IPB

Welcome Guest ( Log In | Register )

4 Pages V   1 2 3 > »   
Reply to this topicStart new topic
> Matrix questions
almost normal
post May 2 2012, 04:47 PM
Post #1


Running Target
***

Group: Banned
Posts: 1,105
Joined: 23-August 10
Member No.: 18,961



Gming a game, the Matrix is still pretty fuzzy to me and my group. I'd appreciate some answers on a few questions. For ease of reference, all page numbers will be using SR4a, unless otherwise noted.

Deleting information off a commlink. How does that work? 230 seems to indicate the edit software, but that seems odd. For one, it means that deltree *.* is harder to pull off then actively changing a face on a video feed. Two, it also seems to indicate that it's something that has to be actively done over several passes. Lastly, can this information, outside of GM/CSI fiat, be brought back?

Black Ice/Hammer/Out. It prevents the hacker from jacking out unless they make a test, and even if they do succeed in such a test, they suffer dumpshock. If a hacker is literally 'jacked in', will a second player unplugging the hacker make the willpower test an auto success, or will some further damage result? Secondly, if attacking an AI with Black ICe, it's nearly guaranteed to succeed, as the AI would lack biofeedback filters, however, neither of the 3 black programs seem to be able to affect the AI's damage tracks. Is this intentional, or are we doing it wrong?

Tracing. Against a reasonable stealth program, it seems to take forever. Is this intentional? Will a trace program narrow down the Access ID/location of the program in ever decreasing circles? What's the main point of tracing if a hacker can quickly and easily change his Access ID number?

Terminate Connection, possibly a subset of the last question, do you need the Access ID of the intruder to terminate their connection?
Go to the top of the page
 
+Quote Post
Warlordtheft
post May 2 2012, 05:43 PM
Post #2


Neophyte Runner
*****

Group: Members
Posts: 2,328
Joined: 2-April 07
From: The Center of the Universe
Member No.: 11,360



Deleting files on a commlink that you own is a no-test situation. Removing a file in a hostile system is not as easy (at least permanently) since the system has back-ups. Even in a hostile system it would be a no roll needed.

IIRC Black out and Hammer IC and programs don't affect programs (they attack the meat). Since an AI is not a program, well then it stands to reason these kinds of programs won't affect them.

Oh god I don't recall the detail on a trace program. THe few games I had involve Technos, and tracing them leads to a 404 error.

Ditto on the last item-but I don't think they can. They could hack you commlink and shut it doen, but they could also nuke you from orbit.

Go to the top of the page
 
+Quote Post
almost normal
post May 2 2012, 05:48 PM
Post #3


Running Target
***

Group: Banned
Posts: 1,105
Joined: 23-August 10
Member No.: 18,961



For the first question, the situation was the team's infiltrator had gotten knocked out, and the team's AI had gone into the infiltrator's commlink and was attempting to delete all of it's information before the infiltrator got captured. I didn't require a test for that, but the rules seem to imply a timeframe required to do so anyway.
Go to the top of the page
 
+Quote Post
Ryu
post May 2 2012, 07:52 PM
Post #4


Awakened Asset
********

Group: Members
Posts: 4,464
Joined: 9-April 05
From: AGS, North German League
Member No.: 7,309



QUOTE (almost normal @ May 2 2012, 06:47 PM) *
Deleting information off a commlink. How does that work? 230 seems to indicate the edit software, but that seems odd. For one, it means that deltree *.* is harder to pull off then actively changing a face on a video feed. Two, it also seems to indicate that it's something that has to be actively done over several passes. Lastly, can this information, outside of GM/CSI fiat, be brought back?

Should be rare, but a search on the Resonance Realms could bring the info back. Also, save early, save often, backup your data.
QUOTE
Black Ice/Hammer/Out. It prevents the hacker from jacking out unless they make a test, and even if they do succeed in such a test, they suffer dumpshock. If a hacker is literally 'jacked in', will a second player unplugging the hacker make the willpower test an auto success, or will some further damage result? Secondly, if attacking an AI with Black ICe, it's nearly guaranteed to succeed, as the AI would lack biofeedback filters, however, neither of the 3 black programs seem to be able to affect the AI's damage tracks. Is this intentional, or are we doing it wrong?

Pulling the cable is auto-disconnect and normal dumpshock. Not really important why the connection was severed.

QUOTE
Tracing. Against a reasonable stealth program, it seems to take forever. Is this intentional? Will a trace program narrow down the Access ID/location of the program in ever decreasing circles?

