IPB

Welcome Guest ( Log In | Register )

7 Pages V   1 2 3 > »   
Reply to this topicStart new topic
> How to protect your devices from Hackers in 5th Edition, Or how I learned to worrying and love the GOD.
Wired_SR_AEGIS
post Jun 24 2013, 10:37 PM
Post #1


Moving Target
**

Group: Members
Posts: 332
Joined: 11-June 13
Member No.: 109,479



Interestingly enough, in the real world of security engineering (See also the definitive book on the subject, Ross Anderson's Security Engineering: A Guide to Building Dependable Distributed Systems), the question is never if your system will be vulnerable/insecure, but the degree by which risk will exceed benefit. This is perhaps best illustrated by the following maxim: Secure Systems are unusable. Usable Systems are insecure.

Therefore, everything you personally use is, by definition, insecure.

It seems that in the world of Shadowrun 5th edition, everything is also, by definition, insecure. Which, when you think about it, is great: It keeps Shadowrunners employed.

So at the advice of another poster in another thread, I thought I'd start this up to discuss the best methods, and solicit the collective wisdom of Dumpshock, for securing your devices and your cyberware.

(It's also informative to consider that when the cost of a counter-measure exceeds the benefit that will be derived from it, risk is often accepted rather than mitigated. Remember that when someone suggests that the 100% solution to matrix-aware gear vulnerabilities is to always keep you gear off-line.)

-Wired_SR_AEGIS
Go to the top of the page
 
+Quote Post
Seerow
post Jun 24 2013, 10:40 PM
Post #2


Moving Target
**

Group: Members
Posts: 705
Joined: 3-April 11
Member No.: 26,658



Here's my main question: Can a group's hacker provide passive protection to his group against hackers in the same way a mage can passively provide counterspelling to his whole group?
Go to the top of the page
 
+Quote Post
Epicedion
post Jun 24 2013, 10:40 PM
Post #3


Douche
****

Group: Banned
Posts: 1,584
Joined: 2-March 11
Member No.: 23,135



What does GOD stand for anyway? I've seen the acronym but missed the full version.
Go to the top of the page
 
+Quote Post
Werewindlefr
post Jun 24 2013, 10:43 PM
Post #4


Moving Target
**

Group: Members
Posts: 321
Joined: 4-April 08
From: Detroit, MI
Member No.: 15,844



QUOTE (Epicedion @ Jun 24 2013, 06:40 PM) *
What does GOD stand for anyway? I've seen the acronym but missed the full version.

Grid Overwatch Division. Created in the ol' Deus days (I remember them being mentioned in Target: Matrix)
Go to the top of the page
 
+Quote Post
apple
post Jun 24 2013, 10:43 PM
Post #5


Moving Target
**

Group: Members
Posts: 875
Joined: 16-November 03
Member No.: 5,827



Grid Overwatch Division. The 2070 Matrix Gestapo.

SYL
Go to the top of the page
 
+Quote Post
hermit
post Jun 24 2013, 10:49 PM
Post #6


The King In Yellow
*********

Group: Dumpshocked
Posts: 6,922
Joined: 26-February 05
From: JWD
Member No.: 7,121



QUOTE
What does GOD stand for anyway? I've seen the acronym but missed the full version.

Grid Overwatch Division. A corp court mandated special forces decker unit from 2E. Probably Grid-cops from CP2020 in SR5.

QUOTE
So at the advice of another poster in another thread, I thought I'd start this up to discuss the best methods, and solicit the collective wisdom of Dumpshock, for securing your devices and your cyberware.

Use bioware. Be awakened. Don't use cyberware if you can help it.

In the case you are stubborn abut this being a cyberpunk game, despite better knowledge: Assuming slaving works somewhat like in SR4, and you can still route a commlink's traffic through another: use a bottleneck commlink you can hard reboot with little problems with the enemy decker inside (dumpshocking them) as a gateway to your actual PAN commlink, which is connected with a fiberglass wire and has (active) wireless deactivated. All your PAN is slaved to this commlink, ideally with wires.

