NEWS

Host questions

  • 10 Replies
  • 2470 Views

HarshRhettoric

  • *
  • Newb
  • *
  • Posts: 60
« on: <06-28-15/1246:13> »
So I'm gearing up to run a game and I was building hosts to confound my players. I attempted to logic my way through what a host might be like when a few questions cropped up that I could not answer.

1. Why do hosts have sleaze? Is a host smart enough to lie to a human? Heh. Maybe it could be used to upload spam or malware. But in practice for a corporate host, can I typically dump this stat?

2. Where is the matrix stored?  By that, I mean does a search agent have to search the whole matrix? Are parts of itncached? If so, where? Capacity may be nigh infinite, but bandwidth certainly isn't.

3. Suppose I wanted my own host, but I run a modest criminal organization or am an anarchist and don't want my stuff perused by a hosting company, what physical form would the hardware take? Servers? Tiny servers?

4. If my physical matrix hardware gets captured, can I build a self destruct? How common would this be?

5. If a host is captured, can I set it to physically infrared beam its data to an offline backup once a day and to fry itself if captured? That would drive my players bonkers but is what I would do if I cared about my security.

6. Archive rules sound sloppy and infallible. Why not keep everything not currently being worked on in archives? I intensely dislike this rule.

7. Can a host be attacked/bricked directly? I guess that would be like a really aggressive dos attack.

8. Can I pay to have my stuff hosted by an AAA mega behind their firewall? I guess this would subject it to perusal by said mega.

9. Are there shadow/blind hosts that will host data for a price/cause? How safe is data being transfered overseas?

10. Data on hosts can be hacked, but what if you just wanted to watch traffic coming to/from a host? Could you log it all encrypted, then break in and steal/exploit a control node to decrypt it all?

And a few more questions about the wireless world in general

11. Cyberlimbs can be used wirelessly anywhere. Are they actually accessing the matrix, or are they talking to your commlink? It seems like noise never affects smartlinks, limbs and other personal belongings.  If it's talking to the matrix, is your limb accessing an external host? That would mean it needs its own account. Can you, with sufficient knowledge of a person, lock out all of their cyberware and device accounts without ever going near them? Can you jam that host's output at its source, depriving the opposition of wireless, but leaving yours intact locally? Brutal.

That's pretty much it. I know some of this might be abstracted within the rules, but it is very likely that one of my players is a security professional and these will be his questions.
Have you ever had a dream where you were standing on a pyramid in sort-of sun god robes with a thousand naked women screaming and throwing pickles at you?

Why am I the only one that has that dream?

Jack_Spade

  • *
  • Prime Runner
  • *****
  • Posts: 6516
« Reply #1 on: <06-28-15/1306:53> »
1. Security Hosts can run silent. A high rating ensures that you don't have to deal with hackers - can't hack what you can't find

2. Everywhere. Every connected device is part of the infrastructure. That's why you don't have to deal with noise once you are inside a host. Don't try to explain it, this is a world where Elves throw fireballs and work as gogo dancers.

3. Getting a host is a lot like registering a domain: You can't do it yourself, you need to register with some fake credentials. The new matrix has no fixed servers.

4. There is no physical matrix hardware with a host. You could have a dedicated deck to run a pseudo host, but that would hardly be efficient. Data Trails does have the option to nuke files beyond recovery. A dedicated agent could enact such measures.

5. Again, a host can't be captured physically. It is possible to move all data to a matrix vault that is very hard to access.

6. Because you can't work on the stuff in the archive. That's the whole point: If you can't access them easily, no-one else can.

7. No, again, the cloud based computing ensures, that host have no single point of failure. It would be like trying to destroy mist with a katana.

8. Sure, but good luck finding a reliable hoster for your illegal business

9. Yes, and it depends: There are shadow hosts, but your data is not overseas, it's everywhere and nowhere. How safe that is depends on what you are willing to pay and what your GM says.

