IPB

Welcome Guest ( Log In | Register )

7 Pages V  < 1 2 3 4 > »   
Reply to this topicStart new topic
> How to protect your devices from Hackers in 5th Edition, Or how I learned to worrying and love the GOD.
Tymeaus Jalynsfe...
post Jun 25 2013, 01:19 PM
Post #26


Prime Runner Ascendant
**********

Group: Members
Posts: 17,568
Joined: 26-March 09
From: Aurora, Colorado
Member No.: 17,022



Just remove wireless from your devices and laugh as the Hacker once again only has the Tacnet and communications to play with, which is powerful in and of itself. That will likely be the end result of the Hacking Ware effect, anyways, and completely removes the forced nature of the change in 5th Edition. Your character builds will be different, but likely still effective, and it bypasses the idiocy of having your Initiative Boosts/Logic Enhancers being Wireless for no good reason.
Go to the top of the page
 
+Quote Post
Aaron
post Jun 25 2013, 01:29 PM
Post #27


Mr. Johnson
******

Group: Dumpshocked
Posts: 3,148
Joined: 27-February 06
From: UCAS
Member No.: 8,314



QUOTE (LurkerOutThere @ Jun 25 2013, 02:20 AM) *
That doesn't really do much when they don't need a mark to dataspike you.

It's tough to one-shot a device without a mark or three, so there's that.
Go to the top of the page
 
+Quote Post
DireRadiant
post Jun 25 2013, 01:29 PM
Post #28


The Dragon Never Sleeps
*********

Group: Admin
Posts: 6,924
Joined: 1-September 05
Member No.: 7,667



QUOTE (LurkerOutThere @ Jun 25 2013, 02:20 AM) *
That doesn't really do much when they don't need a mark to dataspike you.


That's only one technique you've used to overcome my Defense Option 6 of 20.

For every defense there is an offense and vice versa, more options means you get more fun.

The fact you know an offensive counter to a defense doesn't make the defense invalid. No more then my argument makes your counter argument invalid. Without two sides and options you don't even have a game.
Go to the top of the page
 
+Quote Post
Mäx
post Jun 25 2013, 01:58 PM
Post #29


Prime Runner
*******

Group: Members
Posts: 3,803
Joined: 3-February 08
From: Finland
Member No.: 15,628



QUOTE (Wired_SR_AEGIS @ Jun 25 2013, 01:37 AM) *
Interestingly enough, in the real world of security engineering (See also the definitive book on the subject, Ross Anderson's Security Engineering: A Guide to Building Dependable Distributed Systems), the question is never if your system will be vulnerable/insecure, but the degree by which risk will exceed benefit. This is perhaps best illustrated by the following maxim: Secure Systems are unusable. Usable Systems are insecure.

Therefore, everything you personally use is, by definition, insecure.

Sorry but no, if i pull out the Ethernet cable out from the back of my computer it becomes 100% unhackable from afar and it still works just as well as it did before except i cant surf the net with it.
Go to the top of the page
 
+Quote Post
Serbitar
post Jun 25 2013, 02:05 PM
Post #30


Running Target
***

Group: Members
Posts: 1,498
Joined: 4-August 05
From: ADL
Member No.: 7,534



Read the SGP in my sig. Old but still true.
Go to the top of the page
 
+Quote Post
Serbitar
post Jun 25 2013, 02:07 PM
Post #31


Running Target
***

Group: Members
Posts: 1,498
Joined: 4-August 05
From: ADL
Member No.: 7,534



QUOTE (Mäx @ Jun 25 2013, 03:58 PM) *
Sorry but no, if i pull out the Ethernet cable out from the back of my computer it becomes 100% unhackable from afar and it still works just as well as it did before except i cant surf the net with it.


Which equals unusable today.
Go to the top of the page
 
+Quote Post
Mäx
post Jun 25 2013, 02:16 PM
Post #32


Prime Runner
*******

Group: Members
Posts: 3,803
Joined: 3-February 08
From: Finland
Member No.: 15,628



QUOTE (Serbitar @ Jun 25 2013, 05:07 PM) *
Which equals unusable today.

