Help - Search - Members - Calendar
Full Version: Unwired Questions
Dumpshock Forums > Discussion > Shadowrun
Pages: 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11
Jaid
in spoofing lifestyles, there is no target. you're doing the exact same spoof, you're just doing a whole heck of a lot more of it if you want higher lifestyles. there is nothing to indicate you're hitting higher security targets, you're just hitting the same level of security more often. the only difference is that it takes longer to do, and if you were just hitting more difficult targets that shouldn't take any longer, it should only be less likely to succeed.

and for spoofing protection, i'll try explaining again:

you analyse the target. you see that it has the limitation option which prevents it from targeting <insert whatever limitation it is>

given you can see the limitation, and you know what the limitation is against, you therefore know what the program is looking for in a target to make it affected by the limitation program.

the reason you don't have to do any further searching is that once you see the limitation option and identify what it's limiting against, you *already* know what you need to make yourself look like to trigger the limitation option. your search was done when you analysed the target. it's not that you don't have to find the information, it's that the very means by which you discover you need the information also results in your finding the information also. if someone just tells you that a program has some kind of limitation option, that isn't enough, you need to analyse it (presumably you could also receive the information from someone else analysing it also, though that isn't explicit)
Rotbart van Dainig
QUOTE (Jaid @ Sep 4 2008, 07:53 PM) *
in spoofing lifestyles, there is no target. you're doing the exact same spoof, you're just doing a whole heck of a lot more of it if you want higher lifestyles. there is nothing to indicate you're hitting higher security targets, you're just hitting the same level of security more often.

No, the description at the lower end indicates that you target different levels of security. And that's perfectly plausible for an increased threshold - you need to specify what kind of lifestyle you want, first.
Honestly, believing that getting a high or luxurious lifestyle doesn't involve more secure verification systems than getting a low or middle one is not an assumption you should entertain.
QUOTE (Jaid @ Sep 4 2008, 07:53 PM) *
given you can see the limitation, and you know what the limitation is against, you therefore know what the program is looking for in a target to make it affected by the limitation program.

If you succeed in the Matrix Perception test, you get the exact nature of the limitation and can directly feed it the desired result with Spoof.
But your argument was that you need to find hte desired result first through some kind of search.
Jaid
QUOTE (Rotbart van Dainig @ Sep 4 2008, 01:37 PM) *
If you succeed in the Matrix Perception test, you get the exact nature of the limitation and can directly feed it the desired result with Spoof.
But your argument was that you need to find hte desired result first through some kind of search.

i don't think that was ever my argument. my argument *was* that you can't spoof an individual program (though, courtesy of a definition which i suspect the author in unwired wasn't particularly thinking of, individual programs are considered part of a persona and would by RAW be covered under anything that effects the persona, i suppose).

and i still don't see anything to indicate tougher security for higher lifestyles. at the very least, there's nothing anywhere near the scale of what you'd face trying to get into a node that has anything to do with the sales/service of what is essentially milspec gear. and i also don't see anywhere that it says you are spoofing a luxury lifestyle to give you a luxury lifestyle for free. you'd have to be moving on a daily basis, because it's not going to be long before someone notices that you're throwing around 3,000 nuyen worth a day without paying that in real money. the only plausible explanation i can offer is that you're spoofing yourself to be someone else, and that your lifestyle is being paid by someone who doesn't make a habit of keeping a record of what their bank balance should be.
Rotbart van Dainig
QUOTE (Jaid @ Sep 5 2008, 08:18 AM) *
and i still don't see anything to indicate tougher security for higher lifestyles. at the very least, there's nothing anywhere near the scale of what you'd face trying to get into a node that has anything to do with the sales/service of what is essentially milspec gear.

Noone is talking about Rating 7.
QUOTE (Jaid @ Sep 5 2008, 08:18 AM) *
and i also don't see anywhere that it says you are spoofing a luxury lifestyle to give you a luxury lifestyle for free.

