"Unwired" schrieb:Slaving
One node, the slave, may be linked to another node, the master. In this setup, the master is given full admin access to the slave. When slaving a node to a master, the slaved node does not accept any Matrix connections from any other node but the master and instantly forwards any connection attempts to the master.
Hackers have three options when faced with a slaved node. First, they can hack in directly to the slave with an additional threshold modifier of +2, though this requires a physical (wired) connection to the device. Second, they can hack the master node (thus gaining access to the slaved node—and any other slaves— as well), though this node is usually more secure. Third, they can spoof the access ID of the master node and then spoof commands to the slave.
Ich korrigiere mich selbst und behaupte das Gegenteil: Wer einen geslavten Knoten sieht, kann immer direkt auf den Master zugreifen.
Damit kann man immer die access ID des Masters rauskriegen und den geslavten Knoten spoofen.
Das schwächt das Slaven, so wie wir es spielen, deutlich ab, aber es steht einfach explizit drin, was soll man machen
Grüße Zeddicus2