QUOTE (toturi)
Or it could simply be that OC syndicates (and other shadowy organisations) do not screw such people over, especially when there are millions or billions of other prey to victimise instead.
if you go strictly by canon, that's a possibility.
QUOTE (Kremlin KOA)
Security irrelavent? is using stolen passwords security irrelavent? Stolen credit card data?
yes, in that the passwords and credit card data being stolen are unsecured. having a really good safe is irrelevant if you're leaving your cash and valuables out on the table where anyone can pick them up. even if you also leave the combination to the safe lying out on the table, that's really only peripherally relevant to the safe; the safe doesn't necessarily have a flaw that can be exploited, in such a case--it's a flaw in the operation and use of the safe. my point is that modern botnets aren't intended to crack secure systems, though it's certainly possible that they
might, through user errors such as not securing passwords to the secure system.
QUOTE (Kremlin KOA)
You are comparing the idea of multitasking a search of every subscribable database in the world to typing a set of keywords in google?
stop being deliberately obtuse. not everything online can be found by a given searcher, and not everything is online. you need to have information to find information, and for the type of operation you're talking about, even an infinitely successful search roll won't provide all the necessary data--because not all the data is in a searchable location.
QUOTE (Kremlin KOA)
Not everything is done in the matrix, but in 2069 your physical presence is no longer required for 99% of human interaction. All 5 senses can be replicated.
that's kinda my point. given how easy it apparently is to fool the senses in the Matrix, don't you think that maybe a non-retarded criminal syndicate would check in on the meat fairly frequently, just to be sure? moreover,
i don't feel like coming up with a whole new set of rules to govern social engineering, because the reality is that it should be a lot more complex than a simple interrogation roll--especially given how easy it is to get a really good interrogation roll.
QUOTE (Kremlin KOA)
Also there is the Mitsuhama link. A storm botnet, built out of agents, could slowly infiltrate Mitsuhama. This would give you access to the records of Mitsuhama assets such as Yakuza gumi
if Random Dickhead the Hacker has a botnet, you can be sure that Mitsuhama has a better one--probably has better one
s, plural. and their better botnet(s) will be sweeping the Matrix for other botnets, subverting portions of those other botnets to determine their intent, and wiping out those botnets whose intent Mitsuhama finds to be incompatible with Mitsuhama's goals. again, the mechanics for all this aren't covered well by the existing rules.