Not really no.
Go to the top of the page
 
+Quote Post
Tymeaus Jalynsfe...
post Jun 25 2013, 03:47 PM
Post #33


Prime Runner Ascendant
**********

Group: Members
Posts: 17,568
Joined: 26-March 09
From: Aurora, Colorado
Member No.: 17,022



QUOTE (Mäx @ Jun 25 2013, 08:16 AM) *
Not really no.


Agreeed... Just becasue my computer is not connected to the Internet, it is not rendered useless. In fact I can do everything (except browse the Internet, which is not a necessity) on my computer without EVER having to connect to the internet at all, if I like.
Go to the top of the page
 
+Quote Post
Wired_SR_AEGIS
post Jun 25 2013, 03:59 PM
Post #34


Moving Target
**

Group: Members
Posts: 332
Joined: 11-June 13
Member No.: 109,479



QUOTE (Mäx @ Jun 25 2013, 01:58 PM) *
Sorry but no, if i pull out the Ethernet cable out from the back of my computer it becomes 100% unhackable from afar and it still works just as well as it did before except i cant surf the net with it.


Incorrect. By disconnecting your ethernet capable, you have just inflicted a denial of service attack on yourself -- You've lost all networked capabilities. You've lost network shared resources, distributed computing, as well as a number of local programs that require online authentication prior to launching.

Critical Failure: You failed to secure the availability of your system.

Infact, you probably just executed that denial of service attack on yourself BETTER than a hacker could.

How does that make you feel? Sheepish?

-Wired_SR_AEGIS
Go to the top of the page
 
+Quote Post
Tymeaus Jalynsfe...
post Jun 25 2013, 04:05 PM
Post #35


Prime Runner Ascendant
**********

Group: Members
Posts: 17,568
Joined: 26-March 09
From: Aurora, Colorado
Member No.: 17,022



QUOTE (Wired_SR_AEGIS @ Jun 25 2013, 09:59 AM) *
Incorrect. By disconnecting your ethernet capable, you have just inflicted a denial of service attack on yourself -- You've lost all networked capabilities. You've lost network shared resources, distributed computing, as well as a number of local programs that require online authentication prior to launching.

Critical Failure: You failed to secure the availability of your system.

Infact, you probably just executed that denial of service attack on yourself BETTER than a hacker could.

How does that make you feel? Sheepish?

-Wired_SR_AEGIS


That only works if you actually need the Internet to function. I have absolutely no program that NEEDS Internet connections (save Internet Explorer) to make my machine function. My system is completely available to perform the functions I consistently perform. Internet is a Choice, not a Requirement, and my machine works perfectly well without it. So well, in fact that I am no fear of Hacker/Malware attacks whatsoever. *shrug*
Go to the top of the page
 
+Quote Post
Draco18s
post Jun 25 2013, 04:07 PM
Post #36


Immortal Elf
**********

Group: Members
Posts: 10,289
Joined: 2-October 08
Member No.: 16,392



QUOTE (Tymeaus Jalynsfein @ Jun 25 2013, 11:05 AM) *
That only works if you actually need the Internet to function. I have absolutely no program that NEEDS Internet connections (save Internet Explorer) to make my machine function. My system is completely available to perform the functions I consistently perform. Internet is a Choice, not a Requirement, and my machine works perfectly well without it. So well, in fact that I am no fear of Hacker/Malware attacks whatsoever. *shrug*


*cough*
If that's the direction real world software is taking today...
Go to the top of the page
 
+Quote Post
Wired_SR_AEGIS
post Jun 25 2013, 04:08 PM
Post #37


Moving Target
**

Group: Members
Posts: 332
Joined: 11-June 13
Member No.: 109,479



QUOTE (Tymeaus Jalynsfein @ Jun 25 2013, 04:05 PM) *
That only works if you actually need the Internet to function. I have absolutely no program that NEEDS Internet connections (save Internet Explorer) to make my machine function. My system is completely available to perform the functions I consistently perform. Internet is a Choice, not a Requirement, and my machine works perfectly well without it. So well, in fact that I am no fear of Hacker/Malware attacks whatsoever. *shrug*


Based on your dumpshock activity, I would suggest that perhaps you may need to rethink your dependency on network access as part of the routine operation of your system. ;b