Assuming wires have also become lostech for gamist reasons, slave devices to your commlink and wait to be hacked, the reboot your commlink hoping to dump the enemy decker. Of course, you'll be blind and spasming since your ware stops working without the hub it communicates over, but hey, better than having half a million worth of ware bricked, right?
Go to the top of the page
 
+Quote Post
Kruger
post Jun 24 2013, 10:54 PM
Post #7


Moving Target
**

Group: Members
Posts: 542
Joined: 1-August 10
From: Occupied San Diego
Member No.: 18,877



QUOTE (Wired_SR_AEGIS @ Jun 24 2013, 02:37 PM) *
It seems that in the world of Shadowrun 5th edition, everything is also, by definition, insecure. Which, when you think about it, is great: It keeps Shadowrunners employed.

They never had trouble finding work before. (IMG:style_emoticons/default/wink.gif)
Go to the top of the page
 
+Quote Post
Tzeentch
post Jun 24 2013, 11:13 PM
Post #8


Moving Target
**

Group: Members
Posts: 746
Joined: 26-February 02
Member No.: 459



QUOTE (Wired_SR_AEGIS @ Jun 24 2013, 10:37 PM) *
So at the advice of another poster in another thread, I thought I'd start this up to discuss the best methods, and solicit the collective wisdom of Dumpshock, for securing your devices and your cyberware.

Well, the easy answer is to not use cyberware. At all (may be easier to justify for the actual decker character). If you want to talk risk-reward, it certainly makes sense from a players perspective as it entirely eliminates vulnerability to an entire aspect of the game universe that would otherwise be an easy/lazy avenue of attack for the GM. Completely nullifying deus ex machina plots related to easily tracking your location or shutting down your characters advantages is a big deal, even with good GMs.

Compartmentalize your Matrix legwork. Only use a commlink when necessary and both power it down and store it in a RF shielded bag when not in use (you know, like real criminals). Take a look at the character generation rules and see if you can convert your cyber-samurai concept into a bio-samurai or adept.

Pro Tip: Discuss with your GM how dickish he intends to be with deckers, and plan accordingly.
Go to the top of the page
 
+Quote Post
DireRadiant
post Jun 24 2013, 11:14 PM
Post #9


The Dragon Never Sleeps
*********

Group: Admin
Posts: 6,924
Joined: 1-September 05
Member No.: 7,667



QUOTE (Seerow @ Jun 24 2013, 05:40 PM) *
Here's my main question: Can a group's hacker provide passive protection to his group against hackers in the same way a mage can passively provide counterspelling to his whole group?


Slaving to a Master device makes an Brute Force attempt on your device us the Master Device and Hackers rating for Willpower and Firewall.
Go to the top of the page
 
+Quote Post
DireRadiant
post Jun 24 2013, 11:16 PM
Post #10


The Dragon Never Sleeps
*********

Group: Admin
Posts: 6,924
Joined: 1-September 05
Member No.: 7,667



Run Silent. Hackers need to take an extra step or two to find you.
Go to the top of the page
 
+Quote Post
DireRadiant
post Jun 24 2013, 11:22 PM
Post #11


The Dragon Never Sleeps
*********

Group: Admin
Posts: 6,924
Joined: 1-September 05
Member No.: 7,667



Agent performing Matrix Perception and removing uninvited Marks from your own devices.
Go to the top of the page
 
+Quote Post
Epicedion
post Jun 24 2013, 11:30 PM
Post #12


Douche
****

Group: Banned
Posts: 1,584
Joined: 2-March 11
Member No.: 23,135



Commlink 1: broadcasting as normal.

Commlink 2: broadcasting only 1m, connected through matrix though commlink 1.

Cyberware connected to commlink 2 (and thus the Matrix through commlink 1)

Commlink 1 loaded with counterintrusion agents.

To get at the actual PAN (that is, commlink 2), any hacker would either have to be within 1 meter or fully hack into commlink 1 as a node to which commlink 2 is accessible as another node. If commlink 1 starts acting up, commlink 2 can sever the connection and lose the Matrix bonus to its connected 'ware.

Now, get commlink 1a, 1b, 1c, 1d, and 1e. If commlink 2 severs from commlink 1a, automatically connect it to commlink 1b, and so on down the line. A hacker would have to hack 5 commlinks to even try to get at your PAN, and after the last one would only have succeeded at removing Matrix bonuses from your 'ware. By that point the hacker should be meat.
Go to the top of the page
 
+Quote Post
LurkerOutThere
post Jun 24 2013, 11:36 PM
Post #13


Runner
******

Group: Dumpshocked
Posts: 2,946
Joined: 1-June 09
From: Omaha
Member No.: 17,234



QUOTE (Seerow @ Jun 24 2013, 05:40 PM) *
Here's my main question: Can a group's hacker provide passive protection to his group against hackers in the same way a mage can passively provide counterspelling to his whole group?