Assuming Trace rating = Targets Stealth rating, and a target unaware of the trace happening (UW pg. 104), you need to roll 30 dice on average to get 10 hits. Use hot sim: 30/(Computer skill +2) complex actions at 3 IP/turn. Should that be too slow, you can hack the target and look for location data.
QUOTE
What's the main point of tracing if a hacker can quickly and easily change his Access ID number?
Terminate Connection, possibly a subset of the last question, do you need the Access ID of the intruder to terminate their connection?

Changing your access ID cuts all your subscriptions. Not convenient. Less so if you need to hack your way back in.
And yes, unless it´s "big red lever time" and innocent bystanders are of no concern. It is usually easy to get via matrix perception.
Go to the top of the page
 
+Quote Post
almost normal
post May 2 2012, 08:18 PM
Post #5


Running Target
***

Group: Banned
Posts: 1,105
Joined: 23-August 10
Member No.: 18,961



Thanks alot Ryu. Any idea on the timeframe or actions required to delete the info on a commlink?

As for tracing, I was having a spider bring up a trace ICe. Is it usually the other way around, with the spider tracing and the ICe attacking? Could I also trouble you to elaborate on

QUOTE
Should that be too slow, you can hack the target and look for location data.


Lastly, and I realize this may be a wonky question, trace allows you to "trace an icon back to it's originating node." Would this find an AI's home node? Or merely the commlink the AI initiated it's attacks from?
Go to the top of the page
 
+Quote Post
Ryu
post May 2 2012, 08:43 PM
Post #6


Awakened Asset
********

Group: Members
Posts: 4,464
Joined: 9-April 05
From: AGS, North German League
Member No.: 7,309



Using Edit is a complex action.

Depends on the dicepools and why you want to trace. Since ICE will eventually succeed, the matrix specialist should generally do the more critical stuff.


If you are already engaged on the matrix, you don´t really care if you raise any alerts on the hackers side. Hack the attackers node - you won´t need a physical location for that. Look for map software. Ask "Where am I?". Your ICE defends the attacked node, and your matrix specialist creates a second front.


Not sure what you mean. Trace finds the originating node of the AI, not the last link of a multi-node connection.
Go to the top of the page
 
+Quote Post
almost normal
post May 2 2012, 08:53 PM
Post #7


Running Target
***

Group: Banned
Posts: 1,105
Joined: 23-August 10
Member No.: 18,961



QUOTE (Ryu @ May 2 2012, 03:43 PM) *
If you are already engaged on the matrix, you don´t really care if you raise any alerts on the hackers side. Hack the attackers node - you won´t need a physical location for that. Look for map software. Ask "Where am I?". Your ICE defends the attacked node, and your matrix specialist creates a second front.


Not sure what you mean. Trace finds the originating node of the AI, not the last link of a multi-node connection.


Thanks for taking the time to explain a few things.

For the map hack, I thought you needed to actually find the hackers node first? As I understood it, the Icon/persona that appears has nothing that can be hacked, only attacked, and that a successful trace of the icon was needed to find the node. Once found, *that* can be hacked. Is this correct? Or is the trace irrelevant, and you can directly "hack on the fly" against an intruding icon?

As for the AI question, I suppose it's just a complication of the existence of a "home node". The AI tends to exist mainly in his own commlink, that a member of the running team carries on their person. For all intents and purposes, the AI only exists on that commlink. However, should he be attacked and damaged past his track, he will reassemble at the home node. I was wondering if trace would go back to the home node, or only the commlink.
Go to the top of the page
 
+Quote Post
Yerameyahu
post May 2 2012, 08:57 PM
Post #8


Advocatus Diaboli
**********

Group: Members
Posts: 13,994
Joined: 20-November 07
From: USA
Member No.: 14,282



I'm not aware that 'the commlink' and 'the home node' can be anything other than one and the same.
Go to the top of the page
 
+Quote Post
Ryu
post May 2 2012, 09:25 PM
Post #9


Awakened Asset
********

Group: Members
Posts: 4,464
Joined: 9-April 05
From: AGS, North German League
Member No.: 7,309



QUOTE (almost normal @ May 2 2012, 10:53 PM) *
For the map hack, I thought you needed to actually find the hackers node first? As I understood it, the Icon/persona that appears has nothing that can be hacked, only attacked, and that a successful trace of the icon was needed to find the node. Once found, *that* can be hacked. Is this correct? Or is the trace irrelevant, and you can directly "hack on the fly" against an intruding icon?

