Help - Search - Members - Calendar
Full Version: Agent Smith Army problem
Dumpshock Forums > Discussion > Shadowrun
Pages: 1, 2
Ravor
Well, I won't pretend to have put as much thought into the subject as FrankTrollman has, but why couldn't you bandage the problem as follows?

( 1 ) Give AR Modifiers out like candy. The reason that nearly everyone stays connected is that doing so makes their daily life easier. (Doesn't address the idea of corps keeping their networks offline, but I don't see corps forcing Runners to go on-site to do anything as a bad thing.)


( 2 ) Agents and IC use the resources of the node that they are currently present in, however there is something special about a Decker's personia that allows an Agent to break this rule. (Or simply get rid of the exception where an Agent can hack from a Decker's commlink.)

( 2A ) Anytime a Node's Rating is degraded it goes on alert. So multiple Agents are really only good for DoS Attacks, and DoS Attacks are a valid tactic in Matrix Warfare, at least until the corp in question is able to track you down.

( 2B ) In order to work together on anything other than a DoS Attack, you have to use Agents compiled from different source codes, copies simply won't work because they aren't different enough.


( 3 ) Hacking in 2070 simply can not be done without DNI of some kind, a Decker simply can not input commands fast enough to matter, so even while hacking via AR, BlackHammer can and will still kill you.
Blade
Most of these are in my system. wink.gif

Still, your solution leaves a few issues intact, such as hackastack (using a whole lot of commlinks and switching from one to the next to clear your condition monitor and for other purposes). And Frank would tell you that (2) doesn't prevent a drone from using the commlink so that the drone would have a persona.
Ravor
I wouldn't allow an Agent to use a commlink like that, so I personally don't see why a Pilot Program should be allowed too either.

As for hack-a-stack, a guess I never really understood the threat, if you try to log onto a Node with your stack of commlinks all at once it seems to me that you are likely to trigger an alert, and if you don't then every time you switch to another commlink you have to relog onto the Node you were in.

Once you add the threat of BlackHammer even in AR Mode unless I've missed something I just don't see where hack-a-stack would be worth the risk, because with my bandage, you would be at risk of getting your brain fried through every commlink in your stack.
Blade
Exactly. That's more or less the way it works in my system. smile.gif
Ravor
Ok, you win, I'll actually read your system and then come back to comment, although I'll give you fair warning, I place great trust in FrankTrollman's ability to weed out bad rules. cyber.gif
Ravor
*shakes head*

Umm, sorry Blade, but I disagree that my proposed off-the-cuff bandage is anything like your system, for starters I still can't wrap my mind around the idea that a corp node could gangrape an intruding Decker dead in just a few seconds anytime but doesn't.

Plus I don't like the idea that the only thing really preventing Agent Smith Armies is that the knowledge to create an independantly acting Agent is being suppressed by the corps, if nothing else then I'd imagine that the AIs running around since Emergence would let the cat out of the bag rather throughly.
Blade
Well, I've never said that your "bandage" was like my system, I just said that what you proposed was in my system, but my system isn't only made of these. wink.gif

QUOTE
I still can't wrap my mind around the idea that a corp node could gangrape an intruding Decker dead in just a few seconds anytime but doesn't.

I don't see what you're referring to. Can you explain, please?

QUOTE
Plus I don't like the idea that the only thing really preventing Agent Smith Armies is that the knowledge to create an independantly acting Agent is being suppressed by the corps, if nothing else then I'd imagine that the AIs running around since Emergence would let the cat out of the bag rather throughly.


Actually I haven't been through Emergence yet and it only seemed very likely to me that corps would do whatever they could to prevent Agent Smith. I couldn't find any technical reason that'd prevent independant agents if there could be non independant agents. At least, no technical reason that didn't lead to something I didn't like.
So I decided that it was technically possible. But as allowing this would be far more damaging than rewarding to corps, it seemed likely to me that corps would do everything they can to prevent that, especially after the crash 2.0 virus. The best way to do so would simply be to benefit from the fact that they rewrote the Matrix from scratch to include security against these (2070 Captchas) in all possible layers.

You're free to find what's special about a hacker's persona that an agent won't be able to emulate, but as it should allow for non-DNI use, I'm afraid it'll be a little bit complicated to find a reasonable technical reason. (That's what Frank was referring to with his drone using a commlink). Well, of course you can still skip the reason if it's an acceptable break from reality for you. It wasn't for me.
ludomastro
Wow! An amazing amount of warm, yellow liquid on the floor ... <sniff> <sniff> ... Oh, I get it. There was a massive pissing match here I just missed.

wink.gif

hyzmarca
QUOTE (Ravor)
As for hack-a-stack, a guess I never really understood the threat, if you try to log onto a Node with your stack of commlinks all at once it seems to me that you are likely to trigger an alert, and if you don't then every time you switch to another commlink you have to relog onto the Node you were in.

