**PDA Construction and Hacking** *Old proposal section. See header a for rewritten content* The idea is to expand on what you can do with PDA's. There are stock parts but they're all basically useless. Only the Job disks matter right now. This system should be like other systems in the game, where if you invest some time into it you can do some fun and useful stuff with them. Not as complex as, say, circuits, but not as impactful as Nanites for example. This also introduces Hacking and some new possibilities to forgo the emag. Not aiming to replace it nor be half as strong, mind you. The Software to be introduced should all LOOK and FEEL similarly to when you emagg a COMPUTER and use the emagged software. The fast text showing up, the colours, the binary showing up is what makes it cool. There should also usually be a loading time in using the software similar to the downloading of programs. The process of hacking, between Buying the LAPTOP and parts, setting them up and fully hacking a COMPUTER Legally should take between 15 to 20 minutes. Illegal hacking requires Encryption Keys aviable from the RD console or by multi-tooling a server from the server room. When a COMPUTER is mentioned this means TABLETS, PDAS or LAPTOPS. When something can be used wirelessly it requires a Network Card component. # PDA Hacking *Proposal by PinkSuzuki* *Section written by itsmeow - content is collaborative* *Hack ideas by PinkSuzuki* *Encryption keys and packet spoofing by itsmeow* Currently, PDAs sorely lack in functionality outside of their intended purposes for messaging. Modular computers are an advanced system capable of doing much more, and this proposal aims to add wider integration between Modular computers and other game systems. Adding the ability to hack and modify the hardware and software of PDAs (and modular computers) will make them more interesting to engage with and create new avenues of conflict, exploration, and learning. The goal of this hacking proposal is to open up avenues to modify computer systems without requiring direct physical access, while still requiring some level of espionage, stealth, and deception. Currently, for example, to access the message monitor console in any capacity you must trespass into two high security areas and steal a potentially hidden password, then escape without getting caught. Introducing a way to steal messages from a single device, wirelessly, using one-time-keys (encryption keys) would allow an aspiring criminal to engage in lower-level crime while accomplishing similar goals. This is because acquiring the keys requires other criminal activity that may leave evidence. ## Hardware Hacks Hardware hacks enable new functionality for a device locally, by unlocking the underlying features or adding components on the device. By engineering your Modular Computer, you can enable previously impossible functions such as a larger battery or the ability to edit your Identifier's display name. Consider this almost a 'skill tree' for your device - using points to unlock functionality, however it requires time or resource investment. ### How-To Hacking a PDA will always require a USB connection to a laptop. In order to unlock hacks, you will need to perform a type of minigame (similar to Genetics, like number matching). Some illegal hacks will require encryption keys to be unlocked. Some hacks have a more difficult minigame than others. After a hack is unlocked, it can be selected and installed onto the components of a connected device. Only select amounts of hacks can be present on a given component at a time. Some hacks are mutually exclusive. You may only be able to select 1-2 hacks per component. ### Hacks Available Legal hacks are not criminally prosecuted, as they expand on the functionality of the device in a generally non-harmful manner. Illegal hacks break the device in some way or unlock 'harmful' content. Using Illegal Software drains battery extensively. Legal and Illegal hacks are mutually exclusive. #### Network Card - **Advanced Software Tracking (Legal):** The user is able to track hacked software that is running, legal or illegal. #### Area Power Connector - **Battery Share (Legal):** This device is able to transfer its Battery to anything that can store power. - **APC Shutdown (Illegal):** Able to shutdown a selectable APC for 1 minute (requiring manual override). You must be in physical vicinity to the APC. #### Power Cell Controller - **Capacity Overdrive (Legal):** Increases the Battery's capacity. - **Capacity Overcharge Dump (Illegal):** This device is able to shut down COMPUTERS in a small radius. #### Hard Drive - Legal - Makes the device invulnerable