You Analyse the hackers icon. The Precious pg. 228, sidebar, first item of the list. Access ID. You hack the node with that ID. Trace gives you a physical location, which is not needed for hacking.
Go to the top of the page
 
+Quote Post
Eratosthenes
post May 2 2012, 09:42 PM
Post #10


Moving Target
**

Group: Members
Posts: 356
Joined: 3-April 10
Member No.: 18,409



QUOTE (almost normal @ May 2 2012, 12:47 PM) *
Deleting information off a commlink. How does that work? 230 seems to indicate the edit software, but that seems odd. For one, it means that deltree *.* is harder to pull off then actively changing a face on a video feed. Two, it also seems to indicate that it's something that has to be actively done over several passes. Lastly, can this information, outside of GM/CSI fiat, be brought back?


If you have admin rights, you can delete a file without a test. However, it is likely not completely gone. Most systems would have a backup process, and the file(s) could be restored from backup. Check the Corrupt program in Unwired for some information regarding this (pg 111-112).

QUOTE (almost normal @ May 2 2012, 12:47 PM) *
Black Ice/Hammer/Out. It prevents the hacker from jacking out unless they make a test, and even if they do succeed in such a test, they suffer dumpshock. If a hacker is literally 'jacked in', will a second player unplugging the hacker make the willpower test an auto success, or will some further damage result? Secondly, if attacking an AI with Black ICe, it's nearly guaranteed to succeed, as the AI would lack biofeedback filters, however, neither of the 3 black programs seem to be able to affect the AI's damage tracks. Is this intentional, or are we doing it wrong?


Black * programs don't affect IC/AI's nor other programs.

QUOTE (almost normal @ May 2 2012, 12:47 PM) *
Tracing. Against a reasonable stealth program, it seems to take forever. Is this intentional? Will a trace program narrow down the Access ID/location of the program in ever decreasing circles? What's the main point of tracing if a hacker can quickly and easily change his Access ID number?


A hacker changing their Access ID loses all of their subscriptions, so is kicked out of any systems they're in.

How the trace works (i.e. narrows down the location as it approaches the extended test threshold) is up to the GM.

Try loading the IC with it's own Stealth program; therefore it likely gets a jump start on tracing the offending icon (the hacker) before they even detect it (i.e. matrix perception).

QUOTE (almost normal @ May 2 2012, 12:47 PM) *
Terminate Connection, possibly a subset of the last question, do you need the Access ID of the intruder to terminate their connection?


The node/hacker/spyder just needs to have identified the offending icon via a matrix perception test, and have the appropriate priviledges (i.e. admin).
Go to the top of the page
 
+Quote Post
Eratosthenes
post May 2 2012, 09:43 PM
Post #11


Moving Target
**

Group: Members
Posts: 356
Joined: 3-April 10
Member No.: 18,409



QUOTE (Ryu @ May 2 2012, 05:25 PM) *
You Analyse the hackers icon. The Precious pg. 228, sidebar, first item of the list. Access ID. You hack the node with that ID. Trace gives you a physical location, which is not needed for hacking.


And don't forget, even if the icon logs off the system, if you have their Access ID, you can still trace them to their current location.
Go to the top of the page
 
+Quote Post
almost normal
post May 2 2012, 10:30 PM
Post #12


Running Target
***

Group: Banned
Posts: 1,105
Joined: 23-August 10
Member No.: 18,961



QUOTE (Yerameyahu @ May 2 2012, 03:57 PM) *
I'm not aware that 'the commlink' and 'the home node' can be anything other than one and the same.


There doesn't seem to be anything that suggests that at all.

QUOTE
Black * programs don't affect IC/AI's nor other programs.


After looking into it further, you're (and the other kind folks who suggested it) right. Somehow we arrived at the conclusion that the connection would be jammed open, but the damage wouldn't take effect.

Thanks for the rest of the answers guys, it helped a lot!
Go to the top of the page
 
+Quote Post
almost normal
post May 2 2012, 10:36 PM
Post #13


Running Target
***

Group: Banned
Posts: 1,105
Joined: 23-August 10
Member No.: 18,961



*EDIT* Nevermind, found it.
Go to the top of the page
 
+Quote Post
Yerameyahu
post May 2 2012, 11:09 PM
Post #14


Advocatus Diaboli
**********

Group: Members
Posts: 13,994
Joined: 20-November 07
From: USA
Member No.: 14,282



QUOTE
There doesn't seem to be anything that suggests that at all.
Where does it suggest that the they can be different? Like I said, I'm not aware, but I'm happy to learn. AFAIK, the AI lives in the home node, and does everything remotely from there; that's his body, his bionode, his 'commlink'. If, as you say, "The AI tends to exist mainly in his own commlink, that a member of the running team carries on their person." and "For all intents and purposes, the AI only exists on that commlink"… that's his home node. That's the complete definition of home node (again, AFAIK).
Go to the top of the page
 
+Quote Post
_Pax._
post May 2 2012, 11:22 PM
Post #15


Neophyte Runner
*****

Group: Validating
Posts: 2,492
Joined: 19-April 12
Member No.: 51,818



QUOTE (almost normal @ May 2 2012, 06:30 PM) *
There doesn't seem to be anything that suggests that at all.

