NEWS

OOC Auburn: Logrolling

  • 814 Replies
  • 187728 Views

MaxKojote

  • *
  • Omae
  • ***
  • Posts: 556
« Reply #720 on: <11-24-13/0803:41> »
@Sichr: Matrix Perception isn't an opposed test. I have to hit a threshold of the stealth program that they might be running. Net hits provide information.
Spoken
Thoughts
Matrix
Astral

Fang (Auburn Logrolling)

Sichr

  • *
  • Prime Runner
  • *****
  • Posts: 7202
  • TOTÁLNÍ FAŠÍRKA ZMRDI !!!
« Reply #721 on: <11-24-13/1226:05> »
In fact no. p.228
Rolling Firewall+Stealth as oposite dicepool

Trust me...I hate that, since yesterday I was rolling for the same thing you are, and after four "Try again" attempts I was foced to give up...I know the node is thee due to successfull Scan for hidden nodes, well I am unable to get any info about it, I dont even know its AcessID to be able to hack it. Ill have to find another way...

MaxKojote

  • *
  • Omae
  • ***
  • Posts: 556
« Reply #722 on: <11-24-13/1835:41> »
I stand corrected. In fact I think this is the first time I've done a Matrix Perception Test on anything with Stealth. Learn something new every day.

However you don't need an AccessID to hack something (you pretty much trick the node into thinking you provided it when you hack). Heck, you don't even need to do an MPT to hack something, it's just a bad idea if you don't because it might have a data bomb. And of course you can't hack it if it is encrypted.
Spoken
Thoughts
Matrix
Astral

Fang (Auburn Logrolling)

Sichr

  • *
  • Prime Runner
  • *****
  • Posts: 7202
  • TOTÁLNÍ FAŠÍRKA ZMRDI !!!
« Reply #723 on: <11-25-13/0220:17> »
Imo you need node accessid to attempt to hack it, since ypu need to target your exploit on something. Just the knowledge of existence of the node is not enought, as imo hacking attempt must be much better adressed. You are not aware of possible encryption, firewall version, datamines, ic and anything else. Idn. But maybe the acessid is provided by scan so you can give it a try? Give me today ill need to consult rules and maybe forums also for the answer.

Ren

  • *
  • Ace Runner
  • ****
  • Posts: 1364
« Reply #724 on: <11-25-13/0448:50> »
IMO if you are in mutual Signal range of a node, you don’t need its access ID to hack it, only if you are doing it from afar. Even if you do, one of the options of matrix perception is to get the access ID.

@Farothel: almost forgot your question, Bulldog’s Infiltration skill rating is 3.
"Speech", Matrix, >>Text<<, Thoughts, Astral
Bulldog
Stake

Sichr

  • *
  • Prime Runner
  • *****
  • Posts: 7202
  • TOTÁLNÍ FAŠÍRKA ZMRDI !!!
« Reply #725 on: <11-25-13/0638:35> »
Right. And imo aid knowledge is prerequisite to exploit. Thats why it makes sense to run stealth. But ill have to check this in rules

Sichr

  • *
  • Prime Runner
  • *****
  • Posts: 7202
  • TOTÁLNÍ FAŠÍRKA ZMRDI !!!
« Reply #726 on: <11-25-13/1408:41> »
OK.

If you garner no net hits, the target is not invisible as such, but its icon has melded
into the background of data traffic, escaping your notice.


I would rule that if you have no net hits in this case, you are not able to target the iton/node and not able to run exploit against it. Well. Since you have 1 net hit from your retry attempt you are free to do anything you like.

MaxKojote

  • *
  • Omae
  • ***
  • Posts: 556
« Reply #727 on: <11-25-13/1639:02> »
Incidentally for  future reference on AccessIDs...

Quote from: SR4A P225
In order to allow you access to anything beyond a public account, the
node must be given three things. The first is your access ID, which
is automatically given when you log on. Second, the node must have
your access ID associated with an access level/account privileges (for
example, your soycaf dispenser will have your access ID on a list that
shows that you have an admin account on its node); this is called authorization. Third, you must have some way of proving you are the
person who has the authorization in question; this is authentication.

Nutshell: It's something you provide, not that you get. However you would be correct on how Stealth works in this case. Just a bit of side info for future reference, it's mostly moot here.
Spoken
Thoughts
Matrix
Astral

Fang (Auburn Logrolling)

Sichr

  • *
  • Prime Runner
  • *****
  • Posts: 7202
  • TOTÁLNÍ FAŠÍRKA ZMRDI !!!
« Reply #728 on: <11-25-13/2328:01> »
Its like IP adress imo. You cannot connect just to something in the aid. On the othher side afaik linked xevices doesnt have aid so you are probably right, since drones are still hackable. Lets just say for the future that you need at least 1 net hit o  perception to be able to hack the node.

