Back to the main page

Mailing List Logs for ShadowRN

Message no. 1
From: shadowrn@*********.com (Steve Mancini)
Subject: Encrypted Messages
Date: Mon Jul 16 20:55:01 2001
Okay - I survived a weekend in Vegas with the hacking community elite.
*snicker*

But it brought to mind an idea I have..

Imagine a Fixer who owns a small time radio station. He broadcasts
a completely legal program.

But he uses steganography in the broadcasts to send messages to
specific runners - so that you hear Milli Vanilli.. and I hear
a pre-recorded message that there is a job on the table and
if I want to accept it to be the 10th caller at 1-800.... :)

Likewise, a runner team might also be able to do the same thing.
Use stego in their radio transmissions

Think I am drilling into specifics about crypto the way military
people dwell on combat rules? Am I looking too deeply into something
just called Crypt 9 ? :)

Da Minotaur
Message no. 2
From: shadowrn@*********.com (Damion Milliken)
Subject: Encrypted Messages
Date: Tue Jul 17 04:50:01 2001
Steve Mancini writes:

> Think I am drilling into specifics about crypto the way military
> people dwell on combat rules? Am I looking too deeply into something
> just called Crypt 9 ? :)

It might be considered somewhat excessive if you want to put custom rules
down for it :-), but I do feel that a fairly "real" explanation of things
like "Crypt 9" adds significantly to the atmosphere of the game. And it also
contributes much to the storyline and feel of NPCs if it's carried out in
such a way.

--
Damion Milliken University of Wollongong
Unofficial Shadowrun Guru E-mail: dam01@***.edu.au
-----BEGIN GEEK CODE BLOCK-----
Version: 3.12
GE d- s++:-- a25 C++ US++>+++ P+ L+>++ E- W+ N++ o@ K- w+(--) O-@ M--
V- PS+ PE- Y+ PGP-@>++ t+ 5 X+>+++ R++ !tv(--) b+ DI+++@ D G+
e++>++++$ h- r++>+++ y->+++
------END GEEK CODE BLOCK------
Message no. 3
From: shadowrn@*********.com (Gurth)
Subject: Encrypted Messages
Date: Tue Jul 17 05:30:03 2001
According to Steve Mancini, on Tue, 17 Jul 2001 the word on the street was...

> Imagine a Fixer who owns a small time radio station. He broadcasts
> a completely legal program.
>
> But he uses steganography in the broadcasts to send messages to
> specific runners - so that you hear Milli Vanilli.. and I hear
> a pre-recorded message that there is a job on the table and
> if I want to accept it to be the 10th caller at 1-800.... :)

Not that I know anything at all about this, but it seems to me that you
wouldn't need a radio station for that, since it sounds like you could
also incorporate it into an otherwise innocent phonecall. So the fixer
phones up a shadowrunner and talks about the weather for five minutes, but
the runner hears a message to meet a Johnson at the Pink Pitbull at 20:00.

--
Gurth@******.nl - http://www.xs4all.nl/~gurth/index.html
A bad day fishing is still better than a good day dying.
-> NAGEE Editor * ShadowRN GridSec * Triangle Virtuoso <-
-> The Plastic Warriors Page: http://plastic.dumpshock.com <-

GC3.12: GAT/! d-(dpu) s:- !a>? C+@ UL P L++ E W-(++) N o? K w+(--) O V?
PS+ PE(-)(+) Y PGP- t@ 5++ X(+) R+++(-)>$ tv+ b++@ DI- D+ G+ e h! !r y?
Incubated into the First Church of the Sqooshy Ball, 21-05-1998
Message no. 4
From: shadowrn@*********.com (Damion Milliken)
Subject: Encrypted Messages
Date: Tue Jul 17 05:55:00 2001
Gurth writes:

> Not that I know anything at all about this, but it seems to me that you
> wouldn't need a radio station for that, since it sounds like you could
> also incorporate it into an otherwise innocent phonecall. So the fixer
> phones up a shadowrunner and talks about the weather for five minutes, but
> the runner hears a message to meet a Johnson at the Pink Pitbull at 20:00.

Yeah, but _style_, Gurth, that's what it's all about :-).