Logging in all at once isn't such a problem as is logging in serially. Given a sufficient number of comlinks any character can continue cybercombat indefinitely.
Nightwalker450
Ok, this Matrix causes large disputes... I've been been reading through and trying to come up with some theories, strictly from canon. Interpretations are different for everyone granted but here are some things that might not be coming together properly... Granted even the writers themselves didn't get everything together as we've all figured out.

QUOTE ("BBB 227-228")
Agent can be loaded into your persona, allowing it to acompany you to any nodes you access.  Agents can also access other nodes independently [...] If you wish for you agent to operate in the Matrix independently, you must load it on a particular node seperate from your persona. [...] In this case, the agent doesn't count toward your persona's active program limits like running programs but it does count as a subscriber toward your subscription limit.


QUOTE ("BBB 212")
The subscription list may be unlimited in size, but the number of nodes, agents or drones that a person may actively subscribe to (access) at any one time is limited to the persona's System x 2.


First Item, looks like Agents must be on a node in order to work it, they can only exist in one node. Your persona can subscribe to multiple nodes, but agents are either with you, or in a node seperate of your persona. Taking this in, Agents reduce, which reduce response, which Pilot, which (No Rule, just theory) the agent would drop to 0, which should crash it "Your system does not meet the requirements to run this program.". So you could probably put crazy drain on a system, but at that point it would probably start dropping connections to improve performance "All server connections are busy, please try again later".

Second Item, if the agents are with you, you are limited to (Response) number of agents, if the agents are independent (spread throughout the matrix), you are limited to your subscription list (System x 2). Agents look to always count towards your subscription list unless they are shut down completely. Though running the full System x 2, you would be issuing commands blindly since you couldn't be logged into a node yourself.

There's my interpretations. Are they word for word in the book.. No, just my interpretation. But neither is how a ganger responds to getting shot at. This isn't a "Choose Your Own Adventure" book, its a guide.

Whose houserule is best? Depends on whose house it is, and who's GMing (and what mood he's in). cool.gif
Nightwalker450
Ugh, hackastack... More reading to try and theorize this...

To start with the hackastack is doing everything physically so the hackastack would be Wired not Hot-Simed otherwise its the independent agents as discussed above. (So I suggest a high AGI for commlink juggling)
So options are

1. Lots of pairs of Image Linked Glasses using Simple action to draw your glasses (Quck Draw test?) and you still have to change your AR Gloves/Trode Net... Yeah this is ridiculousness. Smile it's Friday...

2. AR displays using two free actions, first to change your Image Link, then to change your AR Gloves/Trode net. (Change Linked Device Mode pg 135) Leaves you with a Simple Action to issue a command to the Agents on that commlink. As a group only.

3. Touch screen interface. Ugh how archaic, using your stylus or the built in keypad... So here he has a simple action to draw the commlink, and a simple action to issue the command. Assuming you're not going to penalize for trying to num pad or stylus enter commands.

So 4 passes, each pass sending out whatever Agents are subscribed to that commlink (System x 2 per commlink).

Hackastack very amusing concept for the juggling hacker. I suggest Adept thrower, so when your commlinks crash you can chuck them at people as well. "Thats right, brain hacking! The hard way!" (I'm actually a fan of brain hacking but the pun was needed.)

[EDIT]
I didn't want to add yet another reply in a row... So agents vs hacker skills.

I think it is broken, and here's why. You need to get targeting, maneuver, clearsoft, electronic warfare.... But they all come with max Computer, Cybercombat, Data Search, and Hacking? Why aren't these autosofts as well? What really ticks me off... Sprites don't even come with all these knowledges and their supposed to be even smarter than agents. Autosofts should just be activesofts and none come included.
Ravor
QUOTE (Blade)
I don't see what you're referring to. Can you explain, please?


QUOTE (Blade)
Nodes and hosts, why size doesn't matter

In 2070 size and computing power aren’t related, except for some experimental systems. You can have the same computing power in a big computer and in a small commlink. Even using several CPU in parallel processing won’t give any significant boost. The only advantage of big node networks is that they can handle much more traffic and programs at the same time.
If one intruder breaking into a rating 5 commlink will face 2 rating 5 ICEs, 10 intruders breaking into a similar rating 5 host will face 2 rating 5 ICEs each. It’s as if each user connected to his own node, except that all users of the same host will be able to interact with other users on the same host.

But what if there are 9 legitimate users and 1 intruder? Will he be sent 10 rating 5 ICEs? It’s possible but this kind of situation will rarely arise because you can’t be sure that the 9 other users are really legitimate users. Sending all your ICEs on the same intruder would be like sending all your troops to attack an intruder in a building, leaving the rest of the building without anyone.

But what if the host is able to handle 100 personas at the same time, but there’s only 1 person connected? Will the 200 ICEs check him? Once again, it’s possible but they won’t, and exactly for the same reasons: you can’t be sure that the 99 other slots are really inactive. A good hacker can enter the node without being detected.
Besides, running too many ICEs on the same slot often leads to more trouble than it’s worth: a hacker can disguise himself as an ICE, so each ICE should check each ICE it comes in contact with. So when you have 100 ICE for 1 user, the probability that one ICE will check the intruder is much lower than if you only had 2.
That’s why most of the time you won’t have hordes of ICE defending a host.


