Some things in the rules are not laid out as well as they could be. And as such there are rules that are just not well known. So if there is some obscure rule that completely changed your view on how something worked post it. It might help clear up things for some of the others around here.
Example: Method posted this on the Illusions forum... Little to say my hacker is now underskilled dramatically..
BBB p.125 under the forgery skill
| QUOTE ("BBB p. 216") |
Note that standard electronic devices only have admin accounts, as there is no need for other accounts for their software. |
I doubt that would apply to commlinks, as they are full fledged computers that may very well have legitimate uses for other levels of access. Think corporate computers for traveling salesmen, for instance. You want your IT security to be able to lock the device down and make sure it stays secure even if your salesman is likely to download some garbage from the matrix, so you don't give him full access.
Drones would likely have other access levels as well. For instance, I could see corporations allowing every security grunt to have "read only" access to the drones to get tactical information, while only the security riggers get full command access (admin)
Admin-only I tend to think applies to "simple" devices -- like toasters, MP3-playing underwear, and other things that do not have a stat listing for either pilot or system.
| QUOTE (Feshy) |
| I doubt that would apply to commlinks ... |
The salesmen would log onto his companies network. Not have all the companies data on his commlink.. Unless he door-to-doors in a deadzone, in which case its really not a problem at all. As to drones they can give a readout without providing access, just as you can link your cybereyes input to teammates without them controlling your eyes.
So yes, I think when these were written it was very much intended for drones/commlinks/vehicles... Most drones/vehicles though don't have analyze or systems very high. I think the ruling is they use pilot for everything, so upping your pilot is useful to protect it, but it already comes with a +6 due to ADMIN only.
Anyways don't want to argue, I want more rules that have been overlooked in the books! (I'll get the exact page/quote out of the book when I get home, so I can update my prior post)
| QUOTE (Fortune) | ||
I disagree. In my opinion, Commlinks typically only come with Admin Access. |
| QUOTE (Redjack @ Jan 7 2008, 02:46 PM) | ||||
I would have to agree with Feshy. Even my pda phone has two levels of access. There is no reason to think that a comlink would have a poor security model as to have only one level of access. |
How do you figure that raising your access level is easier once you're inside? All that hacking yourself access at Public level before you hack yourself Security or Admin access does, is throw in an extra hacking attempt during which you may be detected.
I don't see what is to be gained from a normal commlink having more than Admin level access.
Oh, and knasser ... I was under the impression (through your pdf stuff) that you were in agreement about commlinks and admin access. Hmm ...
| QUOTE (knasser) |
| How do you figure that raising your access level is easier once you're inside? All that hacking yourself access at Public level before you hack yourself Security or Admin access does, is throw in an extra hacking attempt during which you may be detected. |
| QUOTE (Fortune) |
| I don't see what is to be gained from a normal commlink having more than Admin level access. Oh, and knasser ... I was under the impression (through your pdf stuff) that you were in agreement about commlinks and admin access. Hmm ... |
| QUOTE (Jaid) | ||
you just edit the account list, of course... which is going to be a simple hacking + edit test, since it likely isn't something your hacked account is allowed to do. |
i agree with you conceptually (that is, i agree that the rules *should* work like that), but i'm not sure that they do. iirc, you can attempt any test while in a node. if you are acting within the privileges of your account, you use your computer skill. if you are going beyond them, you use hacking.
i certainly can understand *why* you wouldn't want to allow that kind of nonsense though.
For what it's worth, I think it would be a Hacking + Edit test but, because a general user account wouldn't have access rights to that file, the system would get to try and detect either (a) the change or (b) the action that's causing the change or © both, depending on how strict the security is going to be.
I've even run some extremely secure hosts as systems which continue to add any new hits on analyze tests to the original hits to prevent hacking (whether on the fly or probing the target) which has almost always made things very tense on the team's hacker!
@Jain: Okay, well I guess we're allowed to play differently.
There are lots of easy fluff explanations for any particular Matrix rules, though. So I see no need to let someone with a few preconceptions about how computers work alter elements of the rules.
