QUOTE (Abbandon @ Feb 14 2008, 07:34 AM)
![*](http://forums.dumpshock.com/style_images/greenmotiv/post_snapback.gif)
What information can you derive from just looking at a node or a encrypted node??
If it's a non-encrypted node, the information depends on the current mode of the device: active, passive, or hidden. Active and passive nodes will be reasonably easy to notice and find. Active ones might be broadcasting a general profile (like Facebook or MySpace sort of information) for commlinks, devices will probably tell you want they are and, if there's any public functionality (like the iMenu at the table where you sat down
![biggrin.gif](http://forums.dumpshock.com/style_emoticons/default/biggrin.gif)
) then you might find instructions and/or other interface hints. Passive nodes would be there but probably not respond to public connections with too much (or maybe any) information. Hidden nodes wouldn't be there at all without a more intensive scan (hence the 15+ threshold to find them).
If the node is encrypted, you would still get information from active nodes, but it would be encrypted and, thus, unhelpful until you decrypted it.
QUOTE (Abbandon @ Feb 14 2008, 07:34 AM)
![*](http://forums.dumpshock.com/style_images/greenmotiv/post_snapback.gif)
[...] If a bar has 10 security camera's and they are all subscribed to the barkeepers commlink I would only see that one single node (the barkeepers commlink) right? I wouldnt see a node for each of the 10 camera's??
Again, depends on the mode of the cameras. I'd think that the average camera would be passive or hidden. If the former, then you'd see their node and if the latter, the node wouldn't pop up unless you specifically made an effort to find them. Plus, depending on the set up, cameras might not be wireless and, instead, wired directly to the security room or something. There's pretty much no reason to make them wireless because it only creates a weakness. 'Course, it might be useful to give them a skinlink for maintenance purposes (touch the camera, and you can interface with it for diagnostic purposes) but that's a little obvious if you're not careful.
QUOTE (Abbandon @ Feb 14 2008, 07:34 AM)
![*](http://forums.dumpshock.com/style_images/greenmotiv/post_snapback.gif)
If my cyberarm is subscribed to my commlink then nobody would find my cyberarm in a scan they would just see my commlink?
Probably not, unless your Cyberarm is operating with a wireless connection to your commlink. More likely, your Cyberarm has a direct neural interface wired within the body and then to a datajack which can be plugged into your commlink. With that setup, you could disable the wireless on your Cyberarm and they wouldn't be able to find it without breaking into your PAN.
QUOTE (Abbandon @ Feb 14 2008, 07:34 AM)
![*](http://forums.dumpshock.com/style_images/greenmotiv/post_snapback.gif)
However....if they decrypt my commlink and sniff it then they can see things subscribed to my commlink and be lead right to my cyberarm or the sec camera's and they could then view the sec camera footage or begin hacking my cyberarm. Theres no way in hell I would have wireless turned on in my cyberarm im just giving examples heh.
If they break into your PAN (detect, decrypt, and hack your commlink, in other words) and then
analyze it (not sniff it), then they could potentially see what is subscribed to your commlink, yes. What they do with that information is up to them. I like moving the smart gun targeting reticule to the left by a meter or so
![biggrin.gif](http://forums.dumpshock.com/style_emoticons/default/biggrin.gif)
.
The big reason for wireless on cyberware is "fluff." For maintenance and other purposes, with a wireless interface to cyberware, then a street doc or cybertechnician won't have to cut you open to get diagnostic information on your 'ware. For a cyberarm it's even less important since it's on the outside of the body, but giving the cybertech the ability to diagnose a leaking internal air tank is probably handy rather than having them cut open you abdomen to notice that there's a bullet hole in your extra lung.
QUOTE (Abbandon @ Feb 14 2008, 07:34 AM)
![*](http://forums.dumpshock.com/style_images/greenmotiv/post_snapback.gif)
Going back to the bar... 10 camera's, 1000 camera's that could all be set up to count as a single subscription right ??
I wouldn't call them one subscription, but since the subscription list is essentially limitless, the result is the same: all the cameras can be subscribed. Plus, the drones chapter indicates that you can send single commands to groups of drones (or in this case, camera devices) and have them all respond, so you could definitely do this if you want to.
QUOTE (Abbandon @ Feb 14 2008, 07:34 AM)
![*](http://forums.dumpshock.com/style_images/greenmotiv/post_snapback.gif)
[...] Encryption wouldnt matter at this point. If you have your commlink encrypted it just means people can't listen in on your conversations or see INSIDE your commlink. It doesnt change what information is being broadcast by your PAN. Otherwise the law would be on your ass just like if you were hidden.
That's probably up to interpretation, but I wouldn't disagree with what you've said. I don't personally run it that way in my games, but I assume that the reason decryption is so easy is that the corps and governments have required backdoors in the encryption schemes. Hackers have learned of those backdoors and exploit them just as easily as law enforcement does. Thus, encryption isn't a concern to law enforcement -- they can just break it when they need to and the average SINner either doesn't know, doesn't care, or trusts the government/corporation to be acting appropriately. Shadowrunners, on the other hand, probably know better.
QUOTE (Abbandon @ Feb 14 2008, 07:34 AM)
![*](http://forums.dumpshock.com/style_images/greenmotiv/post_snapback.gif)
I guess if you narrowed it down to 10 hidden nodes you could decrypt and sniffer, or decrpyt and analyze the signals coming from the node to get information? Would that just give you an Access ID. I guess then you could do a computer + browse test with a massive bonus to match the access ID with a name..? But what if the target node was using a spoofed ID? You could grab a picture of the person off the net probably but then you would have to visually scan the entire room to make sure that person is or is not there and that would be impossable in some places....
Anybody wanna comment on this? How do you explain enemy or player hackers knowing which hidden nodes to hack if there are more than one?? How can they possably identify the right node?? I seriously doubt people are just going to randomly start hacking every hidden node until they get to the right one??
Personally, I think the threshold of 15+ you need to detect a wireless node indicates that all the work has been done to find the appropriate node. The program triangulates on areas where it can detect small amounts of traffic but not a node until it can hone in on the one you're looking for. If there's 100 hidden nodes in the area, especially if they're all clumped right around the target, increase the threshold to 20+ or maybe even 25+ and then you need some kind of super hacker (or assistance from sprites, teamworking Agents, etc.) to find your target without trying another angle.
To get an access ID you would need a successful Matrix Perception test on the target. If you haven't decrypted the target, then I wouldn't give you much information because even the access ID would be encrypted. Just like when you submit credit card information online today, all of the data transfered between your computer and the server is encrypted and the exchange of keys for that encryption happens first so that, for your session, the server knows who you are and what key to use for you. If the target was using a spoofed ID, then you'll still get an access ID, but it won't ever correlate to the target's actual identity. You could still use it to spoof commands to drones that he's controlling with that spoofed ID though.