Unless I'm completely misunderstanding what you are saying this would allow the corps to gangrape any intruding Decker dead in a few seconds the moment he is detected by hoards of IC.


As for what is special about a metahuman persona that allows Agents to "ride" the signal, well I'm perfectly fine with having that special something being DNI, after all, I have no problem with requiring Deckers to use DNI for any meaningful hacking anyways and it also allows me to put the bite back into AR Hacking which in turn should help limit the usefulness of hack-a-stack.


hyzmarca
QUOTE (Nightwalker450)
Ok, this Matrix causes large disputes... I've been been reading through and trying to come up with some theories, strictly from canon. Interpretations are different for everyone granted but here are some things that might not be coming together properly... Granted even the writers themselves didn't get everything together as we've all figured out.

QUOTE ("BBB 227-228")
Agent can be loaded into your persona, allowing it to acompany you to any nodes you access.  Agents can also access other nodes independently [...] If you wish for you agent to operate in the Matrix independently, you must load it on a particular node seperate from your persona. [...] In this case, the agent doesn't count toward your persona's active program limits like running programs but it does count as a subscriber toward your subscription limit.


QUOTE ("BBB 212")
The subscription list may be unlimited in size, but the number of nodes, agents or drones that a person may actively subscribe to (access) at any one time is limited to the persona's System x 2.


First Item, looks like Agents must be on a node in order to work it, they can only exist in one node. Your persona can subscribe to multiple nodes, but agents are either with you, or in a node seperate of your persona. Taking this in, Agents reduce, which reduce response, which Pilot, which (No Rule, just theory) the agent would drop to 0, which should crash it "Your system does not meet the requirements to run this program.". So you could probably put crazy drain on a system, but at that point it would probably start dropping connections to improve performance "All server connections are busy, please try again later".

Second Item, if the agents are with you, you are limited to (Response) number of agents, if the agents are independent (spread throughout the matrix), you are limited to your subscription list (System x 2). Agents look to always count towards your subscription list unless they are shut down completely. Though running the full System x 2, you would be issuing commands blindly since you couldn't be logged into a node yourself.

There's my interpretations. Are they word for word in the book.. No, just my interpretation. But neither is how a ganger responds to getting shot at. This isn't a "Choose Your Own Adventure" book, its a guide.

Whose houserule is best? Depends on whose house it is, and who's GMing (and what mood he's in). cool.gif

Actually, with a proper comlink chain it would be {(System)*2 + (n-1)[(system-1)*2]} agents with n being the number of comlinks in the chain, which is unbounded.

A simpler hub and spoke setup would naturally max out at 4(system^2) but could be converted into an unbounded branching tree.

Either way, the only limit to the number of subscribed devices is money, since you can always add new systems to the chain.
Nightwalker450
QUOTE ("hyzmarca")
Actually, with a proper comlink chain it would be {(System)*2 + (n-1)[(system-1)*2]} agents with n being the number of comlinks in the chain, which is unbounded.

A simpler hub and spoke setup would naturally max out at 4(system^2) but could be converted into an unbounded branching tree.

Either way, the only limit to the number of subscribed devices is money, since you can always add new systems to the chain.


I'm not sure if I'm interpreting this correctly, but I think you're saying Agents can have subscription lists? Basically you send a command to your subscription list of commlinks, and each of those commlinks would have an agent with a subscription list and he would send the command to his subscription list. Since persona's maintain subscription lists, so there would have to be some mind there agent or person to send the command to their subscription list.

My interpretation before was Agents could only work in one node or in your own persona, so I think that would rule out a subscription list of any type. Again my interpretation, taking this out and you would be quite right.
FrankTrollman
QUOTE
I'm not sure if I'm interpreting this correctly, but I think you're saying Agents can have subscription lists?


Sure can. Every Commlink in the Hackastack has a unique persona and subscription list whether there is currently any person pressing buttons on it or not. It has a subscription list and loaded programs even while not having commands sent to it.

If one of those programs happens to be an Agent, then your Hackastack just became Agent Smith.

-Frank
Blade
QUOTE (Ravor)
Unless I'm completely misunderstanding what you are saying this would allow the corps to gangrape any intruding Decker dead in a few seconds the moment he is detected by hoards of IC.

Actually, I like to compare a hacker hacking a Matrix systems to a face infiltrating a corp building.

If the intruder is detected, you won't send all your security guards to catch him, because you have to keep an eye on the rest of the building. Sure, you might send some extra guys to take care of him, but you don't want to send everyone, except in small places or places with few guards.
Well, they can do it if they want but in that case, the best way to attack a system would be to start a diversion attack somewhere in the node while you hack.

