[OOC] Panzerknacker |
[OOC] Panzerknacker |
Nov 6 2017, 08:26 PM
Post
#51
|
|
Dragon Group: Members Posts: 4,887 Joined: 18-September 13 From: Germany Member No.: 154,444 |
All things considered, that's actually quite reasonable. (IMG:style_emoticons/default/wink.gif)
|
|
|
Nov 10 2017, 03:24 PM
Post
#52
|
|
Dragon Group: Members Posts: 4,887 Joined: 18-September 13 From: Germany Member No.: 154,444 |
@Volker
Schmidt is talking about the bootstrap program: Bootstrap: An IT expert’s tool of choice when working with boot code of a device. Corrupted by many hackers, Bootstrap allows for hidden commands to be input into the device after the next reboot. Popular options include announcing the location of the device when it connects to the Matrix, adjusting the processing of the device so that the default device attributes are the choice of the user, annoying the user with constant demands for ownership permissions, and making a record of every action on the device. This cyberprogram allows for a variety of tasks to be set up in the boot record by way of a Format Device action rather than just setting the device up to no longer function. (p.56 Datatrails) one such hidden command could be not to trigger the alert function but to continue sending "everything's peachy" |
|
|
Nov 10 2017, 03:33 PM
Post
#53
|
|
Shooting Target Group: Members Posts: 1,970 Joined: 22-July 17 From: Austria Member No.: 211,160 |
Schmidt is talking about the bootstrap program Yeah, so does bnc ^^ That's why I/she said, it won't work. Reason 1 (IC): From my technical and medical understanding (which is far superior to bnc's but still not bad as I'm a programmer and a paramedic), that's not how I would expect such a system to work. A biomonitor would, from my perspective, not just send "green light" or "red light", but rather information about pulse, blood pressure, blood sugar, and so forth. I imagine a host drawing conclusions from these stats, including the creation of alert messages to certain subscribers. Even if it works differently, sending one command while rebooting would change nothing at all. Whichever server or device contacts the biomonitor (or is contacted) will do so several times a minute, or in this case rather several times a second. So I need to create a long-term solution, which a bootstrap program can per definition not perform. Reason 2 (OoC): I find it fitting that at least now and than bnc, who is an expert on both medicine and matrix security operations, should be able to provide a better solution than some random Johnson who did his homework well. I though this might be such an occasion. EDIT: Also, I think it's somehow Shadowrunnier to generate a virtual datafeeder class from stolen data and redirect it as a source of output for the biomonitor than just running a pre-defined program and rolling a check. |
|
|
Nov 10 2017, 05:26 PM
Post
#54
|
|
Dragon Group: Members Posts: 4,887 Joined: 18-September 13 From: Germany Member No.: 154,444 |
Feel free to do it the hard way (IMG:style_emoticons/default/smile.gif)
But the bio-monitor in this case is nothing more than a modified panic button that sends an alert when the vital functions show some dangerous change. Biomonitor: This compact device measures life signs—heart rate, blood pressure, temperature, and so on. The biomonitor can also analyze blood, sweat, and skin samples. [...] Wireless: The biomonitor shares information with other wireless devices you designate and can auto-alert DocWagon or another ambulance service if your life signs reach certain thresholds. You really don't want to send all your vitals information at all times and everyday to your employer - they'd see every shit you take and every time you get an orgasm, every time you go out for a smoke and every time you aren't actually working but taking a little break. You can do that with low level personal, but not with expensive specialists - especially not with those who can manipulate the system anyway. |
|
|
Nov 11 2017, 08:01 PM
Post
#55
|
|
Shooting Target Group: Members Posts: 1,970 Joined: 22-July 17 From: Austria Member No.: 211,160 |
You really don't want to send all your vitals information at all times and everyday to your employer - they'd see every shit you take and every time you get an orgasm, every time you go out for a smoke and every time you aren't actually working but taking a little break. You can do that with low level personal, but not with expensive specialists - especially not with those who can manipulate the system anyway. I never said you send your vitals to your employer. I said, you send them to the server of the company who is running your biomonitor. The exact thing you describe is happening already 2017. Firms can tell when you take a shit if you wear one of these fitness wristbands. And other firms alread pay for that info. But even in SR biomonitors are discreeter and process, as you suggest, the info on their own. Then there are two ways how they communicate with, in that case, your employer: 1) There's no communication unless there is a problem, in which case an alert is sent. If this is how they do it, there's no need for a bootstrap prog. We just fry the darn thing or shut it down. 2) There's constant communication, sending green light as long everything's fine. More traffic, more processing powers, more security. In this case - that's the one I was assuming - bootstrap is worthless. We can send a single glimpse of green light, then the boot is done. Next heartbeat, the biomonitor will process its sensoric data and raise alarm. This is where bnc's idea of redirecting the biomonitor to a virtual system comes into play. So from my perspective it's not doing "it the hard way". It's doing it at all. |
|
|
Nov 11 2017, 10:50 PM
Post
#56
|
|
Dragon Group: Members Posts: 4,887 Joined: 18-September 13 From: Germany Member No.: 154,444 |
bootstrap permanently alters the behavior of a device without the need for a mark. It essentially allows you to force a specific behavior - i.e. send a fake loop of green light.
