IPB

Welcome Guest ( Log In | Register )

4 Pages V  < 1 2 3 4 >  
Reply to this topicStart new topic
almost normal
post May 3 2012, 05:04 PM
Post #51


Running Target
***

Group: Banned
Posts: 1,105
Joined: 23-August 10
Member No.: 18,961



QUOTE (tete @ May 3 2012, 11:53 AM) *
Its not based on the real world its base on Tron. GM fiat and handwaving should be the norm, reserve tests for something important.


As clarified previously, it's not the test that's the concern, it's the timeframe, which remains ambiguous. I wouldn't make a player roll to walk a mile, but I'd at least have mental timeline on how long it'd take him.
Go to the top of the page
 
+Quote Post
_Pax._
post May 3 2012, 05:22 PM
Post #52


Neophyte Runner
*****

Group: Validating
Posts: 2,492
Joined: 19-April 12
Member No.: 51,818



QUOTE (almost normal @ May 3 2012, 11:40 AM) *
The player knows as much (or as little) about the Matrix as I do, he's also the player least likely to be a dick about abusing rules.

I wasn't suggesting he'd abuse anything. Just, that an AI is a complex and complicated enough character, that without at least the GM being reasonably experienced handling Matrix actions, I wouldn't advise allowing an AI PC.

QUOTE
A meat hacker can also be hit with Black ICe, jamming their connection on, an AI cannot.

A meat hacker, even if traced right back to his or her commlink, can simply turn it off and drive away. Or worst case, physically throw the commlink off a bridge, and go get another one.

An AI can't usually do either of those with their home node. Not with nearly as much ease, at least.
Go to the top of the page
 
+Quote Post
almost normal
post May 3 2012, 05:34 PM
Post #53


Running Target
***

Group: Banned
Posts: 1,105
Joined: 23-August 10
Member No.: 18,961



QUOTE (_Pax._ @ May 3 2012, 12:22 PM) *
A meat hacker, even if traced right back to his or her commlink, can simply turn it off and drive away. Or worst case, physically throw the commlink off a bridge, and go get another one.


With Black ICe, the meat hacker can't disconnect without a complex action and test, while the trace gets the equivalent of 2 free hits against the hacker. If the hacker loses combat, the trace is a guaranteed thing, and the hacker is at least knocked out, if not dead. Basically, as it seems now, the AI can get away from any combat where it doesn't get killed in the first pass, where the hacker has no such luxury. I'm not suggesting that how it seems is how it actually is, only that it's the way I understand it currently.

QUOTE
Just, that an AI is a complex and complicated enough character, that without at least the GM being reasonably experienced handling Matrix actions, I wouldn't advise allowing an AI PC.


I'm one of those types of people who jumps right into the thick of things to learn. Might not be the best way, but Im figuring by the end of this campaign, the group will have at 2 people who understand the Matrix, and that's two more then we have now.
Go to the top of the page
 
+Quote Post
_Pax._
post May 3 2012, 07:39 PM
Post #54


Neophyte Runner
*****

Group: Validating
Posts: 2,492
Joined: 19-April 12
Member No.: 51,818



QUOTE (almost normal @ May 3 2012, 12:34 PM) *
With Black ICe, the meat hacker can't disconnect without a complex action and test, while the trace gets the equivalent of 2 free hits against the hacker. If the hacker loses combat, the trace is a guaranteed thing, and the hacker is at least knocked out, if not dead. Basically, as it seems now, the AI can get away from any combat where it doesn't get killed in the first pass, where the hacker has no such luxury. I'm not suggesting that how it seems is how it actually is, only that it's the way I understand it currently.


Logging out without wiping the Access Log - which might be Encrypted, making it take quite a while - leaves you open to potentially being found. Also, the system may retain a Restricted Alert against the AI's Access ID for some time - perhaps even hours - making it very very hard for the AI to hack back in.
Go to the top of the page
 
+Quote Post
almost normal
post May 3 2012, 07:51 PM
Post #55


Running Target
***

Group: Banned
Posts: 1,105
Joined: 23-August 10
Member No.: 18,961



QUOTE (_Pax._ @ May 3 2012, 03:39 PM) *
Logging out without wiping the Access Log - which might be Encrypted, making it take quite a while - leaves you open to potentially being found. Also, the system may retain a Restricted Alert against the AI's Access ID for some time - perhaps even hours - making it very very hard for the AI to hack back in.


