QUOTE (hermit @ Jan 3 2015, 09:56 AM)
The problem is, in my view, that this just doesn't work out; either it is account based, so corps can register all their stuf to corp.com's account, but then there is no way this works as intended, with regards to safety, as accounts are easily spoofed ... or it is tied to biometric data
Even biometrics are being found to be less than secure, now in 2015. But the original dilemma remains: What is ownership tied to? With a SIN being "identity" in Shadowrun, surely it is a SIN.
QUOTE (hermit @ Jan 3 2015, 09:56 AM)
And even then, how does ownership transfer work, and why is it so much more complicated to spoof it than legally transfer it? Why does it on the one hand need only some software settings changed for legal ownership transfer, but hardware hacks and changes for illegal transfer? I know, they want their matrix stuf just handwaived, but this just kinda breaks my suspense of disbelief hard, and I'm not even an IT person.
I could imagine needing to change the serial number or VIN. That said, in this "everything is connected world", unless you get the VIN or serial of a device that was destroy to take the place of, now you have a device with a VIN/serial that fails a simple validity check with the manufacturer. That would be something that should set off warning bells in an extended check.
QUOTE (Mach_Ten @ Jan 3 2015, 10:52 AM)
I can't get my head around most of the IT things
For better or worse, I am very deeply involved in IT both as a technical lead in the corporate arena and at the instructional level in academia. My understanding of how corporate IT systems, especially security systems, work in both the practical and theoretical spheres impact my suspension of disbelief. That said, I can usually find a theoretical was to explain how something *might* work in the future enough to enjoy the game. Certified Cred was a great exercise in thinking about how to deal with the possibility of fake copies, for example.
QUOTE (Mach_Ten @ Jan 3 2015, 10:52 AM)
so my laptop (corporate property) has 2 factor authentication, a soft key or pass-code and a a hardwired encryption device. one is useless without the other.
Mostly, but in this case the easiest thing to do is to exploit a vulnerability at a different level, a vulnerability that allows you to bypass it, or a hack that exploits a probability vulnerability.
QUOTE (Mach_Ten @ Jan 3 2015, 10:52 AM)
How is it worded in the core rules ?
QUOTE (SR5 @ pg237)
The owner of an icon can intentionally transfer ownership to another persona in a process that takes about a minute {...} changing ownership is a high-priority action any time you steal a wireless-enabled item. You can illegally change a device’s owner with a Hardware toolkit and an Extended Hardware + Logic [Mental] (24, 1 hour) test.
Requiring a hardware toolkit implies that there is a hardware chip (or something). This still requires something for the ID on that hardware chip to match to. Anything it matches to can still be spoofed somehow. Given the rule that all encryption is irrevocable broken in Shadowrun, it cannot be something akin to certificate based authentication, which pretty much rules out anything token based.