I had this epiphany of a really cool way to keep a teams network secure.
I seemed like genius but the more I try to pin down the details the further it slips away from me.
You ever get that?
So I'm hoping you guy's might be able to iron out the kinks or spot what I'm missing.
So the basic idea is this. You slave everyone's comm-link to a master owned by the hacker. Some sort of nexus might be handy. Then you load an Agent onto each of the slave nodes and a master Agent onto the master node. These Agents then create a second subscription between each slave node and the master. The master separates these into two groups, or channels, call them A and B, that each slave node connects through both of.
The intention of the Agents is to make this transparent to the nodes so that the same data travels through both channels but there is a layer of redundancy so that if one channel goes down for some reason the connection is not lost.
Then the Agents start to operate a rotating Spoofing and Encryption system. As soon as each channel is established the Master Agent encrypts it and transmits a new Access ID and Encryption Key to the Slave Agents. Every 12 seconds, on a staggered schedule, the Master Agent breaks the connection to every device on one 'channel' It then spoofs that channel to use the Access ID it already provided the Slave Agents with and waits for them to reconnect. When a channel is dropped the Slave Agents re-connect using the new Access ID and the Master Agent re-encrypts the whole channel with the Key that the Slave Agents already possess. It then transmits a new Access ID and Encryption Key over the newly secure channel and proceeds to do the same thing 6 seconds later with the other channel and so on and so on.
So long as some way to keep this transparent exists, which is where I can't seem to see the wood for the trees, this would result in a network that, once set up, communicated over two encrypted channels that never use the same Encryption Key or the same Master Access ID for more than 6 seconds and never transmit either over a channel that is not freshly encrypted. It takes a minimum of 1 combat round to decrypt a signal so by the time you break the encryption it is already too late and the channel has been closed.
This narrows hacking options down to physically jacking into a Slave Node or Cracking the Master Node.