10-07-2020, 10:49 AM
I think something to keep in mind is this:
The process of hacking should require SOME time, especially since it's contactless and thus leaves no trace - more time than a typical door hack. Additionally:
The process should not be able to be *easily* automated. Any automation of the process should be possible, but difficult/complicated. For example, processing a reply ping with an equation in it to get the valuable information out (coefficients and such), then using arithmetic comps to process all that, then recompile it back into a packet to be sent back. This can be done fairly straightforward as a human, but requires a good deal of work to automate with MechComp.
The process of hacking should require SOME time, especially since it's contactless and thus leaves no trace - more time than a typical door hack. Additionally:
The process should not be able to be *easily* automated. Any automation of the process should be possible, but difficult/complicated. For example, processing a reply ping with an equation in it to get the valuable information out (coefficients and such), then using arithmetic comps to process all that, then recompile it back into a packet to be sent back. This can be done fairly straightforward as a human, but requires a good deal of work to automate with MechComp.