Site Tools


trix_traps

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Next revision
Previous revision
trix_traps [2021/12/19 11:53] – created jacktrix_traps [2024/03/20 18:24] (current) – Crosslinking as suggested in Discord. bloodninja
Line 1: Line 1:
-This will be a dump of various bits and pieces of undocumented decking knowledge.+This will be a dump of various bits and pieces of miscellaneous decking knowledge.
  
-1. Canonically the Matrix requires a subscription to use. Because you're a fly-by-night shadowrunner who refuses to pay the corps their scripts, not that you have a SIN to pay with, *any* intrusion into the Matrix is considered a hostile one. This means as soon as you step foot into it the alert level begins to climb.+Alternative representation and additional information is also available at the [[houserules#decking|houserules]] article.
  
-2Analyze host is not the only analyze action you can performAs it turns out there are subsystems and built-in IC to hosts. You have to analyze ACIFS sybsystems to get it. Analyze files analyzes the files subsystem, and analyze slave detects for slaved programs and hostsHosts can have their own File subsytems and Slave subsystems, which can not only protect and encrypt host databut also dump you into different locations if triggeredDecrypt file(s?)/decrypt slave is how you untangle that messIt also shows trapdoors this way and you can find them/take them manuallyand there are possibly hidden nodes around that require this.+1Canonically the Matrix requires a subscription to use. Because you're a fly-by-night shadowrunner who refuses to pay the corps their nuyen, not that you have a SIN to pay with, *any* intrusion into the Matrix is considered a hostile oneThis means as soon as you step foot into it the tally (security/alert) level begins to climb. 
 + 
 +2. Exits themselves (SANs) can be encrypted and there are several bugs on how it is documented. 
 +  * locate host blah 
 +  * -> Your search returns the address blah. 
 +  * logon blah 
 +  * -> You fail to gain access to the host. 
 +  * # The target room has an AccessScramble value, which blocks remote login.  But it could be the source room blockingso... 
 +  * analyze access 
 +  * -> There is nothing out of the ordinary about that subsystem. 
 +  * # Well, now what?  (This is what usually keeps people from logon.  But the source room has no encryption.  So decker has bright idea:) 
 +  * analyze blah 
 +  * -> Analyze what (That doesn't work...) 
 +  * help decrypt 
 +  * -> helpfile shows no ability to decrypt exits/SANS exists 
 +  * # But finally if you just do it anyway: 
 +  * decrypt blah 
 +  * -> You successfully decrypt that SAN. 
 + 
 +So, the room is not the SAN, the exit is. An access-encrypted room can prevent movement inforcing you to decrypt it blind.
trix_traps.1639943599.txt.gz · Last modified: 2023/01/30 19:07 (external edit)