No they cannot. The best the can do is if someone is slaved then them they can take a -10 on their inititiave to throw their willpower into the tests involved.
Go to the top of the page
 
+Quote Post
Seerow
post Jun 24 2013, 11:46 PM
Post #14


Moving Target
**

Group: Members
Posts: 705
Joined: 3-April 11
Member No.: 26,658



QUOTE (LurkerOutThere @ Jun 24 2013, 11:36 PM) *
No they cannot. The best the can do is if someone is slaved then them they can take a -10 on their inititiave to throw their willpower into the tests involved.


Well there's a big stinker. I was hoping to see something like Electronic Warfare acting as a counterspelling bonus for allies, making their team's gear passively more resistant to hacking attempts.

And seriously, giving up a full pass to add willpower? That's really lame.
Go to the top of the page
 
+Quote Post
Deathstorm
post Jun 25 2013, 12:15 AM
Post #15


Target
*

Group: Members
Posts: 1
Joined: 26-February 11
Member No.: 22,806



To start, I'll point out that I only have 4th edition so far, so can't confirm how well these translate to 5th.

Some things you can do to help lessen your chance of getting screwed by your PAN:

1: Hidden mode. Best case, this might mean the opposing hacker spends enough time scanning that your team hacker spots and neutralizes him. Worst case, a good hacker will take a microdrone with a sprayer filled with hacker nanites that will give you a direct link to his commlink, and might start hacking you that turn. Keep your real commlink hidden, physically as well as matrixly. Matrixally? Whatever.

2: IC. Think about it. Since 1st edition, corps have made sure THEIR computers had IC floating around their systems to give deckers/hackers a bad day. So, you've got your system, with YOUR paydata (or valuable cyberware), so why wouldn't you give it the same consideration that the corps do. Chances are you are NOT good enough to program your defender yourself, so get someone you trust to do it for you. That's what fixers are for. To fix you up with things.

3: Redundancy. Add extra steps to hacking your cyberware. Skinlink your wares to your main commlink. Link that with a cable to your burner link. Link THAT via cable to another one. The hacker will need to go through each node to get to the good stuff, and each hacking attempt (after the first) gives you two chances to notice them. One for the node he's in, and another for the one he's hacking. Plus the chance for your hacker buddy to scan him down.

4: Decoys. Bring four commlinks. Three of them in hidden, and the fourth your real one. Better still, have one of the decoys in passive mode, with links to your "cybergun" and other things. Face it. Everybody knows street samurai aren't smart. If they see a Street Sam with a commlink in passive mode declaring him "Super Samruai" (misspelling intentional), they're going to waste their time hacking IT, because we all assume street samurai ARE that dumb. Then, they need to go from there to your fake wares, and only then do they figure out that you pulled a fast one on them. That's a minimum of two-three turns for you to find and pull a fast GUN on them! Again, get your fixer to hire you a hacker to program RFID tags or some junk nodes to fake your cyberware.

5: Redundancy. Yeah. I had to make that joke. Slightly different version though. Don't assume any one security method is enough. Do all of these, plus any others that you like from other people. Plus have a hacker or technomancer on overwatch scanning for bugs. AND have everything set to flush all users and delete their accounts(except you, specifically) the instant it spots ANY suspected intrusion. Heck, along with 3 and 4, set them all up to perform a synchronized flush+delete any time ANY of them spot a suspected intrusion. If you've got a REALLY good hacker on tap, they might even have some way to randomize the ID for the commlinks, so each time the flush+delete happens, the commlinks swap IDs to make things even MORE annoying to figure out (the commlink they try to hack is now one of the decoys, unless they rescan).