In fact, there are several things that suggest just the opposite. For example, there are Lifestyle qualities that involve an AI taking up residence in your apartment's Home Network Node.

An AI put together less as a Hacker and more as a Rigger (Pilot origin, for example) might prefer a nicely-kitted-out drone as it's home node, for example.
Go to the top of the page
 
+Quote Post
Yerameyahu
post May 2 2012, 11:32 PM
Post #16


Advocatus Diaboli
**********

Group: Members
Posts: 13,994
Joined: 20-November 07
From: USA
Member No.: 14,282



I'm just trying to figure this out. The AI must have a home node. It can then load itself onto other nodes, basically traveling around (while leaving its home node 'empty'). But surely it can't "exist mainly" on the non-home node, or "For all intents and purposes, […] only exist on that" non-home node. It's just temporarily loaded there.

Pax, of course any node can be your home node, and you can change home nodes with the relevant Extended tests. What are you saying about 'suggests the opposite', and of what?
Go to the top of the page
 
+Quote Post
DMiller
post May 2 2012, 11:40 PM
Post #17


Moving Target
**

Group: Dumpshocked
Posts: 681
Joined: 23-March 10
From: Japan
Member No.: 18,343



I think what the OP is saying as far as the home node issue is:

The AI has a Home Node, perhaps a CHN somewhere, but is currently “riding along” in someone’s comlink. So if traced would he be traced to his CHN (where he is not) or to the comlink (where he is)?

I’d say if he is getting the various Home Node bonuses he is in his Home Node and will be traced to there, if he is only using the stats from the comlink that he is currently sitting in than that is where he will be traced to.

I see the Home Node as literally the AI’s Home, it can leave home to work but will return there like anyone else when the job is done and it’s time to rest.

Just my 2¥
-D
Go to the top of the page
 
+Quote Post
_Pax._
post May 2 2012, 11:56 PM
Post #18


Neophyte Runner
*****

Group: Validating
Posts: 2,492
Joined: 19-April 12
Member No.: 51,818



QUOTE (Yerameyahu @ May 2 2012, 06:32 PM) *
Pax, of course any node can be your home node, and you can change home nodes with the relevant Extended tests. What are you saying about 'suggests the opposite', and of what?


Your ocmment:
QUOTE (Yerameyahu @ May 2 2012, 03:57 PM) *
I'm not aware that 'the commlink' and 'the home node' can be anything other than one and the same.


.... led me to believe that at least one person thought that AI PCs had to reside on a commlink.
Go to the top of the page
 
+Quote Post
Yerameyahu
post May 3 2012, 12:08 AM
Post #19


Advocatus Diaboli
**********

Group: Members
Posts: 13,994
Joined: 20-November 07
From: USA
Member No.: 14,282



Oh, I dig. Thanks. I had gotten a different read, DMiller: that the the commlink (in the example) was somehow his 'primary residence' but not his 'home node'. I agree: the AI 'lives' at the home node, but can leave home to do things. And yes, the confusion didn't affect the other question: the AI is traced to 'where he is'/'where he's calling from', not to his (empty) home node. (IMG:style_emoticons/default/smile.gif)
Go to the top of the page
 
+Quote Post
Eratosthenes
post May 3 2012, 12:13 AM
Post #20


Moving Target
**

Group: Members
Posts: 356
Joined: 3-April 10
Member No.: 18,409



Information regarding autonomous program's Access ID's is on pg. 110 of Unwired. Basically, they can only spoof their Access ID when logging onto a node. Otherwise it serves as a trail through the internet.

So a Track program would trace them back to the last time they spoofed their Access ID, when logging into a node. I'm not entirely sure of the mechanics of doing that, though.
Go to the top of the page
 
+Quote Post
almost normal
post May 3 2012, 02:10 AM
Post #21


Running Target
***

Group: Banned
Posts: 1,105
Joined: 23-August 10
Member No.: 18,961



QUOTE (Eratosthenes @ May 2 2012, 08:13 PM) *
Information regarding autonomous program's Access ID's is on pg. 110 of Unwired. Basically, they can only spoof their Access ID when logging onto a node. Otherwise it serves as a trail through the internet.

So a Track program would trace them back to the last time they spoofed their Access ID, when logging into a node. I'm not entirely sure of the mechanics of doing that, though.



