I'm designing a very low-end home net, Can you look over my security sheaf? |
I'm designing a very low-end home net, Can you look over my security sheaf? |
Jul 13 2005, 07:37 AM
Post
#1
|
|||
Horror Group: Members Posts: 5,322 Joined: 15-June 05 From: BumFuck, New Jersey Member No.: 7,445 |
This is supposed to be a milk-run datagrab, and it has some Run-relavent info in it. It's supposed to be the home network of a low-midling executive at a megacorp (I haven't decided which.) Yes, this is the home network of the guy from the de-gaying camp rescue Run. Note: I've designed it with the SR3Decking rules revisions (featured in This Thread in mind. I want it to be a bit challenging, but overall a milk run. The players (and the DM, for that matter,) are matrix-run virgins. |
||
|
|||
Jul 13 2005, 09:12 AM
Post
#2
|
|
Moving Target Group: Members Posts: 637 Joined: 26-February 02 Member No.: 1,528 |
Drop the black ICE. AntiPersonal Programs are IMHO a NoNo outside a AAA host.
Birdy |
|
|
Jul 13 2005, 09:22 AM
Post
#3
|
|
Horror Group: Members Posts: 5,322 Joined: 15-June 05 From: BumFuck, New Jersey Member No.: 7,445 |
Whoops. I forgot about that.
I could say he lives in a corporate enclave... Meh, I'll just replace it with Sparky. Good catch, thanks. :) |
|
|
Jul 13 2005, 11:25 AM
Post
#4
|
|
Runner Group: Members Posts: 2,598 Joined: 15-March 03 From: Hong Kong Member No.: 4,253 |
If you are actually going to play out the run with your decker, better add some more milk run stuff for the rest of the team here too.
I notice that the system dosen't 'call the cops' I would think that it would do so fairly early, call up the corp systems that have some real computing power and get them to run some much better trace programs that what the execs relatively feeble desktop can run. So change the security sheaf to look like this: Tally ~20 Call corp system, ask for 'trace ~6-7', if call is unsuccesful (line cut is probably cut, goto active alert), then all the IC over rating 3 or 4 is acutally being run by the large corp systems, not the simple home system. This will in theory give the regular team members something to do, they can cut the phone line to greatly reduce the IC available to the home system, but then it's more likely to go on alert/shut down. Or they can try to spoof the outgoing call, so that the system thinks it's getting the support it's asking for, but isn't. Otherwise it becomes a much better deal to just break into the guys house and make off with his PC, it has all sorts of moby IC on it, which will undoubtedly sell for a lot more than you are being paid. |
|
|
Jul 13 2005, 12:35 PM
Post
#5
|
|
panda! Group: Members Posts: 10,331 Joined: 8-March 02 From: north of central europe Member No.: 2,242 |
black ice for a home system? sounds like a paranoid user to me :P
hell, even gray ice may be over the top... |
|
|
Jul 13 2005, 01:36 PM
Post
#6
|
|
Neophyte Runner Group: Members Posts: 2,453 Joined: 17-September 04 From: St. Paul Member No.: 6,675 |
Seems reasonable. Except the black IC as noted previously.
What deck and utilities does the decker have? |
|
|
Jul 13 2005, 04:19 PM
Post
#7
|
|
Horror Group: Members Posts: 5,322 Joined: 15-June 05 From: BumFuck, New Jersey Member No.: 7,445 |
Jray - I don't know yet. That's the problem. I don't even know IF we're going to have a decker at all.
That's why I'm designing it as a home invasion, and they can also get the mission data off the home telecom. It's not just a straight datasteal - they need to prevent the system from calling Lone Star. Also, that was what I had envisioned - every IC after Active Alert is actually being streamed to this system by the corp mainframe. |
|
|
Jul 13 2005, 04:31 PM
Post
#8
|
|
Running, running, running Group: Dumpshocked Posts: 2,220 Joined: 18-October 04 From: North Carolina Member No.: 6,769 |
i would say put SOME sort of low grade defense on the run info, unless for some reason the guy has appsolutely no reason to think the data is in trouble (say, it's a coded message within mama's home made chocolate cookies)
|
|
|
Jul 13 2005, 04:32 PM
Post
#9
|
|
Horror Group: Members Posts: 5,322 Joined: 15-June 05 From: BumFuck, New Jersey Member No.: 7,445 |
Aku: The incriminating Run data is simply the logfile of his incoming and outgoing transmissions. He's wiped the contents of the log manually, but he forgot to wipe the numbers.
|
|
|
Jul 13 2005, 04:35 PM
Post
#10
|
|
Running, running, running Group: Dumpshocked Posts: 2,220 Joined: 18-October 04 From: North Carolina Member No.: 6,769 |
hmm, ok, well, since that doesnt seem like any major info (alone), maybe they wouldnt be...
|
|
|
Jul 14 2005, 12:48 AM
Post
#11
|
|
Neophyte Runner Group: Members Posts: 2,073 Joined: 23-August 04 Member No.: 6,587 |
SSG tells us that the typical home telecom is a blue-4 8/8/6/6/6 with a single probe 2 program. But may be improved buy paranoid users at the GMs discretion.
A street dater term is green 4 8/8/8/8/8 with nothing nastier than blaster IC. The question is how are they going to find the jack address to access a home data terminal. That will require hacking his local telecom grid I would put scramble IC on the file myself Edward |
|
|
Lo-Fi Version | Time is now: 28th April 2024 - 08:23 PM |
Topps, Inc has sole ownership of the names, logo, artwork, marks, photographs, sounds, audio, video and/or any proprietary material used in connection with the game Shadowrun. Topps, Inc has granted permission to the Dumpshock Forums to use such names, logos, artwork, marks and/or any proprietary materials for promotional and informational purposes on its website but does not endorse, and is not affiliated with the Dumpshock Forums in any official capacity whatsoever.