10. Sounds like a creative use of the edit file action: A self updating file that logs all icons should be possible.

11. Complicated. Wireless only works if you are not in a dead zone. But as long as at least your commlink has a connection you are not in a dead zone, ergo you can connect to the matrix. Noise is another thing. If the noise level is higher than the device rating you can't get wireless.
Sadly, the game did not distinguish clearly between the different sources of noise (distance, spam/jamming), but it is implied to work that way (see satellite receiver).
And no, you can't jam a host at it's source - it has none. You can jam your enemies with a jammer that you wireless enabled to exclude your gear from it's effects.
talk think matrix

To strive, to seek, to find and not to yield
Revenant Kynos Isaint Rex

HarshRhettoric

  • *
  • Newb
  • *
  • Posts: 60
« Reply #2 on: <06-28-15/1319:45> »
This everywhere cloud bothers me, as does the hosts exist nowhere idea. Hardware must exist somewhere to index all of this insanity. How does, for example, a host running illegal pornography, get to exist if it has to be registered somewhere? The idea of this ephemral, shapeless mass of data that flows and moves with the tides of information seems to fly in the face of not having a centralized index architecture. How does anything knkw where anything is without an address? Is there a central authority for addresses? The megas? Does that mean they can seize or cache anything that happens to be hosted by them?

I am also uncomfortable with a little bit of the matrix being stored on every device. I feel like each host must exist on hardware somewhere. Ahh well. Can't wait to explain this.
Have you ever had a dream where you were standing on a pyramid in sort-of sun god robes with a thousand naked women screaming and throwing pickles at you?

Why am I the only one that has that dream?

Triskavanski

  • *
  • Ace Runner
  • ****
  • Posts: 2249
« Reply #3 on: <06-28-15/1333:17> »
A theory I have, and have seen thrown around..

the Matrix is Magic. but like a corrupted form of magic, like Blood or Toxic magic. Cept, well, it didn't go evil, fairly obviously.

So like when you're going on things like Deep runs, you're actually astrally projected into the Astral realms, but like I said, a place with such a high background count that normal magic no longer is functional.

With Magic, all the things that are living create bits and pieces of the astral side, but when you get into space, due to the lack of anything there alive, Astral perception and Astral Projection will cause you to go absolutely mad. Replace Living things with Electronic Devices and Astral side with Matrix. And you get about the same deal. Except if you try to matrix perception or go into VR, you don't go insane, you just can't do it if there is no electronic devices around.
Concepts are great, but implementation sucks. Why not improve it?

Triskavanski's House Rules

Moonshine Fox

  • *
  • Omae
  • ***
  • Posts: 589
  • Proudly serving our dragon overlords
« Reply #4 on: <06-28-15/1546:07> »
First thing I'll say is get your hands on a copy of Data Trails if you haven't yet. That book goes into awesome detail as to just what the Matrix, hosts, and such are and how they work.


So I'm gearing up to run a game and I was building hosts to confound my players. I attempted to logic my way through what a host might be like when a few questions cropped up that I could not answer.

1. Why do hosts have sleaze? Is a host smart enough to lie to a human? Heh. Maybe it could be used to upload spam or malware. But in practice for a corporate host, can I typically dump this stat?

Because hosts can run in silent mode. Also, any file that is hidden on the host would probably use it's sleaze rating to stay unnoticed.

2. Where is the matrix stored?  By that, I mean does a search agent have to search the whole matrix? Are parts of itncached? If so, where? Capacity may be nigh infinite, but bandwidth certainly isn't.

Bandwidth in the wireless world is almost infinite. The two ways to signify to much traffic in an area is with noise, which also is used to represent lag from distance or signal blocking material, or being in a spam zone (which I think is in Data Trails). The information itself is stored everywhere, and nowhere. Every device in the world has large storage capacity and works on a distributed computing model. While your commlink is in your pocket not doing much, some of it's storage and processing ability is being used by hosts around you. Now that data is linked to that host so you can't just open up a file directory and see what's there.

3. Suppose I wanted my own host, but I run a modest criminal organization or am an anarchist and don't want my stuff perused by a hosting company, what physical form would the hardware take? Servers? Tiny servers?

You would register a host under fake credentials. I'd imagine few host making sites would be able to (legally) look at what's in someones host, especially since once a host is made you, not them, have ownership of the host with all the root access command that implies. Though if you get caught doing something illegal, I'm sure though it's not to hard to for local law enforcement get the authority to seize your files. But as stated before, there isn't such a thing as servers anymore, unless you choose to go with legacy tech, and then you're not part of the wireless matrix since the two run on different base code. Though a run to get data from an old legacy system would be a good/fun mission!