Actually, that's the whole point of it. wink.gif
Per RC, you can spoof individual categories.
Jaid
QUOTE (Rotbart van Dainig @ Sep 5 2008, 03:35 AM) *
Noone is talking about Rating 7.

milspec gear is by default rating 5 actually. rating 7 isn't milspec, it's prototype stuff that is beyond the cutting edge, which militaries don't have.

so if you're trying to get yourself rating 5 or 6 software patches, you're going up against a place that is offering military-grade hacking programs.
Aaron
I think military devices are Rating 5, and military nodes tend to be Rating 7+. So your military-issue drone is going to be Rating 5, but the node that is coordinating that drone's unit could be Rating 7. Does that make sense?
Rotbart van Dainig
QUOTE (Jaid @ Sep 7 2008, 10:10 PM) *
rating 7 isn't milspec, it's prototype stuff that is beyond the cutting edge, which militaries don't have.

You might to want to read the title of the black box on p. 112 of Unwired, then. wink.gif
Jaid
QUOTE (Rotbart van Dainig @ Sep 7 2008, 04:19 PM) *
You might to want to read the title of the black box on p. 112 of Unwired, then. wink.gif

perhaps you should read the information inside the black box then, which says that those aren't distributed to just anyone, they are given to special operatives, and are not handed out to the military at large. the sample spiders on page 68-69 do not include any programs of rating 7 anywhere. the matrix support specialist, who is unique in that he has *any* rating 6 programs at all, and even has 1 each at ratings 3 and 4, has the following in their description:
QUOTE
military Matrix specialists cover military operations from the lowliest commando squad all the way up to the largest division.


if the military is mostly using rating 5-6 software, and other hackers are not, then rating 5-6 software is milspec gear.
Rotbart van Dainig
QUOTE (Jaid @ Sep 8 2008, 04:43 AM) *
perhaps you should read the information inside the black box then, which says that those aren't distributed to just anyone, they are given to special operatives, and are not handed out to the military at large.

But that's what SR4 calls milspec software. It even say so in the black box.
Don't blame me if you use the wrong terms.
QUOTE (Jaid @ Sep 8 2008, 04:43 AM) *
if the military is mostly using rating 5-6 software, and other hackers are not, then rating 5-6 software is milspec gear.

Programs up to rating 6 are generally available, and most hackers will use them if the got the hardware to do so.
QUOTE (Jaid @ Sep 8 2008, 04:43 AM) *
the matrix support specialist, who is unique in that he has *any* rating 6 programs at all, and even has 1 each at ratings 3 and 4

Which is pretty much silly, given the rules... but hey.
Jaid
well then, if you're just going to choose to be impossible to have a reasonable discussion with, then i guess i'm gonna just stop wasting my time.
Tarantula
QUOTE (Jaid @ Sep 8 2008, 11:53 AM) *
well then, if you're just going to choose to be impossible to have a reasonable discussion with, then i guess i'm gonna just stop wasting my time.


Just because the military is using the programs, doesn't make them "mil-spec". Just because the military uses a fancy GPS watch, doesn't mean they're the only ones who can get/use it (What i consider to be the definition of mil-spec).

Since its obvious most any hacker could get rating 4-6 programs, and only the military has the ability to have 7+ programs, then 7+ is milspec, while 4-6 is typically what they use due to costs.
Jaid
so what you're saying is that only missile launchers that fire ICBMs (the 'launchers' being 'silos') are milspec, and anything less (no matter how restricted it may be) is not milspec because there's something bigger out there?

sorry, no, that doesn't work for me.

the kind of people who are busting out rating 5 and 6 programs are also the kinds of people with skill ratings at 5 and 6. we can tell that by looking at the sample spiders. rating 5 and 6 hacking programs are *not* commonly available. they are a forbidden item, and the fact that most PC hackers have programs at rating 5 or 6 is a testament to the fact that they are extremely skilled hackers with high-end gear and programs to run it. even the megas don't typically use those kinds of programs except for their most skilled personnel, which are basically their own militaries. just because rating 7 programs are military grade doesn't mean that rating 6 is not.
Tarantula
I don't call an ak-47 milspec. Plenty of people have 'em. I would call a tank milspec because mostly only militaries have them. I wouldn't call a rating 6 program that quite a few people have milspec. I would call a rating 7 program only militaries have milspec.

