IPB

Welcome Guest ( Log In | Register )

4 Pages V  < 1 2 3 4 >  
Reply to this topicStart new topic
> Matrix questions
almost normal
post May 3 2012, 02:00 PM
Post #26


Running Target
***

Group: Banned
Posts: 1,105
Joined: 23-August 10
Member No.: 18,961



Here's how I'm going to rule it, and I think hitting it with a fresh mind this morning helped, as I'm seeing it more logically.

The AI has to realign every night, or sleep, for lack of a better term, in it's home node. To leave the home node, it needs to access the Matrix, which it does with an Access ID. This Access ID therefore is going to link back to the home node. Now while normally a matrix specialist could spoof up an Access ID and move on from there, the process to spoof an AID for an AI takes days, making this precautionary step nearly impossible. Breaking it down logically.

To leave a home node, it has to have an Access ID.
To change an AID requires a day or more's worth of time.
If a day or more's time goes by, the AI needs to go back to it's home-node to realign.

Make sense?
Go to the top of the page
 
+Quote Post
Yerameyahu
post May 3 2012, 02:36 PM
Post #27


Advocatus Diaboli
**********

Group: Members
Posts: 13,994
Joined: 20-November 07
From: USA
Member No.: 14,282



The Access ID shouldn't specially link back the home node, though. It's intrinsic to the AI itself.
Go to the top of the page
 
+Quote Post
almost normal
post May 3 2012, 02:46 PM
Post #28


Running Target
***

Group: Banned
Posts: 1,105
Joined: 23-August 10
Member No.: 18,961



QUOTE (Yerameyahu @ May 3 2012, 09:36 AM) *
The Access ID shouldn't specially link back the home node, though. It's intrinsic to the AI itself.


The AID will always link to a node, which by definition, rules out it linking to the AI.
Go to the top of the page
 
+Quote Post
Yerameyahu
post May 3 2012, 02:55 PM
Post #29


Advocatus Diaboli
**********

Group: Members
Posts: 13,994
Joined: 20-November 07
From: USA
Member No.: 14,282



I said it doesn't link *specially* to the home node. It links to whatever node the AI was/is on/connecting-through. The Access ID is explicitly intrinsic to the AI (same for agents, of course). So looking for the AIs Access ID would never lead to the home node, if the AI was actually somewhere else.
Go to the top of the page
 
+Quote Post
almost normal
post May 3 2012, 03:04 PM
Post #30


Running Target
***

Group: Banned
Posts: 1,105
Joined: 23-August 10
Member No.: 18,961



QUOTE (Yerameyahu @ May 3 2012, 09:55 AM) *
I said it doesn't link *specially* to the home node. It links to whatever node the AI was/is on/connecting-through. The Access ID is explicitly intrinsic to the AI (same for agents, of course). So looking for the AIs Access ID would never lead to the home node, if the AI was actually somewhere else.


I'm pretty sure that doesn't really jive with the rules. When you enter an AID, you don't go to where that AID is currently browsing, you go to it's address. After browsing through the rules, I see nothing to support a node sharing multiple AIDs. Please support your statement with direct rules references.
Go to the top of the page
 
+Quote Post
Eratosthenes
post May 3 2012, 03:08 PM
Post #31


Moving Target
**

Group: Members
Posts: 356
Joined: 3-April 10
Member No.: 18,409



Access ID's are either 1) the network ID of whatever device is being used to generate the persona program used to access the Matrix (for meat users of the Matrix, their commlink, CHN, or Nexus), or 2) the software ID for autonomous software (which includes AI).

Thus an AI's access ID points to themselves. The Track program simply follows their trail of what nodes they were in.

Having an AI's Access ID point to their home node means that every time that AI hacks into somewhere...they're going to need a new home node. It's very difficult not to leave your Access ID behind when you hack into someplace, as the act of logging off/disconnecting leaves an entry in the Access Log of a system that can be used for a trace. And since it's difficult for AI's to change their Access ID...
Go to the top of the page
 
+Quote Post
almost normal
post May 3 2012, 03:15 PM
Post #32


Running Target
***

Group: Banned
Posts: 1,105
Joined: 23-August 10
Member No.: 18,961



QUOTE (Eratosthenes @ May 3 2012, 10:08 AM) *
Having an AI's Access ID point to their home node means that every time that AI hacks into somewhere...they're going to need a new home node. It's very difficult not to leave your Access ID behind when you hack into someplace, as the act of logging off/disconnecting leaves an entry in the Access Log of a system that can be used for a trace. And since it's difficult for AI's to change their Access ID...


