IPB

Welcome Guest ( Log In | Register )

2 Pages V  < 1 2  
Reply to this topicStart new topic
> The Commlink used as a Repeater, Just what it says
mfb
post Sep 13 2005, 06:54 AM
Post #26


Immortal Elf
**********

Group: Members
Posts: 11,410
Joined: 1-October 03
From: Pittsburgh
Member No.: 5,670



the datatrail doesn't stop at that commlink. if they've got a trace running, they'll notice the link to your commlink.
Go to the top of the page
 
+Quote Post
Rotbart van Dain...
post Sep 13 2005, 07:32 AM
Post #27


Hoppelhäschen 5000
*********

Group: Members
Posts: 5,807
Joined: 3-January 04
Member No.: 5,951



QUOTE (hahnsoo)
Well, spoofing a datatrail only adds +1 per hit to the threshold on a trace.

Oddly, this only can be done when a trace is just running...
Go to the top of the page
 
+Quote Post
hahnsoo
post Sep 13 2005, 07:51 AM
Post #28


Mr. Johnson
******

Group: Dumpshocked
Posts: 2,587
Joined: 25-January 05
From: Berkeley, CA
Member No.: 7,014



QUOTE (mfb)
the datatrail doesn't stop at that commlink. if they've got a trace running, they'll notice the link to your commlink.

That's only if they successfully hack into the commlink that they are tracing, assuming you are using the dupe's commlink persona to do your dirty work (and thus, that commlink's OS). Remember, Trace only tracks a persona icon back to its original source, using that persona's datatrail. Once they've traced your dupe's persona that you are controlling, they can attempt to hack the dupe's commlink, and gain access to any connections that the commlink is connected to, including your commlink. However, the initial response would probably be sending the troops in to the physical location of the persona's originating commlink, which would still be the dupe's commlink.

This won't work if you are using your own persona and own OS (originating from your own commlink), and I know there are GMs whose heads are probably imploding right now. But this would be similar to the rules for uploading Agents into another node rather than running it off of your persona, as Agents aren't linked back to you unless they are loaded from your persona. Heck, alternatively, you can even spoof your datatrail to match someone else's Access ID (a simple Hacking + Spoof (2) test) to do pretty much the same thing, and you don't even have to hack their commlink. When the heat goes down, just switch off your commlink or go into Hidden mode. When they search for the particular Access ID you've spoofed, they'll get your dupe.
Go to the top of the page
 
+Quote Post
Rotbart van Dain...
post Sep 13 2005, 11:05 AM
Post #29


Hoppelhäschen 5000
*********

Group: Members
Posts: 5,807
Joined: 3-January 04
Member No.: 5,951



QUOTE (Dashifen)
Good point :D

Especially if you keep in mind the reduction of Response by running Programs:
If you command those hundred of Frames to log/hack into a certain system, all at once... :grinbig:
Go to the top of the page
 
+Quote Post
mfb
post Sep 13 2005, 03:16 PM
Post #30


Immortal Elf
**********

Group: Members
Posts: 11,410
Joined: 1-October 03
From: Pittsburgh
Member No.: 5,670



QUOTE (Rotbart van Dainig)
Oddly, this only can be done when a trace is just running...

are you sure? that seems silly.

QUOTE (hahnsoo)
That's only if they successfully hack into the commlink that they are tracing, assuming you are using the dupe's commlink persona to do your dirty work (and thus, that commlink's OS).

hm. i suppose. it still seems like a very limited-use trick, given

a) how easy it would be for the owner of the hacked commlink to just reboot;
b) how unlikely it is that the commlink you've hacked will have sufficient system and response to run your programs;
c) how long it will take, given (a), to upload your programs.

hacking commlinks can be pretty handy, though, especially in cybercombat (if you can escape cybercombat for a few passes). for instance, you can load an IC frame onto their system, forcing them into cybercombat in multiple nodes, which really sucks for them. you can delete their programs. you can go for the throat and force a reboot.
Go to the top of the page
 
+Quote Post
Rotbart van Dain...
post Sep 13 2005, 03:31 PM
Post #31


Hoppelhäschen 5000
*********

Group: Members
Posts: 5,807
Joined: 3-January 04
Member No.: 5,951



QUOTE (mfb)
are you sure? that seems silly.

Kinda. *shrugs*

It is defined as feeding false infos to the trace... the Stealth Program works as a precaution, though, reducing their dicepool.
Go to the top of the page
 
+Quote Post
Elldren
post Sep 13 2005, 04:39 PM
Post #32


Target
*

Group: Members
Posts: 34
Joined: 10-September 05
Member No.: 7,725



QUOTE (Rotbart van Dainig)
QUOTE (mfb)
are you sure? that seems silly.

Kinda. *shrugs*

It is defined as feeding false infos to the trace... the Stealth Program works as a precaution, though, reducing their dicepool.

But the trace wouldn't necessarily have to be running yet. Since the trace isn't actively requesting info from the hacker's commlink (Well, at least not until he's completely fragged it isn't), feeding false info to the program would consist mostly of leaving false info in the places the trace program would be looking for it.
Go to the top of the page
 
+Quote Post
hahnsoo
post Sep 13 2005, 06:33 PM
Post #33


Mr. Johnson
******

Group: Dumpshocked
Posts: 2,587
Joined: 25-January 05
From: Berkeley, CA
Member No.: 7,014



QUOTE (mfb)
hm. i suppose. it still seems like a very limited-use trick, given

a) how easy it would be for the owner of the hacked commlink to just reboot;

Yup, which is why I said you should knock the dupe out first.
QUOTE
b) how unlikely it is that the commlink you've hacked will have sufficient system and response to run your programs;
c) how long it will take, given (a), to upload your programs.
Probably. But it would only take a Complex Action at the most (maybe one Complex Action per program, to be fair) to do it. It's something that you do if you have time on your hands to prepare and want to be all clever and shit. Not something you are doing when you are going for speed and in a pressure situation.
Go to the top of the page
 
+Quote Post
Rotbart van Dain...
post Sep 13 2005, 06:40 PM
Post #34


Hoppelhäschen 5000
*********

Group: Members
Posts: 5,807
Joined: 3-January 04
Member No.: 5,951



When run on an system with insufficient Response/System, Programs just are reduced in Rating - they run nonetheless.
Go to the top of the page
 
+Quote Post

2 Pages V  < 1 2
Reply to this topicStart new topic

 



RSS Lo-Fi Version Time is now: 22nd May 2026 - 01:18 PM

Topps, Inc has sole ownership of the names, logo, artwork, marks, photographs, sounds, audio, video and/or any proprietary material used in connection with the game Shadowrun. Topps, Inc has granted permission to the Dumpshock Forums to use such names, logos, artwork, marks and/or any proprietary materials for promotional and informational purposes on its website but does not endorse, and is not affiliated with the Dumpshock Forums in any official capacity whatsoever.