this post was submitted on 20 Nov 2024
15 points (100.0% liked)
rpg
3172 readers
11 users here now
This community is for meaningful discussions of tabletop/pen & paper RPGs
Rules (wip):
- Do not distribute pirate content
- Do not incite arguments/flamewars/gatekeeping.
- Do not submit video game content unless the game is based on a tabletop RPG property and is newsworthy.
- Image and video links MUST be TTRPG related and should be shared as self posts/text with context or discussion unless they fall under our specific case rules.
- Do not submit posts looking for players, groups or games.
- Do not advertise for livestreams
- Limit Self-promotions. Active members may promote their own content once per week. Crowdfunding posts are limited to one announcement and one reminder across all users.
- Comment respectfully. Refrain from personal attacks and discriminatory (racist, homophobic, transphobic, etc.) comments. Comments deemed abusive may be removed by moderators.
- No Zak S content.
- Off-Topic: Book trade, Boardgames, wargames, video games are generally off-topic.
founded 1 year ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
Really depends on the specifics of your setting doesn't it. A lot of things aren't going to be available outside of the local network which means you'd need to logistically get into the building via other skills. Most of the time your not going to be able to access what you want from a safe location.
I would second this. I've definitely spent a lot of time with this question.
For my setting, I try to lean into realism. So the first thing we have to ask is what "hacking" means in these situations. Hacking shouldn't be magic.
First, hacking typically looks like using a system in the way it was intended by someone who wasn't intended to use it or in some other modified way. So to break into a CCTV system, ask how proper users would use it, and then how to bypass that.
Second, the more advanced technology gets, the more advanced security gets. Think about what it would take to hack into a CCTV system today. You'd likely need to steal a password to use the actual software or snoop the raw data signal of a camera and then decode it. In the future, this isn't going to be less secure.
So if you wanted to hack into CCTV camera, players should not be able to roll and then see anything anywhere. They should need to find some physical connection and/or find some way to obtain credentials to a remote access system. This could be by forging biometrics of someone with access, tricking someone with access to logging in for them, or finding leaked access credentials online. And all of these should have limitations: how long they can be logged in; what they can do without triggering detection; how long it takes to call files; etc.
These same principles apply to a social media search. It wouldn't really make sense for everyone's data to be readily available to anyone with basic hacking proficiency in some kind of easy database. Assume online privacy moves forward at the same pace or greater than privacy invasion. You can't just type "HACK!" and see someone's real-world location. You could probably find a publicly listed address or maybe find a license plate reading with a time and place. But you're going to have to still do a lot of the conventional investigation work to find someone: figure out where they work, hang out, shop, etc. and look for a point where they slipped up, either in biospace or online.