--
Damion Milliken University of Wollongong
Unofficial Shadowrun Guru E-mail: dam01@***.edu.au
-----BEGIN GEEK CODE BLOCK-----
Version: 3.12
GE d- s++:-- a25 C++ US++>+++ P+ L+>++ E- W+ N++ o@ K- w+(--) O-@ M--
V- PS+ PE- Y+ PGP-@>++ t+ 5 X+>+++ R++ !tv(--) b+ DI+++@ D G+
e++>++++$ h- r++>+++ y->+++
------END GEEK CODE BLOCK------
Message no. 5
From: shadowrn@*********.com (S. Johnson)
Subject: Encrypted Messages
Date: Tue Jul 17 20:10:01 2001
>Gurth writes:
>
> > Not that I know anything at all about this, but it seems to me that you
> > wouldn't need a radio station for that, since it sounds like you could
> > also incorporate it into an otherwise innocent phonecall. So the fixer
> > phones up a shadowrunner and talks about the weather for five minutes,
>but
> > the runner hears a message to meet a Johnson at the Pink Pitbull at
>20:00.
>
>Yeah, but _style_, Gurth, that's what it's all about :-).


I think i heard of something like this before... oh yes. Thieves Cant.(sorry
had to be said)

ring ring. 'hello' "hi its johnson how are you" 'good am thinking of going
for a drive'(delivery run?)"mind if i go with" (got one if you interested)
'sure, should i pick you up?'(meet where?) "(time and place) and bring a
date/friend/pal/whatever"

just add a few more words and you get some more feel and depth to the whole
shadowrunning theme.

Sagys
_________________________________________________________________
Get your FREE download of MSN Explorer at http://explorer.msn.com
Message no. 6
From: shadowrn@*********.com (Zixx)
Subject: Encrypted Messages
Date: Thu Jul 19 16:30:01 2001
Damion Milliken wrote:
> Gurth writes:
> > Not that I know anything at all about this, but it seems to me
> > that you wouldn't need a radio station for that, since it sounds
> > like you could also incorporate it into an otherwise innocent
> > phonecall. So the fixer phones up a shadowrunner and talks about
> > the weather for five minutes, but the runner hears a message to
> > meet a Johnson at the Pink Pitbull at 20:00.
>
> Yeah, but _style_, Gurth, that's what it's all about :-).

Not to mention that when you broadcast the the message, it's
impossible to figure out who it went to. In Gurth's version, if
either the sender or the recipient are under survailance, you could
figure out there was a contact between the two of them. In the
broadcast scenario, that's not possible. You could even do the whole
thing mixen-style, and use serveral stations that exchange the
messages, re-crypt them and then send them out in random patterns.
That way, I couldn't even tell, when the message is recieved. For
anyone interested, read Bruce Schneiers "Applied Crypthology".

Zixx
Message no. 7
From: shadowrn@*********.com (Steve Mancini)
Subject: Encrypted Messages
Date: Thu Jul 19 17:05:02 2001
> Not to mention that when you broadcast the the message, it's
> impossible to figure out who it went to. In Gurth's version, if
> either the sender or the recipient are under survailance, you could
> figure out there was a contact between the two of them. In the
> broadcast scenario, that's not possible. You could even do the whole
> thing mixen-style, and use serveral stations that exchange the
> messages, re-crypt them and then send them out in random patterns.
> That way, I couldn't even tell, when the message is recieved. For
> anyone interested, read Bruce Schneiers "Applied Crypthology".
>

Funny you should mention Bruce. It was at Defcon this last weekend past
that this idea came from a discussion in his "Ask Bruce Questions"
meeting. The group was talking about stego in general and my mind
wandered to shadowrunners who worked for a 'Charlie' ala Charlies
Angels - who spoke to them over the radio.

-Da Minotaur
"For the last time I am not a fed so stop trying to SPOT me!"
Message no. 8
From: shadowrn@*********.com (Zixx)
Subject: Encrypted Messages
Date: Thu Jul 19 17:55:01 2001
Steve Mancini wrote:
> Funny you should mention Bruce. It was at Defcon this last weekend
> past that this idea came from a discussion in his "Ask Bruce
> Questions" meeting. The group was talking about stego in general
> and my mind wandered to shadowrunners who worked for a 'Charlie'
> ala Charlies Angels - who spoke to them over the radio.

Well, talking about crypto and not comming up with Bruce would be
funny :)

Zixx

Further Reading

If you enjoyed reading about Encrypted Messages, you may also be interested in:

Disclaimer

These messages were posted a long time ago on a mailing list far, far away. The copyright to their contents probably lies with the original authors of the individual messages, but since they were published in an electronic forum that anyone could subscribe to, and the logs were available to subscribers and most likely non-subscribers as well, it's felt that re-publishing them here is a kind of public service.