Ravor
Two things come to mind, one, in the meat world your security can't just teleport over, splatter some poor sod and then teleport back to whatever they were doing a few seconds before, and two, if a corp building could have as many sec-guards as your system allows IC, then there is no reason not to send them out in hoards, in fact it's a far safer tactic as it would be virtually impossible for a Decker to sleaze past the hoards of IC set up to scan "their" portion of connection slots.
Feshy
QUOTE (kzt)
10 agents attacking a node is identical to having 10 individual human hackers attacking the node.  Agents work like people, and they are expert systems able to do a very good job at whatever they are designed to do. 

10 agents could be distinguished from 10 hackers by a matrix perception test. This implies that there is a fundamental difference between the two.

Based on the idea that they are in fact distinguishable, I'd propose the following rules:

CODE

1) If multiple agents with the same agent code (hacked and replicated, or whatever) are in a node, any matrix persona that has successfully performed a matrix perception test on them and identified them can apply any damage they do to [i]all[/i] the identical agents in the stack.  This is because they all have the same vulnerabilities at that moment, because they are identical.

2) Likewise, if you have perceived each agent, then you take only the highest damage inflicted by all of the agents.  If four agents that you've identified all attack, doing 4,5,5, and 6 damage, you only take 6 damage.  This is because though the agent is a complex expert system, it can't coordinate its attacks with other copies of itself (if it were capable of coordinating and running multiple different attack strategies at once, it would be a higher rating, not multiple agents!)

3) Any attack from a centralized location (a room full of commlinks in a Hackastack or Agent Smiths) allows IC to notice similarities in the data trails for all Agents or Personas that have been Perceived.  Each agent or Persona from the same location grants a -1 to the threshold for Track actions against any matrix icon originating from that location.  Should one icon be disconnected, the track action may resume with another Icon in the stack without penalty.


The above rules also apply to IC based on the same code as well. This would seem to solve (or at least improve) the Hackastack (and by extension) Agent Smith problem. It also allows users to try and exploit multiple agents as well if they feel the drawbacks are worth it -- and for cheap corps to try the tactics as well against unsuspecting or unperceptive hackers. (Running four copies of your identical Blaster IC will keep out script kiddies, but not experienced hackers with these rules.) I like this better than either the "ruled out by fluff" or "player-GM MAD standoff" approach.

AR Hackastacks will be very dangerous options -- a large number of poorly-rolling commlinks controlled by a hacker (not an agent) will make you a physical sitting duck, as IC will be able to track you very quickly unless you use a large number of actions to shut down your commlinks in a hurry. Sure, you *might* get past nasty IC with that many commlinks. If you've got wired reflexes, you *might* even do it before they shut down remote access to the node. You won't do it before you're seen though.

Having a room full of commlinks with identical agents will not be very helpful. Against a single (perceptive) target, they will do little damage. Against several targets, they may do a good deal of damage (at the expense of being more easily tracked), but they will be shut down fast by perceptive attackers.

A very rich (or very prolific coder) could purchase or write a large number of different agents, and use them with impunity. This is fine, actually -- because it is not unlimited (time and resource limits apply) and is no different than spending the equivalent resources to hire multiple hackers.

A very skilled hacker could hack into multiple nodes (high rating nodes, or he risks his agent being degraded!) and avoid the track penalties by running his identical agent army on a number of different nodes. His army of agents will still be vulnerable, though. And, he's limited by the number of nodes he can hack and remain undetected in. This again seems fine.

The system also gives a very slight penalty to running even a single agent. That seems fine to me as well.

This creates a question for fluff -- why do Agents running on different hardware create identical personas, while a metahuman using the System-supplied persona running on different hardware creates different personas. I'm sure it could be explained away with some technobabble about quantum computing and interactions with the human brain.

One thing it doesn't solve is a room full of anthropomorphic drones using AR commlinks (well, the track penalties would still apply.) Really, though, if you allow drone Pilot programs to run commlinks in this manner, you're probably already setting yourself up for a world of hurt. I'm sure we could think of enough exploits for Pilot that advanced to rename this game AI: The Awakening.

kzt
Even if you do have to buy them, agents are not that expensive. And compared to a 225,000 nuyen.gif/year 24/7/365 security hacker, they are darn cheap. And I think that 15 rating 6 agents with rating 6 SW patrolling are likely to be more effective that 1 hacker with rating 6 SW patrolling.
Cheops
QUOTE (Nightwalker450 @ Jan 13 2008, 02:08 AM)
Ok, this Matrix causes large disputes...  I've been been reading through and trying to come up with some theories, strictly from canon.  Interpretations are different for everyone granted but here are some things that might not be coming together properly...  Granted even the writers themselves didn't get everything together as we've all figured out.

QUOTE ("BBB 227-228")
Agent can be loaded into your persona, allowing it to acompany you to any nodes you access.  Agents can also access other nodes independently [...] If you wish for you agent to operate in the Matrix independently, you must load it on a particular node seperate from your persona. [...] In this case, the agent doesn't count toward your persona's active program limits like running programs but it does count as a subscriber toward your subscription limit.


QUOTE ("BBB 212")
The subscription list may be unlimited in size, but the number of nodes, agents or drones that a person may actively subscribe to (access) at any one time is limited to the persona's System x 2.