@Dashifen: By the time you've added in those counter-tests, it's starting to look a lot like the original hacking on the fly rules anyway. ![]()
One important difference between the Internet of today and the Matrix of tomorrow, is that today we deal with static files. A video is a video, an access list is an access list. In the Matrix, we're living in an always-on, distributed computing, post-DRM, post-P2P, post-Virutalisation re-designed from the bottom up infrastructure. Static files are a thing of the past. I envisage almost everything as a running process, handed from node to node (I also picture the Matrix 2.0 to have strong countermeasures built into it to prevent runaway replication). This is why agents can travel from node to node, editing a file is akin to interacting with a separate program. It's why IC can be embedded in a file to prevent it being copied.
I can zip up an entire virtual machine as a file and send it to you, complete with all the installed preferences, programs and conceivably processes. It's a small step from there to making the freezing and re-starting of that virtual machine invisible to the user. With SR2070's cannon technology, we can justify, and justify very well, any aspect of the Matrix rules we like.
Long-winded way of saying if any player thinks they're going to type their account name into a permissions file somewhere and become an Admin, they're out of luck. ![]()
-K.
So I'm fairly knowledgeable on computers, but only basic info on networking security, so decided to ask a buddy of mine who knows more than is probably healthy on networking and security. I specifically asked why it'd be easier to upgrade access once inside as opposed to attacking the higher level from the outside directly. This is basically what he told me:
When attacking from the outside, you're basically fighting a login prompt. One way or the other, you have to pass that. Generally speaking, user access will be easier to get to due to social engineering and such, and because general users frankly don't pick good passwords as a rule. Admin access is typically harder to break through simply because the passwords are generally much better. (Obviously only talking general, not specific people right now) Once inside however, even at the user level, now you have access to the OS, the programs, whatever. There are more points of exploitation, more things you can use against the system to help give you more access.
So basically, yes, when you're inside, apparently it would be easier to get more access. The exact hows and whys are subject to interpretation and fluff, but the mechanics should show that it's slightly easier from inside than out. Interior walls of a house are never as sturdy as the exterior walls is a good analogy I guess...
| QUOTE (BBB p. 219) |
| You can also alter a device's output--video taken by a security camera, for example, or telemetry data taken by a vehicle sensor. A single Edit action only alters output for a short period (one Combat Turn). In order to alter output for a longer period, you must first take control of the device (see p.220) prior to the Edit action. Edit can also be used for creative output, such as crafting a life-like 3-D holo to use as a distraction, or forging a convincing set of fake credential printouts. |
Okay, let's take a crack at it. Some of these are just things I discovered after running the game for a while, and kinda surprised me.
Wheres that stand up rule?
| QUOTE (Aaron) |
| Fake SINs tend to be disposable, since they only roll their ratings, which increases the chances for a glitch. |
The basic (and really obscure to me) problem is that everyone is checking the integrity of your SIN. The part where they check if YOU match up with YOUR SIN is actually left alone.
How can the whole economic system be based on a number that does nothing for business except linking data (can be done without SIN today), and that basically noone has trust in? Plus, I calculated that a rating 6 SIN will fail against a rating 1 scanner about 3% of the time.
No SR designer would have passed a basic statistics class.
| QUOTE (Tarantula) |
| Wheres that stand up rule? |
| QUOTE (Method) | ||
This is interesting. I think in my game I would allow the PC to add dice equal to the net hits on a Con+Charisma test... |
| QUOTE (Aaron) |
| Actually, I like the system, and wouldn't be surprised if this was intentional. Fake identities should be more like commodities and less like real estate, at least in my opinion. |
| QUOTE (Aaron) |
| [*]A dice pool of 2 glitches more often than a dice pool of 1. |
Where is the shield penalty? I keep missing it.
Chris
| QUOTE (DTFarstar @ Jan 8 2008, 02:47 PM) |
| Where is the shield penalty? I keep missing it. Chris |
| QUOTE (Sponge) | ||
This is a specific case of all Even-sized dice pools glitching more often than dice pools which are one less in size - but the effect is largest at the bottom end, I think. DS |
Ah yes, the famed Discworld Law of Narrative Causality.