to Information Theft - Illegal - This device is able to steal other device's Message logs and notes wirelessly which can then be printed. #### Identifier - Legal - The user can choose a custom Job Title and colour, these will be displayed instead of the actual ones. - Illegal - The user can choose a custom Name. This is the only thing that will be displayed. #### Primary Card Reader - Legal - Illegal - Stores bank details of the fitted ID. The user is then able to fit another ID and select it, transfering all future paychecks of the original ID into the new one instead. #### Secondary Card Reader - Legal - Illegal - This component stores the access of the ID fitted last and creates a false copy on the Primary slot, if it is empty. #### CPU - Legal - This device is able to produce 10 credits every 2 minutes. This software needs to be running and will take a lot of battery while doing so. These credits can be manually redeemed and will go towards the ID fitted in them (or saved for a later date). - Illegal - This device is able to steal 20 credits per minute from random budgets. This software needs to be running and will take a lot of battery while doing so. These credits can be manually redeemed and will go towards the ID fitted in them (or saved for a later date). #### Printer - Legal - The COMPUTER is able to send faxes but not recieve. - Ilegal - The user is able to create new bank accounts for free (and print the paper like a console would). #### Camera - Legal - Camera range is now custumizeable (like a normal camera). - Illegal - Plants a bug on another COMPUTER's camera wirelessly. The user is able to make use of that camera like a spyglass. While the bug is active the Camera module will use up a lot of power of the victim's COMPUTER. #### Sensor Package #### Radio Card - Legal - - Illegal - The user is able to select a frequency to spy on. Anything said in that frequency while the Software is running is transcribed into the program without timestamps. #### Job Disks - Legal - - Illegal - Accessing any software from this hacked jobdisk will brick the phone by destroying the Hard Drive. ## Software Hacks ### Local Hacks NtOS incudes several hidden 'debug' features that can be unlocked by manipulating hardware and 'hacking' the device's CPU. This adds the ability to install hidden software on the device. This enables various debug apps, such as a packet spoofing program that can be used to send malicious packets to other devices. It also enables a utility for reading packets currently being sent on the network. Select hardware hacks may also enable additional software functionality, taking up space on the device. This limits the amount of hacked software available to the user. ### Packet Spoofing Packet Spoofing is a new system integrating NTNet and PDAs. Physical servers will now exist for multiple systems in the game, such as security records, medical records, crew manifest, payroll, and (already existing) telecomms. These systems will now communicate via NTNet, and have specified message formats that distinguish them from other servers. For example, in order to read security records, a PDA will now have to send a successful "get_security_records" packet to the Security server. This will make individual programs susceptible to espionage and server outages. In order to access secure data, you will need encryption keys. #### Encryption Keys Encryption keys are builtin to IDs with access to devices - for example Security IDs will have access to security records encryption keys. This is how PDAs will automatically have access to job related servers. For our aspiring antagonist, they can either steal encryption keys from the server by physically breaking into the server room, or they can steal the relevant ID access. This gives unlimited future access to the stolen credential, since you are essentially stealing an ID. It is more difficult to do, however, and is more akin to breaking into Telecomms to use the message monitor. It is not the core focus of this proposal. 