IPB

Welcome Guest ( Log In | Register )

4 Pages V  < 1 2 3 4 >  
Reply to this topicStart new topic
> Hacking proof Metalinks?, The advantages of subscription limits.
Koekepan
post May 30 2012, 12:52 AM
Post #51


Neophyte Runner
*****

Group: Members
Posts: 2,357
Joined: 19-May 12
From: Seattle area
Member No.: 52,483



QUOTE (Tymeaus Jalynsfein @ May 30 2012, 12:41 AM) *
Again, that is in the real world. Shadowrun does not work that way. See, even you have a hard time getting out of the real world mindset... (IMG:style_emoticons/default/smile.gif)
Purge your mind of the real world constraints and paradigms in regards to computers and you will be set free... (IMG:style_emoticons/default/smile.gif)


This is actually a commonly offered view, but in practice a very bad one for games.

Why? Because if you're trying to present something in a game as "It's a computer." then you must expect players to deal with it as one, and get angry when it's disallowed. If you're trying to present something as "It's not a computer." then you must expect them to use computers for things computers are good at. If you're trying to say "There are no computers, and this is the closest approximation so deal with it." then suspension of disbelief flies out of the window precisely because you're challenging the very underlying concepts of the milieu.

The game source materials explicitly say that commlinks are computers and that the matrix as a whole is the network environment. Blanket responses to the effect of "Yeah, all those computer things which computers are great at and we use computers for all the time and have for decades and decades in the real world just suddenly don't work because it's not in the rulebook." don't fly. Not at my table, not at any table I've been at.

Get it? It's not the `real world constraints' or the `real world mindset' which matters except in the presentation and the player expectations - and there it all matters deeply, and irretrievably. Shadowrun (to refer to another thread) doesn't have explicit animal husbandry rules either - that doesn't mean animals don't breed.

It would matter a lot less if the game source materials provided a whole new fundamental set of principles on which electronics (or the game equivalent) functions - but it doesn't. Not even a little bit. It just offers gaming abstractions, and describes VR as being an efficient way, within the game, and within the VR metaphor, for interacting with computers. It even makes explicit references to where the VR interface is not an adequate metaphor for what is happening under the skin (the Fastjack fiction snippet in the anniversary rules also make reference to this, as source material example) and reflects the fact that you are loading programs onto an electronic device.

So go ahead - call it house rules, call it gamebreaking, call it what you like, but at my table, commlinks are computers and ingenuity in their use, recognising that what you are using is a data processing device and using that information to buttress your in-game decisions, will be permitted. You'll roll for your electronics and hacking skills - of course you will. But if you have the skills, the technology has the flexibility.

To develop the point about the milieu, it even goes further - Shadowrun juxtaposes very well the rise of technology and the rise of what people generally have regarded as nontechnological or even antitechnological, in parallel, very well. The social questions which are raised, the implications for the elite nature of magic, and the democratising nature of technology, make for a great situation to examine. Reducing the high technology of the system to just another set of inflexible buttontwiddles eviscerates this aspect of the milieu, to the loss of the game's philosophical depth. All right in a beer-and-pretzels one-shot game, but lousy in an ongoing campaign.
Go to the top of the page
 
+Quote Post
UmaroVI
post May 30 2012, 01:10 AM
Post #52


Shooting Target
****

Group: Members
Posts: 1,700
Joined: 1-July 10
Member No.: 18,778



The problem here is that it's not just that SR doesn't have rules for doing every single thing real-world computers can do - it's that its rules specifically make the Matrix not work like modern computers in a huge number of ways. In the real world, public key cryptography exists and lets people send messages, fairly easily, that can't be broken before the sun burns out. Real world decryption is about hoping that someone doing the encryption was sloppy or made a mistake, or stealing the key. Shadowrun cryptography does not work like that. At all. It's not that there are not rules for encryption. It's that there are rules for encryption and they are nothing at all like real-world encryption. This is a really fundamental thing and that it works so differently in SR and in the real world really does say that Shadowrun computers are nothing like real-world ones.
Go to the top of the page
 
+Quote Post
Tymeaus Jalynsfe...
post May 30 2012, 01:16 AM
Post #53


Prime Runner Ascendant
**********

Group: Members
Posts: 17,568
Joined: 26-March 09
From: Aurora, Colorado
Member No.: 17,022



QUOTE (Koekepan @ May 29 2012, 05:52 PM) *
This is actually a commonly offered view, but in practice a very bad one for games.

Why? Because if you're trying to present something in a game as "It's a computer." then you must expect players to deal with it as one, and get angry when it's disallowed. If you're trying to present something as "It's not a computer." then you must expect them to use computers for things computers are good at. If you're trying to say "There are no computers, and this is the closest approximation so deal with it." then suspension of disbelief flies out of the window precisely because you're challenging the very underlying concepts of the milieu.

The game source materials explicitly say that commlinks are computers and that the matrix as a whole is the network environment. Blanket responses to the effect of "Yeah, all those computer things which computers are great at and we use computers for all the time and have for decades and decades in the real world just suddenly don't work because it's not in the rulebook." don't fly. Not at my table, not at any table I've been at.

