![]() |
![]() ![]() |
![]() |
![]()
Post
#1
|
|
Moving Target ![]() ![]() Group: Members Posts: 502 Joined: 14-May 03 From: Detroit, Michigan Member No.: 4,583 ![]() |
So let's see if I got this right.
The matrix crashes. A new wireless one is constructed in its place. The otaku increase in number and evolve into Technomancers and show the ability to access this matrix through some sort of matrix telepathy. Is it just me or would this cause a major rush by the corporations to go back to wired networks for their facilties? For security reasons? Likewise for cyberware ( if rumors that technomancers can effect it as well are true ) Obviously corporations would take a strong look at giving their forces old-style cyberware that wasn't subject to any technomancer manipulation. |
|
|
![]()
Post
#2
|
|||
Dragon ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 4,718 Joined: 14-September 02 Member No.: 3,263 ![]() |
There are long, detailed threads about this from a long time back. At least 2 months. My search-fu isn't strong enough to find them though. |
||
|
|||
![]()
Post
#3
|
|
Immortal Elf ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 11,410 Joined: 1-October 03 From: Pittsburgh Member No.: 5,670 ![]() |
i don't think it'd cause any larger rush than the prevalence of hackers in general. that said, any corp infosec officer who doesn't make his high-end research lab a wired system, or at least a wireless system contained by Faraday cage, is an idiot.
and, really, in 2070, a wired system isn't necessarily going to be much more secure than a wireless system, unless you monitor the wired system very closely. all that has to happen is for some researcher to plug in his mp3 keychain player into your ultra-secure wired system, and all of the sudden, your ultra-secure wired system has grown a wireless access point. |
|
|
![]()
Post
#4
|
|
Moving Target ![]() ![]() Group: Members Posts: 502 Joined: 14-May 03 From: Detroit, Michigan Member No.: 4,583 ![]() |
Faraday cage?
In any event its basic security. Any security sub-system would only be accessible for secure jackpoints. Any secure research system would obviously have several security safeguards to prevent someone from making it accessible to the matrix. For ultra-secure locations, I'd expect that a corp would not only use an isolated wired network, but would have jammers in place to prevent anyone from accessing the wireless network while inside the facility. |
|
|
![]()
Post
#5
|
|
Manus Celer Dei ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Group: Dumpshocked Posts: 17,008 Joined: 30-December 02 From: Boston Member No.: 3,802 ![]() |
Faraday cages block EMR.
~J |
|
|
![]()
Post
#6
|
|
Ain Soph Aur ![]() ![]() ![]() ![]() ![]() ![]() Group: Dumpshocked Posts: 3,477 Joined: 26-February 02 From: Montreal, Canada Member No.: 600 ![]() |
If I recall correctly my electricity course, all you need to do to build a Farraday cage is to "box" in the area with metal poles. The EMR shoots out, but makes a "force field" between the poles.
In any case, it's very very easy to do. Your computer case, for example, is a Farraday cage. You may google for more details. |
|
|
![]()
Post
#7
|
|
Mr. Johnson ![]() ![]() ![]() ![]() ![]() ![]() Group: Dumpshocked Posts: 2,587 Joined: 25-January 05 From: Berkeley, CA Member No.: 7,014 ![]() |
The SR4 solution is simpler... Wireless-blocking Paint. Yeah, Lead Paint. Great.
|
|
|
![]()
Post
#8
|
|
Immortal Elf ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 11,410 Joined: 1-October 03 From: Pittsburgh Member No.: 5,670 ![]() |
feed it to your kids!
|
|
|
![]()
Post
#9
|
|
Moving Target ![]() ![]() Group: Members Posts: 527 Joined: 26-February 02 Member No.: 1,118 ![]() |
It's not lead paint, and it's real, a paint containing aluminum and copper sold by an outfit called Force Field Wireless. However, it dulls (rather than stopping cold) radio frequencies, and does so for all of them, not just those that specifically carry data. I'm not familiar enough with metallurgy or optics to understand how hard it would be, with future advancements in material engineering, to create materials that inhibit only certain data-carrying wavelengths. Without that feature, it's more of a drawback than it is a boon.
|
|
|
![]()
Post
#10
|
|||
Mr. Johnson ![]() ![]() ![]() ![]() ![]() ![]() Group: Dumpshocked Posts: 2,587 Joined: 25-January 05 From: Berkeley, CA Member No.: 7,014 ![]() |
That would explain why these technomancers are living antennae, what with the high metal content. :) Okay, maybe not. But it's a better explanation than the one FanPro is giving. |
||
|
|||
![]()
Post
#11
|
|
Moving Target ![]() ![]() Group: Members Posts: 527 Joined: 26-February 02 Member No.: 1,118 ![]() |
Heh, as a fly on the wall for the technomancer discussion, the higher-ups essentially declared it to be so, and then told the writers to figure out why and how.
