Jump to content
Main menu
Main menu
move to sidebar
hide
Navigation
Main page
Recent changes
Random page
Help about MediaWiki
Chucks 1E Eclipse Phase Wiki
Search
Search
Create account
Log in
Personal tools
Create account
Log in
Pages for logged out editors
learn more
Contributions
Talk
Editing
Mesh
(section)
Page
Discussion
English
Read
Edit
Edit source
View history
Tools
Tools
move to sidebar
hide
Actions
Read
Edit
Edit source
View history
General
What links here
Related changes
Special pages
Page information
Warning:
You are not logged in. Your IP address will be publicly visible if you make any edits. If you
log in
or
create an account
, your edits will be attributed to your username, along with other benefits.
Anti-spam check. Do
not
fill this in!
= Mesh Abuses = As with all things, the mesh has its darker side. At the basic level, this amounts to flamewar-starting trolls, stalkers, or griefers whose intent is to mess with others for a laugh. At the more organized level, it expands to illicit or criminal enterprises that utilize the mesh, such as selling black/snuff/porn XPs, illegal software, pirated media, or even egos. The most infamous threats—thanks both to the Fall and to the continuous sensationalism applied by media and stern authorities—are, of course, malware and hackers. Given the capabilities of modern hackers and the vulnerability of many habitats—where damage to life support systems could kill thousands—the threat may not be over-exaggerated. == Hackers == Whether individuals who are genuinely interested in exploring new technologies and seeking ways to break them in order to make them better, hacktivists who utilize the mesh in order to undermine the power of authorities, or “black hats” who seek to circumvent network security for malicious or criminal intent, hackers are a permanent fixture of the mesh. Unauthorized network break-ins, infiltration of VPNs, muse subversion, cyberbrain hijacking, data theft, cyber-extortion, identity fraud, denial of service attacks, electronic warfare, spime hijacking, entoptic vandalism—these are all common occurrences on the mesh. Thanks to smart and adaptive exploit programs and assisting muses, even a moderately skilled hacker can be a threat. In order to counter hacking attempts, most people, devices, and networks are protected by a mix of access control routines, automated software intrusion prevention systems, encryption, and layered firewalls, typically overseen by the user’s muse who plays the role of active defender. Extremely sensitive systems—such as space traffic control, life support, power systems, and hypercorporate research facilities—are usually limited to isolated, tightly-controlled, heavily-monitored, hard-wired networks to minimize the risk of intrusion from snoopers and saboteurs. Various countermeasures may be applied against such intruders, ranging from locking them out of the system to tracking them back and counterhacking. == Malware == The number of worms, virii, and other malware programs that ripped through computer systems during the Fall was staggering. Many of these were part of the netwar systems prepared by old Earth nation-states and corporations and unleashed on their enemies. Others were products of the TITANs, subversive programs that even the best defenses had trouble stopping. Even 10 years later, many of these are still reappearing, brought back to life by the accessing of some long-forgotten data cache or the accidental infection of a scavenger mucking through old ruins. New ones pop every day, of course, many of them programmed by criminal hacker out� ts, while others that enter circulation are modifications and variations of suspected TITAN designs, perhaps implying that certain parties are intentionally tinkering with this code and releasing it into the wild. Rumors and whispers circulate that some of these TITAN worms are even more potent and frightening than previously hinted at, with stunning adaptive capabilities and intelligence. These rumors are steadfastly denied by authority figures and security experts ... who then quietly turn around and do their best to ensure that their own networks remain safe.
Summary:
Please note that all contributions to Chucks 1E Eclipse Phase Wiki may be edited, altered, or removed by other contributors. If you do not want your writing to be edited mercilessly, then do not submit it here.
You are also promising us that you wrote this yourself, or copied it from a public domain or similar free resource (see
Chucks 1E Eclipse Phase Wiki:Copyrights
for details).
Do not submit copyrighted work without permission!
Cancel
Editing help
(opens in new window)
Toggle limited content width