comStar Firewall alert - PhaseThrough
comStar Firewall alert - PhaseThrough
comStar Firewall alert - PhaseThrough
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
hacker’s handbook . . . . . . . . . . . . . . . . . . . . . . . . . .<br />
104<br />
a note on coMManding deviceS<br />
There’s more than one way to rig a drone. The same is true<br />
for other devices controlled through the Matrix. Here’s a quick<br />
and handy reference guide.<br />
issue remote commands<br />
You may remotely command any device that you have subscribed<br />
to your persona (p. 221, SR4) with a Simple Action (see Issuing<br />
Commands, p. 221, SR4). You do not need to be in the same node as<br />
the device, as long as it is subscribed and your command can reach<br />
them. Multiple devices may be controlled as a single subscription,<br />
but this means they all receive the same command. Nodes, devices,<br />
agents, drones, sprites, etc. may all be commanded this way.<br />
In this case, the commanded device acts on the orders independently<br />
on its own action. Pilot + autosofts are used for any<br />
relevant tests. If the orders are complex, the gamemaster can<br />
roll Pilot + Response to see if the device comprehends them<br />
(see p. 111). More complicated orders can be issued in the way of<br />
scripts (see Agent Scripts, p. 105).<br />
remote control<br />
Rather than letting the device operate on its own, you may<br />
access it directly via AR or VR, using the Command program (see<br />
Controlling Devices, p. 220). You must either log in to the device<br />
or subscribe it to your persona. The program provides you with<br />
a virtual interface, allowing you to control the device like a video<br />
game. Most devices have built-in Command programs, which<br />
you can run if you lack your own.<br />
A remote-controlled device acts on your Initiative. All tests<br />
are made by you, using Command + an appropriate skill. For<br />
example, to fire a gun emplacement, you would roll Command +<br />
Automatics. To maneuver a rotordrone around a tree, you would<br />
use Command + Pilot Aircraft +/– Handling.<br />
Devices, agents, and drones may all be remote controlled<br />
this way.<br />
Jump in<br />
Your final, and most direct, option is to “jump into” the device<br />
with a Simple Action via full-immersion VR (see Jumping Into<br />
Drones, p. 239, SR4). This is only possible with devices that have<br />
rigger adaptation (p. 341, SR4), typically drones and vehicles. In<br />
rare occasions, other devices will feature rigger adaptation.<br />
Devices rigged this way act on the rigger’s Initiative, and<br />
tests are made using the rigger’s skill + appropriate vehicle attribute<br />
(see Common Rigger/Drone Tests, p. 105).<br />
multiple levels of access, linked passcodes or nanotech passkeys, encryption,<br />
data bombs set to activate during off-hours, and proactive<br />
IC. If a hacker does manage to access a nanofax or nanoforge, they’re<br />
limited to producing items that the nanomanufacturing device that<br />
they have the correct feedstocks to produce, and has nanoschematics<br />
for. Nanofaxes are further limited in that they can only create a specific<br />
type of gear, such as personal microtronics or pistols. If a nanofax<br />
or desktop nanoforge is compromised (an Active Alert) instead of<br />
shutting down it will self-destruct. Stolen nanofaxes and desktop<br />
nanoforges are typically ordered to self-destruct wirelessly, or do so<br />
Unwired<br />
automatically when they leave the range of the wifi<br />
network of the building they are in.<br />
Nanoschematics are kept in high-level security<br />
nodes, and legitimate users download them by logging<br />
onto the node with their passcodes and then<br />
verify their log-on by sending a valid license number<br />
that is hard-coded into the nanofax processor. The<br />
nanoschematics are encrypted when downloaded<br />
from the secure node. Provided the character has<br />
access to a nanofax, finding the license number<br />
requires a Hardware + Logic (4) Test. A nanofax<br />
license number only works with the appropriate<br />
matching account. Nanoschematics cost serious<br />
nuyen, and few show up on peer-to-peer file sharing<br />
networks (see Piracy, p. 94)<br />
proxy Servers<br />
A “proxy server” is a program routine that<br />
acts as a go-between, transferring data from a user<br />
(the “client”) to another user or node. The advantage<br />
to proxies is that they act as an intermediary,<br />
so the data seems to be coming from the proxy<br />
rather than the client. Hackers and shadowrunners<br />
find proxies very useful both as anonymous<br />
remailers (obfuscating the original message<br />
source) and to foil tracking attempts.<br />
Almost any node can be configured to act as a<br />
proxy server, though this typically requires admin<br />
access and a Computer + Edit (10, 1 Initiative Pass)<br />
Test to set-up (use Hacking in place of Computer<br />
if you do not have admin privileges). Once set up,<br />
messages that are sent from a client through the<br />
proxy server node will seem to have originated<br />
from the proxy node. In order to determine the<br />
source of a message, a hacker would need to trace<br />
the message back to the proxy server node and then<br />
hack that node’s access log (or request it from the<br />
admin/owner of the node, if they are cooperating).<br />
Anonymizing proxy servers are often set to not<br />
keep or to delete message transfer logs.<br />
A hacker can also route his connection through<br />
a proxy server as a means of hindering traces. This<br />
increases the threshold by +4 for Tracking Tests<br />
for each proxy server used. The drawback, however,<br />
is that each proxy server reduces the hacker’s<br />
Response by 1.<br />
Spotting traces<br />
It can be advantageous to know when someone is trying to<br />
track your datatrail (see Track, p. 219, SR4), so that you can redirect<br />
the trace or otherwise make haste. In order to spot a trace, you<br />
must be in the same node that the track attempt is launched in (if<br />
someone is attempting to track your datatrail from the access log<br />
of a node you are no longer in, for example, you will not know).<br />
Spotting the trace requires a simple Matrix Perception Test (1)<br />
Test. However, if the tracker is trying to keep the trace discreet,<br />
you must beat them in an Opposed Test pitting your Analyze +<br />
Computer versus their Track + Stealth.<br />
Simon Wentworth (order #1132857) 9