Well-Known Member
OUT OF CHARACTER INFORMATION
Intent: To submit an anti-slicing technology for use in future submissions and role-playing.
Image Source(s): N/A
Canon Link(s): N/A
Primary Source(s): N/A
PRODUCTION INFORMATION
Manufacturer: Visanj T’shkali
Affiliation: Closed-Market
Model: Slicer’s Curse
Modularity: None
Production: Mass-Production
Material(s) / Component(s):
In a galaxy where computerization and automation is increasingly found and relied upon, securing those systems and the data they contain is paramount. Slicers and slicing grow more sophisticated and common every day. To guard against these threats, the “Slicer’s Curse” was born.
Most slicing attacks use one or two different vectors, and rely on speedy, overwhelming attack methods to overpower and overcome their targets. Few slicers have a wide array of tools, software, and computers, with most restricted to common tools, portable kits used to overcome common defenses. Fewer still are the slicers who have unlimited time, sophisticated expertise, and ultra-powerful, specialized equipment sufficient to tackle the best and most secure systems’ defenses. Bearing this in mind, the “Slicer’s Curse” was designed to frustrate and confound the abilities and resources of slicers throughout the galaxy.
Constant systems’ diagnostics and monitoring is used, able to detect and identify an attack almost as it begins. Once found, the “Curse” begins, throwing up a number of self-regenerating layers of pyrowalls, slowing an attack to a painful pace, all the while developing a sophisticated number of tactics and measures to defeat the attack. Simultaneously, it launches a powerful encryption of system files using layered quantum-spread bio-hexacryption, making it impossibly difficult for attackers to decrypt and defeat security coding. A series of counter-slicing methods are launched, attacking the slicer’s systems in return. Once inside, they begin to launch a series of malware, spyware, and disruptive attacks, both diminishing the enemy systems and at the same time locating, targeting, and tracking the slicers’ themselves. Their files copied then corrupted, their hardware malfunctioning, systems failing, the slicer will find themselves increasingly vulnerable the longer they continue their attack.
If the enemy persists, a series of powerful surges is used. Wirelessly, this can disable enemy systems, burn out hardware, shut down interfaces and connectivity, and more. For the poor droid attacking directly, they risk being utterly – and possibly permanently – knocked offline. For a cyborg, the risk is even greater. Surges can result in burns, exceeding pain, unconsciousness, neural damage, brain damage, potentially even death. At the very least, cybernetics can be damaged or destroyed, possibly permanently.
In short, the “Curse” promises to make the task of slicing into protected systems too long, too hard, and too costly for anyone to persist in their attacks. The worst part is, a slicer won’t know that a system is “Cursed” until they commence an attack, and once they do, they will feel the full ramifications of their discovery. How severely is up to them.
PERMISSIONS:
Locke and Key Mechanics’ Padlocke requested HERE. Authorization granted HERE.
All other components are 'open-market' and/or canon technologies.
Intent: To submit an anti-slicing technology for use in future submissions and role-playing.
Image Source(s): N/A
Canon Link(s): N/A
Primary Source(s): N/A
PRODUCTION INFORMATION
Manufacturer: Visanj T’shkali
Affiliation: Closed-Market
Model: Slicer’s Curse
Modularity: None
Production: Mass-Production
Material(s) / Component(s):
- Socketguards
- System Diagnostic Filters
- Scomp-Spikers
- Quantum-spread Bio-Hexacrypt Encoders
- Slicer Units
- Pyrowalls
- Mithril Software
- Aegis SH13LD
- Padlocke Software
- Constant systems monitoring and diagnostics ensures vigilance against slicing attempts, while regular memory wiping and re-coding provides systems with up-to-date protection.
- Upon detection, numerous replicating pyrowalls, dynamic encryption protocols, and code-shifting occurs immediately. The effect is like opening a locked door, to find another locked door, to find another locked door, and so on, with new doors being created each time one is opened. Coding changes each time, requiring all new decryption and attack methods. Only the most gifted slicers using the most powerful tools will stand any chance of resolving this tedious challenge.
- While slicers attempt to bypass security, a secondary counter-attack using malware, spyware, etc. is launched, invading the slicer’s systems, stealing files, scrambling them, infecting whole systems with viruses, etc. The longer the slicer tries to attack the system, the more vulnerable his own systems become.
- Finally, a modified scomp-spike will deploy a series of potent surges meant to cause serious damage to attacking systems, including cybernetics.