First Item, looks like Agents must be on a node in order to work it, they can only exist in one node. Your persona can subscribe to multiple nodes, but agents are either with you, or in a node seperate of your persona. Taking this in, Agents reduce, which reduce response, which Pilot, which (No Rule, just theory) the agent would drop to 0, which should crash it "Your system does not meet the requirements to run this program.". So you could probably put crazy drain on a system, but at that point it would probably start dropping connections to improve performance "All server connections are busy, please try again later".

Second Item, if the agents are with you, you are limited to (Response) number of agents, if the agents are independent (spread throughout the matrix), you are limited to your subscription list (System x 2). Agents look to always count towards your subscription list unless they are shut down completely. Though running the full System x 2, you would be issuing commands blindly since you couldn't be logged into a node yourself.

There's my interpretations. Are they word for word in the book.. No, just my interpretation. But neither is how a ganger responds to getting shot at. This isn't a "Choose Your Own Adventure" book, its a guide.

Whose houserule is best? Depends on whose house it is, and who's GMing (and what mood he's in). cool.gif

Few things to point out to pay Devil's Advocate here:

1) The RAW states that you can issue the same command to multiple drones/agents at the same time. So you can have System*2*a bazillion agents working for you at once. Basically a rating 3 commlink could have 3 different hordes of agents doing 3 different tasks all at once.

2) Proponents of hackastack seem to take the RAW definition (from the sidebar on Matrix Terminology) of Node as any Drone, Commlink, Device or Network. The important one to note there is Network. I remember getting into this debate with Seven-7 and the interpretation I was told is that since a Node = Commlink = Network then you can have Multiple Commlinks = Network. Thus it only takes a Free Action to switch to your new Commlink with its fresh Condition Monitor. And since your Commlink = Network = Node then you are still in the same session.

Now I don't allow the Agent Smith or the Hackastack in my games. Here's why and how:

1) First off Agent Smith is going to get you caught. If you have an arbitrarily large number of Agents all trying to brute force a node then the same laws of statistics that ensures you get in also ensures that you will get a critical glitch. Edge can't negate this when it is an agent acting on your behalf. This means that you will be tracked by security and in SR4 it is REALLY easy for corps to set up covert surveillance until the strike team gets there.

2) The way I interpret the Agent rules for agents working independently limits their effectiveness. Even if you hack into an arbitrarily large number of rating 6 nodes and plant 1 agent per node they still operate at Response = to system on which they are operating (target system). As a result most corporate nodes in my game are 3/3/6 (firewall is cheap). This still allows most worker bees to get their job done without slowing them down while also restricting what Agents can do. All of a sudden they can only use 2 programs at a time without going down to Response 2 and System 2. And they are only rolling a max of 6 dice.

3) All security systems are rigged so that Matrix Alert = Physical Alert = Magical Alert. Congratulations your hacker just got the rest of the team killed (if infiltrating the facility as you are in most runs).

4) Networked (ie actively subscribed) Commlinks =/ Network =/ Node. Sorry but you have to do it the long way. Hack in. Log out. Switch devices. Log in. Lather, rinse, and repeat. A Node = Network for situations where you are considering a Corporate Node. The Node is not just one device. It is numerous devices throughout the facility that are set up (through system architecture) to act as 1 Node.
kzt
The counterpoint is the guy setting off the burglar alarm four times a night for a week. At what point do you stop having the huge reaction and start assuming that something is broken? And if you are spending all your effort reacting to X, how much can you direct against threat y?

And you can program this stuff a long time in advance and scrub the data trail.
Cheops
To counter your argument how hard is it really for SR4 security forces to be on alert? AR is pretty darn flexible. Maybe you are right and it comes down to corp security ALWAYS being in full combat armor and packing heavy weaponry.
Dashifen
QUOTE (Cheops)
To counter your argument how hard is it really for SR4 security forces to be on alert? AR is pretty darn flexible. Maybe you are right and it comes down to corp security ALWAYS being in full combat armor and packing heavy weaponry.

No, but it might come down to a small group of five to ten individuals "on-call" and prepared to engage with a target while the rest of the forces suit up. It's usually not numbers that ruin the team's day in my games but reinforcements.....
FrankTrollman
QUOTE (Ravor)
Well, I won't pretend to have put as much thought into the subject as FrankTrollman has, but why couldn't you bandage the problem as follows?

( 1 ) Give AR Modifiers out like candy. The reason that nearly everyone stays connected is that doing so makes their daily life easier. (Doesn't address the idea of corps keeping their networks offline, but I don't see corps forcing Runners to go on-site to do anything as a bad thing.)

1) This is an established methods of incentivising people to have a connection to the Matrix. But so long as you can segregate networks one from another you can put your important stuff off Matrix. And the corps can and will do this as well. One computer for incoming information and another for storing important data and running your vital systems. Your cyberarm will have all the files that run your cyberware and it will have the pay data in it, and you'll have a pan that constantly gives you positional information that is subject to hacking, but they won't directly conect at all.

