WAR10CK's Fr33w0rld

Guild of Technomancers Nirn Cellular Network and DarkPhone.
Description of a mobile network and Crypto Phone

Black Horse Courier
Cyberpunks deploy Tamriel’s first cellular network!
More secure then Earth’s they claim!

The Guild of Technomancers has done it again. We heard their announcement in their Skyrim Branch that they have created the empire’s very first cellular based telecommunications network. This complex mesh net of tower arrays enables long distance communications for text, voice, and data based transmissions. The additional invention of the mobile smartphone has streamlined this system into the mainstream populations.

Now anyone can use the network for all their communication needs.

However one of the primary features is the security of the system.

“The Imperial Celluar Network operates in cipherspace. It uses multiple advanced cryptographic techniques implimented into the most secure encryption algorithms used for networks like this. It will use Off The Record (OTR) encryption to ensure perfect forward secrecy for all connections. All transmissions are End to End encrypted with a 256 bit keystream based cipher. You can download and examine the algorithm specifications and source code in full yourself on the Cryptoanarchy Wiki.

We are also using a special algorithm to randomize the route each call takes to its destination. This should be able to further enhance the system for anonymous and secure communication. It is a special Sphinx Onion Routing Protocol optimised and written specifically for this purpose. The full specs and source are also available for download for on the cryptoanarchy wiki. We provide all the specs and sources for all of our programs for peer review and security purposes. By allowing the security community to examine our stuff we can be sure that it is truely secure." said Crash Override of the Technomancers.

It allows for 3G and 4G connections as the standard connection. The network and service relies on crowd funding, volunteer work, and pay as you go plans to keep running. There are no contracts to sign and all phones are unlocked by default. The Guild of Technomancers said that they would never have subscribers fees or service fees and that the crowd funding along with the Imperial Tax money they are getting to fund this system it is not needed.

Most mobile devices will use the HearthStone Mobile OS which is a Security Enhanced Android OS that comes rooted by default.

“However we will include multiple applications and documentation that will make the Superuser access permission very user friendly to manage. These along with an Open Source Security Suite called SecuriMeow optimised for mobile.

For the Standard Tamriel Cellular Crypto we have decided on the follwing algorithms:
Dragon Stream Cipher with 256 bit keystreams and IVs
Dragon-MAC for efficant call authentication
This encryption will be enforced to be used in all voice, sms, and video calls.

Dragon-MAC is a Message Authentication Code based off of the Dragon Stream Cipher. It was originally designed for sensor networks so with its very small size it should be effortless to implement into the Network Architecture. This will be used to verify that the two ends of a call are valid.
Dragon is a Word Based Stream Cipher developed by the Nirn Crypto Munitions Bureau Skyrim Branch and it made it to the final round of selections for the Skyrim eSTREAM Portfolio but was ultimately not selected. However it is easy to implement in hardware so we can use it in the architecture of the new TCMB Secure Baseband Processor.

We have also decided to have this End-to-End encryption enforced in all cellular architecture with towers and all. There shall be no way to turn it off.

As for baseband level exploits, the newly developed TCMB Secure Baseband Processor with have the following features:
Dragon Cipher and the Dragon-MAC built into the chip itself.
Electronic TEMPEST Shielding will cover the entire die.
The Baseband OS will have tightly enforced Restricted Access to the device hardware with access to nothing except the components required for cellular communications.
The new hardware Baseband Firewall will alert and automatically block any suspicious traffic.