Get it? It's not the `real world constraints' or the `real world mindset' which matters except in the presentation and the player expectations - and there it all matters deeply, and irretrievably. Shadowrun (to refer to another thread) doesn't have explicit animal husbandry rules either - that doesn't mean animals don't breed.

It would matter a lot less if the game source materials provided a whole new fundamental set of principles on which electronics (or the game equivalent) functions - but it doesn't. Not even a little bit. It just offers gaming abstractions, and describes VR as being an efficient way, within the game, and within the VR metaphor, for interacting with computers. It even makes explicit references to where the VR interface is not an adequate metaphor for what is happening under the skin (the Fastjack fiction snippet in the anniversary rules also make reference to this, as source material example) and reflects the fact that you are loading programs onto an electronic device.

So go ahead - call it house rules, call it gamebreaking, call it what you like, but at my table, commlinks are computers and ingenuity in their use, recognising that what you are using is a data processing device and using that information to buttress your in-game decisions, will be permitted. You'll roll for your electronics and hacking skills - of course you will. But if you have the skills, the technology has the flexibility.

To develop the point about the milieu, it even goes further - Shadowrun juxtaposes very well the rise of technology and the rise of what people generally have regarded as nontechnological or even antitechnological, in parallel, very well. The social questions which are raised, the implications for the elite nature of magic, and the democratising nature of technology, make for a great situation to examine. Reducing the high technology of the system to just another set of inflexible buttontwiddles eviscerates this aspect of the milieu, to the loss of the game's philosophical depth. All right in a beer-and-pretzels one-shot game, but lousy in an ongoing campaign.


And obviously, I disagree with you.
In Shadowrun, becasue the rules work the way they do, oftentimes, the player's intimate knowledge of Computers gets in the way.
Honestly, if hacking were to emulated realistically, in game, you would never get anything done, because you would be unable to do anything as a Hacker to a properly defended system.
BORING !!!!!

The rules are the way they are to make Hackers viable in the game. SR4A is a much better Hacking system than the 3 previous editions in this regard, because it is streamlined. Even if there are a few issues, most, if not all of them, can be addressed with the optional rules presented in the books. Making them more reaslistic just drags the game down and kills all the fun.

Oh, and I never said that computers were not computers in Shadowrun. They are, they just work on different paradigms than they do in the real world. Basic Electronics aside. Besides, Even with the simplicity, Hacking is still one of the most complex (and some would say confusing) aspects of the game.
Go to the top of the page
 
+Quote Post
kzt
post May 30 2012, 02:08 AM
Post #54


Great Dragon
*********

Group: Members
Posts: 5,537
Joined: 27-August 06
From: Albuquerque NM
Member No.: 9,234



I see our incident response tickets, I can assure you that you can find a way to get in.
Go to the top of the page
 
+Quote Post
Koekepan
post May 30 2012, 02:44 AM
Post #55


Neophyte Runner
*****

Group: Members
Posts: 2,357
Joined: 19-May 12
From: Seattle area
Member No.: 52,483



QUOTE (UmaroVI @ May 30 2012, 03:10 AM) *
The problem here is that it's not just that SR doesn't have rules for doing every single thing real-world computers can do - it's that its rules specifically make the Matrix not work like modern computers in a huge number of ways. In the real world, public key cryptography exists and lets people send messages, fairly easily, that can't be broken before the sun burns out. Real world decryption is about hoping that someone doing the encryption was sloppy or made a mistake, or stealing the key. Shadowrun cryptography does not work like that. At all. It's not that there are not rules for encryption. It's that there are rules for encryption and they are nothing at all like real-world encryption. This is a really fundamental thing and that it works so differently in SR and in the real world really does say that Shadowrun computers are nothing like real-world ones.


Actually, given plausible advances in technology, that's not quite true. Already quantum computing is finding real use in special situations. Give it a couple of decades, and decoding just about anything short of a one time pad becomes plausible, if not outright provably feasible.

Also, as kzt observes, security gets cracked all the time - some systems just aren't well designed, like many wifi systems. People use poorly chosen passwords. Or the Johnson has a password for you. Or a key file. Or people fall for social engineering. Or get sloppy about trusting certificates. It doesn't matter how fancy your encryption is, if the person actually using it doesn't follow the processes and procedures set up by the guy who designed the security system in the first place. Even today you have tools to get you access to systems all the time - or you set up a man-in-the-middle attack.

Or, you step one small victory on another until you own the whole place. One badly chosen password gets you user access. A poorly secured system gets you network scanning capability. A man in the middle position lets you identify a couple of keys. This gets you a higher privilege for a different system. From there, the administrators, for the sake of convenience, can use that level of access to hop around the systems. Pretty soon you can read an online backup containing passwords in the clear, or you can identify an SQL injection attack in some source code or script left on a system. Not long after, you're downloading paydata.

Sounds almost like the system as presented, doesn't it?
Go to the top of the page
 
+Quote Post
Koekepan
post May 30 2012, 03:00 AM
Post #56


Neophyte Runner
*****

Group: Members
Posts: 2,357
Joined: 19-May 12
From: Seattle area
Member No.: 52,483



QUOTE (Tymeaus Jalynsfein @ May 30 2012, 03:16 AM) *
Honestly, if hacking were to emulated realistically, in game, you would never get anything done, because you would be unable to do anything as a Hacker to a properly defended system.
BORING !!!!!