6: Imagination trumps science. Remember, this is a cinematic game. This means that movie hacking is the way to think. So if you think of something that would be "impossible" with realistic hacking, try it anyway. If you see something awesome (yet realistically implausible) in a movie, either try it yourself or have your hacker buddy try it! In fact, ABUSE that idea. Like how movies ALWAYS have the timer stop at 1 second, have a built in timer set so anybody who logs in gets a pop up saying "Security violation! Enter code to stop:" with a timer counting down from 4 seconds and a box with space for 4 digits. The correct answer is of course to wait the timer down, and it'll stop and say "Violation cancelled. Have a good day!" or something like that. If any input is made, then boom, instant full alert! Sure, it means you have to wait an extra combat turn when you log into your commlink, but that's better than having some hacker having an easy time getting to your goodies, right?
Go to the top of the page
 
+Quote Post
LurkerOutThere
post Jun 25 2013, 12:28 AM
Post #16


Runner
******

Group: Dumpshocked
Posts: 2,946
Joined: 1-June 09
From: Omaha
Member No.: 17,234



QUOTE (Deathstorm @ Jun 24 2013, 07:15 PM) *
To start, I'll point out that I only have 4th edition so far, so can't confirm how well these translate to 5th.


So then please don't start.
Go to the top of the page
 
+Quote Post
Aaron
post Jun 25 2013, 12:58 AM
Post #17


Mr. Johnson
******

Group: Dumpshocked
Posts: 3,148
Joined: 27-February 06
From: UCAS
Member No.: 8,314



QUOTE (Seerow @ Jun 24 2013, 05:40 PM) *
Here's my main question: Can a group's hacker provide passive protection to his group against hackers in the same way a mage can passively provide counterspelling to his whole group?

Yes. Not exactly the same way, but they can provide passive protection in the form of their own stats when the devices they're protecting are slaved. There is a minor to moderate risk to the master.

I should also mention that SR5 doesn't have daisy-chaining. A device is either on the Matrix or it isn't; there is no gateway architecture (if anybody thinks that we disregarded modern networking practice in the interests of playability, then my counter-argument is ... I got nothing; yeah, we did that).
Go to the top of the page
 
+Quote Post
binarywraith
post Jun 25 2013, 01:06 AM
Post #18


Shooting Target
****

Group: Dumpshocked
Posts: 1,973
Joined: 4-June 10
Member No.: 18,659



So yeah.


Be a Mystic Adept.


That's pretty much the optimal solution.
Go to the top of the page
 
+Quote Post
Wired_SR_AEGIS
post Jun 25 2013, 01:07 AM
Post #19


Moving Target
**

Group: Members
Posts: 332
Joined: 11-June 13
Member No.: 109,479



QUOTE (Aaron @ Jun 25 2013, 12:58 AM) *
Yes. Not exactly the same way, but they can provide passive protection in the form of their own stats when the devices they're protecting are slaved. There is a minor to moderate risk to the master.

I should also mention that SR5 doesn't have daisy-chaining. A device is either on the Matrix or it isn't; there is no gateway architecture (if anybody thinks that we disregarded modern networking practice in the interests of playability, then my counter-argument is ... I got nothing; yeah, we did that).


Well. In your defense... I think you could build a case that the distributed computing available across the matrix in conjunction with new security protocols could reduce the need to use classic network gateway architecture, based on the latency expense it would incur. Particularly when, even today, six white papers titled 'The Host is the new Perimeter' crop up weekly.

Theorizing about the fundamentals of the 2070 Matrix in today's terms would be like listening to a Babbage Contemporary opine about the possibilities of the modern GPU.

-Wired_SR_AEGIS
Go to the top of the page
 
+Quote Post
Seerow
post Jun 25 2013, 01:10 AM
Post #20


Moving Target
**

Group: Members
Posts: 705
Joined: 3-April 11
Member No.: 26,658



QUOTE
Yes. Not exactly the same way, but they can provide passive protection in the form of their own stats when the devices they're protecting are slaved. There is a minor to moderate risk to the master.


To my understanding though, with how expensive cyberdecks are, it's actually much cheaper to get a high rating non-deck, and slave things to that, than slave things to the decker's deck. Like in another thread I saw someone make a point that there was like some rating 6 commlink or something for 5000 nuyen, where you'd spend several hundred grand to get something similar out of a deck. Which means the decker really isn't contributing much of anything to defending the group.