In this model you've upped everyone's dice pools across the board. And you've given people the ability to be hacked. But the hacker is just eliminating people's dicepool bonuses, because the actual good stuff is still unhackable as long as that is physically possible.

QUOTE
( 2 ) Agents and IC use the resources of the node that they are currently present in, however there is something special about a Decker's personia that allows an Agent to break this rule. (Or simply get rid of the exception where an Agent can hack from a Decker's commlink.)


Sure. But I can just have more than one persona so long as it is functioning in AR and I have no neural connection to it. And as long as each of my personas can run agents, Agent Smith exists.

I don't really know why anyone thinks that Agents counting as being run on the hardware they are attacking makes anything any better. The important part, the part where they hack themselves a connection in the first place, doesn't work that way and can't. If you have even one agent in a node then it can spend an action to give you access and boogy out. Or not, heck if piling in more Agents degrades the target host it's basically just an "attacker wins" scenario anyway because no matter how nova hot the target server is or how black the IC you can always drop it down to your level by adding more Agent Smiths.

QUOTE
( 2A ) Anytime a Node's Rating is degraded it goes on alert. So multiple Agents are really only good for DoS Attacks, and DoS Attacks are a valid tactic in Matrix Warfare, at least until the corp in question is able to track you down.


Yeah. I'm not feeling you there. It just means that any hacker can automatically crash any node whenever they want and no IC can theoretically be tough enough to matter. All agents and IC on both sides will automatically be the same rating and the attacker will always be fielding more.

QUOTE
( 2B ) In order to work together on anything other than a DoS Attack, you have to use Agents compiled from different source codes, copies simply won't work because they aren't different enough.


The costs involved in an Agent Smith assault are so small that making them twice as much is meaningless outside the realm of starting characters. It may make a difference to a particular campaign, but the abstract effect to the campaign world is essentially non-existant.

QUOTE
( 3 ) Hacking in 2070 simply can not be done without DNI of some kind, a Decker simply can not input commands fast enough to matter, so even while hacking via AR, BlackHammer can and will still kill you.


AR is without a direct neural interface. If you make computers mandatorily connected to human brains then you've eliminated Drop-Out. That is, since you can't have no connection to your brain, people will hack you and the hacker always has something to do.

But that's my system. It's an extremely massive overhaul to the way absolutely everything works and it doesn't even play nicely with the other stuff you have here. If you go stick approach (where hackers can hack your stuff and you need firewalls to try to stop them rather than allowing people to be unconnected and then entice them into sticking their vulnerables into the nets where they can be crushed), then you don't need or want any of the other things you have written down here.

It's not simple. It's not clean. It completely changes everything. But it does work.

-Frank
Ryu
Network seggregation of critical systems can not be avoided. It is a viable tactic, and good for running as it requires the team to go on-site.

Not having important data on the matrix is also doable for private persons, always was. Anything with a Network-on/off switch will work fine.

But things can be wireless without being connected to the matrix. A corp that pays for wire gains some better protection from outside intrusion, but can´t save on other security measures because the hacker might gain access to their wire. If wireless security is deemed sufficent, it will be used. Drones and personell need a wireless setup.

If you encounter a purely wired system (no drones, no networked security), little will stop you from going onsite and installing wireless capability. The hacker will have to just tag along for a short while. If he can´t fight, combat will be a problem. He got 400 BP like everyone, his choice. Not doing combat is very valid IMO.

Conclusion: Opt-out is no problem, so you don´t need a fix.
Blade
QUOTE
AR is without a direct neural interface.


Wrong. You can experience AR without a DNI (with image-link glasses, feedback clothing and earbuds for the output and any kind of non neural input device (voice, stick, touchscreen, wheel)) but you can also experience it with DNI both for input and output.

If I understand correctly, Ravor's idea is to only allow hacking (use of hacking skill or hacking software) with DNI. So you can hack in AR, if you use a DNI to experience AR.
This doesn't necessarily implies a brain-hacking system, it just implies rules which consider the difference between DNI AR and non-DNI AR or between normal DNI AR and hacking DNI AR.
FrankTrollman
QUOTE
Network seggregation of critical systems can not be avoided.

Sure it can.
QUOTE
It is a viable tactic, and good for running as it requires the team to go on-site.


No. It requires people to physically compromise actual devices. Essentially as long as network segregation exists the wireless matrix does not from the standpoint of hardened criminals (the PCs), and we're back to Deckers being an NPC who sits in their basement while the rest of the team goes and does exciting stuff.

Stuff which may or may not include attaching a spice to the corporate systems so that he can have a mini-adventure in VR while the rest of the players go out for pizza.

-Frank
Ryu
But network segregation can happen for wireless systems. You can set any device up to only accept communication from devices on their subscription list. That is an OFF mode concerning matrix functions, even if the protocols used work the same.

