NEWS

[OOC] Missions 2 - Twist and Insult

  • 556 Replies
  • 164923 Views

Kouryuu

  • *
  • Prime Runner
  • *****
  • Posts: 2717
  • The idea is to die young as late as possible -A.M.
« Reply #270 on: <11-29-11/1204:33> »
Yes, for this reasons it is Wifi. IMO even MathSPU...since it adds its dice to Electronic Warfare tests. Nanohive Im not sure, I got Hard nanites. And IMO for the reasons youve said Hive would be Wifi capable device. Also yes, since I got smartlink and it needs wifi to comunicate with smartgun.
IMO I would have those nodes all
1) Slaved to commlink
2) Encrypted...I would think that high level encryption would be set by manufactor
3) Able to work even with commlink (master node) is down. How do we deal with this? IDN if crashing the master crashes also peripheral devices...

I dont see the point of this whole. Still, It can be fun to look for maintenance after being hit for 5P or after 3 months.

Lets get back to the streets :)
doubt they would be slaved, more like a hell of a firewall and encryption.
Prepare for the worst, hope for the best and expect nothing!
Matrix;speaking;thinking;ExternalSourcesLink
RainDragonBar

Sichr

  • *
  • Prime Runner
  • *****
  • Posts: 7202
  • TOTÁLNÍ FAŠÍRKA ZMRDI !!!
« Reply #271 on: <11-29-11/1214:48> »
since firewall depends on response, they hardly would have higher firewall than 1. Thus it is mbetter to have them slaved. On the other side, Encryption, especialy the one using Advanced encryption rules from wirteless (such as we have on our commlinks) is really hard to break in the matter of a combat turn (we have encryption with interval 6 hours to break)

snake_eyes

  • *
  • Omae
  • ***
  • Posts: 445
« Reply #272 on: <11-29-11/1620:03> »
Also if slaved, to access the device directly w/o going through the master node adds two more to the number of success required. Of course there is still that problem of mutual signal range. Mouse wouldn't want to be close enough to have to directly hack a cyberarm or skill wire set.
Theoretical question: cyberware even at signal 0 have what...about a 3ft range? Which is in mutal signal range of your com-link. That would form a mesh network and therefore would be hack-able, would it not? Even if the devices are hidden. So either slave it or not slave it, doesn't seem to make much difference, you can be hacked either way. It seems the best option for not having your cyberware hacked is to not have cyberware at all.

From the encryption standpoint: it seems to me that each device would need to run an encryption program to encrypt the data that is being transmitted back and forth. Encrypting a node would entail encrypting all the data stored in the node (which is why bio-nodes can't be encrypted since they can't store data there, but could still run an encryption program for handling team/internal data traffic) and would need the encryption program running??? for the node to decrypt it??? in order to access its own data.
« Last Edit: <11-29-11/1626:42> by snake_eyes »

Sichr

  • *
  • Prime Runner
  • *****
  • Posts: 7202
  • TOTÁLNÍ FAŠÍRKA ZMRDI !!!
« Reply #273 on: <11-29-11/1648:13> »
Advanced encryption applies only on nodes, not traffic. Still, encrypted node means you cannot access it without cryptoanalysis done, so the closest possible hack, if any of our nodes is 6 hours away. IDN what bout technos. This, and temporarily switching off the node from time to time and change AcessID...must be enought for now.

Sentinemodo

  • *
  • Prime Runner
  • *****
  • Posts: 4498
  • Prepare for the worst - surprises will be pleasant
« Reply #274 on: <11-29-11/1659:28> »
I dont see the point of this whole. Still, It can be fun to look for maintenance after being hit for 5P or after 3 months.

Lets get back to the streets :)

That's just a side discussion. I was having really busy day, no time to write an IC, but pondering over the rules, since you asked on what nodes are visible.
Sorry for a small delay ;)

Denver Missions
concluded 01 02 03 04 05 10 09 11
running 13
runners: Caretaker Jerry

Sichr

  • *
  • Prime Runner
  • *****
  • Posts: 7202
  • TOTÁLNÍ FAŠÍRKA ZMRDI !!!
« Reply #275 on: <11-29-11/1711:33> »
ook np. better understanding is...well...better understanding. I at least had to read rules about damaging cyberware. I remember those from Street samurai catalogue, well that too far away :)

Sentinemodo

  • *
  • Prime Runner
  • *****
  • Posts: 4498
  • Prepare for the worst - surprises will be pleasant
« Reply #276 on: <11-29-11/1724:35> »
Advanced encryption applies only on nodes, not traffic. Still, encrypted node means you cannot access it without cryptoanalysis done, so the closest possible hack, if any of our nodes is 6 hours away. IDN what bout technos. This, and temporarily switching off the node from time to time and change AcessID...must be enought for now.