To protect the phone itself we will use the following measures:
An external SDmicro Card sized HSM will provide an air gapped TCMB-FIPS Tamper Proof Secure Cryptoprocessor for much more secure cryptographic operations.
The Spaces Software will provide secure compartmentalization by creating virtual “devices” in the same phone which are completely isolated from each other.
A built in Tamper Proof Secure Cryptoprocessor with encrypted and secure hardware key storage IO will ensure that electronic probing will not leak information.
TEMPEST Shielding will prevent electronic emissions but there will be gaps for the wifi and antenna.
An EFS will be used to store all information on the device.
The device will have 128 GB of internal memory.
The HearthStone Android OS will be the default. But measures have been taken to ensure that it remains secure even if it is rooted.
The processor is 8 cores and security enhanced with built in encryption hardware.
The device will be able to withstand even the heavyist abuse and is totally waterproof.
Any attempts to extract encryption keys will cause them to self-destruct.
Passcode Lock will use a scrambling keypad.
Pattern Lock will use an scrypt salted hash for the key and will be large.
Password Lock will use a secure keyboard.
All screen locks will use an scrypt salted hash for the key.
Full Disk Encryption will be enforced in all devices with no key recovery features to ensure cryptographic deniability.
____________________________________

The Annual NordSec Conference in Skyrim is a Cyber Security and Hacking Conference run by Nord Technomancers. Many people attend each year from all the provinces. But Nords make up the majority of all the attendees.

Currently Darken Rahl has a presentation on Securing and Authenticating Cellular Communications which will be the main focus during this one. Mobile Phone Security is a major concern among many of the people of Tamriel. With the introduction of Baseband Interceptors by the Guild of Technomancers and the recent discovery of their use the following things are being covered in a series of presentations by different people:

Cryptographic Security
Authentication of Communications
Baseband Level Security
Hardware and Software Security
Secure Deployment of Mobile Applications
Secure Operating Systems

Darken Rahl will be presenting the current standard of Mobile Phone Encryption, the Dragon Stream Cipher used in all Mobile Devices by default. The Dragon Stream Cipher can use 128 bit and 256 Keystreams and IVs but not interchangeably. The latest work from the Nirn Crypto Munitions Bureau includes the Dragon-MAC algorithm which can be used to Authenticate Calls, Messages, and Data Connections. This should tackle the problem with the current exploits with spoofing and altering the communications in transit.

Dragon is Word Based Stream Cipher which was developed by the Guild of Technomancers TCMB Branch in Skyrim and submitted to the eSTREAM Portfolio being compiled in Hammerfell. It reached the final round of selections but ultimately did not make the cut. But that did not stop them from implementing it into the Skyrim Cellular Networks during the Civil War which prevented the Thelmor from spying on it. However the other provinces have not switched to this more secure cipher. The RC4 Cipher is still prominently used in most Cellular Networks and it has been broken many times.

The Nord known as Bolrholf Axeblade has been working on a Secure Baseband Processor with an embedded Secure Cryptographic Module. It contains the following security features:

Hardware Embedded Baseband Firewall
Tamper Proof Construction
Compartmentalized Baseband OS with RESTRICTED ACCESS to the phone software and hardware.
SCM >> Built In Hardware Khaos CSPRNG
SCM >> Hardware Embedded Dragon and Dragon-MAC Algorithms
SCM >> Tamper Proof Key Storage Memory
SCM >> Automatic Key Zeroization AKA Self-Destruction
SCM >> Electronic Shielding

He calls it the Dragon Secure Baseband Processor.

By placing a Secure Cryptographic Module in the Baseband Processor this would ensure that the encryption is enforced at the hardware level and cannot be disabled by any interceptor. Also by ensuring the Baseband OS is restricted in what it can access and not access this ensures that it cannot be exploited.

The first devices that will use this new Chip is the Telecomix Nirn DarkPhone. The DarkPhone is a Crypto Phone which uses a highly secure operating system.
______________________________

Post from the CipherCat Wiki Forum >>

Topic: Cellular Network Security Plan
By: Eric Bloodaxe

For the Standard Tamriel Cellular Crypto we have decided on the following algorithms:
Dragon Stream Cipher with 256 bit keystream and IVs
Dragon-MAC for efficient call authentication
This encryption will be enforced to be used in all voice, SMS, and video calls.

Dragon-MAC is a Message Authentication Code based off of the Dragon Stream Cipher. It was originally designed for sensor networks so with its very small size it should be effortless to implement into the Network Architecture. This will be used to verify that the two ends of a call are valid.