Duh. Just encrypt the damn log. lol. <3 You guys are great.
Go to the top of the page
 
+Quote Post
_Pax._
post May 3 2012, 08:39 PM
Post #56


Neophyte Runner
*****

Group: Validating
Posts: 2,492
Joined: 19-April 12
Member No.: 51,818



Note, it may only take an action or two for the AI to decrypt the log - but that's another action or two for the IC to run attack on him, too. And makes him decide "take the hits so I can run without trace, or, load up attack and actually try and take this annoying S.O.B. down?"
Go to the top of the page
 
+Quote Post
Ryu
post May 3 2012, 08:53 PM
Post #57


Awakened Asset
********

Group: Members
Posts: 4,464
Joined: 9-April 05
From: AGS, North German League
Member No.: 7,309



QUOTE (almost normal @ May 3 2012, 07:04 PM) *
As clarified previously, it's not the test that's the concern, it's the timeframe, which remains ambiguous. I wouldn't make a player roll to walk a mile, but I'd at least have mental timeline on how long it'd take him.

Unless you find me a rule for longer times (it might exist), the complex action deletes the file in question. The old %-bar moving up while the bad guys try to get the file is very dramatic, but does not jive with the general disregard for file sizes.
Go to the top of the page
 
+Quote Post
almost normal
post May 3 2012, 09:01 PM
Post #58


Running Target
***

Group: Banned
Posts: 1,105
Joined: 23-August 10
Member No.: 18,961



QUOTE (Ryu @ May 3 2012, 03:53 PM) *
Unless you find me a rule for longer times (it might exist), the complex action deletes the file in question. The old %-bar moving up while the bad guys try to get the file is very dramatic, but does not jive with the general disregard for file sizes.


SR4a suggests a simple action per turn until the edit is complete for larger tasks, and a single complex for simpler ones. I'm not sure which "Delete Everything" falls under.
Go to the top of the page
 
+Quote Post
tete
post May 4 2012, 02:56 AM
Post #59


Running Target
***

Group: Members
Posts: 1,095
Joined: 26-February 02
From: Seattle Wa, USA
Member No.: 1,139



QUOTE (almost normal @ May 3 2012, 06:04 PM) *
As clarified previously, it's not the test that's the concern, it's the timeframe, which remains ambiguous. I wouldn't make a player roll to walk a mile, but I'd at least have mental timeline on how long it'd take him.


I mean that it can take as much or as little time as you want. Technically with the removal of memory accounting (SR1-3, and thank god its gone) data is insignificant size, unless you want it to be (like encryption in the core book vs encryption in unwired). Do whats best for the story. You can even throw some real world at it with having it do a drive wipe which should take a fair amount of time but recovering it today is theoretical. (ie too much time an resources to bother). You can throw in as many tests (or as few) as the story needs. Its a terrible answer I know but thats what comes with abstraction.

[edit] but for a large corporation in the real world loosing a data is more than going in a deleting it (you got backups on backups on backups, 3-2-1 or better), but this is tron so do whats best for the story.

QUOTE (Yerameyahu @ May 3 2012, 04:37 PM) *
Yeah, it's tricky in SR4 translating Access ID into RL terms like IP, MAC, etc. It's better to not try, and just go by what the book says. :/


While I agree with you about avoiding the real life stuff. Its a kerberos (or whatever they use in the future) key. Microsoft has some pretty good documentation on technet for their implementation of them. Look up Active Directory SIDs to see the big picture.
Go to the top of the page
 
+Quote Post
Ryu
post May 4 2012, 08:10 AM
Post #60


Awakened Asset
********

Group: Members
Posts: 4,464
Joined: 9-April 05
From: AGS, North German League
Member No.: 7,309



QUOTE (almost normal @ May 3 2012, 11:01 PM) *
SR4a suggests a simple action per turn until the edit is complete for larger tasks, and a single complex for simpler ones. I'm not sure which "Delete Everything" falls under.

