02-26-2018, 12:42 PM | #1 |
Banned
Join Date: Jun 2005
Location: Bristol
|
Hacking Question
If some has a HUD vision either through eyes or a helmet what is needed to hack into the feed?
My understanding is another comms device with a bucket of hacking cryptographic programs to crack the HUD's encryption to allow the hacker to send false or other data or to see what the HUD operator is doing. Am I missing something? Another possibility is how to set an encryption level. My instinct is to set it at 20 and anything 'better' is above that. |
02-26-2018, 02:26 PM | #2 |
Hero of Democracy
Join Date: Mar 2012
Location: far from the ocean
|
Re: Hacking Question
Don't ask about the display. You may as well use the word "Phone", "Monitor", or "Speakers". Ask about how the data gets to the display. Is is externally wired, sent through internal wires (for full cyborg effect), transmitted wirelessly from devices all over the wearer, or part of a unit network? That's the signal you are going to enter through, and it will effect how you hack in.
Also, seeing what's going on is different from sending false data. seeing what's going on is the first thing you'll do if you break the encryption. You'll need a way to fully interrupt the device sending the data or reroute were its getting the data from in order to send false info, and that requires having either good control over the connection or control over the device sending the data. As a note, having hardware access tends to make hacking a lot easier. And if the HUD isn't using wireless communication with the sensors or computer that feeds it, or talking with another device, the hack will require access to the hardware. I hope that helps.
__________________
Be helpful, not pedantic Worlds Beyond Earth -- my blog Check out the PbP forum! If you don't see a game you'd like, ask me about making one! |
02-26-2018, 03:08 PM | #3 |
Banned
Join Date: Jun 2005
Location: Bristol
|
Re: Hacking Question
Ok
I was trying to be not so complicated. If a unit of soldiers/Police/mercenaries/organised criminals are using a HUD net work, that as seen in a lot of scifi, is linked to a control room/vehicle etc. There is a broadcast feed. As you correctly noted, the hacker will have to enter the data stream. From UT46-7 Basic Encryption needs a Complexity 8 device to hack it. No extra cost Secure Devices need a Complexity 10 device to hack it. Requires $500 for each device in the net work. Gun, HUD and Control. Therefore most agencies with huge numbers will go for the cheaper alternative and not have the super expensive stuff. For the most secure stuff are the Quantum Comms but have a pitiful range or broadcost area. If the hacker has a broadcast 'wifi' ability, this is all that is needed to attempt a hack into a network? |
02-26-2018, 03:47 PM | #4 | |
Banned
Join Date: Jul 2006
Location: 100 hurricane swamp
|
Re: Hacking Question
Quote:
It is not nearly as simple† as Shadowrun likes to make it out to be, especially if your trying to keep both the units on the ground and the network hub controller in the dark that this is happening.‡ * Which can be as 'easy' as having a much stronger broadcast than the original signal. † Admittedly SR's way can be more 'fun'... it just isn't very realistic. ‡ Though if you don't care if the base controller figures out they're being jammed, it get's easier, see above * note. |
|
02-26-2018, 03:52 PM | #5 |
Join Date: Jul 2014
Location: New Zealand.
|
Re: Hacking Question
Van Eck phreaking deals with determining what an electronic device is doing based of the electromagnetic noise it produces.
https://en.m.wikipedia.org/wiki/Van_Eck_phreaking
__________________
Waiting for inspiration to strike...... And spending too much time thinking about farming for RPGs Contributor to Citadel at Nordvörn |
02-26-2018, 04:18 PM | #6 |
Banned
Join Date: Jun 2005
Location: Bristol
|
Re: Hacking Question
From what I can gather then.
The Hacker needs to gain control of the the Control feed first. Once this feed is hacked the hacker then can pursue the targets in the HUD matrix. |
02-26-2018, 04:40 PM | #7 |
Join Date: Jul 2008
|
Re: Hacking Question
Pursue what targets? If you've taken over the control feed, you don't need to compromise the HUD sets themselves to send them data and receive data from them.
__________________
I don't know any 3e, so there is no chance that I am talking about 3e rules by accident. |
02-26-2018, 04:49 PM | #8 | |
Join Date: Feb 2005
Location: Berkeley, CA
|
Re: Hacking Question
Quote:
Incidentally, spoofing a machine without first knocking it off the air will probably not work for very long; "someone else is trying to be me" is pretty obvious. Also, none of this happens in real time. It takes an hour to crack basic encryption in UT. That's cinematically fast (typical encryption protocols are set up to require centuries of computer time with same-era computers, and you mostly don't brute force crack them, you rely on bad user practices to make cracking them unnecessary), but still slow enough to be combat irrelevant unless you are involved in an extremely extended operation or run into the same group twice. |
|
02-26-2018, 05:00 PM | #9 |
Join Date: Nov 2005
Location: Renton, WA
|
Re: Hacking Question
What TL?
If you have quantum computing, and quantum based encryption, it could literally be impossible (at least you couldn't hack their comms without them knowing about it). However, if you have just quantum computers without quantum encryption, then a quantum computer gets +5 (IIRC) to break standard encryption. :D Evil stuff... If we're talking TL9/10 radio? Then you hack the network. Once you get in, you can a) view the data or b) make another roll to "spoof" the network and replace/modify data. The spoof roll should be opposed vs. the operators Electronics Communications, Electronics Security or Computer Operations (I would use the highest skill...). I may have messed up the previous skill names, but you get the idea. :D |
02-26-2018, 05:15 PM | #10 |
Banned
Join Date: Jun 2005
Location: Bristol
|
Re: Hacking Question
Quantum encryption is pretty much the Cosmic Power of encryption.
Of course cost is an issue. Nice to have these but wow are they expensive btw do you need it hardened and lighter too? I was thinking TL10. Judging by the Complexity power ups it is possible to run a Comp 9 device with a high capacity too. Which is like 30 Comp 8 programs running? |
|
|