![]() |
![]() ![]() |
![]() |
![]()
Post
#51
|
|
Shooting Target ![]() ![]() ![]() ![]() Group: Members Posts: 1,930 Joined: 9-April 05 From: Scandinavian Union Member No.: 7,310 ![]() |
|
|
|
![]()
Post
#52
|
|
Moving Target ![]() ![]() Group: Members Posts: 881 Joined: 13-November 11 From: Vienna, Austria Member No.: 43,494 ![]() |
This was changed to "peripheral devices" in SR4A. See p. 225, Access Accounts
QUOTE (SR4A @ p.225) Peripheral nodes are simple constructs and only have public and admin access. The hacking threshold increase for admin access does not apply to peripheral nodes. Using an Admin account for everyday activities is also a huge security risk, because every piece of malware you "collect" runs with authorized admin privileges. |
|
|
![]()
Post
#53
|
|
Great Dragon ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Group: Dumpshocked Posts: 5,088 Joined: 3-October 09 From: Kohle, Stahl und Bier Member No.: 17,709 ![]() |
This was changed to "peripheral devices" in SR4A. See p. 225, Access Accounts In Unwired already (IMG:style_emoticons/default/wink.gif) |
|
|
![]()
Post
#54
|
|
Great Dragon ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Group: Dumpshocked Posts: 5,088 Joined: 3-October 09 From: Kohle, Stahl und Bier Member No.: 17,709 ![]() |
b) there's an idea in my head how R. 2 commlinks would no longer be open books without making that R. 4 camera impossible to hack, and I'm not making a gazillion dice rolls to see if it works (IMG:style_emoticons/default/wink.gif) Here is said idea BTW, now math-tested though never actually played (due to lack of group): A Node can be switched into "isolation mode", in which the device ignores all attempts to control it from the outside. Any logon attempts and commands (legitimate or spoofed) not coming from a Persona running on the Node fail automatically, though without causing an alarm. A hacker may still circumvent this protection by either Probing or Hacking on the Fly, but his threshold for success is increased by +3 in addition to any other modifiers (for example, hacking for an Admin account on a isolated device adds 9 to the threshold). Spoofing becomes impossible when the target is running in isolation mode, because there are no legitimate Access IDs to send from. Drones can in theory use the same mechanism, in practice this is obviously a rather bad idea unless you are sending the drone on a suicide run. |
|
|
![]() ![]() |
![]() |
Lo-Fi Version | Time is now: 15th May 2025 - 07:31 PM |
Topps, Inc has sole ownership of the names, logo, artwork, marks, photographs, sounds, audio, video and/or any proprietary material used in connection with the game Shadowrun. Topps, Inc has granted permission to the Dumpshock Forums to use such names, logos, artwork, marks and/or any proprietary materials for promotional and informational purposes on its website but does not endorse, and is not affiliated with the Dumpshock Forums in any official capacity whatsoever.