comStar Firewall alert - PhaseThrough
comStar Firewall alert - PhaseThrough
comStar Firewall alert - PhaseThrough
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
Matrix topoloGy . . . . . . . . . . . . . . . . . . . . . . . . . . . . .<br />
52<br />
pilots<br />
Pilots are a special type of OS with more autonomous decision-making<br />
ability, used in agents and drones. Unlike operating<br />
systems or most other programs, Pilots are capable of operating<br />
independently and maneuvering through the Matrix on their own;<br />
see Autonomous Programs, p. 110. Like an OS, Pilots may also be<br />
programmed with sets of commands; see Agent Scripts, p. 100.<br />
Drone Pilots are also customized for the specific device they are<br />
made for (see Pilot Capabilities, p. 103, Arsenal).<br />
prograMS<br />
Programs are the tools of the Matrix. Every time something<br />
is done, a program is involved. Sometimes only a very small<br />
program is needed, and those instances are not covered by the<br />
rules—but it’s still a program doing the work. Programs are always<br />
run by nodes. The maximum number of programs a node<br />
can handle is called its processor limit, while the number it is actually<br />
running is the processor load. If the processor load exceeds<br />
the processor limit, the node is subject to Response degradation<br />
(see Matrix Attributes, p. 212, SR4). Programs do not have to be<br />
run by the persona’s node to be used by a persona. It is possible<br />
to use programs run on the remote node a persona is accessing.<br />
The remotely used program then counts towards the processor<br />
load of the remote node instead of the node running the persona.<br />
Public nexi like libraries, archives, and data havens often provide<br />
remote browse programs.<br />
protocoLS<br />
Every time a node interacts with another node, predefined<br />
Matrix protocols are invoked. The receiving node looks at account<br />
data, access rights, and status of the connection and then decides<br />
whether a request will be accepted or not. By using hacking tools,<br />
hackers try to circumvent or exploit these protocols to again access<br />
rights, crash other icons, or do things not allowed by their current<br />
account privileges.<br />
accoUntS<br />
Access rights on nodes are governed by accounts. Every subscription<br />
and data request (see Data Requests, p. 54) is assigned<br />
certain privileges, depending on the account information that<br />
was sent with the request, or with the initial login in the case of<br />
subscriptions (see Subscriptions, p. 55). There are various flavors<br />
of accounts, depending on the status of the connection and what<br />
kind of information was sent.<br />
Standard accounts<br />
In the case of a standard account, the login data consists of<br />
a username and a password of arbitrary size. This information is<br />
always encrypted by the operating system, with a Rating of 6, upon<br />
sending. The password can be an alphanumeric string, a biometric<br />
pattern, or a signature produced by a passkey (see Passkeys, p. 64).<br />
The password is then compared to either the node’s internal user<br />
database or other sources (see Web of Trust, p. 64) and either confirmed<br />
or rejected. Most users store their passwords or signatures<br />
in encrypted files on their commlink, as they are normally too<br />
long and complex to remember. Biometric signatures can be read<br />
directly from the user with the help of various types of scanners.<br />
node accounts<br />
Node accounts grant access rights on nodes depending on<br />
the privileges a user has on another node it is linked to at that moment.<br />
User access on a security node, for example, might include<br />
a user account, and thus user rights, on the various cameras and<br />
sensors the security node is connected to. A spider working in the<br />
security node is then able to access all the sensors without having<br />
to provide the entire username and password data for the various<br />
sensor devices. The security node sends this information for him,<br />
and the spider can simply access the devices and control them. Or<br />
he could just read out their sensor feed as long as he is logged into<br />
the security node with the appropriate access rights.<br />
access id accounts<br />
Access rights can also be granted by access ID. This means<br />
that every time a node or construct with a certain access ID is accessing<br />
a node, it is automatically granted the access rights related<br />
to the ID. Just like standard accounts, the node compares the access<br />
ID with its internal user database and grants the appropriate<br />
rights upon initial login. A hacker can abuse this by spoofing his<br />
access ID (see The Datatrail, p. 216, SR4) and thus forcing the<br />
node to automatically assign the related rights to the hacker.<br />
accoUnt priviLegeS<br />
Access rights tell the node what the user of an account can<br />
or cannot do. In principle the administrator of a node sets the<br />
privileges related to certain accounts. Most nodes, however, tend<br />
to have the same categories of access rights. There are four levels<br />
of access rights: User, Security, Admin (see Account Privileges, p.<br />
216, SR4), and Public.<br />
public access rights<br />
If a connection is established without sending any information<br />
except the access ID, the connection is automatically granted<br />
public access rights. This is the type of access a user receives when<br />
she is entering the public part of a node. The public account allows<br />
access to public data like website information, blogs, databases,<br />
personal profiles, and so on. Depending on the accessed data,<br />
different access rights might come with the public account, for example<br />
the ability to write without a username in public forums.<br />
User access rights<br />
The vast majority of accounts on a standard Matrix node are<br />
user accounts. The most important privilege normally granted<br />
via user access is one slot on the subscription list. This allows the<br />
user, or any of his agents, to enter the node in VR or AR mode.<br />
Most other rights vary from node to node and from account to<br />
account. Depending on the purpose of the account, User accounts<br />
grant access to file indexes, files, the ability to edit files, command<br />
devices controlled by a node, upload data, common-use programs,<br />
and so on.<br />
Security access rights<br />
Security access rights are mostly given to those who need more<br />
control over parts of a system without managing the entire system.<br />
This level is often granted to spiders, privileged users, and IC. They<br />
are allowed to view log files and node statistics and can alter general<br />
Unwired<br />
Simon Wentworth (order #1132857) 9