'Generalized' encryption keys can also be obtained by hacking devices or intercepting network traffic, also including some type of minigame. These are limited (one-time) use keys that can be used on hardware hacks or to send malicious packets to a device they do not have a specialized key for. This is the main way hacking is controlled mechanically. These keys allow smaller hacks such as editing a name on the manifest or setting someone to arrest. Generalized keys can also be obtained for TC. ## Hacking Forensics When a hack is performed, it should leave some type of evidence. Usually, this would be in the form of logs. Ingame logs for various NTNet actions would be added to the game, accessible only by high-ranking staff, and only by being physically present in the server room. This limits the ability to passively monitor logs. The AI may also have the ability to view logs, but it would take time to switch between individual logs, making it impossible to watch all logs at one time. There could also be a small delay on logging activity, such as one minute, to allow room for cyber-attacks to occur. We could also partially obfuscate the logs by using "IP Addresses" as a digital fingerprint, requiring an investigator to determine which device it corresponds to. This could involve spoofing a packet to the device, requesting its ID name. A smart antagonist might figure out a way to disable this functionality and hide their identity, however, physically checking the IP Address of the device by opening the Settings menu could expose their identity. ## Additional Improvements on Modular Computers Alongside new hacking systems, in order to implement these we need to make some changes to modular computers. ### TODO List ~~1 - Reduce the ammount of charge on COMPUTER powercells.~~ [J] **DONE** *Basically just reduced the quality of the Stock Battery on PDAs instead.* 1.2 - Make PDAs rechargeable on Cell Chargers. 2 - Make all advanced stock parts available on the modularpc vendor. [J] **ONGOING NEEDS PRICE CHANGES** 3 - Add a Camera component. 4 - Remove the laptop vendor. [J] 5 - Make TABLETS distinct from PDAs in functionality (a direct upgrade). ~~5.1 - TABLETS can fit parts meant for LAPTOPS.~~ [J] **DONE** 5.2 - Add the ability to change the colour of tablets. 5.3 - Add more tablet colours. [J] **ADDED 3 SO FAR** 5.4 - Add the syndicate coloured tablet variant to the modularpc vendor when hacked. ~~5.5 - TABLETS now provide more light than the PDA.~~ [J] **DONE** ~~5.6 - Reduced the quality of parts that come default on PDAs.~~ [J] **DONE** 8 - Add the ability to enable Debug Mode on a LAPTOP trough the use of a multi-tool on the CPU component. This LAPTOP is now able to Hack other COMPUTERS via USB. 9 - Add the ability to hack components with a LAPTOP, granting a COMPUTER hacked software. There are Legal and Illegal hacks. 10 - Add an USB component that can be inserted into a LAPTOP. This allows for COMPUTERS to be connected to it and hacked (later this could be expanded into not just COMPUTERS but normal things like APC circuits) 11 - Update Spacelaw to include cybercrime. 12 - Add an app that integrates with circuits for control over USB. 13 - Add a TC tool that when used with on a computer hacks all programs to Illegal. 14 - Add a tool that does the same for LEGAL. ~~15 - Add a way to copy all standard programs (like messager) into the data disk~~ [J] **DONE** *Basicly just made all stock programs deleteable as well (and contractor program)* ~~16 - Add a sole secondary card reader to the hacked vendor. [J]~~ 17 - PAIs can now be sloted into the Intelicard slot. They can take over the COMPUTER, message with it, hack, everything. ## Ideas to be Discussed **JOON - Scientific Hacking** - I'd like to make it so theres a scientific component to modular computers. Science has access to modular computer parts, the vendor is free for them, they also have access to the server rooms and the too be added keys. Meaning this is the "home" of modular computers. Could be similar to toxins, where, they CAN be missused and ILEGAL BUT, they can be used for good and generate Discovery points. A program or way to generate discovery points trough a complex enough system that requires constant attention would be good. Also would allow a scientist that wants to do this as his science role to actually do his job elswhere (fighting against cabin fever and "autism fort syndrome" here). Think Cryptobro goes to the Bar with his Laptop and 2 tablets. For obvious reasons this would require the keys, so that the average Joe can't just generate Discovery points doing Science's job for them. **JOON - Separating Hardware from Software** - Regarding what was spoken with Meow about Hardware modding, I think whats best to do is make the components hackeable, then they provide as Meow described "Tangible Effects". My idea for this was making, lets imagine, a Network Card. When hacked it becomes a No Relay variant of the same Network Card. Now, regarding legality. This should always be legal, what should be ILEGAL, (now, lets look at machine vendor hacking) is when while hacking you open a doorway to something you shouldn't have. So we'd have 2 types of sub item, Modded and Cracked (or hacked or whatever) So, by Modding a component you'd be able to download legal programs pertaining to that component that you couldn't before. With a hacked component you'd be able to download the ilegal ones. Now why would we be downloading them? 1 - You allow for freedom of choice. You can choose to have 2 legal programs on the same component. 