Matthew Surridge wrote:Sure. I mean, that sort of stuff I can figure out myself. But transmission of viruses, what information can be scraped, who can attack whom and how, can Kanawa attack Core Earth with stuff within our axiom that we haven't figured out (as Core Earth does with the Nile), all that kind of thing, I'd love to see at least a nod to that in the official rules.
There seems to be two issues here and your earlier post.
First a data packet, encrypted under CE tech axioms, take a passage that goes via a server based in the CP. Can the CP break the encryption using their super-fancy quantum entangled trinary position processors? If they then re-encrypt the data packet so it appears to be untampered with and send it on its way is it now a higher tech data packet and so could have issues when it hits the end user in Germany?
Second can Kanawa pull some hardware and software off the shelf that is considered obsolete to them, but is equivalent to CE cutting edge research lab kit to us, and hand it to their undercover operatives in Sydney?
For the first I reckon the CP could easily do the cracking, all under their axioms after all. The re-encrypted data packet... That I think could have some issues. Though fundamentally it runs on rule of cool.
The second I see no difference between this and Israel threatening Mobius with their Nuke stockpile. Just because the reality isn't using it, doesn't mean it can't work. It is literally stated that the CP only uses one element of it's Social Axiom but the other uses would work there.