Just because its illegal doesn't mean its milspec, what matters if the military has it, and how common it is outside of the military.
Jaid
QUOTE (Tarantula @ Sep 8 2008, 03:43 PM) *
Just because its illegal doesn't mean its milspec, what matters if the military has it, and how common it is outside of the military.

and as i just showed by pointing to the sample spiders lists earlier, not very many people have rating 5 and 6 programs. the kind of people who *do* have rating 5 and 6 programs are described as being military. now they may be in the military of a megacorp, or in the military of a nation, but these programs are *not* common, and not many people have them, just like wired reflexes 2 (or synaptic boosters 2) are not common even though there is better stuff out there, but that doesn't mean that everyone and their dog has wired 2, and it likewise doesn't mean that you're going to run into a lot of rating 5-6 hacking programs. they don't compare with an AK-47, they compare with with a Mossberg AM-CMDT shotgun, except they're more expensive per program than the shotgun, and they require additional high availability, expensive gear to even use those programs, never mind running an entire suite of them.
Rotbart van Dainig
QUOTE (Jaid @ Sep 8 2008, 10:04 PM) *
and as i just showed by pointing to the sample spiders lists earlier, not very many people have rating 5 and 6 programs.

No, you didn't.
In fact, using samples, you can't.
QUOTE (Jaid @ Sep 8 2008, 10:04 PM) *
the kind of people who *do* have rating 5 and 6 programs are described as being military.

So the hightech watch is offlimits to everyone else?
Falconer
On the SOTA bits and skillsofts... I don't see a problem at all w/ them degrading. The code might not be changing but the body they're running in certainly is! Think of it this way... the users getting old, his muscles are constantly changing (either getting bigger w/ use or atrophying w/ neglect), his reaction times aren't as good as they were when he was young and had them installed.

Think of it as a monthly tune-up as the software takes accounting of the system it's run in. Contacts the skillsoft company which then runs it through its own expert system which isn't in the program the player has. With the new 'tweaked, customized, or optomized' settings the activesoft can continue to work up to it's rating.

Frankly I liked the bits about highly cybered individuals needing regular maintenance and such in prior editions. There's an up front cost to get the gear then an ongoing cost to keep it going. Same goes for things like aircraft and vehicles... it costs nuyen to keep those things flying and maintained. I don't see why it's so objectionable to have a figure of... I have 25,000nuyen of bought software... I have 10000 more of hacking utilities which I spend 1000 a month to keep up to date and unregistered to me.
Cain
A program with a rating of 7+ is effectively useless, or at least no better than a rating 6 program. There's no way to get a Response of 7+, and you can't have a System higher than your Response. You could try the nexi rules, but that'd be very limited in application.
Rotbart van Dainig
QUOTE (Falconer @ Sep 9 2008, 06:28 AM) *
On the SOTA bits and skillsofts... I don't see a problem at all w/ them degrading. The code might not be changing but the body they're running in certainly is!

Not in a month timeframe. Years, perhaps.

But the point is moot, anyway - normal Skillsofts are not customized to the user in any way.
QUOTE (Cain @ Sep 9 2008, 08:21 AM) *
A program with a rating of 7+ is effectively useless, or at least no better than a rating 6 program.