2 - You'll be constricted anyways because of the file size of these programs. I'm also not against the idea of just separating hardware and software COMPLETELY. Doesn't make much sense for you to download special programs just because the hardware is different anyway! # THE BIG PLAN I'm going to introduce these things slowly into the game (hopefully they get merged) in Phases, to see how people react and what needs to be done and adjusted (also because I can't really do everything just yet) ## Phase 1 This Phase is meant to encorage players into engaging with the Modular PC system. PDA nerfs, TABLET buffs, changes to the Vendor, etc, are made to ensure that engaging with this system is slightly rewarding and hopefully a bit interesting. This Phase also introduces some exclusive items such as the No-Relay Network Card to see what people do with them. And to entice them to engage with the system (obviously) Such items will in future Phases be converted to the Hacking system. Making them more difficult to attain. (But like a drug, hopefully people will be slightly interested in it by then) None of these changes are exactly final, and most of it will change in future Phases as the system develops and becomes more involved. ### So for now, a to-do list for this Phase: #### 1 - Reduce the Quality of PDA stock parts. **DONE** *Right now some PDA components are by default the best that can be fitted. Battery doesn't have to be managed, Storage doesn't have to be managed. This changes that, making it rewarding to upgrade them.* #### 2 - All standard PDA programs are now transferable and deletable. **DONE** *This applies to Messeger, Crew Manifest, Notepad, and the Wiki App. Which means players can now transfer them to a disk drive (making them useful) and then onto a better hard drive. But this also means they can delete what they don't like or don't use, which is a bonus to freedom of choice.* #### 3 - The Contractor Uplink is now transferable and deletable. **DONE** *Crafty traitors can now use this to their advantage and hide their uplink in a less... conspicuous system. But this also means they can delete their uplink like a dumb ass but at that point, if you chose to press the red button that says **DELETE** its your prerogative.* #### 4 - TABLETS now offer a tiny bit more light than PDAs, they can also fit parts meant for LAPTOPS. **DONE** *Be MORE conspicuous! According to Adds on the station there is a new PDA system out there which sounds awesome! Shame you can't get it... NOT! It's the TABLET! TABLETS should be the standard for cool hacker kids, this makes them closer to that goal.* #### 5 - Make PDA's rechargeable in Cell Chargers. *The uncool unhacker boomer won't know a thing about upgrading their PDA's battery, they'll just wonder why their battery is actually going down. Okay grandpa, just stick it in the charger you'll be fineeee. (Also this doesn't apply to TABLETS. If you're a cool hacker kid you should know better)* #### 6 - Adding a Camera Component. *Listen, you got your PDA, you can send photos, why the hell wouldn't you be able to TAKE THEM TOO, dummy.* #### 7 - Adding the ability to change the colour of TABLETS, also adding more TABLET skins. *Your cool hacked kid Tablet should be customizable to YOUR TASTE. Want cool black? Get cool black. Want boring brown. Get boring brown. It's THAT SIMPLE.* #### 8 - You can now buy almost all parts from the vendor. **EHH ALMOST** *I'm sorry, tell me again why PDA comes with ass swamp parts and I can't upgrade them according to my bubdget? Okay, simmer down Jonathan, now you CAN. Also, for the cool hacker people, you can now cool hack your vendor and get access to cool hacker parts. You're welcome.* #### 9 - Micro SSDs (the default for PDAs) now come with all default PDA programs pre-installed. Even when bought froma vendor or printed. **DONE** *Did you just delete messeger? Did a nightmare destroy your PDA and you had the GAUL to reassemble it yourself but couldn't find your previous SSD? Well have I got something for you.* #### 10 - Retires the Lapvendor. *The reason for all of this. We're hosting a funeral for the Lapvendor, which isn't even a vendor and can't even be dissassembled. Poor guy asks you for exhorbitant prices to do the job of assembling your custom computer FOR YOU. I wan't players to engage with this system, not feed them directly with a boring solution.*