-Wired_SR_AEGIS
Go to the top of the page
 
+Quote Post
Tymeaus Jalynsfe...
post Jun 25 2013, 04:18 PM
Post #38


Prime Runner Ascendant
**********

Group: Members
Posts: 17,568
Joined: 26-March 09
From: Aurora, Colorado
Member No.: 17,022



QUOTE (Wired_SR_AEGIS @ Jun 25 2013, 10:08 AM) *
Based on your dumpshock activity, I would suggest that perhaps you may need to rethink your dependency on network access as part of the routine operation of your system. ;b

-Wired_SR_AEGIS


Again, Dumpshock is not a Necessity, it is a choice (and about the only online activity that I persue consistently). I have gone many months (in the past) without attaching to the Internet, and I have no programs that require it to function. And in fact have multiple PC"s at home that DO NOT RESIDE ON THE NETWORK at all. Therefore, how can you ever touch those PC's remotely? Those PC's are not denied service in any way. (IMG:style_emoticons/default/smile.gif)
Go to the top of the page
 
+Quote Post
Kruger
post Jun 25 2013, 04:20 PM
Post #39


Moving Target
**

Group: Members
Posts: 542
Joined: 1-August 10
From: Occupied San Diego
Member No.: 18,877



QUOTE (Draco18s @ Jun 25 2013, 08:07 AM) *
*cough*
If that's the direction real world software is taking today...

Photoshop really isn't a very good example of a program people would be supremely worried about security on. Cloud based applications are awesome. For some things.

This is really the problem. Some people have a disconnect between the ideas of what can be done, and what would or should. Unfortunately, that group of disconnected people appear to have included all the decision makers at Catalyst too.
QUOTE (Wired_SR_AEGIS @ Jun 25 2013, 08:08 AM) *
Based on your dumpshock activity, I would suggest that perhaps you may need to rethink your dependency on network access as part of the routine operation of your system. ;b

-Wired_SR_AEGIS
I joke about people who can't imagine life without the Internet as being the ones who won't survive catastrophes, lol. (IMG:style_emoticons/default/wink.gif) I was traveling all weekend up in the country for a wedding in a hick town, and most of the time I was offline. And yet I still managed to complete all of the stuff I was working on.

http://i131.photobucket.com/albums/p312/ke...n-Fellows-2.gif
(IMG:style_emoticons/default/nyahnyah.gif)
Go to the top of the page
 
+Quote Post
Daedelus
post Jun 25 2013, 04:27 PM
Post #40


Moving Target
**

Group: Members
Posts: 170
Joined: 13-July 09
Member No.: 17,386



QUOTE (Tymeaus Jalynsfein @ Jun 25 2013, 07:47 AM) *
Agreeed... Just becasue my computer is not connected to the Internet, it is not rendered useless. In fact I can do everything (except browse the Internet, which is not a necessity) on my computer without EVER having to connect to the internet at all, if I like.

You just described the whole matrix bonus concept. Without matrix you can do most of what you want, with matrix you can do a bit more. You have commented on the "stupidity" of certain concepts that I find elegant and ingenious. The hacker run you predict will not come to pass due to simple economy of actions. It will take a minimum of three passes to shut down that cyberarm. As far as bricking it...we cannot estimate that yet because we have not seen the rules. It can get really frustrating listening to those of you that equate opinion to fact.
Go to the top of the page
 
+Quote Post
Draco18s
post Jun 25 2013, 04:35 PM
Post #41


Immortal Elf
**********

Group: Members
Posts: 10,289
Joined: 2-October 08
Member No.: 16,392



QUOTE (Kruger @ Jun 25 2013, 11:20 AM) *
Photoshop really isn't a very good example of a program people would be supremely worried about security on. Cloud based applications are awesome. For some things.


I was simply pointing out an application that cannot be run without an internet connection.

And the fact that it's cloudbased is why my company will never upgrade past CS6.
Go to the top of the page
 
+Quote Post
Tymeaus Jalynsfe...
post Jun 25 2013, 04:35 PM
Post #42


Prime Runner Ascendant
**********

Group: Members
Posts: 17,568
Joined: 26-March 09
From: Aurora, Colorado
Member No.: 17,022



QUOTE (Daedelus @ Jun 25 2013, 10:27 AM) *
You just described the whole matrix bonus concept. Without matrix you can do most of what you want, with matrix you can do a bit more. You have commented on the "stupidity" of certain concepts that I find elegant and ingenious. The hacker run you predict will not come to pass due to simple economy of actions. It will take a minimum of three passes to shut down that cyberarm. As far as bricking it...we cannot estimate that yet because we have not seen the rules. It can get really frustrating listening to those of you that equate opinion to fact.


