QUOTE (Rotbart van Dainig @ Jul 1 2008, 07:24 AM)
Actually, a datajack is a security nightmare. It gives everyone plug-in access to your brain and implants... than can even superseede DNI.
It can't supersede a DNI because it
is a DNI. But the big problem with 4th edition Shadowrun tech is that anyone can turn on a set of trodes or even some nanite dust and get direct access to their brain and implants. Instantaneously, with no implants or anything on your end at all. As Unwired said, it's not Plug and Play anymore, it's just
Play. So basically you're in a security nightmare all the time where
anyone can get access to the brain and implants of
anyone at
any time.
Getting security of any sort in a world with that kind of technology is a headache and requires a fair reserve of handwavium. The Unwired solution is to say that Trodes and such only work when "you" turn them on "yourself" - which is very gamist logic. The idea is basically that you have to sign the Devil's contract before you can be afflicted by the black magic of the Matrix. Personally, I find that completely unsatisfactory. I'm going for something more like this draft section:
---
Hacking in a World of Perfect Encryption“
We estimate that we can crack this faster by waiting a few years for comuters to become faster and then starting the project on the new generation of machines.�
Cryptography is a complex thing. But an immutable fact of it is that if you are handed a set of data that has been scrambled by a non-repeating transformation of comparable size, that you
cannot decipher it. Not “it's really hard to decipher� or “It'll take you a long time to decipher that� but that in fact you simply can't do it at all. So anyone with sufficient time on their hands and dedication to cryptographic secrecy
can make a system that cannot be decrypted under any circumstances. It's called a one-time pad, and while resource intensive it is actually unbreakable. But people generally don't really
need codes that can't be broken
ever, most people will settle for codes that cannot be broken any time in the next hundred million years. That's the kind of time frame that even the extremely long lived are generally willing to concede that their secrets of today won't matter much once it has passed.
So while it is entirely within everyone's capacity to go out into the street, turn the microphone on super high and record random discordant noise for an hour, then download that hour into their drone as an exceedingly long cypher to get an hour of unbreakably encrypted communications between themselves and their drone – the vast majority of people are willing to accept a less intensive system where their communications are merely
unlikely to be decrypted before the sun peters out.
Most secure communications use Essentially Unbreakable Encryption (EUE), a system where the sender and the intended recipient both have a cypher that is overlain on the messages and subsequently removed. The keys used in the 2070s are of variable length, but generally are thousands of bits long, and cannot be expected to be broken by any sort of mathematical attack. In order to attain such levels of security the cypher itself must have been shared at some earlier point between the intended sender and receiver, and it can of course be stolen either during the hand off or at any time that anyone has direct access to any of the computers which store the cypher itself. After all, EUE doesn't make the message completely illegible to anyone but the intended recipient; it makes the message completely unintelligible to anyone who doesn't have the key –
not the same thing once espionage comes into the equation.
Vaguely Decent Protection: Asymmetric Encryption“
The algorithms required to decrypt these things are illegal, so no one has them.�
Sending a message of any kind through EUE requires that both the sender and the receiver have a copy of the key. But what if you
don't have a prearranged key, how can you communicate with any privacy? The answer is Asymmetric Encryption. Here's how it works: There are a set of mathematical transformations based on one number that are really hard to undo
unless you happen to know a specific second number. So your Commcode gives out the first number to anyone who wants it, and then people can send transformed (and thus encrypted) data
to you and since you have the magic second number you can reverse those changes very easily.
You can also do this in the reverse order, transforming your message with the secret number and letting the receivers of the message decrypt it with the publicly available number. While this is a fairly useless way to keep information secret, it makes a fairly decent digital signature – in that whoever sent the encrypted message must have known your personal secret number. This is the core of how every Access ID in the Matrix is verified.
Protecting Unencrypted Data: Using Your Inside Voice“
You actually are the weakest link.�
No matter how sweet your encryption is, everyone's brain runs on pretty much the same codes. When each data packet is sent to a metahuman brain, that data is essentially unencrypted. Anyone who can “hear� that transmission can read it. Worse, if someone hears the transmission in brain text and they also had a recording of the encrypted version, they can make a Rosetta stone to decrypt all the rest of your data, which makes all your base belong to them. So it is of no surprise that people in the 2070s attempt to make the actual communications between their brain and the rest of their network be as “quiet� as possible, which is why people use Datajacks, Internal Commlinks, and Trodes. The first two have a directly wired (and shielded) connection between themselves and the brain, while as the last option is merely at very low signal strength and very close to the intended recipient. In any case, these methods of data transfer are very difficult to listen in to, and people generally feel relatively safe sending brain formatted information into their own heads by these means.
Now no data transfer mechanism is truly 100% safe: unscrupulous men
can get microtranceivers very close to your trode set and rebroadcast the precious unencrypted information to their own networks. They
can compromise the physical hardware of the datajack or the trode net. And so it is that over and above having relatively secure direct neural interfaces, the truly security conscious will endeavor to conduct import communications from the sanctity of rooms that have been cleared of bugs and at special times and places that hopefully opposing spies won't know about – cloak and dagger stuff that has been going on for literally thousands of years and shows no signs of stopping at any time in the future.
-Frank