Multiple Edits are for generating content - a delete requires little user input.
Go to the top of the page
 
+Quote Post
DMiller
post May 4 2012, 08:41 AM
Post #61


Moving Target
**

Group: Dumpshocked
Posts: 681
Joined: 23-March 10
From: Japan
Member No.: 18,343



Please note this is my opinion and not from any books:

For the deltree - type action...

I would have it take (System) Turns for a communit or similar device or (System * max users) Turns for a Nexus. The delete action would not require constant supervision once started, however without supervision it could be interrupted by a Spider before completion. I would also say that with Admin level access it shouldn't require a test, but with any lower access perhaps a Hacking + Edit (2 for Security Access, or 4 for User Access).

-D
Go to the top of the page
 
+Quote Post
Udoshi
post May 4 2012, 10:35 AM
Post #62


Runner
******

Group: Members
Posts: 2,782
Joined: 28-August 09
Member No.: 17,566



QUOTE (almost normal @ May 2 2012, 10:47 AM) *
Tracing. Against a reasonable stealth program, it seems to take forever. Is this intentional? Will a trace program narrow down the Access ID/location of the program in ever decreasing circles? What's the main point of tracing if a hacker can quickly and easily change his Access ID number?


I STRONGLY suggest waiving the 'successive extended test -1' rule that Anniversary edition introduced, but only in regards to Tracing. It basically broke Tracewars, in that the track test is extended but defending against it is NOT. A tracewar (trace user vs redirect trace) should be a hack-off, but it shouldn't be one-sided.
If someone is just changing their access ID repeatedly, it does make it harder to find them, but if they're doing it in the middle of combat they're basically shooting themselves in the foot.

For one, see passive traces in Unwired. For second, spoofing your access ID to a new one just happens to disconnect you from all nodes, and resubscribing takes either a simple or complex per(i forget which). It will basically wreck your PAN configuration, unless its smartly networked.

QUOTE (almost normal @ May 2 2012, 10:47 AM) *
Black Ice/Hammer/Out. It prevents the hacker from jacking out unless they make a test, and even if they do succeed in such a test, they suffer dumpshock. If a hacker is literally 'jacked in', will a second player unplugging the hacker make the willpower test an auto success, or will some further damage result? Secondly, if attacking an AI with Black ICe, it's nearly guaranteed to succeed, as the AI would lack biofeedback filters, however, neither of the 3 black programs seem to be able to affect the AI's damage tracks. Is this intentional, or are we doing it wrong?

Doing it Wrong. Black IC only works against users in VR, and very specifically doesn't work against Agents/Sprites, etc. (231, no effect on X...). An AI is basically a better, self-aware agent, and also a Program, so it claims immunity. Do keep in mind that if someone is in AR mode, it doesn't work either.
Otherwise, you're doing it right in terms of tests.
You basically want Attack to damage any wierd programs like sprites or agents or stuff black ic doesn't affect.

QUOTE (almost normal @ May 2 2012, 10:47 AM) *
Terminate Connection, possibly a subset of the last question, do you need the Access ID of the intruder to terminate their connection?

Slightly fuzzier territory. This is expanded upon in Unwired, where users/spiders/ic can take actions to boot specific users from the system. Yes, it took unwired to introduce Kicks. I think you need the Account, but I'm not sure. Also relevant is the Alert section from the same book - if an Alert is successfully triggered against a user, they lose all access rights AND everyone can see you. From the faq:

QUOTE
Q:When you trigger an alert, will security automatically spot you, or do IC and security hackers still need to succeed in an Opposed Matrix Perception Test?

A:IC or security hackers will need to spot the intruder as normal, unless a Restricted Alert was issued. If a Restricted Alert has been issued against the Hacker, IC and Spiders (users with a legitimate account) do not need to make a Matrix Perception Test in order to know of the presence of the intruding Hacker because the Node has already identified them. These icons may attack the hacker or take other actions that target the intruder. They do not, however, know any further information about the intruder beyond the fact of their presence. If defending icons want to know more information (access ID, what programs are running) they must succeed in a standard Matrix Perception Test.