4. If my physical matrix hardware gets captured, can I build a self destruct? How common would this be?

You could probably set a host to auto-delete, even use a Nuke-From-Orbit program, but I would imagine this would be pretty rare and only used for some deep-dark stuff.

5. If a host is captured, can I set it to physically infrared beam its data to an offline backup once a day and to fry itself if captured? That would drive my players bonkers but is what I would do if I cared about my security.

Infrared?! That is so retro ;D But you can get offline storage and upload things to it. The details of how much this would cost and time are left pretty vague and up to the DM.

6. Archive rules sound sloppy and infallible. Why not keep everything not currently being worked on in archives? I intensely dislike this rule.

Probably because bringing something from or putting into the archive takes time and permissions (a full three marks) most employees won't have. Think of it as putting something in a safety deposit box in a bank vault. It's really secure, but a pain in the butt to get in and out of the vault if used everyday, especially when you have to get permission rubber-stamped by other really busy people.


7. Can a host be attacked/bricked directly? I guess that would be like a really aggressive dos attack.

Kinda, but not really. You can "attack" a host and get marks on it so you can get control of things, but you can't truly destroy a host in such a way. It's simply too......big, of a matrix presence for a decker to have that kind of affect on. That said, if you're willing to take the risk of a deep dive to the Foundation (Data Trails), you can destroy a host though there. Just fair warning, even against a small/low rating host you'll pretty much need to rank in the status of the Legendaries to pull of that righteous of a hack with your brain intact.

8. Can I pay to have my stuff hosted by an AAA mega behind their firewall? I guess this would subject it to perusal by said mega.

Maybe not the AAA's (though they probably have subsidiaries that do), but I would most definitely say that there are probably A and AA corps dedicated to secure data holding that have massive Firewall ratings and glacier thick IC. They've existed for the old Matrix, don't see why they would for the new.

9. Are there shadow/blind hosts that will host data for a price/cause? How safe is data being transfered overseas?

I'd say same as above, only rather then being a corp, it's a criminal syndicate who has ownership of the storage host. You don't really transfer data "overseas" like you do nowadays, or even with the old 'Trix. Moving from host to host is usually a fairly simple thing, though it could be intercepted while passing through whatever grid it's on between hosts. To be really secure, I'd suggest a courier for a high end firewall to hand deliver, as it were, the data.

10. Data on hosts can be hacked, but what if you just wanted to watch traffic coming to/from a host? Could you log it all encrypted, then break in and steal/exploit a control node to decrypt it all?

With the protocols GOD has in place, auto-surveillance devices don't last long. Data Trails has a program called Fly On The Wall that will let you hang around for longer without being noticed. You're generally limited on the time that you can keep an eye on things like that, though a cunning decker could still pull it off.

And a few more questions about the wireless world in general

11. Cyberlimbs can be used wirelessly anywhere. Are they actually accessing the matrix, or are they talking to your commlink? It seems like noise never affects smartlinks, limbs and other personal belongings.  If it's talking to the matrix, is your limb accessing an external host? That would mean it needs its own account. Can you, with sufficient knowledge of a person, lock out all of their cyberware and device accounts without ever going near them? Can you jam that host's output at its source, depriving the opposition of wireless, but leaving yours intact locally? Brutal.

That's pretty much it. I know some of this might be abstracted within the rules, but it is very likely that one of my players is a security professional and these will be his questions.

While it connects to the matrix in theory, in practice all your wireless gear interacts for you/your commlink without worry about signal noise. They talk to each other directly rather then over the grid is I think the best way to describe it. I think jammers can still kill your wireless bonus for a time, but I'm not sure and will have to look it up.

Hope all that helps!

Dal Thrax

  • *
  • Chummer
  • **
  • Posts: 109
« Reply #5 on: <06-28-15/1614:02> »
This everywhere cloud bothers me, as does the hosts exist nowhere idea. Hardware must exist somewhere to index all of this insanity. How does, for example, a host running illegal pornography, get to exist if it has to be registered somewhere? The idea of this ephemral, shapeless mass of data that flows and moves with the tides of information seems to fly in the face of not having a centralized index architecture. How does anything knkw where anything is without an address? Is there a central authority for addresses? The megas? Does that mean they can seize or cache anything that happens to be hosted by them?

I am also uncomfortable with a little bit of the matrix being stored on every device. I feel like each host must exist on hardware somewhere. Ahh well. Can't wait to explain this.

