Jump to content

Crazy Monkey

Senior members
  • Content Count

  • Joined

  • Last visited

Community Reputation

0 Neutral

About Crazy Monkey

  • Rank
    Veteran Cyberpunk
  1. Hey! Sorry it took so long to get back to you; I haven't been around. To call anything I'm doing with this "planned" would be exceedingly generous. That said: 1) A list of brands and models with price points generated by their cost in parts would be shiny! It adds atmosphere and gives the little bit-biters something to want. Having a name for things you want makes wanting better. I'd say go for it & it deserves it's own thread in this section. 2) The idea of adding to skills is interesting! I'd work it like it's a part of the deck's system software, and price it like skill chips. For that matter, I'd make it work like skill chips too - your +2 to Cipher from the deck matters while you have 0 in that, but as you get to a +2 yourself, you've passed what it can help you with. Maybe time to sell that deck and get the Sun Microsystems MegaSPARC 20 with it's ultra-fast switching backplane (or something).
  2. Thanks! I'm sorry to hear you haven't played in so long. Perhaps with the the new version coming out, we'll both get more chances!
  3. So, I'm putting MU back in for my games. Super-real city-sized virtual realities should take a significant amount of resources. That said, intrusion software & most other things are small enough to not bother counting. The basic deck has 10MU, plenty for hacking purposes, and only really big things (VRs, mostly) need to be counted. Cost to upgrade is 500eb/10 MU (if an extra 10MU costs more than a basic deck, why not just buy one & strip the memory out of it?) to a max of 30MU.
  4. Is anyone still here/using this? I hope so! As I was working through how to use these rules, I noticed the cyberdeck hardware isn't really fleshed out. So, working with what's in the 1.2.1a PDF for stats and limits, I came up with: Basic Deck (1000eb) Type: Basic Speed: 0 IC: 0 Availability: C Reliability: ST So: B/0/0/C/ST I haven't figured out what to do with other circuitry types. Quantum should give a bonus to parallel tasks and breaking crypto. Neural would be good for massively parallel actions too. I don't have numbers for these things, yet. Perhaps even Basic processors have a quantum co-processor to make Cipher make more sense. The Speed rating, to me, is more than just speed - it's also a measure of the quality of the software on the system. Otherwise, adding it to everything doesn't resonate for me. I'm planning to degrade Speed by 1/year. Used/old decks can be bought with negative speeds, up to -3. I use IC as a bonus to Secure//Modem rolls that sane runners do at the start of a run & leave as a persistant action. So INT+Secure+Modem+Speed+IC=DV for Infiltrate, Scan, Query against that Modem. No roll, the DV to hack you is the IC rating. Likewise, I would encourage every hacker to persist a Conceal//Modem at the start of a run to frustrate Locate and Detect actions. All decks have wireless connectivity, including analogs to modern Bluetooth, WiFi, NFC, and cellular. Most also have wired, and those that don't can connect via a wired interface via the expansion bus (USB-ish) for 30eb. Upgrades! Speed: Increasing the speed costs 2000eb to a cap of +3. Used decks with Speed less than 0 are 25% off per negative speed rating. So last year's basic deck costs 750eb, the year befores now costs 500, and the "so old it'll get you killed" special is a mere 250eb. (I'm not fond of this - I'd rather have linear pricing across the range, but then a Speed 0 deck would cost 7000eb!) IC: Upgrading improves the firewall software, and costs 1000eb/point to a cap of 5. Availability: This is more of a "set by the Ref" thing. Assault decks would be M, perhaps. Higher specced decks, or decks with unusual features (EMP shielding on a deck designed for the Orbitals, for example) would rate higher than C. Reliability: Replacing components with higher grade gear (start with the power supply) costs 500eb per step. Decks with crappy components are 500eb cheaper. It could be very fast, just not reliable if it's overclocked, or is made to looser tolerances. Portable: Just because it's got wireless doesn't mean it's got a battery. A deck with portability built in costs 1000eb more than an otherwise wall-powered deck. You can swap out the power supply and add a battery for 200eb and a successful Cyberdeck Design roll, but the result won't be as sleek (Picture a battery taped to the side, running wires into the power supply.) So the most uber 'leet deck will cost 13500eb. A pretty penny, and