- Easily able to frustrate most slicers, using redundant security protocols, encryption, counter-slicing, and even retributive software and power surging. A single slicer – even well-equipped and with time available – would find bypassing this system incredibly challenging, if not impossible. For teams of slicers, this may still take days or even weeks to do, and the success rate once inside might be far less than hoped for.
- Power surges will overload computer systems, destroy or disable components such as RAM, hard drives, interfacing components, circuitry, etc. If this occurs wirelessly, the damage is likely lower but still ‘painful’, however for those trying via direct interfaces, the damage will be considerably more severe. For someone attempting it through a cybernetic connection directly, the result may be severe injuries and possibly death, and will at minimum result in considerable anguish, serious maybe permanent damage to cybernetics in question, and potential brain / nervous system damage that might be long-lasting or permanent.
- Counter-slicing protocols can locate and track the source of an attack, and will permeate an attacker’s systems for data before commencing disabling attacks. The longer an attack persists, the more vulnerable the attacker(s) become(s).
- Although incredibly difficult to overcome, no system is perfect. A well-equipped, experienced, and skilled slicer, or better, team of slicers can possibly – with sufficient time – eventually overcome this system, though not without serious difficulty and likely significant compromise and/or damage to their own tools / systems / files.
- A secondary system will not work in tandem with the “Curse”, due to programming limitations, meaning a successful slicing attack will result in protected systems and data files becoming vulnerable, to varying degrees of vulnerability and may result in some or all systems being compromised. Thus, once defeated, there is little that can be done to reverse or counter the defeat, short of shutting down the compromised system(s).
- Due to the nature, size, and complexity of the "Slicer's Curse", it cannot be installed on smaller systems such as datapads, onboard computers in armor, speeder bikes, or others. It can only be used on ships and vehicles larger than 20m.
- The system is heuristic and can learn to become more efficient, however a more novel, creative, or clever approach may be more successful and allow faster and less risky attacks with significantly higher success rates.
In a galaxy where computerization and automation is increasingly found and relied upon, securing those systems and the data they contain is paramount. Slicers and slicing grow more sophisticated and common every day. To guard against these threats, the “Slicer’s Curse” was born.
Most slicing attacks use one or two different vectors, and rely on speedy, overwhelming attack methods to overpower and overcome their targets. Few slicers have a wide array of tools, software, and computers, with most restricted to common tools, portable kits used to overcome common defenses. Fewer still are the slicers who have unlimited time, sophisticated expertise, and ultra-powerful, specialized equipment sufficient to tackle the best and most secure systems’ defenses. Bearing this in mind, the “Slicer’s Curse” was designed to frustrate and confound the abilities and resources of slicers throughout the galaxy.
Constant systems’ diagnostics and monitoring is used, able to detect and identify an attack almost as it begins. Once found, the “Curse” begins, throwing up a number of self-regenerating layers of pyrowalls, slowing an attack to a painful pace, all the while developing a sophisticated number of tactics and measures to defeat the attack. Simultaneously, it launches a powerful encryption of system files using layered quantum-spread bio-hexacryption, making it impossibly difficult for attackers to decrypt and defeat security coding. A series of counter-slicing methods are launched, attacking the slicer’s systems in return. Once inside, they begin to launch a series of malware, spyware, and disruptive attacks, both diminishing the enemy systems and at the same time locating, targeting, and tracking the slicers’ themselves. Their files copied then corrupted, their hardware malfunctioning, systems failing, the slicer will find themselves increasingly vulnerable the longer they continue their attack.
If the enemy persists, a series of powerful surges is used. Wirelessly, this can disable enemy systems, burn out hardware, shut down interfaces and connectivity, and more. For the poor droid attacking directly, they risk being utterly – and possibly permanently – knocked offline. For a cyborg, the risk is even greater. Surges can result in burns, exceeding pain, unconsciousness, neural damage, brain damage, potentially even death. At the very least, cybernetics can be damaged or destroyed, possibly permanently.
In short, the “Curse” promises to make the task of slicing into protected systems too long, too hard, and too costly for anyone to persist in their attacks. The worst part is, a slicer won’t know that a system is “Cursed” until they commence an attack, and once they do, they will feel the full ramifications of their discovery. How severely is up to them.
PERMISSIONS:
Locke and Key Mechanics’ Padlocke requested HERE. Authorization granted HERE.
All other components are 'open-market' and/or canon technologies.