Keep in mind that this is a mess dreamed up by an insane technomancer, supported by a Great Dragon (Ghostwalker),  and put into place by megas so scared that they missed little bit like whomever grows your host gets to put an anchor in the foundation and now always has a backdoor in.  Instead of an IP address it seems to be relational.  Items near each other physically interact wirelessly in a kind of peer to peer network.  The actual computing is done in a distributed manner by borrowing computing power from devices and running hosts as a kind of virtual machine.

Yes the entire thing defies common sense.  Why do you think the AIs are trying to flee the matrix before Crash 3.0.
« Last Edit: <06-28-15/1616:38> by Dal Thrax »
Warning: most likely posting from a tablet.

Quatar

  • *
  • Omae
  • ***
  • Posts: 414
« Reply #6 on: <06-28-15/1641:11> »
A theory I have, and have seen thrown around..

the Matrix is Magic. but like a corrupted form of magic, like Blood or Toxic magic. Cept, well, it didn't go evil, fairly obviously.
Yes I like that idea. I also think technomancers are "shamans of the machine" so to speak. It being (some form of ) magic would explain so many things like technomancers, sprites and all that crap.

Of course it would be a really weird kind of magic that's so different from the "traditional stuff".

What was there first? The wolf or the Spirit of Wolf? Probably the wolf. So the machine was first, now we see the emergence of the Spirit of the Machine. Why not?

Dal Thrax

  • *
  • Chummer
  • **
  • Posts: 109
« Reply #7 on: <06-28-15/1657:54> »
Might want to google the Akashic Records if that's the route you're going.
Warning: most likely posting from a tablet.

Zweiblumen

  • *
  • Ace Runner
  • ****
  • Posts: 1803
« Reply #8 on: <06-29-15/1904:05> »
This everywhere cloud bothers me, as does the hosts exist nowhere idea. Hardware must exist somewhere to index all of this insanity. How does, for example, a host running illegal pornography, get to exist if it has to be registered somewhere? The idea of this ephemral, shapeless mass of data that flows and moves with the tides of information seems to fly in the face of not having a centralized index architecture. How does anything knkw where anything is without an address? Is there a central authority for addresses? The megas? Does that mean they can seize or cache anything that happens to be hosted by them?

I am also uncomfortable with a little bit of the matrix being stored on every device. I feel like each host must exist on hardware somewhere. Ahh well. Can't wait to explain this.

Jack_Spade summed this up nicely:
2. Everywhere. Every connected device is part of the infrastructure. That's why you don't have to deal with noise once you are inside a host. Don't try to explain it, this is a world where Elves throw fireballs and work as gogo dancers.

There are two things at play here.  1) This technology is 60 years in the future, we can't even comprehend what leaps they've made, ie: show someone from 1955 the internet today and watch thier brain explode.  2) This is a make believe world where the laws of physics have been binned.  You can assume the laws of computer science have as well.

Essentialy take everything you know about computing and throw it out the window.  None of it applies.  (Being an oldschool SysAdmin, arguably a neckbeard, this is often difficult for me ;P)
Speech, Thoughts, Comm/Text, Subvocal

HarshRhettoric

  • *
  • Newb
  • *
  • Posts: 60
« Reply #9 on: <07-01-15/0746:55> »
@Zweiblumen:
I know, but it shatters my immersion that a score of trillion nuyen megacorporations were "scared into submission" by "a mad technomancer and a dragon."  Also: I have not read data trails.

Have you ever had a dream where you were standing on a pyramid in sort-of sun god robes with a thousand naked women screaming and throwing pickles at you?

Why am I the only one that has that dream?

I_AM_ZHOUL!!!

  • *
  • Omae
  • ***
  • Posts: 659
« Reply #10 on: <07-01-15/0807:44> »
@Zweiblumen:
I know, but it shatters my immersion that a score of trillion nuyen megacorporations were "scared into submission" by "a mad technomancer and a dragon."  Also: I have not read data trails.

All I can say is that you haven't been paying attention if you think a Great Dragon shouldn't be scary! They are mythical being that came here from Mars back in the 2nd Age which is over 20,000 years ago. The really scary part when you think about it is just how weak the Great Dragons are right now because the mana count of the world is still so low. This is Dragons in straight jackets, blindfolded, gagged, & bound to a bed... in another 1,000 years when the mana levels rise they will be unimaginably powerful!