If your decker does not want to sit in the basement, he can acompany the team. Once they manipulate a device, they put a wireless adapter in. The hacker can manipulate any device he sees via AR, no need to go VR (Connection by proxy, but still in range. If there are several networks, things get a bit more complicated than direct access, but thats the reason why you brought a specialist.

If you limit wired networks to VR, then you get issues like hackers prisoned in the basement. But you don´t have to.
FrankTrollman
QUOTE (Ryu)
But network segregation can happen for wireless systems. You can set any device up to only accept communication from devices on their subscription list. That is an OFF mode concerning matrix functions, even if the protocols used work the same.

That is indeed the core of Drop Out. Everyone can do that, and therefore everyone does. The only way to hack any system is to physically splice a dataline tap into it because the device won't accept wireless information from a hacker - on site or not.

And then the entire point of the fourth edition Matrix is to get the Deckers out of the basement and into the fray. If people have to install a physical daaline tap, that doesn't really happen.

For the game dynamic we're looking for to happen, it has to be that hacking is best at "close" range. We need the hackers to physically get on site and then be able to hack from some ways away. If you need to add physical hardware to the target computer to make that happen, it isn't happening. Because people will just add a sat link along with the splice and have their hacking done by an NPC cotact in Micronesia - like we did in 3rd edition.

-Frank
Moon-Hawk
QUOTE (FrankTrollman)
For the game dynamic we're looking for to happen, it has to be that hacking is best at "close" range. We need the hackers to physically get on site and then be able to hack from some ways away. If you need to add physical hardware to the target computer to make that happen, it isn't happening. Because people will just add a sat link along with the splice and have their hacking done by an NPC cotact in Micronesia - like we did in 3rd edition.

Doesn't Wi-Fi blocking paint accomplish that?
FrankTrollman
QUOTE (Moon-Hawk)
QUOTE (FrankTrollman @ Jan 15 2008, 05:11 PM)
For the game dynamic we're looking for to happen, it has to be that hacking is best at "close" range. We need the hackers to physically get on site and then be able to hack from some ways away. If you need to add physical hardware to the target computer to make that happen, it isn't happening. Because people will just add a sat link along with the splice and have their hacking done by an NPC cotact in Micronesia - like we did in 3rd edition.

Doesn't Wi-Fi blocking paint accomplish that?

If and only if the characters can actually hack wirelessly. Which they can't do as long as you can network segregate and voluntarily limit the devices you accept wireless information from.

-Frank
Ryu
QUOTE (FrankTrollman)
QUOTE (Ryu @ Jan 15 2008, 02:33 PM)
But network segregation can happen for wireless systems. You can set any device up to only accept communication from devices on their subscription list. That is an OFF mode concerning matrix functions, even if the protocols used work the same.

That is indeed the core of Drop Out. Everyone can do that, and therefore everyone does. The only way to hack any system is to physically splice a dataline tap into it because the device won't accept wireless information from a hacker - on site or not.

For the game dynamic we're looking for to happen, it has to be that hacking is best at "close" range. We need the hackers to physically get on site and then be able to hack from some ways away. If you need to add physical hardware to the target computer to make that happen, it isn't happening. Because people will just add a sat link along with the splice and have their hacking done by an NPC cotact in Micronesia - like we did in 3rd edition.

-Frank

What about

1.) Sniff signal,
2.) Decrypt Signal,
3.) Spoof Signal,

in that order? Not the hardest tests in the book. Then you face what you would face if you happened to physically access a device.

The nodes need not accept signals from the hacker, but they need to accept signals from their subscription list. The hacker must go onsite because the wireless matrix is not connected to the PAN of the target installation. But the PAN of the target installation runs wireless matrix protocols.

If the group has a hacker on the team, why should it outsource matrix services? I´m more into simplifying the matrix rules so that the resistance to playing one decreases. Not one hacker player so far complained about lack of action.
Blade
Let me get this straight:

Network A is a wired network inside a building where each and every walls are coated with wireless blocking paint. The device connected to network A closest to the outside is deep inside the building and network A is disconnected from any other network.

How can the runners easily add any kind of link to network A for their NPC hacker friend?
Ryu
The way he says, they break and enter to splice in a sattelite dish for their NPC friend, instead of splicing in a wireless adapter for a hacker on the team. That will in many cases be a valid strategy.

It is not a decisive argument IMO because anyone who plays a hacker will splice in a wireless adapter for himself.
Blade
But how can they splice in a sattelite dish?

They're inside the building (no sattelite reception here). They'll need to set up a sattelite dish somewhere where they can get a signal and link it with the network. They can't use wireless connection between the network and the sattelite dish because of the wifi blocking paint, so they'll need to install a cable.