Dragon is Word Based Stream Cipher developed by the Nirn Crypto Munitions Bureau Skyrim Branch and it made it to the final round of selections for the eSTREAM Portfolio but was ultimately not selected. However it is easy to implement in hardware in the architecture of the new TCMB Secure Baseband Processor.

We have also decided to have this End-to-End Encryption to be enforced in all cellular architecture with towers and all. There shall be no way to turn it off.

As for baseband level exploits, the newly developed TCMB Dragon Secure Baseband Processor will be used in all DarkPhone Devices. This secure chip includes the following security measures:
1. Hardware Embedded Baseband Firewall which will alert the user of and automatically block all suspicious traffic.
2. Electronic TEMPEST Shielding will cover the entire chip die.
3. The Baseband OS will be compartmentalized with tightly enforced RESTRICTED ACCESS to the phone software and hardware. No components that are not required for cellular communications will allow the Baseband OS to access them.
SCM stands for Secure Cryptographic Module
4. SCM >> Built In Hardware Khaos CSPRNG (Crypto-Secure Pseudo-Random Number Generator)
5. SCM >> Hardware Embedded Dragon and Dragon-MAC Algorithms
6. SCM >> Tamper Proof Key Storage Memory
8. SCM >> Automatic Key Zeroization AKA Self-Destruction

For the DarkPhone device security itself we will use the following measures:
1. An external microSD Card sized HSM (Hardware Security Module) will provide an air gapped TCMB-FIPS Tamper Proof Secure Cryptoprocessor for much more secure cryptographic operations.
2. The Spaces Software will provide secure compartmentalization by creating multiple virtual “Devices” in the same phone that are completely isolated from each other.
3. A built in Tamper Proof Secure Cryptoprocessor with encrypted IO paths and secure hardware key storage will ensure that electronic probing will not leak information. This will be a custom Fabricated ASIC.
4. TEMPEST Shielding will prevent electronic emissions but there will be gaps for the WiFi and antenna.
5. An EFS (Encrypted File System) will be used to store all information on the device.
6. The device will have 128 GB of internal memory.
7. An additional microSD Card slot which can hold up to 1 TB or more expanded memory. NOTE: any card used for this device will also have an Encrypted File System automatically installed onto it by the Secure Crypto Processor. No other device will be able to read its contents without first decrypting the whole EFS.
8. The HearthStone Android OS will be the default but measures have been taken to ensure that the device remains secure even it is rooted.
8a. Such as the Secure Crypto Processor which cannot be bypassed or disabled by any software.
8b. The TCMB Dragon Secure Baseband Processor which is impossible to subvert due to the fact that it contains its own built in Secure Crypto Module.
8c. The SecuriMeow Android Root Manager.
8d. Universal Compatibility for all Android Roms and Distros. Any OS on the device can fully use its cryptographic security.
9. The processor will have 8 cores and be security enhanced with built in encryption hardware.
10. The device will be able to stand even the heaviest abuse and is totally waterproof.
11. Any attempts to extract the encryption keys will cause them to self-destruct.
12. The Passcode Lock will use a scrambling keypad.
13. The Pattern Lock will be large and complex.
14. The Password Lock will use a secure keyboard.
15. All screen locks will use an scrypt salted SHA3-256 hash for the key.
16. Full Disk Encryption will be enforced in all devices with no key recovery features to ensure cryptographic deniability.
17. All Firmware and Driver Software used on the DarkPhone is Open Source. As for the propriatary parts we could not release, Well let’s just say that a dozen swords pointed at the throat followed by a little pressure will do wonders to help convince a person to be quite reasonable.

The EFS Cryptographic Algorithms are as follows:
1. Threefish-1024-XTS
2. Khufu/Khafre-512-XTS
3. Blowfish-448-XTS
4. AES-256-XTS
5. Anubis-256-XTS >> Enabled by Default.
6. LOKI97-256-XTS
7. Serpent-256-XTS
8. Khazad-128-XTS >> Enabled by Default.
9. Lucifer-128-XTS
10. Twofish-256-XTS
Options to run the algorithms in Native Code (NC) Modes or Platfrom Independent Modes are available. NC Modes is enabled by default.