Obviously, kzt has counterexamples. So do lots of people. Anonymous gets data from people like Sarah Palin. Banks lose credit card lists, government agencies lose personnel data. This isn't speculation, this is real, in our newsfeeds today. I think that the rules can be used as an abstraction of that.

QUOTE (Tymeaus Jalynsfein @ May 30 2012, 03:16 AM) *
The rules are the way they are to make Hackers viable in the game. SR4A is a much better Hacking system than the 3 previous editions in this regard, because it is streamlined. Even if there are a few issues, most, if not all of them, can be addressed with the optional rules presented in the books. Making them more reaslistic just drags the game down and kills all the fun.


Hackers don't need the rules as an excuse for viability, and the rules don't afford an excuse for straitjacketing intelligent play. Nothing in what you said suggests that hackers shouldn't have one system monitoring another, or monitoring Matrix links. Part of the whole point to hacking is the ability to work outside the constraints which others try to impose. And as for killing fun? What's more fun than outsmarting the opposition? Breaking the mould? Seeing another way through a problem?

QUOTE (Tymeaus Jalynsfein @ May 30 2012, 03:16 AM) *
Oh, and I never said that computers were not computers in Shadowrun. They are, they just work on different paradigms than they do in the real world. Basic Electronics aside. Besides, Even with the simplicity, Hacking is still one of the most complex (and some would say confusing) aspects of the game.


Well, you pretty much have to select one of the three positions I mentioned. Either they're computers as we understand it, or there are computers as we understand it but commlinks are different, or commlinks are all there is, and they aren't computers as we understand it. Judging by what you write here, ("they just work on different paradigms than they do in the real world") you're choosing the third option. If you're choosing the third option, then building and carrying along a conventional computer, different from a commlink, but equivalent to what we understand by the concept (since you appear to be happy with basic electronics in-game), makes a hacker massively more useful. Or should I suddenly say that for reasons of *hands wave furiously here* you can't build conventional computers any more?

You're at liberty to state that, of course, but for the reasons I gave above (effects on suspension of disbelief, confusion of terms relating to the understanding of what is or is not, or can or can't be a computer, impoverishing the philosophical implications of the milieu) I decline to accept that at my table, and will reward intelligent play on the shared terms offered by the source material.

Basically, that's why I prefer pen-and-paper games to CRPGs.
Go to the top of the page
 
+Quote Post
UmaroVI
post May 30 2012, 03:21 AM
Post #57


Shooting Target
****

Group: Members
Posts: 1,700
Joined: 1-July 10
Member No.: 18,778



QUOTE (Koekepan @ May 29 2012, 09:44 PM) *
Actually, given plausible advances in technology, that's not quite true. Already quantum computing is finding real use in special situations. Give it a couple of decades, and decoding just about anything short of a one time pad becomes plausible, if not outright provably feasible.

Quantum computers are very different from modern real-world computers. Saying SR computers are quantum computers is one way of explaining why they are so different.
Go to the top of the page
 
+Quote Post
Koekepan
post May 30 2012, 03:48 AM
Post #58


Neophyte Runner
*****

Group: Members
Posts: 2,357
Joined: 19-May 12
From: Seattle area
Member No.: 52,483



QUOTE (UmaroVI @ May 30 2012, 06:21 AM) *
Quantum computers are very different from modern real-world computers. Saying SR computers are quantum computers is one way of explaining why they are so different.


Quantum computers, as general purpose computing devices, not only don't exist but there are no plausible (non-blue-sky) proposals on what they might be like. The current uses of quantum computing largely relate to uses of entangling in communications, and some laboratory quantum computing units (although they're creeping out of the laboratories).

The strong points of quantum computing are roughly similar in style (though not in implications for computational feasibility) to the strong points of having a graphics processor. The quantum computing unit isn't going to run Windows any faster or better than a Xeon, but can be used analogously to an FPU for doing something a lot faster than the conventional processing unit. Basically, quantum and conventional computing are not mutually exclusive, but complementary.

In other words, if commlinks are quantum computers, there's utterly no reason to believe that they aren't also conventional computers. Today we can fit an entirely conventional computer into something the size and shape of an iphone. We call it an iphone. Granted, Apple crippled it because the hell with the general public, but Nokia has built quite a few, as have other companies. Look around. So even if your commlink is a dinky thing which sits on your belt, worst case it's slightly fatter, and has a conventional SoC on it. Even if you want to stick at 1980's handheld technology (why would you?) HP had some nice programmable devices in those days.

And any hacker with Electronics skillsets could certainly combine the two with a little intelligent work.

So why would I stop him? Because the rules don't cover it? No. That's my challenge as a Game Master to overcome.
Go to the top of the page
 
+Quote Post
kzt
post May 30 2012, 04:09 AM
Post #59


Great Dragon
*********

Group: Members
Posts: 5,537
Joined: 27-August 06
From: Albuquerque NM
Member No.: 9,234



It's not that you can't make hacking in SR work, and even work in a way that makes sense to people. It's that you can't do it without house ruling like mad. Which is not a sign that you have great rules.

