I'm trying to make sure I've got a reasonable grasp of matrix topology and how hacking attempts might work. The physical side of matrix topology in terms of weak networks behind paint etc. makes sense. Does this seem like a good example for an entity which is completely online?

Description: The Office Tower houses a variety of businesses through a central entry point.

Node 1 - Public represents "The Lobby". There are a number of businesses that individuals can access here without any specific credentials. Interfacing with individual businesses is either done through agents running in the public node, or connecting to the individual nodes. Agents represented by kiosks perhaps? The majority of businesses though reside in the Tower. Security running here keeps virtual vandals, etc. at bay. Could be IC, matrix security guard or both.

Node 2 - Access to the Towers; This is represented by a guard station and elevators. The elevators provide access to all of the businesses in the Towers. Visitors must sign in (register current matrix address?) and pick up a badge to access their desired business. The badge provides access to the "Elevator" which is the gateway to the individual business nodes. If the individual has access waiting then their badge also includes security credentials to bypass IC at the respective business. Otherwise their appearance will be met by someone likely with IC, a security hacker or both to determine the nature of the visit. Nodes that can be accessed from here fall into 1 of 3 categories. The first is as described above.

The second group would be those "floors" that require a security key to access. In these cases the matrix address of the business needs to be provided by the guard (or lifted from someone else traveling through) in order to access. These nodes are far more likely to also have security credentials waiting and a more hostile response to uninvited guests.

If a user has Security access in Node 2 they will have all of these Matrix addresses and can get to any of the nodes in group 1 or 2, but will still face security from the attached nodes. In some cases where the business is paying "The Office Tower" to provide security, credentials from Node 2 would correspond to the attached nodes allowing the user to move freely into the next node.

The third group of nodes are the highly secure ones. These are hidden nodes that must be detected first. Once detected, determining what it is requires a decryption effort to identify it and then administrative access to establish a connection. Those with proper credentials would already see the Matrix ID of the associated node and are likely to have security credentials. Accessing these nodes without authentication usually yields a swift and harsh response. IC or guards monitor for any new connections and respond appropriately.

Does that sound like a reasonable all Matrix node / hub? My intent is that a hidden hacker's club resides here as one of the group 3 hidden nodes.

Thoughts?

With a sweep of his...

Hat