|
|
|
![]()
Post
#12
|
|||
Moving Target ![]() ![]() Group: Members Posts: 248 Joined: 26-February 02 From: Note Calonna Member No.: 241 ![]() |
Actually conductive Paint is not that much of a stretch. It does not take much thickness at all to block high frequency radio waves. Once you get past the skin depth for a given frequency, you've got a decent shield. There are already coatings on the market that can be applied for this very purpose. They are used today to make EMI shields in some consumer electronic products. |
||
|
|||
![]()
Post
#13
|
|||
Moving Target ![]() ![]() Group: Members Posts: 404 Joined: 22-June 05 From: Canada eh! Member No.: 7,455 ![]() |
It is actually more efficient to wrap the outside of your house in tin foil, (note not aluminum) than to use any of these paints. Remember to use copper screens on your windows. The width of the holes must be less than the wavelength you are trying to block. I am actually looking at ways to make my house into a faraday cage. The problem with wireless is that what can be encoded can be decoded. You are vulnerable to man in the middle attacks. This will not improve in the future. As encryption gets more sophisticated so does decryption. It only takes listening to 5 or so million packets to figure out your encryption key with wep. Wireless transmissions will never be secure as long someone can eavesdrop. If you have a point to point beam, where no one can listen in ... then it could be secure, but if someone else can listen to your signal, you are going to get hacked, or duped. A wired system IS going to be more secure, as you need to gain physical access to the network. Wireless waves do not just stop midair. With a wired system you can also trace data packets to find out where someone accessed. Much easier than trying to locate someone around a broadcast node.
Someone should have brained the higher ups. just because someone got a wireless laptop and router at home doesn't mean it will make your game cooler. Whoever thought this up and implemented it should have a Panther Assault Cannon enima. Edited: [sarc]Oh, and of course infrastructure, we know that wireless nodes repeating across the continent is infinitely faster than the fibre optics, which transmit at the speed of light and suffer no distortion[/sarc] This post has been edited by Nyxll: Aug 22 2005, 01:39 AM |
||
|
|||
![]()
Post
#14
|
|||
Manus Celer Dei ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Group: Dumpshocked Posts: 17,008 Joined: 30-December 02 From: Boston Member No.: 3,802 ![]() |
This is not remotely true. Encryption by its very nature advances faster than decryption, provided that the people designing encryption aren't idiotic. ~J |
||
|
|||
![]()
Post
#15
|
|||
Moving Target ![]() ![]() Group: Members Posts: 404 Joined: 22-June 05 From: Canada eh! Member No.: 7,455 ![]() |
It absolutely is true. Look at all the vulnerabilities and exploits out there. I am sure that most of this stuff is hacked in labs way before the public finds out. Wireless sniffers and hacks were out within weeks of new technology. The tech takes years to develop, and the exploits, decryption and hacks take weeks possibly months. The two a linked like ying and yang Please tell me if encryption is so secure, who come wireless is not yet? it has been out for years. Man in the middle attacks are a vulnerability. Even VPN tunnels are vulnerable. |
||
|
|||
![]()
Post
#16
|
|
Manus Celer Dei ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Group: Dumpshocked Posts: 17,008 Joined: 30-December 02 From: Boston Member No.: 3,802 ![]() |
Wireless encryption breaks my "provided the people designing encryption aren't idiotic" requirement.
Take GPG. Introduced in '99, one minor weakness discovered since then. Or we could go with something that's already been broken, like SHA-1 hashing (I know it's redundant, but someone might not know what it is): published in 1995, broken February of this year. Even then, it isn't trivial—they reduced the number of operations required to find a collision from 2^80 to 2^69. Edit: this has apparently been reduced to 2^63 within the past week. As for why wireless is still vulnerable, I honestly don't know this one but my guess is that security is sacrificed for inexpensive hardware and ease-of-use. Man-in-the-middle attacks of the information-falsifying variety are solvable with public-key cryptography and encryption strong enough to defy cryptanalysis. ~J |
|
|
![]()
Post
#17
|
|||
Moving Target ![]() ![]() Group: Members Posts: 404 Joined: 22-June 05 From: Canada eh! Member No.: 7,455 ![]() |
You have to remember that not the entire transmission is encoded this securely. Only the key is transmitted that securely. The bulk of the communication is done with a lower level of encryption. I took a VPN course for our firewall, ( a week of paid time off basically) ... there are 2 levels of encryption used. the more secure is used to decide how to communicate, then the lower is used for the bulk of communication. It takes a great deal of resources to encrypt and decrypt data. This makes me ask, if there is a new paradigm shift or encryption method how does an otaku adapt, or is this part of the fading? |
||
|
|||
![]()
Post
#18
|
|||||
Manus Celer Dei ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Group: Dumpshocked Posts: 17,008 Joined: 30-December 02 From: Boston Member No.: 3,802 ![]() |
And this is why VPNs are weak. There's nothing requiring the lower level of encryption to be used, people just don't want to deal with the consequences of full high encryption (as above, ease-of-use and required hardware).