Online does not add any functionality to my day to day life, though. It only adds enjoyment. There is a BiG Difference here. I can do ALL of what I NEED without ever touching the Internet. The problem is that they moved Basic Functionality from Need to Want, with no thought to the rationale for it.

Apparently Cyberlimbs cannot be hacked (can't remember who pointed that out). They have no online bonuses. And that is where the stupidity exists. If Limbs have no need for bonuses, why do Reaction Enhancers? They added this so that Hackers have something to do. The brutal fact, however, is that Hackers had More than Enough to do in SR4. They "Fixed" the wrong thing. And that is the complaint.
Go to the top of the page
 
+Quote Post
Kruger
post Jun 25 2013, 04:40 PM
Post #43


Moving Target
**

Group: Members
Posts: 542
Joined: 1-August 10
From: Occupied San Diego
Member No.: 18,877



QUOTE (Daedelus @ Jun 25 2013, 08:27 AM) *
You just described the whole matrix bonus concept. Without matrix you can do most of what you want, with matrix you can do a bit more.

It's this kind of "incomplete" thinking that got a game mechanic like that written in the first place.

What if his only need for his computer was to type up a report and print it? At no point does he require wireless connectivity to do that. What if he's just playing the campaign of Rome: Total War? Or if he's watching Norwegian Midget Porn that he downloaded several days ago? At what point would connectivity enhance any of those activities?

That's what people are getting at. There are just so many actions for which having external connectivity has no practical benefit, nor any material benefit. If I want to browse the Interwebs to get more Norwegian Midget Porn, I have to be online. If I've already got those little bastards downloaded, I'm set for a (short) while.
Go to the top of the page
 
+Quote Post
Tymeaus Jalynsfe...
post Jun 25 2013, 04:43 PM
Post #44


Prime Runner Ascendant
**********

Group: Members
Posts: 17,568
Joined: 26-March 09
From: Aurora, Colorado
Member No.: 17,022



QUOTE (Kruger @ Jun 25 2013, 10:40 AM) *
It's this kind of "incomplete" thinking that got a game mechanic like that written in the first place.

What if his only need for his computer was to type up a report and print it? At no point does he require wireless connectivity to do that. What if he's just playing the campaign of Rome: Total War? Or if he's watching Norwegian Midget Porn that he downloaded several days ago? At what point would connectivity enhance any of those activities?

That's what people are getting at. There are just so many actions for which having external connectivity has no practical benefit, nor any material benefit. If I want to browse the Interwebs to get more Norwegian Midget Porn, I have to be online. If I've already got those little bastards downloaded, I'm set for a (short) while.


Norwegian Midget Porn? Is that a Thing? *shudders* (IMG:style_emoticons/default/smile.gif)
Go to the top of the page
 
+Quote Post
Kruger
post Jun 25 2013, 04:44 PM
Post #45


Moving Target
**

Group: Members
Posts: 542
Joined: 1-August 10
From: Occupied San Diego
Member No.: 18,877



No idea. Probably. Rule 34 and all.
Go to the top of the page
 
+Quote Post
Draco18s
post Jun 25 2013, 04:45 PM
Post #46


Immortal Elf
**********

Group: Members
Posts: 10,289
Joined: 2-October 08
Member No.: 16,392



QUOTE (Tymeaus Jalynsfein @ Jun 25 2013, 11:43 AM) *
Norwegian Midget Porn? Is that a Thing? *shudders* (IMG:style_emoticons/default/smile.gif)


Meh. If it isn't, it should be. I've seen just about everything else.
Go to the top of the page
 
+Quote Post
Ephiral
post Jun 25 2013, 04:48 PM
Post #47


Target
*

Group: Members
Posts: 10
Joined: 9-December 09
Member No.: 17,957



QUOTE (Mäx @ Jun 25 2013, 09:58 AM) *
Sorry but no, if i pull out the Ethernet cable out from the back of my computer it becomes 100% unhackable from afar and it still works just as well as it did before except i cant surf the net with it.


