IPB

Welcome Guest ( Log In | Register )

3 Pages V  < 1 2 3  
Reply to this topicStart new topic
Lionhearted
post Dec 8 2012, 09:10 PM
Post #51


Shooting Target
****

Group: Members
Posts: 1,930
Joined: 9-April 05
From: Scandinavian Union
Member No.: 7,310



QUOTE (Alpha Blue @ Dec 8 2012, 10:04 PM) *
What is this so? That's awesome! That solves so much. Can someone give me background on this?

Account privileges p 216 of SR4 don't know about SR4A
Go to the top of the page
 
+Quote Post
NiL_FisK_Urd
post Dec 9 2012, 09:38 AM
Post #52


Moving Target
**

Group: Members
Posts: 881
Joined: 13-November 11
From: Vienna, Austria
Member No.: 43,494



This was changed to "peripheral devices" in SR4A. See p. 225, Access Accounts

QUOTE (SR4A @ p.225)
Peripheral nodes are simple constructs and only have public and admin access. The hacking threshold increase for admin access does not apply to peripheral nodes.


Using an Admin account for everyday activities is also a huge security risk, because every piece of malware you "collect" runs with authorized admin privileges.
Go to the top of the page
 
+Quote Post
Sengir
post Dec 9 2012, 02:23 PM
Post #53


Great Dragon
*********

Group: Dumpshocked
Posts: 5,088
Joined: 3-October 09
From: Kohle, Stahl und Bier
Member No.: 17,709



QUOTE (NiL_FisK_Urd @ Dec 9 2012, 10:38 AM) *
This was changed to "peripheral devices" in SR4A. See p. 225, Access Accounts

In Unwired already (IMG:style_emoticons/default/wink.gif)
Go to the top of the page
 
+Quote Post
Sengir
post Dec 17 2012, 05:58 PM
Post #54


Great Dragon
*********

Group: Dumpshocked
Posts: 5,088
Joined: 3-October 09
From: Kohle, Stahl und Bier
Member No.: 17,709



QUOTE (Sengir @ Dec 4 2012, 06:26 PM) *
b) there's an idea in my head how R. 2 commlinks would no longer be open books without making that R. 4 camera impossible to hack, and I'm not making a gazillion dice rolls to see if it works (IMG:style_emoticons/default/wink.gif)

Here is said idea BTW, now math-tested though never actually played (due to lack of group):

A Node can be switched into "isolation mode", in which the device ignores all attempts to control it from the outside. Any logon attempts and commands (legitimate or spoofed) not coming from a Persona running on the Node fail automatically, though without causing an alarm. A hacker may still circumvent this protection by either Probing or Hacking on the Fly, but his threshold for success is increased by +3 in addition to any other modifiers (for example, hacking for an Admin account on a isolated device adds 9 to the threshold).

Spoofing becomes impossible when the target is running in isolation mode, because there are no legitimate Access IDs to send from.

Drones can in theory use the same mechanism, in practice this is obviously a rather bad idea unless you are sending the drone on a suicide run.
Go to the top of the page
 
+Quote Post

3 Pages V  < 1 2 3
Reply to this topicStart new topic

 

RSS Lo-Fi Version Time is now: 15th May 2025 - 07:31 PM

Topps, Inc has sole ownership of the names, logo, artwork, marks, photographs, sounds, audio, video and/or any proprietary material used in connection with the game Shadowrun. Topps, Inc has granted permission to the Dumpshock Forums to use such names, logos, artwork, marks and/or any proprietary materials for promotional and informational purposes on its website but does not endorse, and is not affiliated with the Dumpshock Forums in any official capacity whatsoever.