QUOTE ( @ May 2 2012, 10:47 AM) *
Deleting information off a commlink. How does that work? 230 seems to indicate the edit software, but that seems odd. For one, it means that deltree *.* is harder to pull off then actively changing a face on a video feed. Two, it also seems to indicate that it's something that has to be actively done over several passes. Lastly, can this information, outside of GM/CSI fiat, be brought back?

Edit is indeed the program for altering files, but there is a distinction between levels of Access Rights that is rather relevant here. If you have good user rights, you will just succeed automatically without a test. If you don't, you will have to roll against system+firewall to attempt it.
The corrupt program and action from unwired is also extremely relevant, and there is also a virus which can delete everything on a system in the same book, but takes a few minutes to work.


In fact, I'm just going to pretty much recommend that you read the first 90 pages of unwired. Everything about things like matrix topography, how systems are set up, data transfers, expanded rules on alerts and subscriptions, the security example setups.... basically goes a huge long ways towards making it easier to wrap your brain around the matrix without making it more complicated. There's information there that's basically missing from the core book (my favorite obscure text is the one that lets you go above your subscription limit in exchange for program lag, which actually makes pans kind of feasable), and I'm not even talking about crap like echoes or new gear. Just clarifications.
Go to the top of the page
 
+Quote Post
Udoshi
post May 4 2012, 10:46 AM
Post #63


Runner
******

Group: Members
Posts: 2,782
Joined: 28-August 09
Member No.: 17,566



QUOTE (Eratosthenes @ May 3 2012, 09:53 AM) *
Great. They've wiped the acces log. But when they LOG OUT/DISCONNECT, a new entry is put in the access log with their current access ID. And since they're logged out...they can't wipe the access log. See?

It's possible, using an agent or some sort of delayed command perhaps, to do so, but an Agent will never be as skilled at editing the access log as the hacker themselves. And then the Agent's access id can't be tied back to the hacker, or it's all for naught.

A meat hacker can just spoof their access ID after logging off, killing any attempts to trace it. An AI cannot.


The developers actually left the tools to solve this problem easily. Most people just forget about them.
They're called Node Scripts.

The files that do things automatically on nodes, like ejecting your smartgun's ammo clip while it's empty.
You can pretty easily have a script that 1)stops logging, 2)deletes your jack out timestamp 3) Self-delete, sending a command to restart logging. and run it with Administrator authority.

QUOTE (_Pax._ @ May 3 2012, 02:39 PM) *
Note, it may only take an action or two for the AI to decrypt the log - but that's another action or two for the IC to run attack on him, too. And makes him decide "take the hits so I can run without trace, or, load up attack and actually try and take this annoying S.O.B. down?"

Just so you know, Decryption takes SIGNIFICANTLY longer than that. Multiple Combat Turns is rather long when all combatants involved get 3 passes minimum.
Go to the top of the page
 
+Quote Post
Warlordtheft
post May 4 2012, 12:47 PM
Post #64


Neophyte Runner
*****

Group: Members
Posts: 2,328
Joined: 2-April 07
From: The Center of the Universe
Member No.: 11,360



QUOTE (Yerameyahu @ May 3 2012, 11:37 AM) *
Yeah, it's tricky in SR4 translating Access ID into RL terms like IP, MAC, etc. It's better to not try, and just go by what the book says. :/

I don't think that's the case. It 'physically leaves' the home node and moves into another node. That movement may leave access log traces (if not deleted), but there's no active 'presence' (subscription, etc.) to the home node. Theoretically, you could even move the AI to a 'working node' via a totally offline route (flash drive?). (IMG:style_emoticons/default/smile.gif)


Try that when one of your players who programs flight sims for a living is the hacker........ (IMG:style_emoticons/default/wacko.gif)
Go to the top of the page
 