gives the little scamps something to dream about. On a side note, I'd steal some ideas from Shadowrun and encourage people to slave their wireless gear behind a phone, cyberdeck, or dedicated firewall. That could include home stuff too - coffee makers and the like (obviously, they'd go to a firewall, not phone that is only there part time). I guess, in a lot of ways, it's already in there - the coffee maker is a Remote on the victim's home System. Their Bluetooth headset or pocket spectrometer is a remote on their phone (modem?), etc. Also, I like the idea of using proxies to really annoy defenders. Break into home systems the usual way, then Control//System to use it to bounce back out to the net. This is a hacker tradition that goes back to outdials in the 60s.
  5. How do you know what his goal was? Not IP. He checked to see if a Twitter client on the victim was configured with a user name on his list. No IPs were consulted. Here "raped" means he TOOK their data. All that juicy, juicy private data. Not just contacts, but, "SMS logs, call logs, & phonebooks and (as long as the user was using the default out of the box email client) emails stored within." Not so much. Aside from the fact that he wasn't targeting IPs, an IP address does NOT reliably tell anyone where you are, if you care. Mid-level bad guys can use TOR (The Onion Router) to hide their real IP. More serious ones will use multiple zombie systems, preferably in jurisdictions that don't get along, with anti-forensic logic bombs to kill any detected trace in progress. ALSO, if the Feds know what Twitter handles hackers or terrorists are using, they may well not pick up the person responsible. That guy isn't likely to be the leader - instead, you watch Twitter Guy, until he gets a message from someone important, and you start watching that messenger. Wash, rinse, repeat until you find someone worth killing. Certainly not all of the 500 were interesting, although the author assets that a good number were (his targets are likely the same people who view his Twitter page, so, yeah, that's pretty likely.). The ones not on his 'shit list' had a connection open to his listener until the listener closed (like after figuring out the victim was boring). No harm, no foul (though probably still a felony in CA). Saying he missed three times does not make three points. Even if scrambling data was all he did, are you so sure that iCloud would push the changes from the phone to the cloud? After all, if you make a change on the phone yourself, it does. How does the sync software know which is a legit change? Anyway, that's NOT what he did. Instead, he pulled enough data to give a GREAT start in putting together a picture of the victim's social life. And maybe more, considering all the subscription, password reset and business details many people keep in their email. Now THAT we agree on! It ALSO shows how easy it is to pwn people who really outta know better (his Anon victims). I mean, really? You're going to scan a QR Code that a known hacker put up, on a device that can log into anything? Jumpin' jackwagons, that's about the dumbest thing I've heard in a while. I mean, that's almost as dumb as jacking into a random USB power outlet at a hacker conference. My people hurt me inside when they do stuff like that. I hope this has cleared up a little of what went on for you. It can be tricky to grok a hack of this simplicity and elegance without the necessary background, I know. If you have any further technical questions on this, I'd be glad to help.
  6. Speaking of insecure, be careful of malicious PDFs: http://www.sans.org/security-resources/malwarefaq/pidief.php
  7. Would you consider adding an RSS feed? It makes things a lot easier for the punk on the run...
  8. That's pretty clever. They'd need directional antenna, or an array, but that's doable.
  9. Malek, Good ideas a netrunner should consider. Radio Sniper I was at the Defcon talk where the Shmoo group showed that first WiFi sniper rifle that the Bluetooth one was patterned on (both use the same frequency). I very much remember someone, maybe Bruce Potter, telling us what a bad idea it was to use it, and not for the obvious reason of looking like you are pointing a gun at someone. The antenna is a 14-ish DB Yagi, which works by taking a radio signal and pushing it into an oblong shape (*really simplifying here), mostly forward. Only mostly, though, it also has a pretty good sized rear lobe. The device also incorporated a..I want to say 13watt amp. Recall that for every 3DB or gain, you are doubling signal strength, on an exponential curve. So, because I don't