Sure it can be done, but it won't be as quick and easy as plugging in a device.
Crusher Bob
Splicing in a sat dish is simpler because you don't actaully have to drag the hacker along with you. An infiltration team of a stealth adept + hacker is more likely to get caught that the team of just the stealth adept by himself. Of course, you could have the stealth adept be the hacker, but usually that means giving up something in one or both categories. Better to just concentrate on the stealth and hire a wheelchair bound hacker in Indonesia to hack the place once you put the tap into place.
Lyonheart
QUOTE (Buster)
This is the Agent Smith Army problem:

A hacker can write his own agents and programs with a few months downtime. He now has the source code and can create unlimited copies for free with no effort. At chargen, a hacker can buy 25 top of the line commlinks with top of the line OSs. If the criminal doesn't want to pay for the commlink, he can rob a whole store full of them. If he doesn't want to rob a store, he can do what hackers do today and hijack thousands of nodes throughout the matrix and install an agent on each of those. (It's called turning computers into zombies).

A hacker can only control system * 2 agents at the same time, but he can pre-program them with their instructions before stashing them. The hacker now has thousands of agents running all over the world ready to attack anyone he's programmed them to. Since they are each running on their own node with a decent system rating, none of them suffer degradation even if all one million of them attack one node.

Since defenders can do a similar strategy with their IC, Shadowrun goes from street level to Lord of the Rings level with armies of thousands of agents clashing in commlinks.

Solution: Make him roll intrusion on all the agents until one fails and the system responds by going into lock down. If he goes for brute force the system shuts down automatically. It's one of the options for the automatic node response to intrusion, use it. An infinite number of attackers is surprisingly useless against a node that has taken itself offline. Now it makes DOS attacks easy for Agent "bot nets" but then thats what bot nets are good at IRL.
Crusher Bob
The headlines for that response write themselves:

QUOTE

The entire Gridguide system catastrophically failed today, resulting in 7 deaths and scores of injuries.  Inquiries are ongoing.


QUOTE

The Bank of Ares online system remains unavailable due to continued denial of service attacks.


The agent attack pack is dirt cheap compared to the economic damage you could achieve simply by blasting important sites off the net. They can't shut down without incurring losses in the millions, if not billions, of Y.
kzt
QUOTE (Blade @ Jan 15 2008, 04:17 PM)
They can't use wireless connection between the network and the sattelite dish because of the wifi blocking paint, so they'll need to install a cable.

Ever see how small fiber optic cable is? Not the sheathed stuff, but the raw stuff that is inside the sheath? It's really thin and surprisingly tough, and it's still thicker than it needs to be. The actual working part is 1/8 of a milimeter diameter. Coat it with an auto-camouflaging coating to match the carpet/etc and a light glue, run it along the wall (probably using a drone) and you are in business. It will run under doors with no problem. The only exception would be knife-edge pressure doors, and those are kind of rare. And it prevents paranoid sites that run RF scanners from picking you up.

And you can always install a wireless link inside and run it outside to the satcom dish. As SR cybercombat doesn't have any drawbacks even if you have time delays longer then the actual combat turn, why not?
Ryu
Interesting, keep it up!

It is right that not taking the hacker onsite reduces the body count of the infiltration team. It is also right that hackers did not use to be stealth experts. I am saying that you should (SR4) build infiltration hackers.

Of course you can have facilites with WiFi-blocking paint that are wired themselves and have RF scanners. Quite a bit of money spend to make the team leave the hacker offsite. The corps should not really care about (and spend money for) keeping hackers offsite. If anything, they should prefer that the hacker is onsite. If you need to hack wired, AR hacking via cable at least allows you to watch your own back and move a few meters.

So my conclusion is that the hacker should b&e with the rest of the team, and that corps will run wireless, matrix-segregated networks on most facilities. And that is exactly what gives incentives for having the hacker onsite.

Severe bandwith penalties for wired networks are a real posibility, that is one of the things Unwired or simple houserules can do. I´d likely limit encryption ratings, justified by increased data volume. That would severely decrease the security of wireless networks (if encryption actually had meaning, which needs a houserule, too). But I do not think such rules are needed as-is.
Lyonheart
QUOTE (Crusher Bob)
The headlines for that response write themselves:

QUOTE

The entire Gridguide system catastrophically failed today, resulting in 7 deaths and scores of injuries.  Inquiries are ongoing.


QUOTE

The Bank of Ares online system remains unavailable due to continued denial of service attacks.


The agent attack pack is dirt cheap compared to the economic damage you could achieve simply by blasting important sites off the net. They can't shut down without incurring losses in the millions, if not billions, of Y.

Well, it happened to Estonia

http://www.nytimes.com/2007/05/19/world/eu...e/19russia.html

So I imagine the result is that Evo denies involvement.
kzt
Followed by "road construction" blocks the entrances to EVO's plants and that "damages" the water and power lines.

So sad. Obviously a matrix hack damaged the construction plans, so we'll shut the project down until that security vulnerability fixed. No more than 16 months I'd expect.

And being that you're another country, you don't have standing to sue. Have a nice day.
Ryu
One can see how that will end in an SR-like environment with constant retaliations and counter-retaliations real quick. And why there is such a thing as an "omega order" based on "reasonable suspicion" on the CC charter.
This is a "lo-fi" version of our main content. To view the full version with more information, formatting and images, please click here.
Dumpshock Forums © 2001-2012