(Also it would take a good long while for any group to be willing to develop enough trust to slave their stuff to someone else's gear. It's one thing accepting some matrix overwatch, it's another thing to surrender control of everything you own to someone else. Hell in real life where I don't have my life on the line if my stuff is compromised, I still am hesitant to give someone else access to my stuff, much less full control over it.
Go to the top of the page
 
+Quote Post
Aaron
post Jun 25 2013, 03:54 AM
Post #21


Mr. Johnson
******

Group: Dumpshocked
Posts: 3,148
Joined: 27-February 06
From: UCAS
Member No.: 8,314



QUOTE (Seerow @ Jun 24 2013, 08:10 PM) *
To my understanding though, with how expensive cyberdecks are, it's actually much cheaper to get a high rating non-deck, and slave things to that, than slave things to the decker's deck. Like in another thread I saw someone make a point that there was like some rating 6 commlink or something for 5000 nuyen, where you'd spend several hundred grand to get something similar out of a deck. Which means the decker really isn't contributing much of anything to defending the group.

More or less. Taking the commlink route is a perfectly legit means of defense, but you miss out on a couple of things. First, the hacker usually has decent Mental attributes that you wouldn't have access to except via slaving. Second, without a Sleaze attribute running silent is much less effective (having a smaller dice pool to defend against spotting attempts) and potentially dangerous (smaller dice pool means higher chance of glitching, especially if you Logic isn't too high).


QUOTE
(Also it would take a good long while for any group to be willing to develop enough trust to slave their stuff to someone else's gear. It's one thing accepting some matrix overwatch, it's another thing to surrender control of everything you own to someone else. Hell in real life where I don't have my life on the line if my stuff is compromised, I still am hesitant to give someone else access to my stuff, much less full control over it.

I find this both wise and insightful.
Go to the top of the page
 
+Quote Post
LurkerOutThere
post Jun 25 2013, 07:20 AM
Post #22


Runner
******

Group: Dumpshocked
Posts: 2,946
Joined: 1-June 09
From: Omaha
Member No.: 17,234



QUOTE (DireRadiant @ Jun 24 2013, 05:22 PM) *
Agent performing Matrix Perception and removing uninvited Marks from your own devices.


That doesn't really do much when they don't need a mark to dataspike you.
Go to the top of the page
 
+Quote Post
apple
post Jun 25 2013, 07:57 AM
Post #23


Moving Target
**

Group: Members
Posts: 875
Joined: 16-November 03
Member No.: 5,827



QUOTE (binarywraith @ Jun 24 2013, 08:06 PM) *
So yeah.
Be a Mystic Adept.
That's pretty much the optimal solution.


Until the day they discover that they used and write the wrong version of the character creation rules, where mystic adepts cannot by a PP for 2 Karma. So there will be an errata out around the time for SR 6th.

SYL
Go to the top of the page
 
+Quote Post
Larsine
post Jun 25 2013, 09:19 AM
Post #24


Moving Target
**

Group: Members
Posts: 647
Joined: 9-September 03
From: Sorø, Denmark
Member No.: 5,604



QUOTE (Seerow @ Jun 25 2013, 01:46 AM) *
And seriously, giving up a full pass to add willpower? That's really lame.

That bonus lasts for the rest of the combat turn, and is in addition to any other defense you employ.

Sometimes it will be worth giving up that one pass.
Go to the top of the page
 
+Quote Post
Critias
post Jun 25 2013, 09:33 AM
Post #25


Freelance Elf
*********

Group: Dumpshocked
Posts: 7,324
Joined: 30-September 04
From: Texas
Member No.: 6,714



QUOTE (Larsine @ Jun 25 2013, 04:19 AM) *
That bonus lasts for the rest of the combat turn, and is in addition to any other defense you employ.

Sometimes it will be worth giving up that one pass.

It is, essentially, the Full Defense option (for Matrix stuff, instead of meatside dodging). Sometimes worth it, sometimes not. Just like meatside dodging.
Go to the top of the page
 
+Quote Post

7 Pages V   1 2 3 > » 
Reply to this topicStart new topic

 



RSS Lo-Fi Version Time is now: 24th April 2024 - 11:59 AM

Topps, Inc has sole ownership of the names, logo, artwork, marks, photographs, sounds, audio, video and/or any proprietary material used in connection with the game Shadowrun. Topps, Inc has granted permission to the Dumpshock Forums to use such names, logos, artwork, marks and/or any proprietary materials for promotional and informational purposes on its website but does not endorse, and is not affiliated with the Dumpshock Forums in any official capacity whatsoever.