Shouldn't be important, but Fractal's links aren't encrypted that heavily. He just reappeared, and there was no socializing between you in his downtime (at least if I recall correctly from the ICs)
Also, I think that not all of the links, you have are equipped with encrypt program. Remember that all of the starting ones come with built in copy protection and registration and that even if you remove them not all of the links may be able to use them due to system limitation.

as a homework for the technoguys, that should be done in ooc, I'd like you (Sichr and Snake) to draw a logic map of your network, including programs, drones and cyberware including the privilidges levels, and what they allow.
Sorry for a small delay ;)

Denver Missions
concluded 01 02 03 04 05 10 09 11
running 13
runners: Caretaker Jerry

Sentinemodo

  • *
  • Prime Runner
  • *****
  • Posts: 4498
  • Prepare for the worst - surprises will be pleasant
« Reply #277 on: <11-29-11/1740:07> »
since firewall depends on response, they hardly would have higher firewall than 1. Thus it is mbetter to have them slaved. On the other side, Encryption, especialy the one using Advanced encryption rules from wirteless (such as we have on our commlinks) is really hard to break in the matter of a combat turn (we have encryption with interval 6 hours to break)

That should be firewall depends on system, and I don't think there is any problem installing better OS on the cyberware
the hardware is only limiting response and signal
Sorry for a small delay ;)

Denver Missions
concluded 01 02 03 04 05 10 09 11
running 13
runners: Caretaker Jerry

Sentinemodo

  • *
  • Prime Runner
  • *****
  • Posts: 4498
  • Prepare for the worst - surprises will be pleasant
« Reply #278 on: <11-29-11/1754:39> »
Also if slaved, to access the device directly w/o going through the master node adds two more to the number of success required. Of course there is still that problem of mutual signal range. Mouse wouldn't want to be close enough to have to directly hack a cyberarm or skill wire set.
Theoretical question: cyberware even at signal 0 have what...about a 3ft range? Which is in mutal signal range of your com-link. That would form a mesh network and therefore would be hack-able, would it not? Even if the devices are hidden. So either slave it or not slave it, doesn't seem to make much difference, you can be hacked either way. It seems the best option for not having your cyberware hacked is to not have cyberware at all.

From the encryption standpoint: it seems to me that each device would need to run an encryption program to encrypt the data that is being transmitted back and forth. Encrypting a node would entail encrypting all the data stored in the node (which is why bio-nodes can't be encrypted since they can't store data there, but could still run an encryption program for handling team/internal data traffic) and would need the encryption program running??? for the node to decrypt it??? in order to access its own data.

At signal 0 that's 3 meters, and this is within Tony's commlink. It was to easy to even ask you for a roll to hack, this, I guess you hacked his link as a matter of bad habit. The devices are hidden, btu Omar has found them.

slaving give you a +2 for the difficulty to hack them directly.

the other best option is to load it with IC, like every sane citizen is doing, but somehow runners never do.

also encrypting a node doesn't entail encrypting the files (pg 66, Unwired)

the other best option is to do what the Amy is doing, but I'll leave you at guessing how

you can run decrypt/encrypt complex forms in your bionode, you just cannot encrypt node.

sorry for the mixed aneswers
Sorry for a small delay ;)

Denver Missions
concluded 01 02 03 04 05 10 09 11
running 13
runners: Caretaker Jerry

Sentinemodo

  • *
  • Prime Runner
  • *****
  • Posts: 4498
  • Prepare for the worst - surprises will be pleasant
« Reply #279 on: <11-29-11/1758:04> »
Quote
First Impression
Cost: 5 BP
A character with the First Impression quality slides easily into new
situations, groups, cities, and jobs. Whenever attempting to fit into a
new environment—such as infiltrating a group or trying to meet contacts
in a new city—the character gains a +2 dice pool modifier on any
Social Tests during the first meeting
. This modifier does not apply to
second and subsequent encounters.

