From: | dbuehrer@****.org (David Buehrer) |
---|---|
Subject: | Re: Maul the Decker -Repl |
Date: | Mon, 30 Sep 1996 11:43:13 -0600 (MDT) |
|BULL, DON'T READ THIS!
|Well, I like the concept, but I think it has the following problem: ICE
|can do the things it can do because it is hooked into the guts of its
|own system. Letting a program FROM ANOTHER COMPUTER use those hooks is
|a recipee for a really insecure system, not a secure one.
Hmmm... So if you did this a really bright decker might
find a way to use it against the system. Actually, I kinda
like that. It could be part of the adventure.
|Perhaps what you want are Smart Frames from the other computers or
|Semi-Autonomous KnowBots, which can move from system to system much
|easier. Easier still: cascading party ice.
I haven't gotten to that part of the rules yet. I'll get back to you
tomorrow.
|If you want a deadly idea for a system, there is a reference in DNA/DOA
|to Aztechnologies' system: 30 levels (i.e. hosts) that you have to get
|through one at a time (fighting a cumulative security tally and
|accumulating damage by acid and marker programs) "including the
|legendary level 13 where the experimental black ice gets tested" or
|something like that.
Yikes!
-David
/^\/^\/^\/^\/^\/^\/^\/^\ dbuehrer@****.org /^\/^\/^\/^\/^\/^\/^\/^\
"Spare the duct tape, spoil the job." - endnote
||||||||||||||||||||||||||||||ext.132||||||||||||||||||||||||||||||