+Quote Post
Yerameyahu
post May 4 2012, 02:16 PM
Post #65


Advocatus Diaboli
**********

Group: Members
Posts: 13,994
Joined: 20-November 07
From: USA
Member No.: 14,282



The problem with node scripts, Udoshi, is that they're *too* powerful. Have you tried using them in Eclipse Phase? Talk about god mode. :/ But yes, you would expect people to be using 'cleanup' exits like that.
Go to the top of the page
 
+Quote Post
almost normal
post May 4 2012, 03:24 PM
Post #66


Running Target
***

Group: Banned
Posts: 1,105
Joined: 23-August 10
Member No.: 18,961



QUOTE (Yerameyahu @ May 4 2012, 09:16 AM) *
The problem with node scripts, Udoshi, is that they're *too* powerful. Have you tried using them in Eclipse Phase? Talk about god mode. :/ But yes, you would expect people to be using 'cleanup' exits like that.


I GM'd EP before I GM'd SR.

Fell in love with the universe. The char creation left a lot to be desired.
Go to the top of the page
 
+Quote Post
Yerameyahu
post May 4 2012, 03:30 PM
Post #67


Advocatus Diaboli
**********

Group: Members
Posts: 13,994
Joined: 20-November 07
From: USA
Member No.: 14,282



Yeah, it… poses unique challenges. :\ Honestly, the most fun we had with it was the very first game, no knowledge of the setting, just handed us charsheets. I forget the name of the scenario, you wake up alone on the haywire space station. But anyway. (IMG:style_emoticons/default/smile.gif) I'd want to limit scripts in *some* way, for balance (not 'realism', oh well).
Go to the top of the page
 
+Quote Post
_Pax._
post May 4 2012, 03:40 PM
Post #68


Neophyte Runner
*****

Group: Validating
Posts: 2,492
Joined: 19-April 12
Member No.: 51,818



QUOTE (Udoshi @ May 4 2012, 05:46 AM) *
Just so you know, Decryption takes SIGNIFICANTLY longer than that. Multiple Combat Turns is rather long when all combatants involved get 3 passes minimum.

Eh. If it's a rating 3 or 4 Encrypt program, a threshold of 6 or 8 shouldn't take longer than 2, MAYBE 3 combat turns for an AI equipped to handle it. And you only need to use one Complex Action to start the process - it's automated from there. Going full-defense and loading up a Medic program might be enough to buy time for that decryption to work. (IMG:style_emoticons/default/smile.gif)
Go to the top of the page
 
+Quote Post
almost normal
post May 4 2012, 04:35 PM
Post #69


Running Target
***

Group: Banned
Posts: 1,105
Joined: 23-August 10
Member No.: 18,961



QUOTE (Yerameyahu @ May 4 2012, 10:30 AM) *
Yeah, it… poses unique challenges. :\ Honestly, the most fun we had with it was the very first game, no knowledge of the setting, just handed us charsheets. I forget the name of the scenario, you wake up alone on the haywire space station. But anyway. (IMG:style_emoticons/default/smile.gif) I'd want to limit scripts in *some* way, for balance (not 'realism', oh well).


Same. I played it once at a con, had a blast. Bought the core book and sunward right away. No one was playing it in my area, so I started GMing it, and never got to play it again.
Go to the top of the page
 
+Quote Post
Udoshi
post May 4 2012, 11:25 PM
Post #70


Runner
******

Group: Members
Posts: 2,782
Joined: 28-August 09
Member No.: 17,566



QUOTE (Yerameyahu @ May 4 2012, 08:16 AM) *
The problem with node scripts, Udoshi, is that they're *too* powerful. Have you tried using them in Eclipse Phase? Talk about god mode. :/ But yes, you would expect people to be using 'cleanup' exits like that.


I am not familiar with Eclipse Phase, sadly.(i haven't had the time to dig into it, but I've heard its good) how do they work in that system?

