QUOTE
in order to be on someone else's persona, they would have to be with that person's persona, being actively controlled by that persona. if they are taking orders from you, they are clearly not being actively controlled by the persona they're attached to, and therefore don't have that persona's access ID.
Not true. Your agent is autonomous, it can act separately from you even if it's running on your persona. In fact, you can easily spoof an agent on someone's persona, and get it to attack its owner.
A virus is basically an agent running on your persona, and it definitely does not need to take orders from you.
QUOTE
a VPN is not a program that modifies your subscription list. it's a list of people (or agents, in this case) which will receive communications when you send them out. if the technomancer has a host somewhere with that list, he can just subscribe to it, and it works just the same. that node could be an RFID you pulled off of your shirt that used to have instructions for washing, for all the difference it makes (and is therefore effectively free), you just need a list of who you're sending stuff to.
You are incorrect. See Unwired, p 94:
QUOTE
A virtual private network (VPN) is an unrated peer-to-peer program
that allows users to communicate and share files and information
on a less-than-simsense level, typically no
more than just another window in AR or
VR, and as such not counting as a connection
to a node in terms of subscription
lists unless they are encrypted.
that allows users to communicate and share files and information
on a less-than-simsense level, typically no
more than just another window in AR or
VR, and as such not counting as a connection
to a node in terms of subscription
lists unless they are encrypted.
And if that's not enough for you, let's look at p 100:
QUOTE
A botnet is like a specialized VPN that allows a hacker to
maintain and manage large numbers of agents (or worms) without
overloading her subscription list. The agents are loaded with a copy
of the unrated botnet program along with the rest of their payload
and loaded into separate nodes to run independently. From that
point on, the agent (or bot) counts as only a single subscriber on
your subscription list, and its active programs do not count toward
your persona’s active program limits. However, the only way to
communicate with the agent is through the botnet.
maintain and manage large numbers of agents (or worms) without
overloading her subscription list. The agents are loaded with a copy
of the unrated botnet program along with the rest of their payload
and loaded into separate nodes to run independently. From that
point on, the agent (or bot) counts as only a single subscriber on
your subscription list, and its active programs do not count toward
your persona’s active program limits. However, the only way to
communicate with the agent is through the botnet.
I underlined the relevant word. A VPN requires a program to run on your commlink, that modifies your subscription list. You need a program to run a VPN, and otaku do not use programs, they use CFs.
QUOTE
i have to say i find it odd that multiple copies of the same agent can be on the same persona, but i suppose that does expand the hacker slightly. at this point, however, the hacker still has to invest in multiple commlinks (or a nexus, or whatever) to run them all, which is going to cost money, and he's gonna have to carry around whatever it is he's got holding all these agents somewhere. due to clustering rules, he can probably even get an infinite amount of them given an infinite amount of money (which is about as relevant as infinite karma technomancers, i think you'll agree, so let's not go there, shall we?)
I agree that the infinite money thing isn't likely; however, it's cheap and easy to get 10 5/5 commlinks at chargen. Now that they can be networked, you can have a starting character with a lot of agents running on his persona. Getting even more commlinks is easy; you just take them from bodies, and network them. Granted, it won't be as easy; but you can easily reach a point where you could run a hundred agents from your commlink.
QUOTE
f course, it still isn't very useful, because the agent smith army still has all kinds of problems with stealth, subtlety, and what kind of response you're going to get to your action. it's not particularly a problem any more than the fact that you could probably hire a small gang to try and assault the corporate facility you were supposed to do a run on. sure, you could pay some gang to try to smash their way through the security, get into the secret lab, grab the prototype, and leave, but you can bet mr. J won't be happy about your solution, even if the gang somehow actually succeeds. so yes, you can *try* to hack stuff with your agent smith army, but if you do that, you probably get visited by hackers from all over the world who get called in to telecommute to nuke you. best case scenario, once your army is spotted a spider will just shut down the system, leaving you with nothing. thus, agent smith tactics make for a decently effective denial of service attack, kinda like a go-gang might make a decent distraction, but you wouldn't want to rely on your army for proper hacking anyways, just like you wouldn't send a go-gang into a secure corporate facility to steal a prototype.
I'll agree that subtlety isn't one of their strong points; but an Agent Smith army can easily overwhelm a node, taking up all its persona slots, and making it hard for opposing deckers to get in. Sending in massive amounts of IC doesn't help, as you'll rapidly overwhelm your node's processing power, and drop their Response to 0. In other words, it's still a highly-effective tactic. Like all tactics, there's a time and a place to use them; but they're still quite useful for a lot of hacking attempts.