20.04.2013 Views

comStar Firewall alert - PhaseThrough

comStar Firewall alert - PhaseThrough

comStar Firewall alert - PhaseThrough

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

gaMe inforMation<br />

The Hacker’s Handbook is designed to give player characters<br />

more options for using the Matrix with their games, expanding<br />

the opportunities for both hackers and non-hackers to interact<br />

through the Matrix. The rules and material presented in this<br />

chapter can add depth to a campaign, making shadowruns more<br />

challenging and rewarding for clever players and gamemasters.<br />

BUYing a Better Hacker<br />

Not every character is cut out to be a hacker, and not every<br />

hacker has the time and Karma to be the best in every possible<br />

corner of the Matrix. There’s no shame (well, okay, maybe a little)<br />

in paying another hacker to do what you can’t do, or what you<br />

could do if you had the time and equipment. What follows below<br />

is a list of common services hackers are hired to perform and the<br />

usual street costs and availability for them. A hacker player character<br />

looking to do a little freelancing in the downtime between<br />

runs might look for some of these jobs herself.<br />

anonymization<br />

When somebody in 2070 wants to call a friend, he simply<br />

dials his friend’s commcode. The commlink then connects to the<br />

MSP that issued the commcode and retrieves the access ID of the<br />

receiver. Using that access ID, it establishes the data request connection<br />

to the commlink receiving the call. In this process, the<br />

receiving commlink is aware of the access ID of the sending commlink<br />

(see Data Exchange, p. 53).<br />

Anonymization services work as mediators between the two<br />

participants of a commcall or any other data request. The data<br />

package is received by the anonymizing node and then forwarded<br />

to the receiver using the anonymizer’s access ID as sending ID<br />

(see Proxy Servers, p. 104). A trace will not reveal the access ID of<br />

the original sender, but rather the access ID of the mediator. To<br />

retrieve the real access ID, one must hack the proxy server node. If<br />

multiple proxy servers are used, each must be hacked.<br />

Hacker Services Availability Cost<br />

Unwired<br />

one-time commcodes<br />

Some shadow MSPs offer one-time disposable commcodes—<br />

commcodes sold in advance that, once activated, can be used only<br />

once (for a single message or call). As soon as the call/message<br />

ends, all record of the commcode and the access ID that used it<br />

are securely deleted. Any attempt to track it will lead to the MSP’s<br />

node (one of many that are unadvertised and changed often), but<br />

even if this node is hacked no data trail to the original caller can<br />

be found.<br />

numbered credit accounts<br />

Characters who are looking to keep their financial transactions<br />

confidential may take advantage of a numbered credit<br />

account offered by numerous grey and black-market Matrix banks.<br />

These institutions promise complete anonymity and confidentiality;<br />

all account transactions are handled via account number, an<br />

account code name, and heavy encryption. Though often pressured<br />

by governments and megacorps for facilitating money laundering<br />

and tax evasion, these banks are usually reliable at deflecting law<br />

enforcement.<br />

one-time credit accounts<br />

Like numbered credit accounts, one-time accounts are arranged<br />

as a single deposit and single withdrawal, completely<br />

confidential and with all records of the transaction immediately<br />

erased.<br />

escrow accounts<br />

Escrow services, also offered by shadow Matrix banks, act as<br />

a secure middle-man between two parties who don’t trust each<br />

other—such as a runner team and Mr. Johnson. The escrow service<br />

holds on to one party’s credit (or sometimes, goods) until the other<br />

party completes its part of the deal to the first party’s satisfaction,<br />

then sends the held money/goods on to the second party. If either<br />

party fails to follow through on their end of the bargain, the es-<br />

Hacking a passcode 12R Hacking skill x 500¥<br />

Setting up a hidden account 16F Hacking skill x 1,000¥<br />

Copying a certified credstick 24F Half the amount (in real nuyen)<br />

Spoofing a lifestyle (1 month) 16F Half cost of lifestyle for 1 month<br />

Jacking a vehicle or drone 8R Hacking skill x 200¥<br />

DOS attack on an individual (1 hour) 8F Hacking skill x 200¥<br />

Tracing a datatrail 6R Hacking skill x 100¥<br />

Renting a botnet 10F Number of bots x Cost of bots x 0.5¥ an hour<br />

Buying a botnet 15F Number of bots x Cost of bots x 5¥<br />

Anonymizing proxy service 4 Number of reroutes x 10¥ per day<br />

Anonymized commcode (calls/messaging) 4 Number of reroutes x 5¥ per day<br />

One-time disposable commcode 4 10¥<br />

Numbered credit account 4R 100¥/month<br />

One-time disposable credit account 6R 10% of the deposited amount<br />

Escrow service 8R 10% of the deposited amount<br />

Simon Wentworth (order #1132857) 9<br />

93<br />

hacker’s handbook . . . . . . . . . . . . . . . . . . . . . . . . . .

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!