remember how to plot the log, let's say the antenna gives 12db of gain, so that's 13 x 2 x 2 x 2 x 2 = 208 watts effective power. Also recall that Bluetooth and Wifi both use the 2.4GHz ISM band. The natural frequency of water is 2.5GHz (this is why a leaky microwave does bad things to WiFi). While looking down this thing, the rear lobe is going through your eye and into your brain. Owie. The move to 5.8GHz isn't all that helpful - it's close enough to double the frequency to be very bad news. Easy fix, just mount it on a tripod and aim it with a video camera. Preferably from a good bit away (the FCC publishes RF exposure safety charts). Radio Direction Finding This one is good in theory, but harder to do in practice. In fact, it's a whole hobby (see: amateur radio fox hunting) on its own. The problem is that radio waves are attenuated by many things & reflected by most everything else - this is much more true at microwave frequencies (to the point that they can be guided by physical objects, thus the microwave horns you can see on some transmission towers). So, in looking for your source, you will have to move around a bit, taking more than 3 bearings & doing a bit of fiddling. There is better equipment than a simple directional antenna for it too (though I know people who swear by using a Yagi on a stick) and you can get them pretty cheap in kit form. WiFi Artillery You are more likely to fry yourself than your target at the kind of power you'd need, especially if they are taking some countermeasures, like pointing antennas at each other. The military uses frequency hopping to avoid this kind of jamming, and so does my cordless phone (anything that says something about spread spectrum). Also, remember that if you are jamming someone by being louder, they can always use RDF to find you & ask you to stop. The military has even developed special devices to deliver that sort of request. To jam someone, your best best to to get closer to them than the other station and *gradually* roll on the power, so that it appears to each party that the other is experiencing radio failure. It's an art. Fiber optics cannot experience radio interference in any practical scenario. Light is still EM, so I guess technically you might be able to do something there, but since fiber cables have opaque shields on them, that isn't really all that reasonable either. Of course, you can just break them with a baseball bat in a bunch of locations, with won't be physically apparent - they'll have to replace the whole run. Hope this helps!
  10. Marketing aside, the purpose of the S&W .500 Magnum is fun shooting. I've fired a few of them, with a variety of loads, and the blast and flash are enough to bring the range to a standstill. It certainly has a healthy kick and you need to hold it right, but it's not a wrist breaker. You probably won't be shooting it all day, but tossing a few rounds downrange with it is fun for the whole family. The worst handgun I have *ever* experienced, in terms of recoil, was a .357Magnum, with factory rounds. It was a S&W Scandium alloy J-frame revolver and it was the only time I have decided to stop shooting before I ran out of ammo. I suppose if I really needed it, I wouldn't notice the recoil & if I had something in the same size to practice with it might be OK, but...owie. That gun was no fun.
  11. Flipping back to channel 1 after explaining to Jesse what's going on, <I'll check the panel & see if the diagnostic computer has figured out what all is damaged> Los strolls back to the command center. Leafing through the schematics and alerts, thinking to himself, "Yeah, I might get all suited up if I don't have to." ((I'm assuming I can't hear the guys at the boat))
  12. "Yeah, hang on, I'll help." Siddeling up close, out of earshot from the visitors and everyone else, "Don't sweat it, it's an engineered failure. Just make sure it takes a long time to be 'sure' everything's Ok, aite?"
  13. Looking over the array of equipment and people pouring out of the visitor's sub, "Uh, tubes 1 and 4, I think the seawater pump might've come unglued." Looking up as if making a decision about how much to tell them, "HEY! You guys might wanna button up your boat. We should be fine; the doors look like they're holding, but, uh, just in case you know?"
  14. Los swings out of the control room on the opposite side from the sub, hoping to be unseen. Jogging a short distance towards the visitors, he yells out, "There's been a pressure breach in the transit tubes, everybody stay back!"
  15. OOC: In other words: http://en.wikipedia.org/wiki/Evolutionary_algorithm
  • Create New...