Rerooting to a virtual environment sounds good, but has no equivalent in the SR rules. There is only the editing file action to manipulate a data feed (like that from a camera) which means you have to spend a complex action every combat round to keep the feed under control - that's the hard way. |
|
|
Nov 12 2017, 10:18 AM
Post
#57
|
|
Shooting Target Group: Members Posts: 1,970 Joined: 22-July 17 From: Austria Member No.: 211,160 |
As you will. I thought you might favor a creative solution over "the players (yet again) do as the npc tells them to".
I edited the post. We can proceed. |
|
|
Nov 12 2017, 12:06 PM
Post
#58
|
|
Dragon Group: Members Posts: 4,887 Joined: 18-September 13 From: Germany Member No.: 154,444 |
I am open for alternative solutions - just tell me how you want to set them up rules wise.
|
|
|
Nov 12 2017, 12:41 PM
Post
#59
|
|
Shooting Target Group: Members Posts: 1,970 Joined: 22-July 17 From: Austria Member No.: 211,160 |
I already have. There are two possibilities how the biomonitor software would know where the data comes from.
1st (and usual): There is a variable in the source code that defines that. In this case, I'd need a GIGO to replace loadSensorData with loadTestClassData. 2nd: That variable isn't defined in the source code but in a meta file. In this case I need an Edit File to alter this variable. Rest see above. This approach has one big advantage. I don't have to reboot anything, which could be noticed by someone. Or something. |
|
|
Nov 12 2017, 01:35 PM
Post
#60
|
|
Dragon Group: Members Posts: 4,887 Joined: 18-September 13 From: Germany Member No.: 154,444 |
That works - GIGO is always a solution - until the biomonitor is rebooted.
The edit file solution works until an update replaces it. Both work but have to be used relatively close to the beginn of the heist. |
|
|
Nov 12 2017, 04:26 PM
Post
#61
|
|
Shooting Target Group: Members Posts: 1,970 Joined: 22-July 17 From: Austria Member No.: 211,160 |
I'd assume that a bootstrap would be overwritten by an update as well - even more probable than a file which should be untouched by most updates.
|
|
|
Nov 12 2017, 04:33 PM
Post
#62
|
|
Dragon Group: Members Posts: 4,887 Joined: 18-September 13 From: Germany Member No.: 154,444 |
Nope, bootstrap is a function of format device - that needs a complete new system setup (an Extended Software
+ Logic [Mental] (12, 1 hour) Test) |
|
|
Nov 12 2017, 08:21 PM
Post
#63
|
|
Shooting Target Group: Members Posts: 1,970 Joined: 22-July 17 From: Austria Member No.: 211,160 |
From a technical point of view, that doesn't make any sense at all.
But I don't think it's worth arguing. Let's just proceed. |
|
|
Nov 23 2017, 04:57 PM
Post
#64
|
|
Shooting Target Group: Members Posts: 1,970 Joined: 22-July 17 From: Austria Member No.: 211,160 |
I believe we should clarify this OoC before we continue IC.