Unfortunately, that section is dealing on autonomous programs, and not PC AIs. The AI section reads

QUOTE
Artificial intelligences all have their own access ID (p. 216,
SR4). This access ID is more entrenched in the core of the metasapient’s
being than it is in a more mundane device or program. As
a result, it takes longer for an AI to alter its access ID with a Spoof
program, as it must alter and rework a part of itself. To spoof its
own access ID, it must succeed in an Extended Software + Spoof
(AI’s Rating, 1 day) Test.


It seems to make it specifically harder to change access IDs for AIs, perhaps because it's harder to trace them? (As they cannot be hit with BlackIC for the -2 threshold to trace)

Still, the problem remains as to what you would be entering if you queued up the AI's AID. As the entire persona/AI can be in the node it's intruding, it almost seems counter-intuitive to track it only to arrive back at your own node.
Go to the top of the page
 
+Quote Post
Eratosthenes
post May 3 2012, 02:14 AM
Post #22


Moving Target
**

Group: Members
Posts: 356
Joined: 3-April 10
Member No.: 18,409



QUOTE (almost normal @ May 2 2012, 10:10 PM) *
Unfortunately, that section is dealing on autonomous programs, and not PC AIs. The AI section reads



It seems to make it specifically harder to change access IDs for AIs, perhaps because it's harder to trace them? (As they cannot be hit with BlackIC for the -2 threshold to trace)

Still, the problem remains as to what you would be entering if you queued up the AI's AID. As the entire persona/AI can be in the node it's intruding, it almost seems counter-intuitive to track it only to arrive back at your own node.


Well, looking at the part on autonomous programs, I would think tracing the Access ID of an AI would lead back to the node from which the AI last was in. Whether or not one could continue to trace further would be determined by whether or not the tracking entity had access to that node.

I.e. AI Bob hacks System X via a matrix connection from Runner Joe's commlink. If traced, Runner Joe's commlink would show as the origin of AI Bob's attack.

But it doesn't seem to be etched in stone anywhere. That's just my interpretation.
Go to the top of the page
 
+Quote Post
Halinn
post May 3 2012, 02:40 AM
Post #23


Running Target
***

Group: Members
Posts: 1,018
Joined: 3-July 10
Member No.: 18,786



I seem to recall some fluff about using extraterritoriality on the matrix to 'stop' a trace, i.e. if you want to hack NeoNET node Q12E551Z3, you could first hack Renraku node B99aZ48, and through that hack Ares node T3001, all the while actually starting from your home node in a Horizon-owned public library. Assuming that you have time to slow hack some bottom-level accounts on the connecting nodes, it should provide a decent safety net against enemy spiders.
Go to the top of the page
 
+Quote Post
Ryu
post May 3 2012, 07:15 AM
Post #24


Awakened Asset
********

Group: Members
Posts: 4,464
Joined: 9-April 05
From: AGS, North German League
Member No.: 7,309



The AI has a home node, but can leave it. RW pg. 88, Welcome to My Mind.

Not having a home node is bad - RW pg. 90, Node Sweet Node. (Depending on stats, building a new home fast can be a top priority.)

Destruction of a node the AI moved to is bad. Destruction of a Home node the AI is not residing in requires finding a new home, but does not lead to destruction. RW pg. 90, Realignment and Restoration.


A trace will find the node the AI is on - in your example the team members commlink. If it works from its home node (toaster in the riggers kitchen or whatever), that location is traced. Stay "on the team" and you don´t have a long-range connection to maintain, stay home and you face less danger of physical destruction. Think "taking home in the primary battle drone" vs. "well hidden stationary home node".
Go to the top of the page
 
+Quote Post
_Pax._
post May 3 2012, 01:33 PM
Post #25


Neophyte Runner
*****

Group: Validating
Posts: 2,492
Joined: 19-April 12
Member No.: 51,818



.... or work from an "office" installed in a low-signature Renraku Stormcloud that can park a thousand meters over the area the meat team will be operating in (bring your Sunday Best signal rating of 6, natch).
Go to the top of the page
 
+Quote Post

4 Pages V   1 2 3 > » 
Reply to this topicStart new topic

 



RSS Lo-Fi Version Time is now: 3rd October 2025 - 06:32 PM

Topps, Inc has sole ownership of the names, logo, artwork, marks, photographs, sounds, audio, video and/or any proprietary material used in connection with the game Shadowrun. Topps, Inc has granted permission to the Dumpshock Forums to use such names, logos, artwork, marks and/or any proprietary materials for promotional and informational purposes on its website but does not endorse, and is not affiliated with the Dumpshock Forums in any official capacity whatsoever.