Star Wars Roleplay: Chaos

Register a free account today to become a member! Once signed in, you'll be able to participate on this site by adding your own topics and posts, as well as connect with other members through your own private inbox!

Approved Tech SK-45-BR The Botnet - FFE

Status
Not open for further replies.
Did Someone Order a War?
SK5.png
image.jpg
Your sledgehammer of the slicing world. Image Source


Intent: Brute Force Slicing Kit. Intended for specialist technical troops or as a backup unit for more advanced slicers.
Development Thread: N/A

Manufacturer: Fire For Effect
Model: SK-45-BR The Botnet, Slicers Kit, Brute Force.
Affiliation: Fire For Effect Closed Market, Special Orders Only
Modularity: No
Production: Minor
Material: Nutorium Casing, Plexoid, Electrite Crystal, Transmission Wire
Integrated Tech: ATRS #Sliver Snake Approved

Firefor_Effect.jpg

Description:

A reliable field holocomputer hacking deck, suitable for hacking, slicing and reprogramming advanced systems in the field. Able to be worn on head, arm, or any bodypart to project an interactive holoscreen ahead of you, and operate to seem like any normal computer browsing the holonet. Easily carried, this unit is a great backup for when your subtle decks or computers fail you! Using Nutorium casing to help block signal trace on the gear physically. The tool also integrates ATRS tamper proofing tech to prevent easy duplication, or more importantly people taking the kit to pieces to analyse. ATRS stops companies rendering the technology easily obsolete in the future, but also limits any upgrades or customization of the gear that many slicers enjoy. The color of the screen can be customized to the viewers liking however, as can the fonts, language, or size of the screen up to about 5 meters big or 0.1 meters small.

Having the capability to break most high security systems currently on the market in about 5-10 minutes. The time range depends on what other systems are nearby to borrow processing time from. Versatile, compact and easily deployed, its transmission speeds are up there with some of the best gear on the market, and its encryption based on the ATRS scrambling protocols previously developed, ranks it up there with the best of them at masking identity.

The system is however not at all subtle. It is a simple 100% brute force method, only a quick and powerful one. Unless a facility, or ship is completely blocked out during the hack, or someone with equally powerful tools sits down to counter it, then the hacking is more than likely going to succeed. Using a combination of transmitted signals which bounce off ships, satellites, facilities, communicators, stations, vehicles, personal computers, you name it. If its possible to piggy back processing power off nearby systems with advanced malware attacks, this hacking kit certainly will use them too. The quality and success of the malware transmitted, would depend on the skill of the slicer or programs used.

These are not your subtle hacking tools, but in the hands of a slicer they are your reliable hammer to get the job done, or perhaps secondary kit to take with you for your jobs if the main one lets you down. Useful for example in breaching doors, overriding ship systems remotely, overriding droids, hacking accounts or stealing data. Of course unless the people at for example datacenters, large capital ships, or other specialist slicing units are sleeping, they probably have someone able to take measures to slow or counter you! However non technical troops in the field walking into your facility, your average shop, or passing freighter, most likely don't have the technicians, or top of the line equipment capable of resisting the slicing kit at all.

On average: Tracing where a hack comes from takes about 30 minutes for a gifted slicer, giving you a 20-25 minute headstart after the hack has finished. 40 minutes for your average technician, and anything up to a day or week for the average joe. In a busy city or spaceport, tracing you might take considerably longer, making busy areas with a lot of traffic the most ideal locations for this device.

Weakness:
- Very Expensive, and has high repair costs with ATRS, which limits production somewhat and lifespan.
- Brute force. Even a non slicer target will know what you are doing within a minute, but unless trained be hard pressed to stop you doing it. They will however be able to react, such as to transfer funds, move to another safer room, land their ship, etc.
- Can be countered by specialist units such as slicers, or those who know what they are doing.
- You can eventually be traced, but you will almost certainly have a headstart on your pursuer.
- Requires a fair knowledge of slicing, your average joe just isn't going to be able to work this, but you don't have to be a genius either.
- Doesn't allow any customization or the modding which most advanced slicers enjoy.

Strengths:
+ Though the target knows what is going on, due to the encryption and signal bouncing, they won't know who is doing it, unless they spend time tracing you.
+ Able to harness the processing power of nearby computers to further increase the speed of the hack, makes certain areas of ships or facilities even more vulnerable.
+ Using it in a large crowded area gives you a lot more protection, it can be unfolded to seem like a normal personal holocomputer, while you casually drink your blue milk at a busy restaurant for example, or sit in a public area out view, silently draining a nearby store of funds.
+ ATRS makes reverse engineering this tech very difficult.
+ Small, and easily carried, makes for an excellent backup deck for those jobs that go south or block your more subtle advanced deck.
 
RESEARCH REVIEW
-----
Star Wars Canon:
Pending initial review
------
Starwars Chaos:
Pending initial review
------
WITHOUT DEV THREADS
Pending initial review
------
WITH DEV THREADS
Pending Initial review
------
SUGGESTIONS
Pending Inital review
 
[member="Sere Reene"]
The image source should link to the page where the image was located, preferably from the initial artist if possible. So if you found it on deviantart, artstation, etc, please link to the actual page that hosts the image.
 
Status
Not open for further replies.

Users who are viewing this thread

Top Bottom