With the Optimization option 3, it runs on a System 4 with full rating.
QUOTE (Cain @ Sep 9 2008, 08:21 AM) *
There's no way to get a Response of 7+

Sure there is, it's even in the main book.
Jaid
QUOTE (Rotbart van Dainig @ Sep 8 2008, 03:25 PM) *
No, you didn't.
In fact, using samples, you can't.


so pointing out that only extremely skilled specialists are assumed to have these high rating programs when the megas are able to basically hand them out to their own hackers for no cost beyond initial production doesn't show that these programs are, in fact, rare? if the best of the best corp hackers, who could logically have no limits whatsoever on what programs they are able to use, are even using rating 5 programs at all, then rating 6 programs must be pretty special.
Rotbart van Dainig
QUOTE (Jaid @ Sep 9 2008, 06:38 PM) *
if the best of the best corp hackers, who could logically have no limits whatsoever on what programs they are able to use, are even using rating 5 programs at all, then rating 6 programs must be pretty special.

Or you are reading way too much into a sample.
Cain
QUOTE
Sure there is, it's even in the main book.

Main book only goes to Response 6. Response 7 isn't even mentioned, IIRC; there are rules for getting a System and Firewall of 7+, but not hardware.
Tarantula
SR4, 212, "Some cutting-edge and prototype models may exceed rating 6 attributes, but these are exceptionally rare and hard to come by."

So yes, they do exist by RAW.
HappyDaze
QUOTE
I would call a rating 7 program only militaries have milspec.

The idea that the military has the best programs seems off to me.
Sure, they *would* have access, but not exclusive access. That's like the idea of milspec drawings. It's very hard to control the development and distribution of programs that can be made with virtually no materials and access to whatever computers the hightly skilled programmer can find - it's not at all like building a MBT in your garage. Once you've made the program, you can distribute copies making it available to less skilled users, and that's going to be hard to stop.
Earlydawn
I don't think milspec would be cutting edge, considering budgets 'n all. If anything, the megas are withholding the good stuff from sale until they cook something better..
HappyDaze
If you stay true to the cyberpunk genre, the best programs are in the hands of indepenmdent hackers that cook them up themselves. Later, when they've got something new and better, they might sell-off their old programs to the streets.
Cain
QUOTE (Tarantula @ Sep 9 2008, 12:19 PM) *
SR4, 212, "Some cutting-edge and prototype models may exceed rating 6 attributes, but these are exceptionally rare and hard to come by."

So yes, they do exist by RAW.

With no prices and no availability, they're just fluff, not an actual item. So, that rating 7 program isn't going to be useful until they come up with rules for getting a Response 7 commlink.
Rotbart van Dainig
QUOTE (Cain @ Sep 10 2008, 03:55 AM) *
With no prices and no availability, they're just fluff, not an actual item.

Given that rationale, so are rating 7 programs. What's your point, then?
Cain
They actually give availability for Rating 7 programs. In fact, the rules allow you to write your own program with a rating of 6+. The problem is, holding out a rating 7 program as some sort of holy item doesn't work-- you'll never be able to run it, unless the GM decides to hand you a Response 7 commlink.
Rotbart van Dainig
QUOTE (Cain @ Sep 10 2008, 09:44 AM) *
They actually give availability for Rating 7 programs.

In fact, they don't.
QUOTE (Cain @ Sep 10 2008, 09:44 AM) *
In fact, the rules allow you to write your own program with a rating of 6+.

These rules allow you to build your own Response 7, too.
Cain
QUOTE (Rotbart van Dainig @ Sep 10 2008, 12:57 AM) *
These rules allow you to build your own Response 7, too.

Unfortunately, they don't. The necessary cost chart stops at Rating 6.
Rotbart van Dainig
That doesn't mean it's not possible.
Cain
QUOTE (Rotbart van Dainig @ Sep 10 2008, 02:58 AM) *
That doesn't mean it's not possible.

