comStar Firewall alert - PhaseThrough
comStar Firewall alert - PhaseThrough
comStar Firewall alert - PhaseThrough
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
node attributes like a metaphor or special sculpting. Most of the<br />
time a user with security access is able to create or delete standard<br />
user accounts, edit other users’ data, initiate (and deactivate) an<br />
active <strong>alert</strong>, and read the access log (see Access Log, p. 65). Security<br />
privileges also grant the ability to control and command all the<br />
agents or IC deployed by the node and run hacking programs.<br />
admin access rights<br />
The admin level is reserved for an owner or someone responsible<br />
for an entire node. Admin access grants the right to<br />
do everything the user wants to on a node. Admin privileges<br />
empower individuals to reboot the node, alter the node’s sculpting,<br />
create and delete any possible account, assign access levels to<br />
accounts, and assign privileges to account levels. Furthermore,<br />
admins can view and edit all the log files and statistics available<br />
on the node, including the access log (see Access Log, p. 65). An<br />
admin cannot, however, affect programs and files he does not<br />
know about. He has to first defeat the Stealth program of an intruding<br />
agent that is running on the node before he can unload<br />
the unwelcome guest.<br />
coMMcodeS<br />
Matrix service providers (MSPs) issue commcodes (see<br />
p. 214, SR4), which are not to be confused with access IDs.<br />
Whereas your access ID is a sort of serial number that you use<br />
for all of your interactions online, and which is recorded in access<br />
logs (like an IP address in real life), your commcode is more akin<br />
to a phone number or email address.<br />
In principle it would suffice to call somebody by sending a<br />
phone request to the access ID of his commlink. The commlink<br />
would receive the request and the phone call could take place.<br />
On occasion, however, people buy new commlinks, leave their<br />
commlinks at home, in another room, or simply want to take<br />
their phone call, or any other kind of interaction, elsewhere.<br />
That is why people register their devices at a Matrix service<br />
provider that issues commcodes. Matrix devices can be set to register<br />
with the Matrix service provider as soon as they go online.<br />
Every time somebody dials the commcode, the communication<br />
request is automatically routed through the database of the<br />
MSP that knows which devices are available to receive the call.<br />
Modern commlinks, house telecoms, and cars offer additional<br />
convenience by providing the MSP with the information on<br />
whether the user related to the commcode is present or not, so<br />
the incoming call can be relayed to the appropriate device.<br />
data excHange<br />
In every data exchange, access IDs are used to guide the data<br />
from the sender to the receiver. The receiver then automatically<br />
knows where to send the answer. Thus both nodes, the sender<br />
and the receiver, have to be aware of the other’s access ID for a<br />
successful data exchange. Every node in between tries to forward<br />
the traffic a little further to the receiver. In the wired part of the<br />
Matrix, the nodes performing these relay tasks are the routers of<br />
the Matrix’s backbone.<br />
The wireless part of the Matrix is a decentralized mesh<br />
network. This means that every node will work as a router for<br />
all the other nodes around it. If a node wants to go online, it<br />
just connects to the next available node around it, which in<br />
Unwired<br />
BeHind tHe SceneS<br />
So what happens when you get online? When<br />
you jack into or otherwise connect to your commlink<br />
(or any other device), what exactly happens under<br />
the hood?<br />
Before anything, you must log on to the device.<br />
This presumes that you have an account on the device<br />
and a passcode (p. 215, SR4) for accessing it. Some<br />
devices may have a public interface, meaning anyone<br />
that picks it up can use it. When you enter the passcode,<br />
the <strong>Firewall</strong> authenticates you and the operating<br />
system fires up a persona interface for you.<br />
When you engage the persona, several things happen.<br />
First, you are immediately assigned an access ID<br />
(p. 216, SR4) which stays with you for the duration<br />
of your session. This access ID may be spoofed (see<br />
p. 224, SR4), but this must be done before you open<br />
connections to other nodes; otherwise, the switch in<br />
access ID will immediately sever all of your connections.<br />
Second, you gain access to all of the privileges<br />
your account offers (p. 216, SR4). Third, you gain access<br />
to all of the programs and data stored in the device<br />
that the account has access privileges too. You may<br />
run these programs, loading them into active memory,<br />
at which point they count against the node’s processor<br />
limit (p. 48). Fourth, you are assigned an icon that<br />
represents you in AR or VR interactions, which you<br />
may modify as you see fit. Fifth, your persona informs<br />
your Matrix Service Provider that you are online and<br />
that your commcode should be routed towards that<br />
particular node and access ID, so that you receive all<br />
of your messages and calls.<br />
Other users may use the same node as you, of<br />
course, interfacing through their own, separate personas.<br />
Programs that they run also count against<br />
the node’s processor limit, of course, which is why<br />
nexi are better equipped for multiple users than<br />
standard nodes. (Note that even peripheral nodes<br />
have persona interfaces, though these are obviously<br />
more limited.) Other personas from the same node<br />
will not have the same access ID as you, though all<br />
such access IDs will leave a datatrail that leaves<br />
back to the same node (and, in particular, a specific<br />
account on that node).<br />
From your persona interface, you may access<br />
other nodes. If you are simply making a comcall or<br />
data request, accessing a public site or profile, or<br />
otherwise connecting to a public account, no subscription<br />
or login is required—your access ID suffices.<br />
If you are logging in to a user/security/admin account,<br />
communicating with encryption, controlling<br />
an agent/drone, or making some other bandwidthintensive<br />
connection, a subscription is required, and<br />
counts against your subscription limit (p. 51). Your<br />
activity is logged, of course, creating a datatrail that<br />
may be used to track you (p. 55).<br />
Simon Wentworth (order #1132857) 9<br />
53<br />
Matrix topoloGy . . . . . . . . . . . . . . . . . . . . . . . . . . . . .