Help - Search - Members - Calendar
Full Version: Run and Gun "Preview" #1
Dumpshock Forums > Discussion > Shadowrun
Pages: 1, 2, 3, 4, 5, 6, 7, 8, 9, 10
Jaid
QUOTE (pragma @ Mar 8 2014, 03:33 AM) *
Thanks for the perspective. I believe the situation I'm concerned about is covered by your discussion above. Wearing my security designer hat, I want to put a camera on the outside of a building in order to spot potential intruders. I don't want to pay a tremendously expensive professional like a decker to protect it all the time, so I'd like to slave it to a host. (This gains the additional benefit that an on call decker can show up to defend the host from anywhere in the matrix.) However, if I do so, then anyone within 100 meters of the building can get marks on my host, and one mark is all it takes for my precious paydata to leak out the walls without anyone stepping into line of sight of the camera.

OK, so the fix is that I have a separate security host and paydata host. However, this still isn't perfect; my entire security can be compromised by anyone standing within 100 meters of my building. I can put up a fence 200 meters away, and pay lots of people and dogs to wander around at night. However, this makes building any facility with even a modicum of security and technial sophistication really, really expensive. Hosts just don't make sense in many situations; even in the heavily secured facility I described above I'd be really hesitant to use a setup which could lose entire zones of security at the same time. Given the choice I'd go with a network of on-site security spiders every time. That's a shame because I think having an asymmetry in hacking stationary, mildly hardened targets is cool and it really improves the verisimilitude of the world if there exists any way to secure data.

In summary, I agree with your assertion that "the security risk only exists for devices that are slaved to the host, but not physically secured," but I think the standard for physically secured is ridiculously high. Physically secured in this context means there is no way for an unauthorized human to stand within 100m of a slaved device at any time. Because of that, and the inability to localize failures, I have difficulty seeing why anyone would ever install a host.

Also, the rest of your statements raise a few questions for me.
    * What's the difference between being attached to a host and slaved to a host? The only network relationships described in the book (to my knowledge) are master/slave relationships.
    * I think the errata changed the wording of hosts and IC such that IC share marks on you, but you have to mark each piece of IC individually.



100 meters is not direct connection. direct connection is you, sitting there, with a cable running from your cyberdeck directly to the camera.

from 100 meters away, you can detect the camera and hack it, but it still enjoys all the benefits of being slaved to the host, which typically means that it would be just as easy to find the host itself and hack into it. the only benefit to hacking the camera from 100 meters away is that if you manage to beat the host's dice pools, you will have a mark on both the camera and the host, whereas if you beat the host's dicepools while hacking the host itself you will only have a mark on the host. of course, once you've gotten into the host, getting a mark on the camera as well generally becomes pretty easy, but you still had to go up against the host's defences and win either way.

edit: oh, and as far as the errata... that is incredibly confusing. before the errata, i knew exactly what it did. now, i read that and the sentence looks incomplete... i think it needs to actually specify what is being marked.
AccessControl
QUOTE (Jaid @ Mar 8 2014, 12:35 PM) *
edit: oh, and as far as the errata... that is incredibly confusing. before the errata, i knew exactly what it did. now, i read that and the sentence looks incomplete... i think it needs to actually specify what is being marked.


The errata changes it so that if the host or one piece of the host's IC marks you, that mark is shared between the host and all the IC running on that host so any of them can use it for the purposes of attacks or other Matrix actions that require marks.
Draco18s
QUOTE (AccessControl @ Mar 10 2014, 09:47 AM) *
The errata changes it so that if the host or one piece of the host's IC marks you, that mark is shared between the host and all the IC running on that host so any of them can use it for the purposes of attacks or other Matrix actions that require marks, rather than the hacker gaining marks on an entire network based on getting marks on a single device.


FTFY.

You forgot the secondary effect.

Which definitely makes a host more secure than not-a-host, but that's an ancillary problem as far as I'm concerned.
Jaid
that doesn't change anything about multi-device networks. at present, they must be slave and master setups. getting a mark on a slave still gets you a mark on the master, getting a mark on the master still doesn't get you anything on any other device.

the only difference is that now, getting a mark on the host doesn't give you a mark on IC running on the host, or vice versa. or at least, that's probably what it's supposed to say, based on what they changed it from. at present, the verb "marks" in the errata does not specify what is getting marked; the IC or an icon marked by the IC. the original version at least was quite clear on what got the marks, the new version i suspect was meant to be that the IC marks something and all IC (as well as the host itself) get a mark on that target... but i say that on the basis that they changed the old and perfectly clear rule from a system where marking one IC got marks on all.

on a side note, this rule is also pretty much a disaster. if you cannot remove all of the marks on yourself from all IC and the host, at the same time, the marks will simply repopulate, as written.
pragma
Yeah, you make a good point Jaid. I'd missed that reading entirely. I suspect the double errata'd rule should contain a sentence like:

"All IC is considered to have a number of marks on the target equal to the number the host has on a target. Any time IC would gain a mark on a target, instead the host gains a mark on the target."

This way you don't have multiple, mutually unshakable marks on the persona and everything is routed through the host as you might expect it to be.
This is a "lo-fi" version of our main content. To view the full version with more information, formatting and images, please click here.
Dumpshock Forums © 2001-2012