Feb 4 2012, 05:52 AM) *
None of that deals with intercepting wireless traffic, which I'd like to point out, are RADIO WAVES, and can't be stealthed.


True.

Sorry, apparently I'm confused. I thought the discussion was about hacking a hidden node.

Stealth does absolutely nothing about finding a hidden node. That's entirely up to the EW+Scan pool vs a static difficulty.
Stealth comes in on the next step - hacking said icon. Just because you located the transmitter, doesn't mean you can pick out the icon and hack it quickly.

If intercepting signals is your thing, yes, you have a 2-3 step process (in which stealth does nothing because you aren't interacting with anything - its all passive):
1) If its a hidden node's transmissions, you first need to detect/isolate the signal by locating the hidden node (otherwise it's hidden in the EM background). A non-hidden node's signals are automatically detected, as they are loudly proclaiming "here I am!" to the world.
2) This detected signal has to be Decrypted if it is encrypted. Fairly straightforward - it's out there for anyone to look at, once found. It's easy to see if it's garbled. The nice thing, as previously mentioned here, is the other end of the traffic is using the same encryption.
3) Now it can be Captured.

Interception lets you listen in on a node's traffic, but won't let you hack or spoof without analysing the icon on one end or the other of the traffic. You need the valid access ID.
Go to the top of the page
 
+Quote Post

Reply to this topicStart new topic

 



RSS Lo-Fi Version Time is now: 19th April 2024 - 07:41 PM

Topps, Inc has sole ownership of the names, logo, artwork, marks, photographs, sounds, audio, video and/or any proprietary material used in connection with the game Shadowrun. Topps, Inc has granted permission to the Dumpshock Forums to use such names, logos, artwork, marks and/or any proprietary materials for promotional and informational purposes on its website but does not endorse, and is not affiliated with the Dumpshock Forums in any official capacity whatsoever.