I see it in analogy to a computer. If someone is still logged in in his facebook account and goes to the toilet, I can just post whatever I want and no one is able to notice that I'm not him/her. So you misunderstood me slightly. I didn't mean manual control. I meant going in full VR with his persona. I want to fool the commlink into believing I'm Vandemark. And why wouldn't it work? If I control all the data that goes into the commlink, how should it be possible for it to determine which physical person I am? The commlink can't see or think. It can only interprete the data its sensors receive. I can control all this data. There might be security measurements to prevent people from doing this. But those can be circumvented. From a technical side, I see the biggest problem in the interpretation of the DNI. A DNI must certainly be configured to a specific person, since brain waves are pretty much an individual thing. The same input generated from a different person would result in absolute nonsense. But then, I imagine, that each DNI includes a kind of firmware that translates these individual signals into code that is readable by devices, say, a commlink. What bnc would have to do, is to change the input source of his commlink from Vandemark's DNI to her own. Once she's done that, there is no way the machine could tell the difference. Do you agree as a GM? |
|
|
Nov 23 2017, 06:24 PM
Post
#65
|
|
Dragon Group: Members Posts: 4,887 Joined: 18-September 13 From: Germany Member No.: 154,444 |
I'm hitting the books right now to get a more founded explanation.
First the good news: Going unconscious will dump you automatically in AR "Usually, if you fall unconscious in VR, your commlink or deck automatically switches you to AR. If you’re linklocked, you remain online and in VR. IC typically doesn’t care whether its target is conscious, so it will probably keep attacking you." Core p.229 But that means also that a device automatically notices when your brain is no longer sending the right information. After all, the computer is reading your brain and it doesn't take a genius to realize that this is even more unique than a fingerprint. You can only get frustrated if you compare Shadowrun fluff and crunch to real world technology. There are so many things wrong with the matrix, that starting to nitpick specific things will only lead to unraveling the whole thing. Speaking of Rules: You can't go in with his persona while his persona is still in. That at least is made explicitly clear in the rules if noting else: There can only be ever one persona on a given device (with the explicit exception of AIs and Agents). Changing a persona necessitates a reboot. The facebook analogy falls short since this is a much more secure system (that's one of the selling points of the 5e matrix: Much stronger security and almost no options to reach ownership level access without being the owner.) It's more like you have a webcam that at all times scans your face, keeps track of the pattern of your typing, listens to the sound of your voice and periodically tests your reaction to only subconsciously perceivable cues. I mean, even todays modern car keys use encryption to ensure that just recording and replaying the signal coming from the key won't allow you to open the car. Even I have my phone defaulting to ask me to unlock it every time I closed the cover or have not touched the screen for five seconds. I just don't see how you can do what you want to do within the rules. You'd have to be an AI or a Technomancer with Puppeteer. |
|
|
Nov 23 2017, 10:07 PM
Post
#66
|
|
Shooting Target Group: Members Posts: 1,970 Joined: 22-July 17 From: Austria Member No.: 211,160 |
That brainwaves and such are absolutely unique, I pointed out in my earlier post already. That's why I think that DNI comes with firmware. It would be grotesquely unflexible, unhandy and un-whatnot if every single commlink or deck or whatever gear would have to adapt to your unique central nervous system on its own. Not to speak of the costs. So I assume that your DNI translates this in code. That's why the facebook analogy would still work.
This would be where bnc would attack. So it would be a kind of a FIFO: The command getDataFromDNI(Vandemark) is replaced by getDataFromDNI(Axis), basically. Also, I don't want to go in with a second persona. I want to go in with his device and use his persona. Yeah, you got the idea. Where it's possible, is gamemaster's descretion. You decide. If you say yes, I'll go for it, if you say no we just knock him out and leave him be. You said you'd appreciate creative solutions, so I try to think like bnc would. Hacking can be so much more than just landing marks and deleting files. |
|
|
Nov 23 2017, 10:39 PM
Post
#67
|
|
Dragon Group: Members Posts: 4,887 Joined: 18-September 13 From: Germany Member No.: 154,444 |
The point I'm making is, that you can't just access that file in plaintext. The DNI does translate the brainwaves but it also generates a key from them that prevents anyone from just spoofing them (just like a DNA test doesn't look at the functioning parts of the DNA that is identical within most humans but at the garbage data that is unique in each individual). At least that's how I wrap my head around the concept of Personas.
Letting anyone copy a persona would pretty much undo all and every system based on ownership, granting you total access to just about everything. Your plan still works with physical access to the device to direct the deck through buttons, image link and an AR gloves, but I say no to spoofing a persona on the device the persona is build, because a rule change like that would have very far reaching consequences for the game world. |
|
|
Nov 24 2017, 07:19 AM
Post
#68
|
|
Shooting Target Group: Members Posts: 1,970 Joined: 22-July 17 From: Austria Member No.: 211,160 |
Wakata yo.