And SR has chosen option 3 as the choice for the setting. "Commlinks are all there is, and they aren't computers as we understand it". I'm not defending this choice, I'm just pointing it out. It's a terrible choice for all the reasons you mention, but it is what it is.
Go to the top of the page
 
+Quote Post
Tymeaus Jalynsfe...
post May 30 2012, 01:03 PM
Post #60


Prime Runner Ascendant
**********

Group: Members
Posts: 17,568
Joined: 26-March 09
From: Aurora, Colorado
Member No.: 17,022



QUOTE (kzt @ May 29 2012, 08:08 PM) *
I see our incident response tickets, I can assure you that you can find a way to get in.


Maybe you are not as secure as you think you are... Which is my point.
And I can guarantee you that your penetrations did not take on the order of seconds, like they do in Shadowrun. Different Paradigms at work here.
Go to the top of the page
 
+Quote Post
Tymeaus Jalynsfe...
post May 30 2012, 01:41 PM
Post #61


Prime Runner Ascendant
**********

Group: Members
Posts: 17,568
Joined: 26-March 09
From: Aurora, Colorado
Member No.: 17,022



QUOTE (Koekepan @ May 29 2012, 09:00 PM) *
Obviously, kzt has counterexamples. So do lots of people. Anonymous gets data from people like Sarah Palin. Banks lose credit card lists, government agencies lose personnel data. This isn't speculation, this is real, in our newsfeeds today. I think that the rules can be used as an abstraction of that.


of course, and yet, these hacks do not occur over night, nor are they generally considered easy hacks.

QUOTE
Hackers don't need the rules as an excuse for viability, and the rules don't afford an excuse for straitjacketing intelligent play. Nothing in what you said suggests that hackers shouldn't have one system monitoring another, or monitoring Matrix links. Part of the whole point to hacking is the ability to work outside the constraints which others try to impose. And as for killing fun? What's more fun than outsmarting the opposition? Breaking the mould? Seeing another way through a problem?


Never said that. I said that the paradigms are a bit different. Computers do not function in Shadowrun QUITE like they function in the real world. The Tricks of the trade you describe above are all viable in the Shadowrun world, they just do not work quite the same way they do IRL. And I would contend that the rules do not straightjacket intelligent play. I have played a Hacker for years, within the rules (OPtional Rules in use) and have had absolutely no issues with the hacking System. Is it different than what I am used to IRL? Of Course it is... is it unworkable to the point of annoyance? Absolutely not.

In fact, strict adherence to IRL models will tend to break the game by eliminating the straight Hacker as a viable archetype.

QUOTE
Well, you pretty much have to select one of the three positions I mentioned. Either they're computers as we understand it, or there are computers as we understand it but commlinks are different, or commlinks are all there is, and they aren't computers as we understand it. Judging by what you write here, ("they just work on different paradigms than they do in the real world") you're choosing the third option. If you're choosing the third option, then building and carrying along a conventional computer, different from a commlink, but equivalent to what we understand by the concept (since you appear to be happy with basic electronics in-game), makes a hacker massively more useful. Or should I suddenly say that for reasons of *hands wave furiously here* you can't build conventional computers any more?

You're at liberty to state that, of course, but for the reasons I gave above (effects on suspension of disbelief, confusion of terms relating to the understanding of what is or is not, or can or can't be a computer, impoverishing the philosophical implications of the milieu) I decline to accept that at my table, and will reward intelligent play on the shared terms offered by the source material.

Basically, that's why I prefer pen-and-paper games to CRPGs.


Nope - I reject your third option, as it makes no sense, since there are obviopusly other Computing devices in the world... there is another option you forget to include...

Computers/comlinks are similar to what we have now, but operate on different paradigms. You cannot say they are exactly the same, because we both know they are not. There are significant ways in which they differ, which many have stated, over the years. This has been my stance on Hacking from the start.

SO... you can take what the game world gives you and run in that paradigm, or you can try to inject real world computing paradigms into the mix, which leaves most people wanting, because the paradigms do not work well together (and in fact are often contradictory). You can do everything you describe, within the rules of the Shadowrun Matrix, without resorting to the technobabble of real world computing. You just have to allow that certain things are not the same. If you cannot allow for that, then you will be unhappy with the result.

Just becasue I have 20+ years in the Computrer Industry (Between College and Work Experience) and have taken my turn at White Hat endeavors from time to time does not mean that I cannot suspend my disbelief of a world that is 60 years in my future, with a differeing technological basis and development. I tend to (or at least try to) not let my RL knowledge interrupt my fun with the Game World that I am playing in, even if I do have some issues with it. History, as well as technology, diverged in the early 80's in Shadowrun, and they have had 2 world-wide technological crashes since then. Assuming that the technology is different is not a stretch (and in fact it is, by the world description). Why is that so hard to assimilate for you? You are trying to make a divergent world fit your concept of modern day computing. They are not the same.

As for the conventional Computer buildiing crack, Shadowrun Computers ARE NOT what we would call Conventional Computers today. Obviously. They are both a bit better (they can do things we can only dream about currently, such as near-instantaneous decryption of the most secure files, and virtual ly unlimiterd storage space and transmission bandwidth) and worse (they lack some capabilities in areas that Modern Computers have currently, such as making a backup of a data-stream prior to decryption, odd but okay). That is to be expected of a technology that has had to be re-constructed twice in the last 90 years.

