20.04.2013 Views

comStar Firewall alert - PhaseThrough

comStar Firewall alert - PhaseThrough

comStar Firewall alert - PhaseThrough

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

hacker’s handbook . . . . . . . . . . . . . . . . . . . . . . . . . .<br />

94<br />

crow service holds on to the money/goods, eventually returning<br />

them if the deal falls through.<br />

piracY<br />

Cracking copy protection on legally purchased software<br />

is covered on p. 228 of SR4 (see the Cracking Copy Protection<br />

table for suggested thresholds). Illegal software, however, be it<br />

home-coded hacking utilities or a copy of a cracked program,<br />

has difficulties all its own. Programs in the Sixth World are constantly<br />

changing to keep up with the cutting edge of technology,<br />

and periodic patches and updates are<br />

the norm rather than the exception.<br />

Unfortunately, these patches and updates<br />

are only for legal purchasers and<br />

licensers of the program—or in the<br />

case of hacker software, may not exist<br />

at all—and without them a program<br />

slowly slides into obsolescence. A<br />

hacker can stall this degeneration either<br />

by fixing the code herself, finding<br />

the patch or update somewhere else on<br />

the Matrix, or by simply downloading<br />

a newer, updated version of the<br />

same program. (See Legal vs. Pirated<br />

Software, p. 108.)<br />

finding pirate networks<br />

A regular Data Search on the open Matrix never reveals<br />

where a hacker can download a rated program or its updates patch<br />

for free, where a runner might find the detailed AR schematics for<br />

the latest wiz tech toy, or where the drivers for that used piece of<br />

cyberware are. Within minutes of such information being posted,<br />

law enforcement hackers appear in the node to investigate all such<br />

claims and trace and arrest whoever is making the claims or offers.<br />

However, with a little work a hacker can gain access to the<br />

peer-to-peer file sharing networks of the Cracker Underground<br />

(see Virtual Private Networks, below), where she can find and<br />

download programs for a nominal fee.<br />

Finding and getting access to an appropriate network requires<br />

an Extended Data Search + Browse (8, 1 day) Test. Once connected<br />

to such a network, the character doesn’t need to find another one<br />

unless the network gets shut down, or if it doesn’t have the program<br />

she’s looking for (both at the gamemaster’s discretion).<br />

downloading programs<br />

Once a character has made contact with the<br />

Cracker Underground, he can start looking for something<br />

to download. To find a specific program on the<br />

file sharing network, make an Extended Data Search +<br />

Browse (Availability + Desired rating, 1 Combat Turn)<br />

Test. Downloading the program to your commlink or<br />

terminal costs 10 percent of the street price of the program<br />

(see Program Costs and Availability, p. 228, SR4).<br />

A glitch on the Search Test indicates the program is<br />

not on the network, and the hacker must find another<br />

network and try again; a critical glitch indicates the<br />

character has downloaded a bogus program infected<br />

with one or more viruses.<br />

cracking copY protection<br />

threshold<br />

program type (interval 1 hour)<br />

Common 9 + Rating<br />

Hacking 13 + Rating<br />

Agents/IC/Pilot 13 + Rating<br />

System 10 + Rating<br />

<strong>Firewall</strong> 13 + Rating<br />

Autosoft 12 + Rating<br />

Program updates and patches are also available on underground<br />

file sharing networks and may be located in the same way. The cost for<br />

program patches and updates (which restore the degraded program to<br />

its full rating) is 10 percent of the difference in street cost between the<br />

program’s current (degraded) rating and its full rating. All programs,<br />

updates, etc. from an underground file-sharing network have their<br />

copy protection cracked, if they ever had any to begin with.<br />

virtUaL private networkS<br />

A virtual private network (VPN) is an unrated peer-to-peer program<br />

that allows users to communicate and share files and information<br />

on a less-than-simsense level, typically no<br />

Unwired<br />

more than just another window in AR or<br />

VR, and as such not counting as a connection<br />

to a node in terms of subscription<br />

lists unless they are encrypted. Networks<br />

of this kind exist for many purposes, from<br />

simple mobile social software (MoSoSo)<br />

designed to keep members of a social<br />

group in touch to pirate networks trading<br />

cracked software and liberated data.<br />

Security for VPNs varies considerably,<br />

from secretive, passcode-protected,<br />

and encrypted networks on the one<br />

end to completely open networks on<br />

the other. Generally, VPNs depend<br />

on anonymity as much as anything else to protect them, as their<br />

most vulnerable points are the users logged on to them. Spotting a<br />

hacker using a VPN requires a Simple Action to Observe in Detail<br />

(see Observe in Detail, p. 136, SR4) and a successful Opposed Test,<br />

rolling Computer + Analyze against the target’s <strong>Firewall</strong> + Stealth.<br />

If you determine the target is connected to a VPN, you can attempt<br />

to Intercept Traffic (see Intercept Traffic, p. 224, SR4). Secure and<br />

secretive VPNs are almost always encrypted communications.<br />

Rarely, a virtual private network may make use of a node to<br />

facilitate real-time face-to-face communications, or as a common<br />

dropbox to dump files that other users may access and download or<br />

annotate later. Such nodes are usually in out-of-the-way corners of the<br />

Matrix and almost always hidden, requiring the user’s VPN passcode<br />

to access. A node makes a VPN very vulnerable as it often contains<br />

the commcode and passcodes of all members of the network, and networks<br />

that make use of them often change nodes on a regular basis.<br />

paYdata Street coStS<br />

Situation cost adjustment<br />

Data is damaged, but mostly salvageable –20% to –50%<br />

Data is only available on an obsolete medium –20%<br />

Data is publicly available but obscure –10%<br />

Data is in a Proprietary File Format +10%<br />

Certified data +50%<br />

Sole remaining copy of data +100%<br />

Unique enchantment formula +200%<br />

Nanoschematics +400%<br />

Spirit formula +400%<br />

Simon Wentworth (order #1132857) 9

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!