That's maybe unwise to ask, but: If I can do all this manually, wouldn't the effect be the same? I mean, I would still control his ID and thus have ownership to everything he owns, or did I miss something? |
|
|
Nov 24 2017, 09:53 AM
Post
#69
|
|
Dragon Group: Members Posts: 4,887 Joined: 18-September 13 From: Germany Member No.: 154,444 |
This only works as long as he is unconscious (DNI beats manual controls) and nothing causes the deck to reboot.
Also, you don't have ownership. You can't use this to change ownership of any of his devices or to open his protected files (without hacking them) - that includes his bank accounts. |
|
|
Nov 24 2017, 10:30 AM
Post
#70
|
|
Shooting Target Group: Members Posts: 1,970 Joined: 22-July 17 From: Austria Member No.: 211,160 |
So what you're saying is that ownership doesn't refer to a device but to a natural person?
I still don't quite understand how you see this. Let's say, I own a car. Does that mean that my car double-checks my deck or my actual brainwaves? It suddenly doesn't make any sense at all anymore. If ownership refers to a device, I should have ownership to anything the device owns, when I controll the device. If ownership refers to a natural person, taking his commlink would be no use at all (except that I can sell it for 200 nuyen and he's gonna hate me forever). I'm sorry. I'm not trying to make this more complicated, but I can't wrap my head about how you think rights are granted and double-checked in shadowrun. |
|
|
Nov 24 2017, 10:59 AM
Post
#71
|
|
Dragon Group: Members Posts: 4,887 Joined: 18-September 13 From: Germany Member No.: 154,444 |
I warned you that this is the murky part of the rules - and I've seen those discussions in the forums pop up regularly because Catalyst can't be arsed to do anything about it.
My personal interpretation is thus: Your Persona is an individually generated key that creates an identifier in the matrix. This key can not be copied with normal means, because it is based on your user history and/or brain waves. That's why no matter on which device you log in, you always have the same persona and all messages for you can be accessed by you, as well as all devices you have Ownership for. Ownership is separate from your Persona. It's a profile that is kept in a register within the matrix and linked to your persona (heavily encrypted). It is purposefully complicated to change ownership to prevent accidentally or involuntarily transferring any devices. The process includes active input (passwords) as well as identity checks against your persona. The device you are logged in is secondary to all this. It facilitates access to the online stored profiles and is the basis on which your Persona is projected (that's why the device is subsumed by your Persona in the Matrix and can't be accessed separately as long as your persona is active on it. Whenever you open or do something with restricted access (files, matrix actions) your persona gets checked to verify that you have the correct access rights (MARKs) (with DNI you don't notice this, since it can verify against your brain waves) with manual controls I imagine it to be the future equivalent of a lockscreen gesture. |
|
|
Nov 24 2017, 05:27 PM
Post
#72
|
|
Shooting Target Group: Members Posts: 1,970 Joined: 22-July 17 From: Austria Member No.: 211,160 |
In other words, it doesn't work at all. Fine.
|
|
|
Nov 25 2017, 03:30 PM
Post
#73
|
|
Dragon Group: Members Posts: 4,887 Joined: 18-September 13 From: Germany Member No.: 154,444 |
No, it works as I outlined earlier: As long as you keep to manual controls and legal actions like edit file, perception, search etc. you can use his session - provided he stays connected.
|
|
|
Nov 26 2017, 12:42 AM
Post
#74
|
|
Shooting Target Group: Members Posts: 1,970 Joined: 22-July 17 From: Austria Member No.: 211,160 |
Yeah, but what use is his session if the rights are bound to his persona, not the session or the device?
|
|
|
Nov 27 2017, 04:06 PM
Post
#75
|
|
Moving Target Group: Members Posts: 846 Joined: 19-July 17 Member No.: 211,063 |
Provided you can use the session in a way you'd find useful, how does that change our plan?
|
|
|
Lo-Fi Version | Time is now: 27th January 2025 - 10:49 AM |
Topps, Inc has sole ownership of the names, logo, artwork, marks, photographs, sounds, audio, video and/or any proprietary material used in connection with the game Shadowrun. Topps, Inc has granted permission to the Dumpshock Forums to use such names, logos, artwork, marks and/or any proprietary materials for promotional and informational purposes on its website but does not endorse, and is not affiliated with the Dumpshock Forums in any official capacity whatsoever.