And for the record, I, too, prefer Pen and Paper games, and for many of the same reasons I would wager. What I do not do is try to bend the game world to my understanding of it based upon my Real World experience. Some thing just are not required to have fun.
Go to the top of the page
 
+Quote Post
Tymeaus Jalynsfe...
post May 30 2012, 01:43 PM
Post #62


Prime Runner Ascendant
**********

Group: Members
Posts: 17,568
Joined: 26-March 09
From: Aurora, Colorado
Member No.: 17,022



QUOTE (kzt @ May 29 2012, 10:09 PM) *
It's not that you can't make hacking in SR work, and even work in a way that makes sense to people. It's that you can't do it without house ruling like mad. Which is not a sign that you have great rules.

And SR has chosen option 3 as the choice for the setting. "Commlinks are all there is, and they aren't computers as we understand it". I'm not defending this choice, I'm just pointing it out. It's a terrible choice for all the reasons you mention, but it is what it is.


Except that Comlinks are NOT the only computing devices in the setting. Nexi are not Comlinks.
And you do not need House Rules... Simple application of a few of the Optional Rules will do just fine. The issue is that most computer Nerds (Most of us, right?) are not happy with that sort of fix. They (We) want it to work like they (we) know it should. And that is the trap.
Go to the top of the page
 
+Quote Post
Sengir
post May 30 2012, 02:30 PM
Post #63


Great Dragon
*********

Group: Dumpshocked
Posts: 5,091
Joined: 3-October 09
From: Kohle, Stahl und Bier
Member No.: 17,709



QUOTE (_Pax._ @ May 29 2012, 03:13 AM) *
Never said it does.

But if the system has a rule stating "There no Security accounts on this system", and one shows up? Trigger a Restricted Alert on that user, and begin terminating their connection.

Hacking does not create an account, except when the intruder elects to install a backdoor -- which will be a hidden account if the hacker is any good, and thus hidden from the script.

QUOTE
"Optimization
This modification optimizes the device’s processor and components
to enhance one particular program, applying a +1 dice
pool modifier for all tests using that so ware. Each device may
only be optimized once."

(Unwired p198)

It's not the Program Option I meant; it's the Comlink modification I was talking about.

And that still is not available for matrix attributes

QUOTE
Since when is a rating 6 program, and a rating 6 then spcialised skill, someone "without any serious skills or programs" ...???

Which part of "the average commlink" left you with the impression that I was talking about a device with Firewall 6?
Go to the top of the page
 
+Quote Post
_Pax._
post May 30 2012, 03:37 PM
Post #64


Neophyte Runner
*****

Group: Validating
Posts: 2,492
Joined: 19-April 12
Member No.: 51,818



QUOTE (Sengir @ May 30 2012, 09:30 AM) *
Hacking does not create an account, except when the intruder elects to install a backdoor -- which will be a hidden account if the hacker is any good, and thus hidden from the script.

Um. Yes, yes it does:

" Hacking on the Fl y is an Hacking + Exploit (target’s Firewall, Complex Action) Extended Test. Reaching the threshold will get you a user account on the node. If you want a security account, increase the threshold by +3, for an admin account increase it by +6."

SR4A, p235, emphasis mine. Second paragraph under the heading Hacking on the fly. Literally, "SR4 Hacking 101".

So, again: set your System/OS so that there are zero allowed User accounts and zero allowed Security accounts - by the same mechanism that allows you to decide there are no public accounts on your link (or CHN, or whatever).

So now, it's "Admin or bust", and that lovely +6 threshold comes into play.

So, do your 18 dice beat a threshold of 12, as fast as 11 dice beat a threshold of 6? (Answer: not statistically, no. It shuld take two rolls of an 18 die pool to reach 12 successes; it takes only about 1.5 rolls of an 11 die pool, to meet a threshold of 6 (which means, functionally 2 rolls - but with a wee bit of buffer against a spot of bad luck.)

And that's with Analyze 4. Add in some Optimisation for that program, and you can push the 'link's DP to 13 (Firewall 6, Analyze 6, Optimised Link +1), giving even more of a buffer against poor rolls.

So, gee. The best starting-legal link, turns out to be reasonably good at resisting some pretty high-end-for-starting-characters hacking attempts - wihtout being unreasonably HARD to hack, either. Go figure, eh?

QUOTE
And that still is not available for matrix attributes

Firewall is a Program, in addition to being a matrix attribute.

QUOTE
Which part of "the average commlink" left you with the impression that I was talking about a device with Firewall 6?

First, you said:
QUOTE (Sengir @ May 28 2012, 05:27 PM) *
Skill 6
Specialization 2
Exploit 6
VR Bonus 2
Encephalon 2

18 dice without bending over backwards, or even maxing out the potential pool. Chances are that 18 dice beat Firewall 6 faster than 10 (or even 12) dice beat Stealth 6.

Then, you said:
QUOTE (Sengir @ May 28 2012, 05:27 PM) *
If the average commlink can be hacked by the kid at the table next to you without any serious skills or programs, there is something wrong.

