20.04.2013 Views

comStar Firewall alert - PhaseThrough

comStar Firewall alert - PhaseThrough

comStar Firewall alert - PhaseThrough

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Simsense can also be used for experiencing AR. In this case,<br />

a partial simsense feed is applied, allowing the user to experience<br />

AR sensory input directly in their brain via sim signals. This makes<br />

a commlink with sim module the perfect combo package for experiencing<br />

AR and VR and interfacing with devices via DNI and<br />

simsense—no other gear required.<br />

pan Hardware<br />

What items compose the components of a PAN? This is up to<br />

each particular character, but the general rule is that any computerized<br />

electronic device carried by the character counts.<br />

commlink<br />

The commlink is the so-called “hub” of the PAN. As a<br />

standard node with the best Signal rating (usually), it acts as the<br />

primary routing device in the network. It is also the device that the<br />

user directly accesses and engages their persona, and from which<br />

they make calls, send messages, and access other nodes. For more<br />

details, see Commlinks and Networking, p. 210, SR4.<br />

By taking on the role of hub, the commlink can be used to<br />

keep track of all of the other devices in the PAN. This is usually<br />

accomplished by giving the character’s account on the commlink<br />

an equivalent node account (see p. 52) on each device. This<br />

grants the character access privileges on each sub-node without<br />

having to log in, and makes it easier for the character to access<br />

data from each device. This means that a character logging into<br />

his persona can, for example, automatically check the ammo level<br />

in his gun, the remaining power in his drone’s fuel cell, the stock<br />

levels on his medkit, and the credit left on his credstick. The<br />

commlink can also be sent to immediately notify the persona if<br />

a device disappears from the network (a handy way to keep from<br />

leaving things behind). The drawback to this, of course, is that if<br />

that particular commlink account is hacked, all of the devices in<br />

the PAN are compromised.<br />

Sub-nodes<br />

The rest of the PAN typically consists of other devices with<br />

computerized components—which in the 2070s is almost everything:<br />

weapons, clothing, drones, vehicles, other electronics, RFID<br />

tags, credsticks, cybernetic implants, and other gear. Most of these<br />

items are peripheral nodes (p. 48) with limited capabilities, with<br />

the exception of items like drones and vehicles.<br />

While many of these devices have a low Signal rating anyway<br />

(and so don’t mesh with other nodes much), it is common practice<br />

to keep all of these items in hidden mode, only communicating<br />

with the commlink. Not only is this polite (less wireless “traffic<br />

clutter”), it is also prevents someone from compiling a sneak inventory<br />

of what you are carrying and makes these sub-nodes less<br />

tempting targets for hackers. If the sub-node needs to communicate<br />

with a node external to the PAN, the connection is simply<br />

routed through the commlink.<br />

decoy commlink<br />

Many runners prefer to carry a decoy commlink which they<br />

run in active or passive mode, accepting commcalls, and store<br />

their fake ID and credentials on. Their real—and more secure—<br />

commlink is kept in hidden mode, and serves as the PAN hub.<br />

Though this has many advantages, it does mean that the character<br />

Unwired<br />

must switch back and forth between their decoy commlink and<br />

their real one as the situation demands.<br />

pan connectionS and protocoLS<br />

The manner in which the PAN components are connected<br />

plays a crucial part in PAN security. Note that each device does<br />

not need to be connected to every other device in the network, as<br />

long as there is a chain of connections leading to other devices (i.e.,<br />

the PAN is also a mesh network).<br />

wireless Links<br />

The most common method for each node in a PAN to communicate<br />

with the rest is via radio. The Signal rating (p. 212, SR4)<br />

determines its range and power. The advantage to wireless is that<br />

you don’t have to deal with cables and things can be moved around<br />

easily, as long as they stay in range. The drawback is that wireless<br />

signals can be detected, intercepted, jammed, and spoofed (see pp.<br />

224–225, SR4).<br />

wired Links<br />

A less practical but more secure option is to use fiberoptic<br />

cable to connect devices. The obvious drawback is that this limits<br />

your range and cables can get tangled and in your way. The advantage<br />

is that wired connections cannot be jammed. In order to<br />

intercept a wired connection, a hacker would need access to one<br />

of the wired devices (see Intercept Traffic, p. 224, SR4). For this<br />

reason, many hackers use a fiberoptic cable to link to their commlink<br />

via trodes or datajack.<br />

Skinlink<br />

A third option is to use skinlink (p. 318, SR4), where a connection<br />

is established using the skin’s electrical field. For a skinlink<br />

connection to work, both devices must be touching the skin (or<br />

close to it—the electrical field extends a bit beyond the skin, so<br />

clothing does not interfere), and both must be equipped with the<br />

skinlink accessory. Cybernetic implants may also be equipped with<br />

skinlink, even if they are not accessible on the body’s exterior—in<br />

this case, a simple connection is established between the implant<br />

and the skin’s surface.<br />

Slaving<br />

Perhaps the easiest way to secure a PAN is to slave each subnode<br />

to the commlink (see Slaving, p. 55). This will automatically<br />

forward any wireless connection attempts on a slaved sub-node to<br />

the master commlink. In order to hack a slaved device, the hacker<br />

will either need to hack the more secure commlink or gain physical<br />

access to the item.<br />

clustering<br />

If you lack a commlink or other standard node, you can<br />

cluster a number of peripheral nodes together so that they act as a<br />

single, unified node (see Clustering, p. 55).<br />

encryption<br />

Another good line of defense for your PAN is to use encryption.<br />

You can encrypt your wireless transmission, your node, and<br />

even your files, forcing a hacker to chew his way through scrambled<br />

code to get what he wants (see Encryption, p. 65).<br />

Simon Wentworth (order #1132857) 9<br />

59<br />

Matrix topoloGy . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!