Absolutely. This is a part of the price that is to be paid. The computational price of encryption/decryption with the key is decreasing today, though, while the computational price of cracking encryption is skyrocketing. Nothing short of quantum cryptography will change that (or, for each individual method, cryptographic weaknesses being found). ~J |
||||
|
|||||
![]()
Post
#19
|
|
Moving Target ![]() ![]() Group: Members Posts: 778 Joined: 6-April 05 Member No.: 7,298 ![]() |
I'm pretty sure you can do good encryption with computational costs that scale somewhere between (key length) and (key length)^2; decryption for an authorized user takes a similar amount of time. However, to break good encryption by brute force, the costs scale as 2^(key length).
With even a moderately fast computer, it doesn't make sense to use keys less than 512 bits in length. The SHA-1 style attack might reduce the search space from 2^512 to 2^400 or something--still something that would require the computational power of the universe to crack by trial and error. |
|
|
![]()
Post
#20
|
|||
Incertum est quo loco te mors expectet; ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Group: Dumpshocked Posts: 6,546 Joined: 24-October 03 From: DeeCee, U.S. Member No.: 5,760 ![]() |
Silly question, why not aluminum? Would Al still at least work for weaker devices like the whatsit chips stores put on products to keep them from being stolen? |
||
|
|||
![]()
Post
#21
|
|
Moving Target ![]() ![]() Group: Members Posts: 404 Joined: 22-June 05 From: Canada eh! Member No.: 7,455 ![]() |
Tinfoil is much more effective at blocking EMR than aluminum. Aluminum tends to get penetrated too easily. If I could pull off the brick and had 15K around I would also consider galvanized steel.
|
|
|
![]()
Post
#22
|
|
Moving Target ![]() ![]() Group: Members Posts: 502 Joined: 14-May 03 From: Detroit, Michigan Member No.: 4,583 ![]() |
How about just plain jamming the wireless signal?
Runners are detected in a secure facility. The security office decides their system has been compromised and hits a switch which sends a jamming signal throughout the complex. Suddenly all wireless matrix activity becomes so much static and access to the system is only accessible to those who can physically jack in. Any reason that wouldn't work in SR4? ( Let's assume that the facility holds the data from MCT testing their latest pharmacudical by using black op teams to spike the city water of Portland, Tir Tairngire. In other words something that would warrant ultra-extreme security measures ) |
|
|
![]()
Post
#23
|
|
Manus Celer Dei ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Group: Dumpshocked Posts: 17,008 Joined: 30-December 02 From: Boston Member No.: 3,802 ![]() |
Jamming prevents your own communications as well. It's a good emergency response, but not something you're going to want to use for prevention.
~J |
|
|
![]()
Post
#24
|
|
panda! ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 10,331 Joined: 8-March 02 From: north of central europe Member No.: 2,242 ![]() |
that kind of thinking is similar to wondering why hosts dont have a physical kill switch on their connection. to much attacks and you just pull the plug on the outside connection...
|
|
|
![]()
Post
#25
|
|||
Moving Target ![]() ![]() Group: Members Posts: 502 Joined: 14-May 03 From: Detroit, Michigan Member No.: 4,583 ![]() |
Well if the kill switch is computer controlled then the decker simply has to disable the kill switch. I seem to recall reading in one SR3 book te only way you could be sure was to have a living person stationed at the plug. But even then, widespread jamming may not be necessary. Wouldn't it be possible to selectively jam the frequencies of the wireless network? |
||
|
|||
![]() ![]() |
![]() |
Lo-Fi Version | Time is now: 18th February 2025 - 12:02 AM |
Topps, Inc has sole ownership of the names, logo, artwork, marks, photographs, sounds, audio, video and/or any proprietary material used in connection with the game Shadowrun. Topps, Inc has granted permission to the Dumpshock Forums to use such names, logos, artwork, marks and/or any proprietary materials for promotional and informational purposes on its website but does not endorse, and is not affiliated with the Dumpshock Forums in any official capacity whatsoever.