![]() |
![]() |
![]()
Post
#1
|
|
Great Dragon ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 5,486 Joined: 17-March 05 From: Michigan Member No.: 7,180 ![]() |
So, if I have one commlink, and have two devices subscribed to it... say... my image-linked cybereyes and my skinlinked smart-gun... they can communicate with one antoher, and share information (ballistic data, trajectories, etc).
If two commlinks are connected, they can share data files and whatnot - but can they also share linked devices? Like, could this second commlink access my eye-recording data as if it was connected to my eyes - but all traffic would have to go through the intermediate commlink? They give examples in the book where a team has their commlinks connected, and can share data (biometrics, enemy locations, etc). So how exactly is this handeled? They're not using "Transfer data" actions every round to send the crap back and fourth are they? But if not, it seems like you get around the device-limit for commlinks just by having a ton of them. And if two commlinks can share attached devices, could once commlink use the other as a router. Like, if you turned the second commlink's wireless capability off, but then physically linked it to the first... could you then use it to access a wireless node (by having the first commlink access it for you)... allowing you to load up one commlink with a buff firewall, stealth, eccm, scan and IC programs for network security, and having all your hack-y stuff on the second commlink. This way, your network is secure, but your commlink isn't bogged down by the security. That seems to defeat the point of having a program limit on commlinks... but since, you know, that's how they do things in real life... it seems like maybe a legitimate tactic - you just couldn't access those other programs yourself... they'd just be passivly protecting your network. I'm sure this has been brought up several times before.. .but does anyone have a good grasp on the rules to explain how it really works in game mechanics? |
|
|
![]() ![]() |
![]() |
Lo-Fi Version | Time is now: 30th July 2025 - 02:27 AM |
Topps, Inc has sole ownership of the names, logo, artwork, marks, photographs, sounds, audio, video and/or any proprietary material used in connection with the game Shadowrun. Topps, Inc has granted permission to the Dumpshock Forums to use such names, logos, artwork, marks and/or any proprietary materials for promotional and informational purposes on its website but does not endorse, and is not affiliated with the Dumpshock Forums in any official capacity whatsoever.