XTS CBC-ESSIV CBC

We have found a destributer for the DarkPhone. A Cyberpunk Employee Owned company called DataDyne. Their Cypherpunk sister company Ciphernetics Technologies has agreed to Manufacture, Market, and sell the DarkPhone.

Msg>>[DragonBBP]Key]>>Cipher>>{CellTower}>>Cipher>>[DragonBBP]Key]>>Msg

View
Guild of Technomancers Middle Earth C&Cnet Crypto Details
Overview of the cryptographic security of the Command & Control Network

Command & Control Network Technical Cryptographic Information >>

Acronyms in this document:
HSM = Hardware Security Module
SHA3 = Secure Hash Algorithm 3
TCO = Trusted Crypto Officer
KMF = Key Management Facility
ECC = Elliptical Curve Cryptography
SSL = Secure Socket Layer
PGP = Pretty Good Privacy
C&Cnet = Command & Control Network
RootSec = Root Security

The Command & Control Network uses NTRU 1248 Asymmetric Encryption. NTRU is a 3D Lattice Based Cryptosystem that is resistant to Shor’s Quantum Computing Algorithm. The two NTRU Algorithms in use are: NTRUEncrypt for actual data encryption and NTRUSign for data and message authentication.

Before it used Elliptical Curve Cryptography ECC 512 Keys and before that ElGamal 2048 Keys. But after an undisclosed incident the ElGamal Keys were revoked and replaced with the ECC Keys. Then after the Smaug and Five Armies Crisis the ECC Keys were revoked and replaced with the current NTRU Keys.

WolfSSL with NTRU implementation is the main protocol for the C&Cnet. NTRU will be used from now on.

The system contains 6 Network Keys and one Root Key. Separate Protocols apply for changing the Root Key as it is the key with the highest security level. The Network Keys are used for sending and receiving the encrypted traffic and the Root Key is used to sign the Network Keys.

The Network Keys are unique to each individual HQ. This is so that not all traffic is tied to a single key. The Root Key is used to sign all other Network Keys and is split into 7 fragments when it is to be changed. Any new Network Keys will not be allowed to access the C&Cnet until they are signed by the Root Key.

These keys are not known to anyone and are kept in tamper proof HSMs. No person ever sees them. That way they can never be leaked out. If the HSM is tampered with in anyway, the key inside will self-destruct.

The only way you can change the Network Keys is via the use of a briefcase sized HSM called The Encryptor. The security of this HSM is effectively as strong as the Nuclear Football with multiple biometric and other security checks required to start the key changing process.

This HSM can only generate Network Keys and are considered by the system to be Invalid until Signed by the Root Key. The Root Key is generated using a different HSM located in the C&Cnet RootSec Facility: Anduril Sword. Anduril Sword’s location is classified. (Pssst… It’s located in the Shire.)

Also take note of this number as it is the Root Passphrase in Base64 Encoding: 1235711131719232931314159265161803398874989141194123
2215530000577215609159655941235813213455271828182845
123456010101

The Root Passphrase is split into 7 fragments using Shamir’s Secret Sharing Scheme or the S4 Splitting Algorithm. These fragments are stored in a Secured HSM Smart Cards with Anti-Magic Tamper Proof Crypto Chips. The 7 fragments are retained by 7 individuals on Middle Earth. The names of these TCOs are classified. They must all be present at the Anduril Sword RootSec Facility and 5 must have their fragments ready to reconstuct the passphrase which is automatically entered into the HSM when each card is inserted into it.

They are only used in the RootSec Facility when the Root Key is being changed. During a Network Key Change the cards are used in the Root Passphrase HSM stored in the appropriate KMF to sign the new key.

