Cyberdeck
Advanced Cybernetic Hand | |
---|---|
TBD | |
Type | Cyberware |
Tech Level | TL–8+ |
Cost | Cr5,000+ |
Size | 0.2 liters |
Weight | 0.5 kg |
Manufacturer | Various |
Reference | TBD |
TBD |
A Cyberdeck is a sophisticated device used to access cyberspace.
- It is a computer and an electronic device.
- The exact size and dimensions of individual cyberdecks vary.
Description (Specifications)
Public-access information, such as promotional materials, public accounts and so forth can generally be viewed in cyberspace without any difficulty, accessed through white colored nodes that act as navigation hubs. Hidden data, private and restricted data and data rivers can only be viewed and manipulated with successful intrusion.
Intrusion
Intrusion rests on overcoming a node’s security.
To attempt intrusion one must be using a cyberspace deck: traditional hacking techniques of the kind found in the contemporary world can be useful in Traveller but generally intrusion attempts need to be direct assaults. The deck’s capacity to run software is important.
If the Security program is equipped with a Hunter/Killer program – usually only available at higher levels of security – the Hunter/Killer launches a reverse attack immediately against the intruding deck.
Watchdogs
The amount of time a jockey has inside a penetrated node depends on how long they can stay hidden from internal detection programs – Watchdogs – that are constantly hunting and alert for unfamiliar data signatures within the system. Subtract eight from the result of the modified Intrusion roll: this is the number of minutes, in d6, (and always with a minimum of 1d6) one has before detection is likely. Software running on the deck can extend this time or render the deck invisible to Watchdogs.
History & Background (Dossier)
Successfully within a node, one is free to peruse, manipulate, modify, copy or destroy data. This requires an appropriate program to be running; there are discrete programs for each type of data. Some programs have one function (such as copy or delete), while others have multiple functions. The more functions, the higher the program’s level.
- Doing any action to data, be it a simple copy or a more destructive approach, takes time.
- Data sets have their own protection algorithms that slow-down manipulation speeds of assaulting decks. How long it takes to manipulate any set of data, irrespective of what it is, depends on the data type.
Image Repository
No information yet available.
References & Contributors (Sources)
This article is missing content for one or more detailed sections. Additional details are required to complete the article. You can help the Traveller Wiki by expanding it. |
- Mongoose Traveller: Cybernetics Mongoose Publishing 2011, pg 75.
- Traveller Wiki Editorial Team
- Author & Contributor: Lord (Marquis) and Master Scout Emeritus Adie Alegoric Stewart of the IISS
- Author & Contributor: Lord (Marquis) and Master of Sophontology Maksim-Smelchak of the Ministry of Science