I'm of a mixed mind about nodescripts. On one hand, they make sense for a lot of things (gridguide, searchbot agents, smartguns, even vehicle sensors and stuff) but they can be rather powerful if they aren't limited at all. (personally, I tend to say there's a limit of auto-actions a node can take by itself in any given turn, so there's a bit of a limit to 'oh the node does a billion things at once')

On the other hand, a lot of hacking these days is script based anyway, and, at the very least, an exit script is probably hacker 101.
Go to the top of the page
 
+Quote Post
_Pax._
post May 4 2012, 11:30 PM
Post #71


Neophyte Runner
*****

Group: Validating
Posts: 2,492
Joined: 19-April 12
Member No.: 51,818



Maybe if those scripts were treated as a kind of malware / virii, in terms of mechanics? Something that acts as a temorary Agent sort of thing; the higher it's rating, the more complex the instructions you can put into it (so the "typical exit script" described here would be R1 suitable) ...?
Go to the top of the page
 
+Quote Post
Yerameyahu
post May 4 2012, 11:32 PM
Post #72


Advocatus Diaboli
**********

Group: Members
Posts: 13,994
Joined: 20-November 07
From: USA
Member No.: 14,282



Yeah, powerful. (IMG:style_emoticons/default/smile.gif) They work about as you'd expect, which is the issue. You prepare a bunch of things ahead of time, waste X time uploading the script, and then it just goes nuts. It's not so much the number of actions *at once*, just the 'free' actions. One thing that (IIRC?) EP does is require you to 'code' the script, which at least requires some effort and gives you a limitation.

That's interesting, Pax. Hm.
Go to the top of the page
 
+Quote Post
Udoshi
post May 4 2012, 11:50 PM
Post #73


Runner
******

Group: Members
Posts: 2,782
Joined: 28-August 09
Member No.: 17,566



QUOTE (_Pax._ @ May 4 2012, 05:30 PM) *
Maybe if those scripts were treated as a kind of malware / virii, in terms of mechanics? Something that acts as a temorary Agent sort of thing; the higher it's rating, the more complex the instructions you can put into it (so the "typical exit script" described here would be R1 suitable) ...?


I could have sworn there was a sidebar dealing with scripts and suggested guidelines on how elaborate they are, but I can't find it. I DID discover its a software+logic test to make, though.

I think a more easy solution is to treat a node kind of like a pilot - it has its own initiative and limit of actions a turn, but can only spend them on scripted actions.

I think the better solution is more along Pax's lines, which I like. Something along the lines of putting each hit on creating a script towards a dice pool, in the case it needs to roll something, which also makes multi-command scripts harder to throw together.
Go to the top of the page
 
+Quote Post
Yerameyahu
post May 4 2012, 11:53 PM
Post #74


Advocatus Diaboli
**********

Group: Members
Posts: 13,994
Joined: 20-November 07
From: USA
Member No.: 14,282



Ah, there *is* a test for it? Then that's like EP after all. (IMG:style_emoticons/default/smile.gif) Yeah, I'm still interested in the other suggestion.
Go to the top of the page
 
+Quote Post
Udoshi
post May 5 2012, 12:04 AM
Post #75


Runner
******

Group: Members
Posts: 2,782
Joined: 28-August 09
Member No.: 17,566



QUOTE (Yerameyahu @ May 4 2012, 05:53 PM) *
Ah, there *is* a test for it? Then that's like EP after all. (IMG:style_emoticons/default/smile.gif) Yeah, I'm still interested in the other suggestion.


Well. there IS a test for it.

With absolutely no details or guidelines on how it actually works. (IMG:style_emoticons/default/frown.gif)

How do EP scripts work?
Go to the top of the page
 
+Quote Post

4 Pages V  < 1 2 3 4 >
Reply to this topicStart new topic

 

RSS Lo-Fi Version Time is now: 6th June 2025 - 07:17 PM

Topps, Inc has sole ownership of the names, logo, artwork, marks, photographs, sounds, audio, video and/or any proprietary material used in connection with the game Shadowrun. Topps, Inc has granted permission to the Dumpshock Forums to use such names, logos, artwork, marks and/or any proprietary materials for promotional and informational purposes on its website but does not endorse, and is not affiliated with the Dumpshock Forums in any official capacity whatsoever.