QUOTE (Neurosis @ Jun 28 2013, 05:41 PM)

2) "Wahhhhhhhhhhhh! Hacking cyberware is not realistic! Wahhhhhhhhhhhhhh!" SHUT UP!
Oh, I'm sorry, I didn't realize you were a time traveling computer science major FROM THE FUTURE.
In that case, elves dragons wizards vampires bug spirits and shape-changing fox people would like to have A FUCKING WORD WITH YOU about "REALISM".
You forgot that you can already hack pacemakers and some other electronics we already put inside the human body

QUOTE (Fatum @ Jun 29 2013, 08:02 PM)

On a side note, is triangulation a lost art by 2075? I mean, when you have someone walk into a secure zone lit up like a new year tree with wireless transmission, detecting and pinpointing him is child's game.
Well pen-registers sorta are more art than science. Its only a child's game in the movies... I'm assuming your talking about cell phone triangulation ie pen-register which works off the two ID keys every cellular device has and you can "track" it as leaves signal range of one tower and hits the signal range of a new tower. Its not like sonar giving your an exact reading its more like Tarzan swinging from vine to vine.
QUOTE (Shinxy @ Jun 29 2013, 06:54 AM)

To anyone complaining that cyberware being hackable is a security hole that anyone with two brain cells to rub together would be able to address:
Do you use a cell phone? Do you use the internet?
You're aware that all your communications are being monitored by the NSA this very minute, right? The NSA can even track your cell phone when it's off. They can get into your email and social networking accounts at will. Shouldn't you have "addressed" that, in the same way your characters should have "addressed" their every Matrix security vulnerability?
See above for cell phones, for internet the root servers are run by the US so that is not surprising. Also I wouldn't use the word monitoring, that implies actively looking its more like recording, and frankly this happens on its own every time you hit a server, switch, router, etc. Your ISP is recording everything you do for a limited period of time which is why we have things like SSL and other encryption technologies. The news with the NSA was how long they were keeping the information for, not that it happens. Which still doesn't mean someone cant get my passwords it just means it takes longer. Security is all about being obfuscated enough that your not worth the time and effort to bother caring about whats in your TCP/IP packets. If your cell phone is actually off, it cant be tracked, but most smart phones don't actually turn off when your turn them off. Its more like they go to sleep when you turn them off. As for the email and social networking accounts, this is really complicated and has to do with hash keys, court orders, the company policy and other fun. I'm not sure I can go into that in any general way easily so I'm sure I'd break some form I signed once upon a time going into any specifics. They aren't hacking your account to get it though they just ask google, yahoo, whomever to hand over your mail.