If you think that the whole encounter would give Sam a too big advantage over Stuer then i am OK with your decidion, but just wanted to point out that the quality is for the whole first encounter.

I standa corrected, you got +2 during entire encounter
Sorry for a small delay ;)

Denver Missions
concluded 01 02 03 04 05 10 09 11
running 13
runners: Caretaker Jerry

Kouryuu

  • *
  • Prime Runner
  • *****
  • Posts: 2717
  • The idea is to die young as late as possible -A.M.
« Reply #280 on: <11-29-11/1939:31> »
Sam is waiting for the fake message to be placed at the fronts com, so we can tell we got it from there.

Sent can you make the roll for sam?

Also, why does tony have just 1 roll, but Amy 4?

Fractal would be better suited to deliver.  The message and its contents

Sam understood that the hangers have the message on them.

By the way what are the remington?
Without books. And normal. Keyboard, so.
« Last Edit: <11-30-11/1042:39> by Kouryuu »
Prepare for the worst, hope for the best and expect nothing!
Matrix;speaking;thinking;ExternalSourcesLink
RainDragonBar

Sichr

  • *
  • Prime Runner
  • *****
  • Posts: 7202
  • TOTÁLNÍ FAŠÍRKA ZMRDI !!!
« Reply #281 on: <11-30-11/0344:28> »
Advanced encryption applies only on nodes, not traffic. Still, encrypted node means you cannot access it without cryptoanalysis done, so the closest possible hack, if any of our nodes is 6 hours away. IDN what bout technos. This, and temporarily switching off the node from time to time and change AcessID...must be enought for now.

Shouldn't be important, but Fractal's links aren't encrypted that heavily. He just reappeared, and there was no socializing between you in his downtime (at least if I recall correctly from the ICs)
Also, I think that not all of the links, you have are equipped with encrypt program. Remember that all of the starting ones come with built in copy protection and registration and that even if you remove them not all of the links may be able to use them due to system limitation.

as a homework for the technoguys, that should be done in ooc, I'd like you (Sichr and Snake) to draw a logic map of your network, including programs, drones and cyberware including the privilidges levels, and what they allow.

Sorry but no :) I got enought of this kind of work in my job to do it also in my free time when Im trying to get some fun :D :D

Sichr

  • *
  • Prime Runner
  • *****
  • Posts: 7202
  • TOTÁLNÍ FAŠÍRKA ZMRDI !!!
« Reply #282 on: <11-30-11/0347:44> »
Ryker is watching for anything in the astral.
PM@ team " they don't appear to have magical support guy, but I'm going to continue to watch."
PM @ team " do you think, we could get an edge if I was to drop the invisibility. Remember I can onl see astrally at the moment"

And for this reason it would be very hard for you to use commlink. If you have subvocal, OK, but if text, no chance to see it from astral...

Sentinemodo

  • *
  • Prime Runner
  • *****
  • Posts: 4498
  • Prepare for the worst - surprises will be pleasant
« Reply #283 on: <11-30-11/0349:59> »
Thats all right. But until then you have only your commlink node encrypted.

All other unless I got encrypt program in the runner card are considered open.
Sorry for a small delay ;)

Denver Missions
concluded 01 02 03 04 05 10 09 11
running 13
runners: Caretaker Jerry

Sentinemodo

  • *
  • Prime Runner
  • *****
  • Posts: 4498
  • Prepare for the worst - surprises will be pleasant
« Reply #284 on: <11-30-11/0400:51> »
Ryker is watching for anything in the astral.
PM@ team " they don't appear to have magical support guy, but I'm going to continue to watch."
PM @ team " do you think, we could get an edge if I was to drop the invisibility. Remember I can onl see astrally at the moment"

And for this reason it would be very hard for you to use commlink. If you have subvocal, OK, but if text, no chance to see it from astral...

since you don't have subvocal, you would have to be talking loudily to communicate, and you can't text.
Sorry for a small delay ;)

Denver Missions
concluded 01 02 03 04 05 10 09 11
running 13
runners: Caretaker Jerry

 

SMF spam blocked by CleanTalk