MaxKojote

  • *
  • Omae
  • ***
  • Posts: 556
« Reply #729 on: <11-26-13/0431:56> »
Incidentally, you're looking at it as you would having to go through the entire matrix to do so, which is the basis of occasionally needing Data Search+Browse to find the node which is the equivalent of tracking down the ip address over the incredibly poorly-secured internet of SR4 (hence the crackdown between SR4 and SR5 which only really kicked out the program rating system and introduced GOD as an actual meaningful entity). For Mutual  Signal Range (MSR)... Consider how Bluetooth technology works currently. MSR seems to be taken from a similar concept to that. The whole idea appears to have been that nothing non-technomancer is meant to be unhackable unless it's encrypted, the benefit being that hackers won't sit around bored because they couldn't get a hit on their perception (poor luck) or they were silly and didn't get Analyze (and are thus very silly).

Just a bit of (hopefully) helpful info. Not arguing rules, because otherwise I'm pretty sure I've been handling Encryption wrong the entire time for the sake of brevity. (I think you're supposed to Decrypt, THEN Analyze as Encryption prevents you doing anything to the node, but that takes a bit long in PBP as then it'd have to be Decrypt, response, Analyze, response, possibly remove data bombs, response, then actually begin hacking. And when you consider that encryptions can have data bombs in them...).
Spoken
Thoughts
Matrix
Astral

Fang (Auburn Logrolling)

Sichr

  • *
  • Prime Runner
  • *****
  • Posts: 7202
  • TOTÁLNÍ FAŠÍRKA ZMRDI !!!
« Reply #730 on: <11-26-13/0720:11> »
Good points. Imo you need to run analyze to see the node is encrypted and before you decrypt the node, you dont get any other info. Feed for thought, and that bluetooth is good example, unless you take the devices name on the screen to be result of Analyze

farothel

  • *
  • Prime Runner
  • *****
  • Posts: 3859
« Reply #731 on: <11-28-13/0113:42> »
I'll wait until the drone stuff is done and then I think it's time to move in.  So far it's bulldog and myself, plus a spirit that has to be summoned, right?
"Magic can turn a frog into a prince. Science can turn a frog into a Ph.D. and you still have the frog you started with." Terry Pratchett
"I will not yield to evil, unless she's cute"

MaxKojote

  • *
  • Omae
  • ***
  • Posts: 556
« Reply #732 on: <11-28-13/0220:39> »
I'm not disorganised I swear! Anyway you may as well head in, no way I'm going to be able to deal with strong encryption in time. Not to mention data bombs.
Spoken
Thoughts
Matrix
Astral

Fang (Auburn Logrolling)

farothel

  • *
  • Prime Runner
  • *****
  • Posts: 3859
« Reply #733 on: <11-28-13/0407:51> »
Ok, as it's been a while since we discussed this, a quick recap.  Sichr, correct me if I'm wrong.
I roll agility + infiltration (+thermal damping).  my hits are used by Ren as extra dice when he rolls the same dicepool (to a maximum of 3).  We will go in using a gap in the drone coverage (timing it so we know how much time we have)
I roll my camera neutraliser (device rating x2, treshold 2) test to see if it detects a camera and if it does, we can use that as a hole in the camera network.  @Sichr: As visibility modifiers apply on this test, I need to know these.
I will also roll a device test for my non-linear junction detector (arsenal p59) to detect hidden cameras and other devices (max range 2metres, but it's better then nothing).  I can also use my radio-signal scanner for the same purpose, although MaxKojote has already scanned for signals.

The building then rolls their security pool, with a negative modifier because we have that concealment power active on us and a positive modifier since we want to take it over (those should nearly cancel out).

If this is correct, let me know and I'll start rolling.  I also take the rest of my B&E gear (maglock passkey, lockpick set, ...) to get in should we need any of it (I assume we will).
"Magic can turn a frog into a prince. Science can turn a frog into a Ph.D. and you still have the frog you started with." Terry Pratchett
"I will not yield to evil, unless she's cute"

Sichr

  • *
  • Prime Runner
  • *****
  • Posts: 7202
  • TOTÁLNÍ FAŠÍRKA ZMRDI !!!
« Reply #734 on: <11-28-13/0641:34> »
Thermal dampening will lower my dicepool..in fact i will use the worst of your cloaking modifiers...imo thermal dampenig is worse by 1 then chameleon, so -3, then i will add concealement power:5 and the total is -8 for my dicepool. In case vibrarion/ ultrsound or uwb sensor comes to play, I will modify my dicepool accordingly.