I am reading all the security stuff, how effective the AI's work,all the various scanning methods, surveillance, etc... So what I am trying to figure out is how exactly are we supposed to do missions without being identified? Or sneak illegal materials into areas where we need them?
With all the swarm bots, sniffers, scanners, analyzers, AI security, etc... just how are we supposed to passively bypass them?
Plus jammers are written up to be the cure all for aggressively blocking all detection, but they shouldn't be.
So any security breaching experts around here? You have a new student.
Welcome! These forums will be deactivated by the end of this year. The conversation continues in a new morph over on Discord! Please join us there for a more active conversation and the occasional opportunity to ask developers questions directly! Go to the PS+ Discord Server.
Security
Tue, 2010-10-19 02:45
#1
Security
Mea Culpa: My mode of speech can make others feel uninvited to argue or participate. This is the EXACT opposite of what I intend when I post.
root@Security
[hr] Assuming electricity is still used to bear signals, a well placed dust cloud can perform a Tempest hack without ever having to touch the systems if improper Faraday caging is used. The other gaping weak point for security are muses. Muses probably handle all of someones passwords, and muse-hacking is a hell of a lot easier than trying to hack the ICed-to-the-logic-gates security system containing corporate records. And, of course, the worlds best solution to massive computer security is lead-pipe cryptanalysis.@-rep +1
|c-rep +1
|g-rep +1
|r-rep +1
]