Here are the Fragments:

Fragment 1 >>
8013261d5c5c3a54e469a97e58684c6066213d7a30ef53870a109
3ca780041f45d7b3bd49b553ef050ccb417d1d2ee257eb6eaaceb
08b7f556dd0dab32eadfb5bc148e50fc6c451acbd624ae90c4bb44
0802fa2ef774ae1c1cbe15b8f06408a0510d65cc1adb0fd46cb508
0fa4827f23bd016975b457a4e0eb9ac1455d020e8ad44d744f2d3
01e6bbeacac4db916054befbc4ab733eec0cce11dea538ce3e49c
756132839

Fragment 2 >>
802307fa93496c0323586652125edff232ad9d3ddf7b4b222f3a4e2
a923b46bb8fc10c6920b2cbf9d3013639d74c3707ee46ab94bc3e9
06c462768ced3f9273f8d4bca8046596dc668c11a30ba9ebc00346
43dae1df2dc2a1f8ae2e9301267b3912c2815a279f282d0d8997b2
4121d85f8fdcc178b3e2b5269b946223eb526b5ef5647953d8ece7
b06c0599a53500c353e91af4e9bf1bcd4474e807544c6b84ebf76d
2d0d

Fragment 3 >>
803990a6cb926b213139d64a457325b54d983b58f267bfe4bdefe
76285d047be698e9a258f1dd54ed7280be5546cfda8ff84bc4e3bb
a37ad21ada8d52005c09021f6d7091162f1ba0727c1e4d87adc6ad
a0c56da2c52612a907d4360428a8e43155f64c1b61fc40cd94ce96
46a32e460a7893d184ebd45a3e6ccaed397b6cdcba1f328184296
06d9b1557ea00a477940ee0104cb9bbcf05ae094593424762f2c0
5f49d6c6

Fragment 4 >>
804d80cc9682b2a731baf69326c035b1b585aba48c6b51f43a3046
28c9a795086d4fc0ff96e8ce876dfe5174b16884ceb051d48e2293
762713e6c98eedf5d66782a9f200b626754b839e6373b1473dc0d
bcde5ce113bf6a061e74d78fa4adfcd895dc753c41f7f81b072f493e
864268f0eddfff060fcdcfa279407964c7b763fc6caac5dc8caba7be4
de1af9c45c52e1f97859c0ef415ab19e8078be168ae4a1f03b9794f

Fragment 5 >>
8059015f70051808b009f6a432f89cc38bc2bec58f715c5ac0d934e
36e32b6df09c275eef7164d8996a8dfe66e903032821052aeed4c9
d07a38a165bc97f1bc32106f4b0d3dae91bc13da75e013dfe39f754
e4708171c2d55aa21dc9940fdcf3a6a1268546b5e5cf8fac42f29d25
c287b28cb9a61046ca71179930b374d1a54ed2c952e8288fa341ae
a323997131e70cfbd169a7e56eec2c68cb888b3c5eb46436b0646a
9

Fragment 6 >>
8064dd360268d485809d59c72ee4a93b5dab788a2d38a7eef44b9
fd4e4e42435defc04f9118292322a5beb45107fd46655e73073eb0
de28d1cbc5d625680a69ecfad97d3dc61c18ef970b7f25e4b6e5a4
ed0e7a4f83363d830f308f9ac03a7bcf05ef089d39f80c95f458f6baa
a78a3be13b7266954c74f72a8ac9ad34253cae9d4f4352c74b0071
2cde2b3a8243bf525e9e7a4a486475c26dbaa195716267f815753d
6c7

Fragment 7 >>
8079fde7b06d9ca327251f69ea666668a50726f7ac2ed2fe4660186
2f3659714c12acc77d4fade8455ef33e34d728417e72d9b2617a1c6
664dfcd0f8631b03248354d2bd82cc5b47cfe43ca1f3eea68ec424a8
bf7eaad4b74700338690bf9a2ddadbe8428077f3da5a459ee5eabb3
70a60e073b544257792ae6f17622771da2dfc5b7622e57a1f851f9d
46d208d0aa87bce474e0a1eda0e20d3132b7681a9b3ccc1b6c52e