... and I replied:
QUOTE (_Pax._ @ May 28 2012, 09:13 PM) *
Since when is a rating 6 program, and a rating 6 then spcialised skill, someone "without any serious skills or programs" ...???


I was responding to the bit where you mentioned "the kid at the table next to you without any serious skills or programs".
Go to the top of the page
 
+Quote Post
Aerospider
post May 30 2012, 04:44 PM
Post #65


Running Target
***

Group: Members
Posts: 1,150
Joined: 15-December 09
Member No.: 17,968



QUOTE (Tymeaus Jalynsfein @ May 30 2012, 02:41 PM) *
I tend to (or at least try to) not let my RL knowledge interrupt my fun with the Game World that I am playing in, even if I do have some issues with it.

This, IMO, is very important for RPGs and SR especially. If you just can't bear the inconsistency of a future computer system that won't accept tricks you know can be done today then perhaps you can be mollified by considering that your character himself has no idea (unless you were playing a world-leading computer historian, perhaps). There have been times when as GM I've refused an action based on a player's RL knowledge because it was unbelievable that the character would have said knowledge too. I've done it to my own character too and so have most of my players at one time or another. It's not c***blocking, it's investing in the shared gaming experience where the system needs only to maintain integrity within it's own framework. You might not accept the fundamentals of the Matrix, but your character must and that's why you should too.

After all, if everything were about what you would do then it's not really roleplaying.
Go to the top of the page
 
+Quote Post
kzt
post May 30 2012, 05:13 PM
Post #66


Great Dragon
*********

Group: Members
Posts: 5,537
Joined: 27-August 06
From: Albuquerque NM
Member No.: 9,234



QUOTE (_Pax._ @ May 30 2012, 09:37 AM) *
Um. Yes, yes it does:

" Hacking on the Fl y is an Hacking + Exploit (target’s Firewall, Complex Action) Extended Test. Reaching the threshold will get you a user account on the node. If you want a security account, increase the threshold by +3, for an admin account increase it by +6."

SR4A, p235, emphasis mine. Second paragraph under the heading Hacking on the fly. Literally, "SR4 Hacking 101".

It is stated in unwired somewhere (since I never bothered to buy a PDF version of that POS I can't cite it) that you are bypassing accounts when you hack. The computer rules are full of this kind of contradictory stuff.
Go to the top of the page
 
+Quote Post
_Pax._
post May 30 2012, 05:33 PM
Post #67


Neophyte Runner
*****

Group: Validating
Posts: 2,492
Joined: 19-April 12
Member No.: 51,818



You don't need a PDF copy to at least give a page number.

Also, you're wrong. Unwired says that you are bypassing the usual authentication process ... but you're still making an account:

"Hacking and Authentication
When a character hacks into a node, whether on the fly or by probing, she is actually circumventing normal authentication routines and setting up a fake account that the system believes has access at the privilege level the hacker chose at the start of the attempt. [...]"

-- Unwired p65, emphasis mine.

Go to the top of the page
 
+Quote Post
Aerospider
post May 30 2012, 05:42 PM
Post #68


Running Target
***

Group: Members
Posts: 1,150
Joined: 15-December 09
Member No.: 17,968



I checked UW, as I too thought hacking did not provide an account, and could only find it in the very special case that is hidden access points (under Backdoors - sorry, forgot the page number). Elsewhere Pax is right.
Go to the top of the page
 
+Quote Post
Sengir
post May 30 2012, 05:52 PM
Post #69


Great Dragon
*********

Group: Dumpshocked
Posts: 5,091
Joined: 3-October 09
From: Kohle, Stahl und Bier
Member No.: 17,709



QUOTE (_Pax._ @ May 30 2012, 04:37 PM) *
Um. Yes, yes it does:

Not according to Unwired, p. 97. Yep, the extended rulebooks occasionally contradict the BBB...

QUOTE
Firewall is a Program, in addition to being a matrix attribute.

Uh huh, so each system needs to set aside 2 program slots for Firewall and System, and a TM can thread both...


QUOTE
I was responding to the bit where you mentioned "the kid at the table next to you without any serious skills or programs".

...while apparently still being unable to read the first part of the sentence. So once more and just for you: A device with FIrewall 6 (the maximum allowed by the BBB) is not an "average commlink", which Joe Wageslave would bring with him during lunch time. The standard Device Rating is 3, and at that point hacking becomes trivial. The system itself is OK, but it simply is too easy to hack stuff, and security ratings max out too soon.
Go to the top of the page
 
+Quote Post
_Pax._
post May 30 2012, 06:26 PM
Post #70


Neophyte Runner
*****

Group: Validating
Posts: 2,492
Joined: 19-April 12
Member No.: 51,818



QUOTE (Sengir @ May 30 2012, 12:52 PM) *
Not according to Unwired, p. 97. Yep, the extended rulebooks occasionally contradict the BBB...

For one very special, limited-applicability edge case: "hidden access point". Furthermore:

"IC or security hackers that perceive the hacker will immediately recognize him as an intruder."

Thus, immediate Restricted Alert, and therefore, VOILA, "Terminate Connection". All you'd have to add to my setup is a lowly Rating 1 Agent.

QUOTE
Uh huh, so each system needs to set aside 2 program slots for Firewall and System, and a TM can thread both...