Define very difficult? I'm not meaning to be argumentitive, but every hacker I've seen goes straight for admin control, where they can wipe the Access Logs. Granted, my playing experience is limited to two playgroups and 2 con groups.

It's also not my intention to fuck our hacker over, it's just that at the moment, the AID is the only thing I can think of to use to attack him. If he runs into any kind of danger, it seems that he can log off (as Black ICe can't jam him), jump onto a commlink, set it's signal to 0 (or off entirely), and he's home free.
Go to the top of the page
 
+Quote Post
_Pax._
post May 3 2012, 03:17 PM
Post #33


Neophyte Runner
*****

Group: Validating
Posts: 2,492
Joined: 19-April 12
Member No.: 51,818



Gotta agree with Eratosthenes and Yerameyahu, here.
Go to the top of the page
 
+Quote Post
Yerameyahu
post May 3 2012, 03:18 PM
Post #34


Advocatus Diaboli
**********

Group: Members
Posts: 13,994
Joined: 20-November 07
From: USA
Member No.: 14,282



I didn't say anything about 'a node sharing multiple Access IDs'. Access IDs are your digital fingerprint, not your digital address. The AI leaves records of its Access ID on each node it travels to, routes through, or accesses. That is what Trace traces: their trail, their scent. Trace does not get the AI's Access ID and then knock on their home node. It's the same for independent agents, and it's the same for all other hackers, really: you follow the trail they left, which will lead back to the node they were using (unless they change the Access ID, which of course they will).
Go to the top of the page
 
+Quote Post
_Pax._
post May 3 2012, 03:25 PM
Post #35


Neophyte Runner
*****

Group: Validating
Posts: 2,492
Joined: 19-April 12
Member No.: 51,818



QUOTE (almost normal @ May 3 2012, 11:15 AM) *
Define very difficult?

To change their AccesID, an AI has to make an Extended test, with an interfalof ONE DAY, not one Complex Action.

QUOTE
It's also not my intention to fuck our hacker over, it's just that at the moment, the AID is the only thing I can think of to use to attack him. If he runs into any kind of danger, it seems that he can log off (as Black ICe can't jam him), jump onto a commlink, set it's signal to 0 (or off entirely), and he's home free.

Aside from not being able to get stuck - which should be an uncommon experience for meat-body hackers too - that's no different from an Elf, Human, or whatever Hacker, too.

Meanwhile, as an AI, he has his own particular vulnerabilities and limitations.
Go to the top of the page
 
+Quote Post
Warlordtheft
post May 3 2012, 03:28 PM
Post #36


Neophyte Runner
*****

Group: Members
Posts: 2,328
Joined: 2-April 07
From: The Center of the Universe
Member No.: 11,360



The AID is actually more of an ICON ID rather than an IP address (which is how Almost normal is looking at it). In SR terms the device's IP address is an RTG number (IIRC-could be edition creep though).

That being said, the AI could still be tracked backed to its home node. If it moves to another node, as I recall it still has some presence in its home node.
Go to the top of the page
 
+Quote Post
Yerameyahu
post May 3 2012, 03:37 PM
Post #37


Advocatus Diaboli
**********

Group: Members
Posts: 13,994
Joined: 20-November 07
From: USA
Member No.: 14,282



Yeah, it's tricky in SR4 translating Access ID into RL terms like IP, MAC, etc. It's better to not try, and just go by what the book says. :/

I don't think that's the case. It 'physically leaves' the home node and moves into another node. That movement may leave access log traces (if not deleted), but there's no active 'presence' (subscription, etc.) to the home node. Theoretically, you could even move the AI to a 'working node' via a totally offline route (flash drive?). (IMG:style_emoticons/default/smile.gif)
Go to the top of the page
 
+Quote Post
almost normal
post May 3 2012, 03:47 PM
Post #38


Running Target
***

Group: Banned
Posts: 1,105
Joined: 23-August 10
Member No.: 18,961



QUOTE (_Pax._ @ May 3 2012, 10:25 AM) *
To change their AccesID, an AI has to make an Extended test, with an interfalof ONE DAY, not one Complex Action.


Sorry, let me clarify. You suggested it was very difficult not leaving your AID behind. Since in my experience, most hackers wipe such traces (like most mages wipe their astral signatures), I was asking if there was something I was missing, or clarifying if you meant the +6 threshold made it more difficult.

