Network Warfare
This very simple example is just the beginning.
Cryptomancer’s fantasy infrastructure is easily taught to players with no IT background, but complex enough to provide even seasoned security-heads a playground to test their offensive and defensive chops. The game’s infrastructure sections cover the following:
- Symmetric and asymmetric encryption schemes to ensure privacy, verify one’s identity, and securely exchange keyphrases over hostile networks full of eavesdroppers.
- A public shardnet that functions like the Internet: a vast fount of knowledge, a gathering ground for distributed communities, and a veritable warzone.
- Industrial control systems composed of cryptogears receiving instructions from remote administrators, and steam-powered automata serving as firewalls and proxies between hostile shardnets.
- Techniques to enumerate shardnets, investigate breaches, geolocate users, scry through shards (as if they were IP cameras), and more.