Don't be a complete ass. (IMG:style_emoticons/default/ohplease.gif)
Go to the top of the page
 
+Quote Post
Sengir
post May 30 2012, 06:47 PM
Post #71


Great Dragon
*********

Group: Dumpshocked
Posts: 5,091
Joined: 3-October 09
From: Kohle, Stahl und Bier
Member No.: 17,709



QUOTE (_Pax._ @ May 30 2012, 06:26 PM) *
For one very special, limited-applicability edge case: "hidden access point".

Oh dear, reading comprehension really does not not seem to be at an alltime high today...try reading the whole page again...

QUOTE
If a node has been hacked on-the-fly, the hacker has found some gaping hole in the system security that allows him to access an account on that node.
...
If the target node was carefully probed before the hack [...] Either the hacker has ascertained a passcode that will allow him to access the account legitimately in the future, or he has discovered a re-usable exploit (p. 96)—the gamemaster determines which.

Yep, hacking is total magic. It gives you access to an account, but it neither requires one nor creates one. If you want an explanation, maybe those accounts are system accounts

PS: Just FYI, here is a list of users (and similar objects) that come with various windows versions.

QUOTE
Don't be a complete ass. (IMG:style_emoticons/default/ohplease.gif)

Hey, I'm just drawing the logical conclusions. If you want something to be a program, it becomes a program with all the consequences (IMG:style_emoticons/default/wink.gif)
Go to the top of the page
 
+Quote Post
_Pax._
post May 30 2012, 07:09 PM
Post #72


Neophyte Runner
*****

Group: Validating
Posts: 2,492
Joined: 19-April 12
Member No.: 51,818



QUOTE (Sengir @ May 30 2012, 02:47 PM) *
Oh dear, reading comprehension really does not not seem to be at an alltime high today...try reading the whole page again...

Fuck you.

I read the damned page. Did you?

First off: "If a node has been hacked on-the-fly, the hacker has found some gaping hole in the system security that allows him to access an account on that node." (Emphasis mine.)

Now, the four actual options discussed under "Backdoors" ...?
  • "Re-useable exploit" - provides a bonus to future hacking attempts. Nothing more.
  • "Legitimate account" - is an acount. Duh.
  • "Hidden account" - is also an account, duh.
  • "Hidden Access Point" - I've already addressed this one.


QUOTE
Hey, I'm just drawing the logical conclusions. If you want something to be a program, it becomes a program with all the consequences (IMG:style_emoticons/default/wink.gif)


FIREWALL Firewall is the device’s built-in security software. It protects against unauthorized access and fends o hostile access attempts and exploits. A fi rewall will, for instance, instantly block access to multiple icons using the same access ID. Firewall is also used to defend against Matrix attacks in cybercombat (p.236)."
-- SR4A p221, emphasis mine.

"SYSTEM System measures the power of the device’s operating system (OS) so ware.  This includes its stability, multitasking properties, ability to control hardware, resources, and the general quality of its code. If the System software ever crashes, the entire device crashes. System limits the rating of programs running on the device, and sets the limit on most devices for the number of programs that can be run without a Response drop.  The System program is limited by the base Response rating of the device it is on: if the base Response rating of the device is lower than the System rating, then the System rating is set to equal the Response rating. System also sets the size of the Matrix Condition Monitor of persona programs running on the device (Cybercombat, p.236)."
-- SR4A p222, emphasis mine.

"UPGRADING DEVICES
If you are looking for more power in your device, you can upgrade its Matrix attributes. Upgrading a device is simply a matter of having the proper hardware module (for Response and Signal) or software package (for Firewall and System)."

-- SR4A p222, emphasis mine.

See also, page 119 of Unwired - top right corner. Big table, hard to miss, titled "Advanced Programming Table". Deals with coding yoru own software; includes entries for Firewall and for System. Funny how that works.

...

Now, please; stop being an ass. (IMG:style_emoticons/default/mad.gif)
Go to the top of the page
 
+Quote Post
Sengir
post May 30 2012, 07:24 PM
Post #73


Great Dragon
*********

Group: Dumpshocked
Posts: 5,091
Joined: 3-October 09
From: Kohle, Stahl und Bier
Member No.: 17,709



QUOTE (_Pax._ @ May 30 2012, 07:09 PM) *
Fuck you.

Slow internet and not really in the mood, sorry.
Go to the top of the page
 
+Quote Post
Koekepan
post May 31 2012, 12:31 AM
Post #74


Neophyte Runner
*****

Group: Members
Posts: 2,357
Joined: 19-May 12
From: Seattle area
Member No.: 52,483



I'm perfectly happy to assume that everyone here knows a lot more about computing both in theory and practice than I do.

I'm perfectly happy to accept that other people want different things from their games from what I want.

I'm even happy to accept that there are issues with the rules in the printed publications.

