![]() ![]() |
Sep 13 2005, 06:54 AM
Post
#26
|
|
|
Immortal Elf ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 11,410 Joined: 1-October 03 From: Pittsburgh Member No.: 5,670 |
the datatrail doesn't stop at that commlink. if they've got a trace running, they'll notice the link to your commlink.
|
|
|
|
Sep 13 2005, 07:32 AM
Post
#27
|
|||
|
Hoppelhäschen 5000 ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 5,807 Joined: 3-January 04 Member No.: 5,951 |
Oddly, this only can be done when a trace is just running... |
||
|
|
|||
Sep 13 2005, 07:51 AM
Post
#28
|
|||
|
Mr. Johnson ![]() ![]() ![]() ![]() ![]() ![]() Group: Dumpshocked Posts: 2,587 Joined: 25-January 05 From: Berkeley, CA Member No.: 7,014 |
That's only if they successfully hack into the commlink that they are tracing, assuming you are using the dupe's commlink persona to do your dirty work (and thus, that commlink's OS). Remember, Trace only tracks a persona icon back to its original source, using that persona's datatrail. Once they've traced your dupe's persona that you are controlling, they can attempt to hack the dupe's commlink, and gain access to any connections that the commlink is connected to, including your commlink. However, the initial response would probably be sending the troops in to the physical location of the persona's originating commlink, which would still be the dupe's commlink. This won't work if you are using your own persona and own OS (originating from your own commlink), and I know there are GMs whose heads are probably imploding right now. But this would be similar to the rules for uploading Agents into another node rather than running it off of your persona, as Agents aren't linked back to you unless they are loaded from your persona. Heck, alternatively, you can even spoof your datatrail to match someone else's Access ID (a simple Hacking + Spoof (2) test) to do pretty much the same thing, and you don't even have to hack their commlink. When the heat goes down, just switch off your commlink or go into Hidden mode. When they search for the particular Access ID you've spoofed, they'll get your dupe. |
||
|
|
|||
Sep 13 2005, 11:05 AM
Post
#29
|
|||
|
Hoppelhäschen 5000 ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 5,807 Joined: 3-January 04 Member No.: 5,951 |
Especially if you keep in mind the reduction of Response by running Programs: If you command those hundred of Frames to log/hack into a certain system, all at once... :grinbig: |
||
|
|
|||
Sep 13 2005, 03:16 PM
Post
#30
|
|||||
|
Immortal Elf ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 11,410 Joined: 1-October 03 From: Pittsburgh Member No.: 5,670 |
are you sure? that seems silly.
hm. i suppose. it still seems like a very limited-use trick, given a) how easy it would be for the owner of the hacked commlink to just reboot; b) how unlikely it is that the commlink you've hacked will have sufficient system and response to run your programs; c) how long it will take, given (a), to upload your programs. hacking commlinks can be pretty handy, though, especially in cybercombat (if you can escape cybercombat for a few passes). for instance, you can load an IC frame onto their system, forcing them into cybercombat in multiple nodes, which really sucks for them. you can delete their programs. you can go for the throat and force a reboot. |
||||
|
|
|||||
Sep 13 2005, 03:31 PM
Post
#31
|
|||
|
Hoppelhäschen 5000 ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 5,807 Joined: 3-January 04 Member No.: 5,951 |
Kinda. *shrugs* It is defined as feeding false infos to the trace... the Stealth Program works as a precaution, though, reducing their dicepool. |
||
|
|
|||
Sep 13 2005, 04:39 PM
Post
#32
|
|||||
|
Target ![]() Group: Members Posts: 34 Joined: 10-September 05 Member No.: 7,725 |
But the trace wouldn't necessarily have to be running yet. Since the trace isn't actively requesting info from the hacker's commlink (Well, at least not until he's completely fragged it isn't), feeding false info to the program would consist mostly of leaving false info in the places the trace program would be looking for it. |
||||
|
|
|||||
Sep 13 2005, 06:33 PM
Post
#33
|
|||||
|
Mr. Johnson ![]() ![]() ![]() ![]() ![]() ![]() Group: Dumpshocked Posts: 2,587 Joined: 25-January 05 From: Berkeley, CA Member No.: 7,014 |
Yup, which is why I said you should knock the dupe out first.
Probably. But it would only take a Complex Action at the most (maybe one Complex Action per program, to be fair) to do it. It's something that you do if you have time on your hands to prepare and want to be all clever and shit. Not something you are doing when you are going for speed and in a pressure situation.
|
||||
|
|
|||||
Sep 13 2005, 06:40 PM
Post
#34
|
|
|
Hoppelhäschen 5000 ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 5,807 Joined: 3-January 04 Member No.: 5,951 |
When run on an system with insufficient Response/System, Programs just are reduced in Rating - they run nonetheless.
|
|
|
|
![]() ![]() |
|
Lo-Fi Version | Time is now: 22nd May 2026 - 01:18 PM |
Topps, Inc has sole ownership of the names, logo, artwork, marks, photographs, sounds, audio, video and/or any proprietary material used in connection with the game Shadowrun. Topps, Inc has granted permission to the Dumpshock Forums to use such names, logos, artwork, marks and/or any proprietary materials for promotional and informational purposes on its website but does not endorse, and is not affiliated with the Dumpshock Forums in any official capacity whatsoever.