Site Tools


trix_traps

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revisionPrevious revision
Next revision
Previous revision
trix_traps [2022/01/04 10:51] jacktrix_traps [2024/03/20 18:24] (current) – Crosslinking as suggested in Discord. bloodninja
Line 1: Line 1:
-This will be a dump of various bits and pieces of undocumented decking knowledge.+This will be a dump of various bits and pieces of miscellaneous decking knowledge.
  
-1. Canonically the Matrix requires a subscription to use. Because you're a fly-by-night shadowrunner who refuses to pay the corps their nuyen, not that you have a SIN to pay with, *any* intrusion into the Matrix is considered a hostile one. This means as soon as you step foot into it the alert level begins to climb.+Alternative representation and additional information is also available at the [[houserules#decking|houserules]] article.
  
-2Analyze host is not the only analyze action you can perform. As it turns out there are subsystems and built-in IC to hosts. You have to analyze ACIFS sybsystems to get it. Analyze files analyzes the files subsystem, and analyze slave detects for slaved programs and hosts. Hosts can have their own File subsytems and Slave subsystemswhich can not only protect and encrypt host databut also dump you into different locations if triggered. Decrypt file(s?)/decrypt slave is how you untangle that messIt also shows trapdoors this way and you can find them/take them manually, and there are possibly hidden nodes around that require this.+1Canonically the Matrix requires a subscription to use. Because you're a fly-by-night shadowrunner who refuses to pay the corps their nuyen, not that you have a SIN to pay with*any* intrusion into the Matrix is considered a hostile oneThis means as soon as you step foot into it the tally (security/alert) level begins to climb.
  
-3Some Colus notes+2Exits themselves (SANs) can be encrypted and there are several bugs on how it is documented
-locate host blah +  locate host blah 
--> Your search returns the address blah. +  -> Your search returns the address blah. 
-logon blah +  logon blah 
--> You fail to gain access to the host. +  -> You fail to gain access to the host. 
-# The target room has an AccessScramble value, which blocks remote login.  But it could be the source room blocking, so... +  # The target room has an AccessScramble value, which blocks remote login.  But it could be the source room blocking, so... 
-analyze access +  analyze access 
--> There is nothing out of the ordinary about that subsystem. +  -> There is nothing out of the ordinary about that subsystem. 
-# Well, now what?  (This is what usually keeps people from logon.  But the source room has no encryption.  So decker has bright idea:) +  # Well, now what?  (This is what usually keeps people from logon.  But the source room has no encryption.  So decker has bright idea:) 
-analyze blah +  analyze blah 
--> Analyze what?  (That doesn't work...) +  -> Analyze what?  (That doesn't work...) 
-help decrypt +  help decrypt 
--> helpfile shows no ability to decrypt exits/SANS exists +  -> helpfile shows no ability to decrypt exits/SANS exists 
-# But finally if you just do it anyway: +  # But finally if you just do it anyway: 
-decrypt blah +  decrypt blah 
--> You successfully decrypt that SAN+  -> You successfully decrypt that SAN.
-Colus — 07/22/2021 +
-So, the room is not the SAN, the exit is.  An access-encrypted room should prevent movement out, not movement in.  If encrypted SANs (Matrix exits) are a goal, then matrix exits should be 'crackable' like maglocked doors (give them a barrier rating or something similar)--but that should have no relation to the access encryption of the target room+
  
-Colus:  +So, the room is not the SAN, the exit is. An access-encrypted room can prevent movement in, forcing you to decrypt it blind.
-Related to that'you fail to X' messages when trying to do things involving encrypted subsystems are unhelpful.  In the TT, it would be clear that Scramble IC would be protecting them; here it's just a number, so the analyze command and/or the failure should elaborate. +
-Since it'not an actual visible Scramble IC blocking the subsystem or the entrance to the SAN, the failure message should indicate why you can't download a file ('The encryption on the files subsystem prevents your download.') or log on to a subsystem or host ('The encryption on the [ACIFS subsystem | remote host] prevents your logon attempt.')  +
-This came about when Khai was trying to decipher the one place in the game where a remote host (that has host encryption baked into the host) requires you to decrypt it remotely.  The decrypt and disarm commands don't cover subsystem actions (which are more common) and new deckers run into this buzzsaw a lot. +
-Colus — 07/20/2021 +
-Specifically, each color code takes up two characters on the format string limit, so one closed color code reduces it by 4 characters, two reduce it by 8...example: +
-It is a featureless cyberdeck. +
-Custom Components: +
-FUPS Port 2                       Type: Ports (FUPS)              Rating: 0 +
-FUPS Port 1                               Type: Ports (FUPS)              Rating: 0 +
-(The 2nd port has two closed color codes, notice the 8-char difference.)  +
-Colus — 07/20/2021 +
-Yes, speaking to that: In SR3 base you technically aren't able to analyze a host to see if it's decrypted before entering it, and theoretically nothing prevents you from entering it.  Once you're in, if the access subsystem is encrypted, you can't do any kind of logon operation until the encrypting IC is removed.  But I think in MM I found an example where a remote encryption preventing access is implied. +
-Colus — 07/20/2021 +
-(MM 98talking about Encrypt Access actions) +
-The opposite of Decrypt Access, this operation allows the user to encrypt a system’s access nodes. If successful, the Access subsystem will be encrypted and no one will be able to log on without first succeeding in a Decrypt Access operation. +
- +
-That implies encrypting access within a node prevents logons from outside. +
- +
-Colus idea: I just noticed (and didn't think about it until now!) that some IC in the game are Scramble IC.  Canonically, this IC would be present at the host level to block access to A/F/S subsystems (and the stuff within them, meaning hosts, files/paydata, and slaved devices).  We don't do that right now; instead there are scramble flags on subsystems, individual files, and remote exits, and we ICly assume there's file-level IC on them to decrypt.+
trix_traps.1641322312.txt.gz · Last modified: 2023/01/30 19:07 (external edit)