20.04.2013 Views

comStar Firewall alert - PhaseThrough

comStar Firewall alert - PhaseThrough

comStar Firewall alert - PhaseThrough

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

node attributes like a metaphor or special sculpting. Most of the<br />

time a user with security access is able to create or delete standard<br />

user accounts, edit other users’ data, initiate (and deactivate) an<br />

active <strong>alert</strong>, and read the access log (see Access Log, p. 65). Security<br />

privileges also grant the ability to control and command all the<br />

agents or IC deployed by the node and run hacking programs.<br />

admin access rights<br />

The admin level is reserved for an owner or someone responsible<br />

for an entire node. Admin access grants the right to<br />

do everything the user wants to on a node. Admin privileges<br />

empower individuals to reboot the node, alter the node’s sculpting,<br />

create and delete any possible account, assign access levels to<br />

accounts, and assign privileges to account levels. Furthermore,<br />

admins can view and edit all the log files and statistics available<br />

on the node, including the access log (see Access Log, p. 65). An<br />

admin cannot, however, affect programs and files he does not<br />

know about. He has to first defeat the Stealth program of an intruding<br />

agent that is running on the node before he can unload<br />

the unwelcome guest.<br />

coMMcodeS<br />

Matrix service providers (MSPs) issue commcodes (see<br />

p. 214, SR4), which are not to be confused with access IDs.<br />

Whereas your access ID is a sort of serial number that you use<br />

for all of your interactions online, and which is recorded in access<br />

logs (like an IP address in real life), your commcode is more akin<br />

to a phone number or email address.<br />

In principle it would suffice to call somebody by sending a<br />

phone request to the access ID of his commlink. The commlink<br />

would receive the request and the phone call could take place.<br />

On occasion, however, people buy new commlinks, leave their<br />

commlinks at home, in another room, or simply want to take<br />

their phone call, or any other kind of interaction, elsewhere.<br />

That is why people register their devices at a Matrix service<br />

provider that issues commcodes. Matrix devices can be set to register<br />

with the Matrix service provider as soon as they go online.<br />

Every time somebody dials the commcode, the communication<br />

request is automatically routed through the database of the<br />

MSP that knows which devices are available to receive the call.<br />

Modern commlinks, house telecoms, and cars offer additional<br />

convenience by providing the MSP with the information on<br />

whether the user related to the commcode is present or not, so<br />

the incoming call can be relayed to the appropriate device.<br />

data excHange<br />

In every data exchange, access IDs are used to guide the data<br />

from the sender to the receiver. The receiver then automatically<br />

knows where to send the answer. Thus both nodes, the sender<br />

and the receiver, have to be aware of the other’s access ID for a<br />

successful data exchange. Every node in between tries to forward<br />

the traffic a little further to the receiver. In the wired part of the<br />

Matrix, the nodes performing these relay tasks are the routers of<br />

the Matrix’s backbone.<br />

The wireless part of the Matrix is a decentralized mesh<br />

network. This means that every node will work as a router for<br />

all the other nodes around it. If a node wants to go online, it<br />

just connects to the next available node around it, which in<br />

Unwired<br />

BeHind tHe SceneS<br />

So what happens when you get online? When<br />

you jack into or otherwise connect to your commlink<br />

(or any other device), what exactly happens under<br />

the hood?<br />

Before anything, you must log on to the device.<br />

This presumes that you have an account on the device<br />

and a passcode (p. 215, SR4) for accessing it. Some<br />

devices may have a public interface, meaning anyone<br />

that picks it up can use it. When you enter the passcode,<br />

the <strong>Firewall</strong> authenticates you and the operating<br />

system fires up a persona interface for you.<br />

When you engage the persona, several things happen.<br />

First, you are immediately assigned an access ID<br />

(p. 216, SR4) which stays with you for the duration<br />

of your session. This access ID may be spoofed (see<br />

p. 224, SR4), but this must be done before you open<br />

connections to other nodes; otherwise, the switch in<br />

access ID will immediately sever all of your connections.<br />

Second, you gain access to all of the privileges<br />

your account offers (p. 216, SR4). Third, you gain access<br />

to all of the programs and data stored in the device<br />

that the account has access privileges too. You may<br />

run these programs, loading them into active memory,<br />

at which point they count against the node’s processor<br />

limit (p. 48). Fourth, you are assigned an icon that<br />

represents you in AR or VR interactions, which you<br />

may modify as you see fit. Fifth, your persona informs<br />

your Matrix Service Provider that you are online and<br />

that your commcode should be routed towards that<br />

particular node and access ID, so that you receive all<br />

of your messages and calls.<br />

Other users may use the same node as you, of<br />

course, interfacing through their own, separate personas.<br />

Programs that they run also count against<br />

the node’s processor limit, of course, which is why<br />

nexi are better equipped for multiple users than<br />

standard nodes. (Note that even peripheral nodes<br />

have persona interfaces, though these are obviously<br />

more limited.) Other personas from the same node<br />

will not have the same access ID as you, though all<br />

such access IDs will leave a datatrail that leaves<br />

back to the same node (and, in particular, a specific<br />

account on that node).<br />

From your persona interface, you may access<br />

other nodes. If you are simply making a comcall or<br />

data request, accessing a public site or profile, or<br />

otherwise connecting to a public account, no subscription<br />

or login is required—your access ID suffices.<br />

If you are logging in to a user/security/admin account,<br />

communicating with encryption, controlling<br />

an agent/drone, or making some other bandwidthintensive<br />

connection, a subscription is required, and<br />

counts against your subscription limit (p. 51). Your<br />

activity is logged, of course, creating a datatrail that<br />

may be used to track you (p. 55).<br />

Simon Wentworth (order #1132857) 9<br />

53<br />

Matrix topoloGy . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!