or how SR4 calls it:"long shot rules"
| QUOTE (Ryu) |
| The basic (and really obscure to me) problem is that everyone is checking the integrity of your SIN. The part where they check if YOU match up with YOUR SIN is actually left alone. How can the whole economic system be based on a number that does nothing for business except linking data (can be done without SIN today), and that basically noone has trust in? Plus, I calculated that a rating 6 SIN will fail against a rating 1 scanner about 3% of the time. |
| QUOTE (Feshy) |
| That's a total failure rate of ~4.6%. And that doesn't take into account how the 4.2% normal glitch chance might affect results. So overall, you're looking at ~9% chance something funny will happen, and a one-in-twenty chance you'll be totally hosed, every time you use your best that money can buy SIN number at a worst available ID checker. |
do scanners get edge? else why would they get exploding dice?
with that system scanners would probably never manage to get a sin when doing sin 6 against scanner 1 . . if you don't have them corrode by substracting successes from the sins level or something like that O.o
heck even a scanner of 6 would still need to get a hit on every single dice he has to his availability to get a sin level 6 to show up as bad O.o
| QUOTE (Stahlseele) |
| do scanners get edge? else why would they get exploding dice? with that system scanners would probably never manage to get a sin when doing sin 6 against scanner 1 . . if you don't have them corrode by substracting successes from the sins level or something like that O.o heck even a scanner of 6 would still need to get a hit on every single dice he has to his availability to get a sin level 6 to show up as bad O.o |
| QUOTE |
| And WTF does "O.o" mean? |
| QUOTE |
| I am not even going to check your math. I believe you. |
Pah, heretic, see were it leads you !
Thanks for the die roller, or as I would call it, probability calculator. Much better (and faster) than my usual calculations!
| QUOTE (Moon-Hawk @ Jan 8 2008, 05:31 PM) |
| 1- game designers are often bad at stats. No news here, it's a tricky subject, moving on. |
| QUOTE (Aaron) |
Okay, let's take a crack at it. Some of these are just things I discovered after running the game for a while, and kinda surprised me.
|
| QUOTE (FriendoftheDork) |
| The GM determines the effect of a glitch. |
| QUOTE (Fortune) | ||
I disagree. In my opinion, Commlinks typically only come with Admin Access. |
| QUOTE (Moon-Hawk) |
| 1- game designers are often bad at stats. No news here, it's a tricky subject, moving on. |
| QUOTE (Buster) | ||||
Not in any company I've worked for in the last 10 years! No network admin with any experience would give their users local admin rights to their workstations. Only tech savvy users like engineers/programmers/network-admins get local admin rights to their boxes and I'm sure the same security principle applies as much in 2070 as 2007. |
A prime example of the move away from users having admin access is Windows. I remember when I could log into DOS easily and whenever I wanted and that if I wanted to reformat my HD I just had to type in the command. Now I have to jump through 15 fricking hoops and reassure them that YES I know what a reformat is, YES I want to do it, YES really, YES seriously, PLEASE dear god just let me.... to get in a simple reformat.
Stupid windows.
Chris
aaand that is why you either use two partitions/2 OS'es(with WinXP you can actually pretty easyly format any partition that is not in use by windows itself at the moment) or simply use a boot-cd with something like Barts Windows PE or something . . or the MTCD *g*
Windows is kinda good practice for how to get around system limitations ^^
Quite on the opposite, Windows is the premier OS where everyone (at home) is using an admin account. The safeguards against user error only dumb down the user accounts. As they assume you are working from Admin...
And in that case, an admin account is not harder to break into than a normal user account. All accounts are protected by the same methods.
Admin functions are supposed to be rarely used (rarely as in, "you have to administrate rather then use), so your password can´t be spied out as often, and if someone breaks into your running system, many security-critical functions are simply inactive and need ANOTHER password to be activated.
I liked my linux admin-greetings. "I do not care about my data, continue anyway".
My plan for changing Fake SIN Identification is use the SIN as a threshold, with the scanner making an extended test to tell if its fake. Most scanners will only scan a SIN once in order to save time and keep running efficiently, but in times of high security the scanner could scan multiple times, or if the SIN has already been flagged by something as being "questionable".
Here's another obscure.. or at least took me a while to find
- To make a spell Permanent it takes a number of Combat Turns equal to half the Drain Value.