Emphasis mine. So your machine is perfectly secure over the network, and perfectly unusable over the network. It remains usable locally, and insecure locally. How does this contradict "secure systems are unusable, usable systems are insecure", exactly?
Go to the top of the page
 
+Quote Post
Wired_SR_AEGIS
post Jun 25 2013, 04:48 PM
Post #48


Moving Target
**

Group: Members
Posts: 332
Joined: 11-June 13
Member No.: 109,479



QUOTE (Tymeaus Jalynsfein @ Jun 25 2013, 05:18 PM) *
Again, Dumpshock is not a Necessity, it is a choice (and about the only online activity that I persue consistently). I have gone many months (in the past) without attaching to the Internet, and I have no programs that require it to function. And in fact have multiple PC"s at home that DO NOT RESIDE ON THE NETWORK at all. Therefore, how can you ever touch those PC's remotely? Those PC's are not denied service in any way. (IMG:style_emoticons/default/smile.gif)


So then you're describing a system whose dependencies do not include network activity. Therefore, a network is not a practical attack vector and the risk associated with a networked attack is minimal. It sounds like, in the context that you're describing, to perform a network attack a malicious individual would have to first inject network connectivity to your device, and then execute their network attack.

In that sort of a scenario, you're likely more concerned about physical access to your device, than networked access.

That's fine. That doesn't change the fact that your system is still vulnerable. It just has different dependencies and vulnerabilities to different threat vectors.

Personally? I find that the benefits of online connectivity outweigh the risks associated with online connectivity because I use systems where, practically speaking, online connectivity is a dependency. All of this, in no way, invalidates that usable systems are, by their nature, insecure in one way or another.

Full stop. (IMG:style_emoticons/default/smile.gif)

-Wired_SR_AEGIS
Go to the top of the page
 
+Quote Post
Kruger
post Jun 25 2013, 04:50 PM
Post #49


Moving Target
**

Group: Members
Posts: 542
Joined: 1-August 10
From: Occupied San Diego
Member No.: 18,877



QUOTE (Wired_SR_AEGIS @ Jun 25 2013, 08:48 AM) *
So then you're describing a system whose dependencies do not include network activity.
Strangely enough, exactly like Wired Reflexes would be.
Go to the top of the page
 
+Quote Post
Daedelus
post Jun 25 2013, 04:56 PM
Post #50


Moving Target
**

Group: Members
Posts: 170
Joined: 13-July 09
Member No.: 17,386



QUOTE (Kruger @ Jun 25 2013, 08:40 AM) *
It's this kind of "incomplete" thinking that got a game mechanic like that written in the first place.

What if his only need for his computer was to type up a report and print it? At no point does he require wireless connectivity to do that. What if he's just playing the campaign of Rome: Total War? Or if he's watching Norwegian Midget Porn that he downloaded several days ago? At what point would connectivity enhance any of those activities?

That's what people are getting at. There are just so many actions for which having external connectivity has no practical benefit, nor any material benefit. If I want to browse the Interwebs to get more Norwegian Midget Porn, I have to be online. If I've already got those little bastards downloaded, I'm set for a (short) while.

It sounds as if some of those items are not given bonuses. Some. that are questionable, are. We have a small sample to work from and cannot make any legitimate statistical analysis yet. I was speaking of the concept not the implementation. None of us can speak with any degree of expertise, to the implementation because we have not seen it yet. Well most of us anyway. I have not and I won't make any leap to judgment one way or the other until I have done my own homework. I'm not sure everyone here can say the same.
Go to the top of the page
 
+Quote Post

7 Pages V  < 1 2 3 4 > » 
Reply to this topicStart new topic

 



RSS Lo-Fi Version Time is now: 25th November 2024 - 11:47 AM

Topps, Inc has sole ownership of the names, logo, artwork, marks, photographs, sounds, audio, video and/or any proprietary material used in connection with the game Shadowrun. Topps, Inc has granted permission to the Dumpshock Forums to use such names, logos, artwork, marks and/or any proprietary materials for promotional and informational purposes on its website but does not endorse, and is not affiliated with the Dumpshock Forums in any official capacity whatsoever.