QUOTE
The AID is actually more of an ICON ID rather than an IP address (which is how Almost normal is looking at it). In SR terms the device's IP address is an RTG number (IIRC-could be edition creep though).


Unwired explicitly states that any node that accesses the Matrix must have it's own unique Access ID, which then links back to the node itself. I'd provide a quote but I'm at work, gleefully talking shadowrun instead of being productive.
Go to the top of the page
 
+Quote Post
Yerameyahu
post May 3 2012, 03:52 PM
Post #39


Advocatus Diaboli
**********

Group: Members
Posts: 13,994
Joined: 20-November 07
From: USA
Member No.: 14,282



The home node has its own Access ID (and easier to change), because it is a node. This is totally distinct from the Access ID of the AI, which is intrinsic to it.
Go to the top of the page
 
+Quote Post
Eratosthenes
post May 3 2012, 03:53 PM
Post #40


Moving Target
**

Group: Members
Posts: 356
Joined: 3-April 10
Member No.: 18,409



QUOTE (almost normal @ May 3 2012, 11:15 AM) *
Define very difficult? I'm not meaning to be argumentitive, but every hacker I've seen goes straight for admin control, where they can wipe the Access Logs. Granted, my playing experience is limited to two playgroups and 2 con groups.

It's also not my intention to fuck our hacker over, it's just that at the moment, the AID is the only thing I can think of to use to attack him. If he runs into any kind of danger, it seems that he can log off (as Black ICe can't jam him), jump onto a commlink, set it's signal to 0 (or off entirely), and he's home free.


Great. They've wiped the acces log. But when they LOG OUT/DISCONNECT, a new entry is put in the access log with their current access ID. And since they're logged out...they can't wipe the access log. See?

It's possible, using an agent or some sort of delayed command perhaps, to do so, but an Agent will never be as skilled at editing the access log as the hacker themselves. And then the Agent's access id can't be tied back to the hacker, or it's all for naught.

A meat hacker can just spoof their access ID after logging off, killing any attempts to trace it. An AI cannot.
Go to the top of the page
 
+Quote Post
almost normal
post May 3 2012, 03:59 PM
Post #41


Running Target
***

Group: Banned
Posts: 1,105
Joined: 23-August 10
Member No.: 18,961



QUOTE (Eratosthenes @ May 3 2012, 10:53 AM) *
Great. They've wiped the acces log. But when they LOG OUT/DISCONNECT, a new entry is put in the access log with their current access ID. And since they're logged out...they can't wipe the access log. See?


I'm fairly certain, but not 100%, that log offs don't register Access ID.

Could a trace action be done off of pure AID?
Go to the top of the page
 
+Quote Post
almost normal
post May 3 2012, 04:09 PM
Post #42


Running Target
***

Group: Banned
Posts: 1,105
Joined: 23-August 10
Member No.: 18,961



QUOTE (Yerameyahu @ May 3 2012, 10:52 AM) *
The home node has its own Access ID (and easier to change), because it is a node. This is totally distinct from the Access ID of the AI, which is intrinsic to it.


Unfortunately, that only adds more confusion. If an AI is riding in a commlink, and uses that commlink to hack, the Commlink would need an AID just to access the Matrix, and the AI already *has* an AID, meaning someone analyzing the AI could potentially see two AIDs.

This is giving me a headache.
Go to the top of the page
 
+Quote Post
_Pax._
post May 3 2012, 04:25 PM
Post #43


Neophyte Runner
*****

Group: Validating
Posts: 2,492
Joined: 19-April 12
Member No.: 51,818



Really, if you weren't confident you could handle the matrix, you shouldn't have allowed a PC AI.

I know _I_ won't, for exactly that reason: I'm not 100% on handling matrix issues during a game session. So, no PC AIs.
Go to the top of the page
 
+Quote Post
Eratosthenes
post May 3 2012, 04:40 PM
Post #44


Moving Target
**

Group: Members
Posts: 356
Joined: 3-April 10
Member No.: 18,409



QUOTE (almost normal @ May 3 2012, 11:59 AM) *
I'm fairly certain, but not 100%, that log offs don't register Access ID.

Could a trace action be done off of pure AID?


Well, color me purple and call me Barney.

Per Unwired, 65, it seems the Log off/Jack Out does not record Access ID.

I think I was giving too much emphasis to this (and misreading it):

QUOTE
If she is in a hurry, she may simply delete the file, but such ham-fisted tactics are a dead giveaway that an intrusion happened. Unless the intruder can figure out a way to delete it, her Log Out or Jack Out action will remain behind, leaving evidence of the incursion but no information on who accomplished it or what was done.