I knew there was a time, but took forever to figure out exactly how long it was.
| QUOTE (Aaron) | ||
In the section on actions in the chapter on combat. Let's see, page ... hang on, my PDF is still loading ... page 137 in your hymnal. |
| QUOTE |
7. True, but a pool of 1 critically glitches more often than a pool on 2. I would go for 2 dice. |
Houserule: Hardened SINs. Any SIN scanner with equal or lesser rating always fails. However, the modified rating of the SIN scanner can be raised with net hits by the person running the check.
(A bored, none-too-smart tollbooth operator will raise the gate whenever the scanner light flashes green. The receptionist at the Tir consulate, however, will actually look at the ID, look at the person, and if the person's dress and accent are unusual for the nationality/corp issuing the ID, she may ask questions.)
If their clothing is unusual? Honestly? So, just because his ID pegs him from japan means he should be wearing a kimono?
Accent I could believe, but clothing? Come on.
Clothing still could have an effect if somewhat extreme however. If their SIN says that they are just a low level office worker who barely makes enough for medium lifestyle why are they wearing the newest novahot designer clothes made from high quality real silk?
Cause they moved out of their medium home and lived low for a while cause they like to have nice clothes more than they like a nice building?
Also, I don't think SINs have your job title nor your salary on them.
Now, if their ID says they're a high manager of a well to do company and they show up in hobo rags, then I could see someone questioning them. But just style differences? Not so much.
I dunno about your experience of travelling through high-security checkpoints, but I have done so (legitimately), and the security staff were carefully checking for any inconsistencies. Expecting everyone from Japan to wear a kimono is silly; more people in Tokyo wear suits or jeans than kimonos. But if someone's SIN says they're Japanese, and they're dressed in clothing from Eastern Europe, and their passport visa stamps don't show that they've been in Europe, then it's time to ask a few questions, if you're staffing a high-security checkpoint.
If the subject stammers and seems like they're making up their story as they go along, it's time to call for backup, and to politely apologize for the delay. It's also time to call the JIS and ask "So, did you issue this SIN? Did you issue it to a person who looks like (show photo)? Would you be surprised to learn that they're trying to enter a Tir consulate in Seattle?"
If you would say "oh, there's probably a good reason why they're wearing these clothes, and the ID checks out, go on through sir", then I don't recommend that you staff checkpoints, or at least not in Bagdad.
Being handcuffed to the steering wheel - another bad sign.
-Siege
So just because they bought some clothes on the 'net from eastern europe that means they should have stamps from there on their passport?
I agree on inconsistencies, but clothing is so easily mutable, that I think its a terrible thing to try to nab someone because they're in some clothing thats a different style. (Now, if their clothing is out of class, like your rich clothes example, or some hobo rags, I agree with you, but whether someone likes gucci or prada I don't think really matters.)
No, that means someone should take a closer look. Everything that appears odd gets analysed. Don´t underestimate the power of small-time profiling in police work. I think clothing is one of the hardest things to emulate perfectly.
I´m all for doing SIN checks that way. Request SIN, read data, check consistency with person in front of you. Assess and note threat level of the person (a stuffer shack might value a history theft and robbery higher than one of homicide here).
I'll point out that Baghdad would be classed as a "high risk" zone in all probability, anywhere in Iraq would probably be higher risk than border checkpoints in SR4 NA unless there was some serious political tension going on.
| QUOTE (Tarantula) |
| If their clothing is unusual? Honestly? So, just because his ID pegs him from japan means he should be wearing a kimono? Accent I could believe, but clothing? Come on. |
| QUOTE (DireRadiant) |
| The locals can never tell who the tourists are... or can they? |
| QUOTE (Aaron) | ||
Stop that. I occasionally teach Statistics; I'd like to think I'm pretty good at it. =i) |
| QUOTE (Critias) |
| Laziness is no excuse for incompetence. I'm not just picking on the SR4 guys here, or even just the SR guys in general -- but as a head's up to game designers everywhere, you are designing a game. Do a little math, and make sure shit works the way you think it does, knuckleheads. |
| QUOTE (Riley37) | ||
I have talked my way through a post-9/11 airport security checkpoint with a ticket in a name different from the name on my ID. With good reason: the person who bought the ticket for me used my nickname, not my parentally-issued name. I was pleasantly surprised that the guard believed me. It probably helps that I look white and was wearing a light blue dress shirt. If my skin had turned out more towards the Iroquis side of my ancestry, or I wore a spiked leather jacket, they would not have "nabbed" me, but not let me through either. |
| QUOTE |
| A five-year-old boy was taken into custody and thoroughly searched at Sea-Tac because his name is similar to a possible terrorist alias |
Here's one I stumbled on last session. In the vehicles and combat section it says that you can take an additional type of called shot against vehicles in order to target and destroy components of the vehicle. The component is outright destroyed if you succeed.