SHA3-512 Hash Checksum USED TO VERIFY PASSPHRASE INTEGRITY >>
819d6881468589aef41a44ae51db58145d05c0a5892a53319bcb8
db6508cf8bacd24014a228bd2f5f7fbac0b81581635be0f655c7636
511feab7c238b4e04854

The PGP Words for SHA3-512 Hash Checksum TO BE RECITED BY THE TCOs WHEN VERIFYING THE PASSPHRASE INTERGRITY >>
minnow Ohio frighten inventive cubic leprosy nightbird performance upshot Bradbury crumpled performance drunken suspicious endorse belowground exceed almighty slowdown paperweight nightbird chambermaid dwelling company puppy revival optic potato drumbeat megaton Vulcan puberty spindle Capricorn absurd direction blockade Medusa standard visitor virus Wichita ribcage armistice minnow everyday backward conformist skydive atmosphere fracture fascinate inverse congregate drunken businessman Trojan processor snapshot consulting scenic tobacco deadbolt equation

Threshold is 5-7 which means five of the seven TCOs must be present to reconstruct the Root Passphrase.

Further more the Root Keys are encrypted with a KHAZAD-128 Symmetric Key which is split into 7 more fragments stored in 7 more Smart Cards also with a 5-7 threshold. Those are each retained by the TCOs as well but are used in a different HSM from the Root Passphrase HSM. These are used for both changing the Root Key and signing Network Keys.

Here are those fragments:

Fragment 1 >>
801c6965bb2d70e280c17b97149bd264269db4dd94ea7e6f0067
590f86f640cacea2c

Fragment 2 >>
8023c11b64726f32e682acec39c6d1fbdb87cbcdf854f98e3c87dfe
29dfa6300e841a

Fragment 3 >>
8035e94a8ef6c2a3322260abf6423f63c2a1972c60ab340d23fa2ae
fc38a184f10d4f

Fragment 4 >>
804218d84391063e8d160920bef3ea35dbe6ab25d456653dc1aa6
3a8eba62841c7497

Fragment 5 >>
8051f715e106762b754c8ff9de05a1da3f74f15f7b78d317e004b10
7f05983fe6c9fd

Fragment 6 >>
8065d0426faec3235b3a0c7e6c6de8aa28d68368a864b26560927
8ae605bd1d4ecfb5

Fragment 7 >>
807c6ebd036fb1ba2705b288087b4fbf43feced1db5ce7a17e2126
01bcdd91edc11d6

SHA3-512 Hash Checksum >>
9ab476f3d9c6457e499dd7c42f70aafafa6344cf6521d634796e868
7f6140354573c23cefd559fe5e8d25f65f38c9ef5f6278c3c87b7b87
b0448cd5af9cfbe01

PGP Words for SHA3-512 Hash Checksum >>
pupil politeness inverse vertigo sugar responsive crusade insurgent deckhand Ohio stopwatch reproduce cement hesitate reward whimsical wallet Galveston crumpled Saturday fracture Camelot stockman confidence jawbone headwaters necklace liberty village belowground acme equation eightball crossover blowtorch sardonic willow equipment quota travesty trauma sensation eyetooth glossary upset megaton quiver visitor village celebrate offload crossover Neptune processor select inferno adrift dictator spindle existence waffle Saturday skydive adviser

All keys stored in the smart cards can be changed at anytime.

View
Guild of Technomancers Middle Earth C&Cnet Overview
General Overview of the Command & Control Network

The Guild of Technomancers has several sites across Middle Earth.

We have five ultimately expanded to six primary bases of operation. Each one includes its own dedicated Command & Control Facility, Research Facility, and NDA Data Center. If one is taken out then we still can coordinate with each other.