But earlier it quite clearly states that it only leaves a timestamp.

That notwithstanding, all it would take is for the AI to be identified by a node/spyder/IC once, and if their Access ID leads to their Home Node...they'll be looking for a new home node.
Go to the top of the page
 
+Quote Post
almost normal
post May 3 2012, 04:40 PM
Post #45


Running Target
***

Group: Banned
Posts: 1,105
Joined: 23-August 10
Member No.: 18,961



QUOTE (_Pax._ @ May 3 2012, 11:25 AM) *
Really, if you weren't confident you could handle the matrix, you shouldn't have allowed a PC AI.

I know _I_ won't, for exactly that reason: I'm not 100% on handling matrix issues during a game session. So, no PC AIs.


The player knows as much (or as little) about the Matrix as I do, he's also the player least likely to be a dick about abusing rules.

QUOTE
A meat hacker can just spoof their access ID after logging off, killing any attempts to trace it. An AI cannot.


A meat hacker can also be hit with Black ICe, jamming their connection on, an AI cannot.
Go to the top of the page
 
+Quote Post
Ryu
post May 3 2012, 04:43 PM
Post #46


Awakened Asset
********

Group: Members
Posts: 4,464
Joined: 9-April 05
From: AGS, North German League
Member No.: 7,309



See AccessIDs, UW pg. 48 for nodes.

Continue to UW pg. 51 for persona AIDs. Note how the unique persona AID is based on the nodes hardware AID. Just assume the AI has a two-part address of "current node AID + unique AI AID", and stuff should work nicely.

While you are at it, look at UW pg. 53-55 on Data Exchange.
Go to the top of the page
 
+Quote Post
almost normal
post May 3 2012, 04:45 PM
Post #47


Running Target
***

Group: Banned
Posts: 1,105
Joined: 23-August 10
Member No.: 18,961



Thanks Ryu, you're a game saver.
Go to the top of the page
 
+Quote Post
Yerameyahu
post May 3 2012, 04:48 PM
Post #48


Advocatus Diaboli
**********

Group: Members
Posts: 13,994
Joined: 20-November 07
From: USA
Member No.: 14,282



QUOTE
This is giving me a headache.
Yes. I never said they were good rules. I really don't know why independent programs have their one Access ID, honestly. What a mess.

Sounds good, Ryu.
Go to the top of the page
 
+Quote Post
tete
post May 3 2012, 04:53 PM
Post #49


Running Target
***

Group: Members
Posts: 1,095
Joined: 26-February 02
From: Seattle Wa, USA
Member No.: 1,139



QUOTE (almost normal @ May 2 2012, 05:47 PM) *
For one, it means that deltree *.* is harder to pull off then actively changing a face on a video feed.


Its not based on the real world its base on Tron. GM fiat and handwaving should be the norm, reserve tests for something important.
Go to the top of the page
 
+Quote Post
Ryu
post May 3 2012, 05:00 PM
Post #50


Awakened Asset
********

Group: Members
Posts: 4,464
Joined: 9-April 05
From: AGS, North German League
Member No.: 7,309



QUOTE (Eratosthenes @ May 3 2012, 02:13 AM) *
Information regarding autonomous program's Access ID's is on pg. 110 of Unwired. Basically, they can only spoof their Access ID when logging onto a node. Otherwise it serves as a trail through the internet.

So a Track program would trace them back to the last time they spoofed their Access ID, when logging into a node. I'm not entirely sure of the mechanics of doing that, though.


QUOTE (Unwired Errata 1.0)
p. 110 Access IDs
Remove the following sentence from the second
paragraph:_
“An agent’s access ID may be spoofed (see Spoo ng the
Datatrail, p. 224, SR4), but only when it is being
loaded onto a node.”
Go to the top of the page
 
+Quote Post

4 Pages V  < 1 2 3 4 >
Reply to this topicStart new topic

 



RSS Lo-Fi Version Time is now: 28th November 2025 - 06:49 PM

Topps, Inc has sole ownership of the names, logo, artwork, marks, photographs, sounds, audio, video and/or any proprietary material used in connection with the game Shadowrun. Topps, Inc has granted permission to the Dumpshock Forums to use such names, logos, artwork, marks and/or any proprietary materials for promotional and informational purposes on its website but does not endorse, and is not affiliated with the Dumpshock Forums in any official capacity whatsoever.