Anything's *possible*. The GM can hand out Response 30 MacGuffins if he felt like it. That doesn't mean they're going to be available to PC's anytime soon, or that rules exist for building Response 30 MacGuffins.
TonkaTuff
Why can't you just optimize those high-rating programs? Just one level of Optimization would be enough to let you run a rating 7 utility on a System 6 device at rating 7. The description for that program option doesn't mention it being subject to the Max: Rating->System->Response rule non-Optimized software is subject to (though, admittedly, it also doesn't say it's exempt), and, in fact, would seem to be largely pointless if it were (who would load 4GB of memory to run Win3.1 and then try to play Spore?). Adding Optimization only costs the developers time, so it seems a no-brainer addition if you want to produce high-rating software in a world where the equivalent hardware is so exceedingly rare.

Or was this explained away on one of the twenty-odd earlier pages of this thread that I haven't slogged through?
Rotbart van Dainig
QUOTE (TonkaTuff @ Sep 11 2008, 07:11 AM) *
Or was this explained away on one of the twenty-odd earlier pages of this thread that I haven't slogged through?

Sure.
QUOTE (Rotbart van Dainig @ Sep 9 2008, 10:27 AM) *
With the Optimization option 3, it runs on a System 4 with full rating.

But hey, don't let the facts disturb a good argument. wink.gif
Rotbart van Dainig
What are the Standard Upgrades of the Micro-Tapper Bug drone?

Special Machinery (Optical Tap) is a given, as is Walker Mode - are Gecko Tips so, too?
Killgore
VPNs/BotNets

As I understand it, you could create a Botnet full of agents for a swarm attack on someone/some node. However, the book is vague on what resources it takes to actually do this, either that or I fell off the bus.

So, if I get this right, one commlink with a rating 4 system could host 4 rating 4 agents, each with a payload of 4 programs each? Or would I need one commlink for each agent?
Also, does the botnet software count against the agents payload, or against the commlink's system maximums?

Once I establish that, lets say they are all clones of each other. If I run a spoof on them, can I have each one spoof its own access ID, so even though cloned, each has a unique ID?

I'm also a touch fuzzy on the hacking part.

Do you have to be inside a node to attack it's programs? Can you attack its programs and/or OS without having to hack in first?

What mechanics do you use in game to block out an access ID?

Sorry for the noobish questions but this complexity is surpassing my ability to contend with it as a player and a GM both. And I survived 1st Edition! Maybe I'm just getting old! LOL!

Thanks in advance!
Ryu
QUOTE
As I understand it, you could create a Botnet full of agents for a swarm attack on someone/some node. However, the book is vague on what resources it takes to actually do this, either that or I fell off the bus.

Hope it didn´t hurt! nyahnyah.gif (Sorry.)
The Botnet coordinates agents, all agents need the usual ressources. You can either mass-probe for useable nodes to exploit, or provide the hardware yourself. Since you want to maintain anonymity, the later option is somewhat dangerous.

QUOTE
So, if I get this right, one commlink with a rating 4 system could host 4 rating 4 agents, each with a payload of 4 programs each? Or would I need one commlink for each agent?

That would be 20 programs running on your comlink, so you would want to have more commlinks. You want to avoid System dropping under your Agent rating.

QUOTE
Also, does the botnet software count against the agents payload, or against the commlink's system maximums?

Each agent will have the botnet program in its payload, and the commlink will run all of them. Agent Payload 1, Commlink System load (# of agents on commlink).

QUOTE
Once I establish that, lets say they are all clones of each other. If I run a spoof on them, can I have each one spoof its own access ID, so even though cloned, each has a unique ID?

You can only do that until the Unwired errata is out. Then you´ll have to reprogram copies of your agents to have a different "native" IDs.


QUOTE
I'm also a touch fuzzy on the hacking part.

Do you have to be inside a node to attack it's programs? Can you attack its programs and/or OS without having to hack in first?

Using a program on another node requires a subscription.
This is a "lo-fi" version of our main content. To view the full version with more information, formatting and images, please click here.
Dumpshock Forums © 2001-2012