IPB

Welcome Guest ( Log In | Register )

 
Reply to this topicStart new topic
> Access ID, persona, and node
hobgoblin
post May 16 2012, 07:45 AM
Post #1


panda!
**********

Group: Members
Posts: 10,331
Joined: 8-March 02
From: north of central europe
Member No.: 2,242



While pondering the functioning of trace in the wireless matrix, it hits me that access id is not tied to node but persona.

This means that although you can analyze a persona to get a access id, take tells you exactly nothing about the node the persona originates from.

So this means that in order for a spider to counter hack a hackers comlink, he first needs to run a trace to know what node to attack.

This because the nature of the matrix is that the traffic routing happens via access id, with the go between nodes not caring about the end node. They just look at the access id, and either send it to the last known other node that handed it some traffic from the same id in the past (if that node is still in range), or sends out a general "can someone please forward this?".

So in a sense, access id is more like a mobile phone SIM. I can swap the phone, i can swap the number, but as long as i have the same SIM any call, text or similar directed towards my number will reach whatever phone i happen to have my SIM in at the time. But for all the caller knows, i can be on the other side of the planet thanks to network roaming and such.

So it may well be that some squatter has a access id without owning a comlink. This by having some kind of card or similar that holds his access id, that he then uses when buying matrix time at a matrix cafe.
Go to the top of the page
 
+Quote Post
Seriously Mike
post May 16 2012, 02:06 PM
Post #2


Moving Target
**

Group: Members
Posts: 770
Joined: 19-August 11
From: Middle-Eastern Europe
Member No.: 36,268



Access ID is generated by the commlink. There are options in the corebook to spoof it either by software or hardware means.
Go to the top of the page
 
+Quote Post
Ryu
post May 16 2012, 04:31 PM
Post #3


Awakened Asset
********

Group: Members
Posts: 4,464
Joined: 9-April 05
From: AGS, North German League
Member No.: 7,309



QUOTE (hobgoblin @ May 16 2012, 09:45 AM) *
While pondering the functioning of trace in the wireless matrix, it hits me that access id is not tied to node but persona.

This means that although you can analyze a persona to get a access id, take tells you exactly nothing about the node the persona originates from.

So this means that in order for a spider to counter hack a hackers comlink, he first needs to run a trace to know what node to attack.

This because the nature of the matrix is that the traffic routing happens via access id, with the go between nodes not caring about the end node. They just look at the access id, and either send it to the last known other node that handed it some traffic from the same id in the past (if that node is still in range), or sends out a general "can someone please forward this?".

So in a sense, access id is more like a mobile phone SIM. I can swap the phone, i can swap the number, but as long as i have the same SIM any call, text or similar directed towards my number will reach whatever phone i happen to have my SIM in at the time. But for all the caller knows, i can be on the other side of the planet thanks to network roaming and such.

So it may well be that some squatter has a access id without owning a comlink. This by having some kind of card or similar that holds his access id, that he then uses when buying matrix time at a matrix cafe.

A persona AID is based on the originating nodes AID. UW pg. 48, 51.
Go to the top of the page
 
+Quote Post
hobgoblin
post May 16 2012, 08:37 PM
Post #4


panda!
**********

Group: Members
Posts: 10,331
Joined: 8-March 02
From: north of central europe
Member No.: 2,242



Ugh, making track basically worthless when a simple analyze can provide the same info. Thanks Catalyst...
Go to the top of the page
 
+Quote Post
kzt
post May 16 2012, 09:03 PM
Post #5


Great Dragon
*********

Group: Members
Posts: 5,537
Joined: 27-August 06
From: Albuquerque NM
Member No.: 9,234



You expect the matrix rules to make sense? Have they ever, in any version of the rules? So it's not really Catalyst's fault.
Go to the top of the page
 
+Quote Post
Tymeaus Jalynsfe...
post May 16 2012, 09:23 PM
Post #6


Prime Runner Ascendant
**********

Group: Members
Posts: 17,568
Joined: 26-March 09
From: Aurora, Colorado
Member No.: 17,022



QUOTE (hobgoblin @ May 16 2012, 02:37 PM) *
Ugh, making track basically worthless when a simple analyze can provide the same info. Thanks Catalyst...


Having the AID (from an Analyze) does not provide you the location (From Trace), though.
Go to the top of the page
 
+Quote Post
HaxDBeheader
post May 17 2012, 01:21 AM
Post #7


Target
*

Group: Members
Posts: 73
Joined: 22-March 12
Member No.: 51,183



QUOTE (hobgoblin @ May 16 2012, 09:37 PM) *
Ugh, making track basically worthless when a simple analyze can provide the same info. Thanks Catalyst...


If all you want is the Access ID then Trace is serious overkill.

If you the slightest idea of the physical location that the persona is logged in from you need Trace.

If you want to spoof commands then you can use analyze to find the Access ID and Spoof to generate a command to a third party that pretends to be from them (drone:shutdown, door:unlock, email to girlfriend, etc).

Go to the top of the page
 
+Quote Post
hobgoblin
post May 17 2012, 01:35 AM
Post #8


panda!
**********

Group: Members
Posts: 10,331
Joined: 8-March 02
From: north of central europe
Member No.: 2,242



Meh, i just found the whole matrix thing to click more into place if one considered the access id to be a persona thing rather than a node thing.

For without it, trace becomes largely meaningless as one can just as well hack the persons node and read off their GPS data.

But if it was hard to figure out what node the persona in front of you originated from without a trace then trace becomes worthwhile again.

Note btw that trace as a location finder only really works for fixed nodes. A comlink needs to be triangulated from known fixed points independently of running a trace.
Go to the top of the page
 
+Quote Post
Ryu
post May 17 2012, 05:16 AM
Post #9


Awakened Asset
********

Group: Members
Posts: 4,464
Joined: 9-April 05
From: AGS, North German League
Member No.: 7,309



1) Besides the ton of stuff that will stop working if you read the rules.

2) Track uses an extended, possibly opposed test. Needing it often would be deeply annoying. It has itīs place in tracing hard-to-hack targets, and in getting the last known location after an evildoers AID has been spoofed. UW pg.99 (Spoofing a Data Trail Online).
Go to the top of the page
 
+Quote Post

Reply to this topicStart new topic

 



RSS Lo-Fi Version Time is now: 23rd April 2026 - 01:16 PM

Topps, Inc has sole ownership of the names, logo, artwork, marks, photographs, sounds, audio, video and/or any proprietary material used in connection with the game Shadowrun. Topps, Inc has granted permission to the Dumpshock Forums to use such names, logos, artwork, marks and/or any proprietary materials for promotional and informational purposes on its website but does not endorse, and is not affiliated with the Dumpshock Forums in any official capacity whatsoever.