My sole position here is that:

  1. IF Shadowrun's rules refer to notions which are commonly understood in common modern vocabulary
  2. IF there's nothing in the books which suggests that related knowledge or technologies have been irretrievably lost
  3. IF the milieu is deeply enriched by the assumptions of technological continuity (or would be deeply impoverished by the converse)
  4. IF restricting the actions of a class of character (and by extension the players) to solely what is strictly described in the books is a substantial strike against creativity in a shared view of what the given milieu purports to present

  • THEN it is not to the game's benefit to introduce artificial restrictions on player activity (and by extension ingenuity) in addressing IC situations
  • AND at the very least, should I choose to make such restrictive choices then it would behoove me to make clear to anyone who sits at my table the nature of such restrictions and the implications for what they might have thought were otherwise perfectly reasonable actions, since these assumptions, when violated, could otherwise lead to protracted and convoluted retcons and general unhappiness.



So let's look at that list of conditions:
  1. Absolutely true. Computers, wireless communications, RFID tags, even AR are part of common vocabulary, even for casual readers of online technical magazines like Wired.
  2. True again. Technology is advanced far beyond what was, on many levels. Even if you ignore nanotechnology and monofilaments, prosthetics and neural interfaces are way beyond what we have today, including in energy storage density and data processing terms. The ability to describe and build conventional Von Neumann architectures is nowhere described, nor even hinted at being a lost art, and the milieu in general militates against that assumption.
  3. Absolutely. I already touched on the juxtaposition of technology, and its incumbent, democratic nature vis-a-vis the parvenu elitism of the mystical world elsewhere in this thread.
  4. Unquestionably. When something as trivial as recording a stream of information and examining it later is off the table, regardless of how common, obvious or technologically feasible it might be, it's a plain restriction on the flexibility of the player, and because of the previous three points a restriction which isn't supported by the milieu as described nor the bulk of inspirational literature which openly poses questions as to the values and limits of technology in defining humanity in the context of its advance, in a typically dystopian environment.


So go ahead, run the game you like. Just, please, if I ever sit at your table, provide a courteous disclaimer. That's all I ask, and I don't think it's very unreasonable.
Go to the top of the page
 
+Quote Post
Tymeaus Jalynsfe...
post May 31 2012, 01:36 AM
Post #75


Prime Runner Ascendant
**********

Group: Members
Posts: 17,568
Joined: 26-March 09
From: Aurora, Colorado
Member No.: 17,022



QUOTE (Koekepan @ May 30 2012, 05:31 PM) *
I'm perfectly happy to assume that everyone here knows a lot more about computing both in theory and practice than I do.

I'm perfectly happy to accept that other people want different things from their games from what I want.

I'm even happy to accept that there are issues with the rules in the printed publications.

My sole position here is that:

  1. IF Shadowrun's rules refer to notions which are commonly understood in common modern vocabulary
  2. IF there's nothing in the books which suggests that related knowledge or technologies have been irretrievably lost
  3. IF the milieu is deeply enriched by the assumptions of technological continuity (or would be deeply impoverished by the converse)
  4. IF restricting the actions of a class of character (and by extension the players) to solely what is strictly described in the books is a substantial strike against creativity in a shared view of what the given milieu purports to present

  • THEN it is not to the game's benefit to introduce artificial restrictions on player activity (and by extension ingenuity) in addressing IC situations
  • AND at the very least, should I choose to make such restrictive choices then it would behoove me to make clear to anyone who sits at my table the nature of such restrictions and the implications for what they might have thought were otherwise perfectly reasonable actions, since these assumptions, when violated, could otherwise lead to protracted and convoluted retcons and general unhappiness.



So let's look at that list of conditions:
  1. Absolutely true. Computers, wireless communications, RFID tags, even AR are part of common vocabulary, even for casual readers of online technical magazines like Wired.
  2. True again. Technology is advanced far beyond what was, on many levels. Even if you ignore nanotechnology and monofilaments, prosthetics and neural interfaces are way beyond what we have today, including in energy storage density and data processing terms. The ability to describe and build conventional Von Neumann architectures is nowhere described, nor even hinted at being a lost art, and the milieu in general militates against that assumption.
  3. Absolutely. I already touched on the juxtaposition of technology, and its incumbent, democratic nature vis-a-vis the parvenu elitism of the mystical world elsewhere in this thread.
  4. Unquestionably. When something as trivial as recording a stream of information and examining it later is off the table, regardless of how common, obvious or technologically feasible it might be, it's a plain restriction on the flexibility of the player, and because of the previous three points a restriction which isn't supported by the milieu as described nor the bulk of inspirational literature which openly poses questions as to the values and limits of technology in defining humanity in the context of its advance, in a typically dystopian environment.


So go ahead, run the game you like. Just, please, if I ever sit at your table, provide a courteous disclaimer. That's all I ask, and I don't think it's very unreasonable.


So you use Houserules. Great, at least you admit it... (IMG:style_emoticons/default/smile.gif)
Go to the top of the page
 
+Quote Post

4 Pages V  < 1 2 3 4 >
Reply to this topicStart new topic

 



RSS Lo-Fi Version Time is now: 13th August 2025 - 12:01 PM

Topps, Inc has sole ownership of the names, logo, artwork, marks, photographs, sounds, audio, video and/or any proprietary material used in connection with the game Shadowrun. Topps, Inc has granted permission to the Dumpshock Forums to use such names, logos, artwork, marks and/or any proprietary materials for promotional and informational purposes on its website but does not endorse, and is not affiliated with the Dumpshock Forums in any official capacity whatsoever.