|
Post by Jase Dallas on Oct 4, 2013 21:26:00 GMT -5
Hydra Holo-wrist computer Encryption Method: Hashing Encryption- creates a unique, fixed-length signature for a message or data set. Hashes are created with an algorithm, or hash function, and people commonly use them to compare sets of data. Since a hash is unique to a specific message, even minor changes to that message result in a dramatically different hash, thereby alerting a user to potential tampering. A key difference between hashing and the other two encryption methods is that once the data is encrypted, the process cannot be reversed or deciphered. This means that even if a potential attacker were able to obtain a hash, he or she would not be able to use a decryption method to discover the contents of the original message. Some common hashing algorithms are Message Digest 5 (MD5) and Secure Hashing Algorithm (SHA). Use: While connected with the controller (Echo and her computer system) the user has access to various databases which will allow the user to send and received data and pictures. Be able to hack into different computer systems. Have data uploaded and used while on the move. Able to access CCTV cameras and other technology devices. Also able to have a map displayed on the screen.
|
|
|
Post by Lilly OzGud on Oct 4, 2013 21:34:36 GMT -5
I don't understand, what are we voting on? Does this picture have any information to go with it by chance? You can edit the thread to include the information rather than using the "Reply" feature now that you're a member! Thank you!
~Rosa~
|
|
|
Post by Anton Kresnikov on Oct 5, 2013 3:52:54 GMT -5
My particular feeling on the idea is that while the computer system itself is not so out of the realm of possibility, that the primary function of it may be severely hampered by the fact that very few systems would be also accessible via wireless connection. The big issue with suddenly connecting to a camera system as I see it is that more often than not, CCTV uses a hard wired network to prevent people from randomly hacking into them for control. It would be one thing if the system itself had some sort of cellular connection to a satellite that could then route into systems throughout wherever, but a space station likely isn't going to have that sort of satellite in orbit for that sort of connection.
I could see it being used to connect at certain locations, or accessing systems that were set up well in advance, even the sort of PDA functions for maps and the like, but I doubt it would be effective as an on-the-fly sort of tool for security access.
|
|
|
Post by MADDOX on Oct 5, 2013 11:27:30 GMT -5
I agree with it all. I'm of a mind that in this future they could have the technology (especially with Echo's help) to create this kind of tech. That said, I don't know enough about that stuff to say if the "how" makes sense and tend not to get that detailed for that reason. It's enough for me to believe it's possible without having to know "how" it's possible. At least in this case.
|
|
Bomont
Commoner
The Engineer
Posts: 10
Superior: JSS Handler (NPC)
OCCUPATION/SPECIALTY::: Engineering
:::::::::::::::::::::HGT:::::::::::::::::::: 5'7''
:::::::::::::::::::::WGT:::::::::::::::::::: 133 lbs
:::::::::::::::SCENT:::::::::::::::: Under the daily grease, oil and metal scents she has base notes of cinnamon and vanilla, with hints of jasmine and rose.
++++++ WORDS +++++: "Sure I let it cross me mind, then I chose to think about another something."-- Bomont
|
Post by Bomont on Oct 5, 2013 12:28:24 GMT -5
I agree with both! Given Echo's tech knowledge and ability to create things I could go along with it if the rest of the group was in agreement! Vid has some valid points though, about the difference between hacking a hardline and wireless. I think there should be limitations, such as the hardline needing to be exposed in an open line of sight or through general plating. So special armor walls or plating around wiring would stop it? Those are my ideas!
~Rosa~
|
|
|
Post by Papa Cain on Oct 5, 2013 17:16:05 GMT -5
If you want more belief with hardwired systems, it's not completely impossible to let device do something close to an emp. Something to mess with the signal for a few seconds, or hell not even need it. But he could have a wifi device that he slips between the camera and it's cable which gives him access to the the entire hardwire system as they tend to do in spy like movies or ya know... last week's episode of Elementary.
|
|
|
Post by Anton Kresnikov on Oct 5, 2013 20:11:11 GMT -5
Also if you have general questions about this sort of thing, I'm an IT professional with many years experience in network topography, security, as well as the installation of camera and security systems. Feel free to ask any questions.
|
|