The first is the Alpha-1 Headquarters located in Rivendell. Codename: The Hacker Shelter >>
Command & Control Facility Alpha-1
Research Facility Alpha-1
NDA Data Center Alpha-1

The second is the Beta-2 Headquarters located in Lothlorien. Codename: Swiftluck Greens >>
Command & Control Facility Beta-2
Research Facility Beta-2
NDA Data Center Beta-2

The third is the Gamma-3 Headquarters located in Northern Mirkwood. Codename: The Greenhouse >>
Command & Control Facility Gamma-3
Research Facility Gamma-3
NDA Data Center Gamma-3

The fourth is the Omega-4 Headquarters located in Erebor. Codename: Fort Knox >> Contact Restored
Command & Control Facility Omega-4
Research Facility Omega-4
NDA Data Center Omega-4

The fifth is the Epsilon-5 Headquarters located Khazad-dum. Codename: Blackleg Miner >>
Command & Control Facility Epsilon-5
Research Facility Epsilon-5
NDA Data Center Epsilon-5

A recently built one known as Umbra-6 is located deep inside the mountains of Gondor. Codename >> Black Mountain
Command & Control Facility Umbra-6
Research Facility Umbra-6
NDA Data Center Umbra-6

All five now turned to six of these installations are in constant 24/7 communication with each other sharing command and control information, intelligence, research data, operational information, messages etc. They all have a large Numbers Station Erebus Terminal as well in order to send out messages to agents in the field.

This real time communication is done over the Command & Control Network (C&Cnet) which is a closed loop F2F (Friend-to-Friend) Darknet End-to-End Encrypted Network which is not accessible from outside of these sites except via a series of heavily guarded Gateway Nodes that can allow outside traffic into the Darknet.

Only the strongest cryptographic algorithms and protocols are used in the C&Cnet. Specific Details on the Cryptographic Security can be found in its own document.

The C&Cnet Interfax Messaging System uses an modified I2P (Invisible Internet Project) Bote Garlic Routing MixMinion type protocol which splits the messages into tiny encrypted packets and randomly scatters them across the C&Cnet to make sure that the messages are untraceable.

The Ultra Strong Encryption allows C&Cnet traffic to be sent over any comm channels without compromising the security. It is completely impossible to tell if any type of traffic is C&Cnet traffic. However this capability is only used in an emergency when the Closed Loop Lines are down.

The C&Cnet Gateway Nodes and all network endpoints are protected by a extremely sophisticated Endpoint Protection System called MITHERIL. This system consists of some of the best anti-malware and cyber security technology including things like redundent firewalls, packet filters, virtualized sandbox envionments, active scanning of all incoming and outgoing packets for malware, rootkit detection, tamper detection etc.

View
Welcome to your campaign!
A blog for your campaign

Wondering how to get started? Here are a few tips:

1. Invite your players

Invite them with either their email address or their Obsidian Portal username.

2. Edit your home page

Make a few changes to the home page and give people an idea of what your campaign is about. That will let people know you’re serious and not just playing with the system.

3. Choose a theme

If you want to set a specific mood for your campaign, we have several backgrounds to choose from. Accentuate it by creating a top banner image.

4. Create some NPCs

Characters form the core of every campaign, so take a few minutes to list out the major NPCs in your campaign.

A quick tip: The “+” icon in the top right of every section is how to add a new item, whether it’s a new character or adventure log post, or anything else.

5. Write your first Adventure Log post

The adventure log is where you list the sessions and adventures your party has been on, but for now, we suggest doing a very light “story so far” post. Just give a brief overview of what the party has done up to this point. After each future session, create a new post detailing that night’s adventures.

One final tip: Don’t stress about making your Obsidian Portal campaign look perfect. Instead, just make it work for you and your group. If everyone is having fun, then you’re using Obsidian Portal exactly as it was designed, even if your adventure log isn’t always up to date or your characters don’t all have portrait pictures.

That’s it! The rest is up to your and your players.

View

I'm sorry, but we no longer support this web browser. Please upgrade your browser or install Chrome or Firefox to enjoy the full functionality of this site.