| QUOTE (Zak) | ||
|
| QUOTE (Moon-Hawk) | ||||
Let me get this right: Similar to a possible terrorist alias. Translation: TSA guy#1: Check out the little brown kid. TSA guy#2: What's his name? TSA guy#1: It's, ah, Habi....habaj....haa....habajabawabidon'tfrickinknow, man, I can't pronounce this shit. TSA guy#2: Sounds like a terrorist name or somethin'. TSA guy#1: Nab 'im. Keeping the world safe from terror. |
| QUOTE (Spike) |
| You laugh now, but you forget two things, one silly, one tragically not. One: Midgets can be terrorists too... Two: terrorists have proven quite willing to strap explosives to children and infants in the name of Allah. Point in fact: The attempt to kill Bhutto prior to the successful on involved just such an explosive baby. So next time you fly, rest easy knowing that kung fu muslim midgets will NOT be getting past security and onto your plane by posing as children.... |
Knowledge of the 'alias' in question could have been received by the authorities through a tip, or nabbed in a decoded email (or other message), and could easily be seen as a 'code word' for a planned terrorist strike. Stranger things have happened.
Honestly, unless we know the whole story (and we never will), it's hard to judge the situation in a totally fair manner.
| QUOTE (Spike) |
| So next time you fly, rest easy knowing that kung fu muslim midgets will NOT be getting past security and onto your plane by posing as children.... |
| QUOTE (Moon-Hawk) |
| Honestly, I'd be more worried about zombies than kung-fu muslim midgets, but that's probably just me. |
I still prefer apocabombie.
| QUOTE (Whipstitch) |
| I still prefer apocabombie. |
| QUOTE (Spike) |
| ... or a single shambling dead capable of bringing the apocalypse by itself? Oh: and to be on topic: What obscure rule really applies in either case? |
So in a feeble attempt to get this thread back on topic...
[EDIT] never mind.... I re-read and answered my own dumb question...
We can now get back to discussing bloodzillazombiedropbear invasions....
Bloodzilla is an obscure rule! I was actually on topic for once.
Horribly Derailed Topic... But I found another obscure rule...
| QUOTE (BBB pg 257) |
| Each character starts off with a Notoriety of 0—people have a neutral opinion of her. Modify this according to the following qualities possessed by the character (plus one point per negative quality, minus one point per positive quality): Positive Qualities: Blandness, First Impression, Lucky Negative Qualities: Addiction, Bad Luck, Combat Paralysis, Elf Poser, Gremlins, Incompetent, Infirm, Ork Poser, Scorched, SINner (criminal SIN only), Spirit Bane, Uncouth, Uneducated |
Here's a great one that we came across:
Armor and Encumbrance: evey 2 points over body x 2 gives a -1 to Agility and Reaction tests.
This means that Running and Climbing (both strength) are unaffected by lots of armor. Also, swimming, another strength skill, only has modifiers for #kilos carried/worn for treading water. Equipment doesn't list kilos and there is no modifier for trying to swim in armor (just stay there and float does).
| QUOTE (Feshy) | ||
Actually, you should have. I was wrong, it is around 3%. I forgot that critical glitches would overlap with the 0 hit rate (actually, I forgot that my statistics printout didn't subtract them from the 0 hit odds, which it probably should. 0 hits is different from a critical glitch! It handles this properly for extended die rolls, but leaves it in for normal rolls.) Oh well. I need to add opposing rolls to the statistics calculations in my die roller, that would make this quicker. I guess what it comes down to is, try to use your fake SIN as seldom as possible -- or SIN costs will rapidly outpace your lifestyle costs! |
| QUOTE (Cheops) |
| Here's a great one that we came across: Armor and Encumbrance: evey 2 points over body x 2 gives a -1 to Agility and Reaction tests. |
Powered by Invision Power Board (http://www.invisionboard.com)
© Invision Power Services (http://www.invisionpower.com)