IPB

Welcome Guest ( Log In | Register )

 
Reply to this topicStart new topic
> SR1 - Graceful logoff and surpressed IC
Acenoid
post Mar 11 2020, 10:58 PM
Post #1


Moving Target
**

Group: Members
Posts: 102
Joined: 27-July 13
Member No.: 133,691



Hi there!

EDIT: This is for SR3 of course - I made a typo in the topic header O_O

Anyone has a clue, if the security sheet of the decker increases after a successful logoff , when the destroyed IC is no longer surpressed?

Example:
A decker took down a number of IC and surpressed them with his hacking pool (or DF): Killer-8, Tracer-5 = 13 points total which would be added to his security tally of 5 points.
Afterwards the decker decides to jump ship and performs
a) a graceful logoff: the security sheet stays at 5 because the 13 points can no longer traced back to the user.
b) jack-out: the security sheet is increased after logout (13+5 = 18)

I suppose those 13 points could be used by the host in general to decide if it should trigger alarms.
Go to the top of the page
 
+Quote Post
Sengir
post Mar 23 2020, 08:59 PM
Post #2


Great Dragon
*********

Group: Dumpshocked
Posts: 5,082
Joined: 3-October 09
From: Kohle, Stahl und Bier
Member No.: 17,709



Last sentence of the rules for suppressing IC: "Deckers cannot suppress IC in a system they have left."

While it does not outright say "therefore, the security tally increases when leaving", IMO that is the only reasonable interpretation of that remark.
Go to the top of the page
 
+Quote Post
Acenoid
post Mar 24 2020, 10:26 AM
Post #3


Moving Target
**

Group: Members
Posts: 102
Joined: 27-July 13
Member No.: 133,691



QUOTE (Sengir @ Mar 23 2020, 09:59 PM) *
Last sentence of the rules for suppressing IC: "Deckers cannot suppress IC in a system they have left."

While it does not outright say "therefore, the security tally increases when leaving", IMO that is the only reasonable interpretation of that remark.


Yep, I agree. Though to my understanding the action "graceful logoff" deletes all traces of the decker's actions on the host. So the host would know, only that some untraceable source surpressed the IC at some unknown time, after the IC was activated for an "unknown user"...

Therefore I would assume that those points can not be traced back to the hacker, on the other hand - I would still use them to increase the overall security tally to check if apassive or active alert would be triggered.
Go to the top of the page
 
+Quote Post
Sengir
post Mar 28 2020, 12:52 PM
Post #4


Great Dragon
*********

Group: Dumpshocked
Posts: 5,082
Joined: 3-October 09
From: Kohle, Stahl und Bier
Member No.: 17,709



QUOTE (Acenoid @ Mar 24 2020, 11:26 AM) *
I would still use them to increase the overall security tally to check if apassive or active alert would be triggered.

...or even a security decker called, who might in turn inform the physical security to be extra suspicious in case the matrix intrusion was part of a physical intrusion.
Go to the top of the page
 
+Quote Post
Acenoid
post Apr 1 2020, 09:38 AM
Post #5


Moving Target
**

Group: Members
Posts: 102
Joined: 27-July 13
Member No.: 133,691



QUOTE (Sengir @ Mar 28 2020, 01:52 PM) *
...or even a security decker called, who might in turn inform the physical security to be extra suspicious in case the matrix intrusion was part of a physical intrusion.



Exactly. If multiple IC have been surpressed, it is almost certain that the host will be on active alert afterwards. This really ensures the runner do what they do "in one matrix run" instead of login - do 1 thing - logout - wait until the hosts reset - do next thing. And if you want to keep a low profile, you have to adjust your deck for evasion maneuvers, so you can hide yourself from the IC.
Go to the top of the page
 
+Quote Post
Tiralee
post Apr 8 2020, 10:18 AM
Post #6


Moving Target
**

Group: Members
Posts: 917
Joined: 5-September 03
From: Melbourne, Victoria, Australia
Member No.: 5,585



Once the suppressed ICE drops, the security tally jumps and the alarms go off.

What happens after that depends on the level of response, how secure the site (physical, matrix and otherwise) is and just how paranoid they are.
Oh wait, it's Shadowrun, they're paranoid.

Btw: this can lead to some really fun things that happen during a perfect run, like a kiddie trying to crash the server of the facility you're sneaking the physical prototype out of - and then it's double and triple twist time while you try and get paid from people who might be trying to kill you.

And the way Matrix security is in 3rd, you can be sure that, unless someone has nuked the alarm system, if the server goes POP, you can be sure the special-response team as well as the IT-on call will be called.

Hola!
-Tir

Go to the top of the page
 
+Quote Post

Reply to this topicStart new topic

 



RSS Lo-Fi Version Time is now: 28th March 2024 - 05:33 PM

Topps, Inc has sole ownership of the names, logo, artwork, marks, photographs, sounds, audio, video and/or any proprietary material used in connection with the game Shadowrun. Topps, Inc has granted permission to the Dumpshock Forums to use such names, logos, artwork, marks and/or any proprietary materials for promotional and informational purposes on its website but does not endorse, and is not affiliated with the Dumpshock Forums in any official capacity whatsoever.