Apr 1 2005, 08:30 AM
Post
#1
|
|
|
Immortal Elf ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 11,410 Joined: 1-October 03 From: Pittsburgh Member No.: 5,670 |
okay. SR4 says it's going to streamline things, especially Matrix things. let's talk about what it should be, especially from a rules perspective. i've listed my requirements in no particular order below. note that while i've put a lot of thought into these concepts, i've put very little into their execution. this is primarily a list of what needs to change, and only secondarily a list of ways to change it.
Tests a single roll against a TN with little variance should resolve most actions. a wide array of ridiculously high TNs, which are modified by a ridiculously large number of reductors, is completely ridiculous. personally, i think all decker-hackers should use Channels, a la otaku. at least, the mechanic should be similar: a small number of multi-purpose, very expensive programs. i also think that the ACIFS should be reduced by at least one. get ride of Slaves completely: this is the realm of rigger-hackers. replace all Slave operations with rigger-hacker actions. i think Index and Files could possibly combined; Access and Control can certainly be combined. jesus, you use Access for one thing: Logon to X! it does not deserve its own stat. either that, or expand Access to include all forms of electronic warfare and cryptography in general (since cracking crypto is basically all Access is anyway). want to listen in on your enemies' comms? Access test. want to gank control of a rigger-hacker's drone network? Access test. you get the idea. a name change would be appropriate: Crypto gets my vote. even better, give hosts one TN, which is then reduced by a decker's programs. for instance, you could have a rating 10 host. if you're performing an Access action--oops, Crypto action!--and your Crypto program (or whatever) is 5, then your TN is 5. Hackability everything on a computer should be hackable, and every computer with a network connection should be hackable. i want to play a Comp Sci major who hacks girls' pocsecs for their numbers, goddammit. i want to be able to gank control of the IC that's attacking me, and send it after the security deckers that just popped in. i want to be able to hack another icon and pervert his actions. this includes cyberdecks, or whatever replaces them: the connection is two-way. i want to hack cyberdecks. i want to be able to hack a computer so completely that i can change the ACIFS ratings, reset my security tally, and delete IC--and i want everything in that last sentence to be hard as hell. Definitions i want simple, non-detailed definitions for computer-related statistics. basically, i want to know if ACIFS are hardware, software, or firmware. i want to know how much Mp a Red host has. i want to know how many users an Orange-6 host can handle, and i want to know what happens when you overload it with connections. Crafting related to the above, i want to be able to build hosts. i want to be able to pay more for a host that's pocket-sized, or nanowoven into my clothes. i want a server in my goddamn sunglasses. Similarity everything needs to use the same damn rules. none of this 100Mp wristtop computer / MPCP-8 cyberdeck / Orange-6/10/12/11/10/11 host crap--everything that can be hacked (see Hackability, above) should use the same stats as everything else that can be hacked. Security the entire concept of security sheaves should be reworked. it's interesting, but in the end, it's both limiting. the sheaf system means that computers can't proactively respond to intruders (unless the computer operator can afford IC Constructs, and it's a very reactionary proactivity even then). moreover, the reactivity of computers to intruders is incredibly limited. there's no way to respond intelligently to specific methods of attack. i think that every host should have a security controller. a single piece of IC (larger/more important systems might have more, but one would be the norm) that handles all security for that host. as hackers gain attention, this controller would spawn countermeasures as required. it should be possible, though difficult, to simply take the controller down in combat, neutralizing all security for as long as it takes the host to rebuild the controller (several minutes for low-end hosts, several rounds for high-end). to keep things simple and streamlined, the mechanics controllers use for spawning countermeasures should be similar to summoning nature spirits. Countermeasures countermeasures should do more--and less--than just attack things. after all, hackers appear as glitches in the system. in the real world, it's very rare for guards of any stripe to be given shoot-on-suspicion orders, where anything that moves at all (wind, animals, wandering children) gets an automatic three-round burst. yet that's exactly how IC reacts to everything, in SR. instead, the first response by the security controller (see above) should be to spawn a countermeasure that raises the TN for the specific action that the controller detected, or which allow the controller to gain more information about any further attempts (a la probe or scout IC). SIMPLICITY jesus christ, hacking should be simpler. none of this crap with 500,000 programs that take up 15613.54Mp which you then have to find the square root of in order to discover how much time it takes to get to hell with that. operations should be action-based: write up a definition of what an Index action is, or a File action, or an Access/Crypto action. we don't need four seperate Logon to X actions. we don't need umpteen billion Locate X actions that all use the same goddamn program, subsystem rating, and skill anyway. |
|
|
|
mfb what the WMI needs to be Apr 1 2005, 08:30 AM
Kagetenshi I disagree with just about everything you say.
~J Apr 1 2005, 12:01 PM
Austere Emancipator I suspect Kagetenshi is truly embracing this whole... Apr 1 2005, 12:22 PM
Kagetenshi No, I quite honestly disagree with almost the enti... Apr 1 2005, 12:19 PM
Austere Emancipator You honestly think it's a good idea for the ha... Apr 1 2005, 12:45 PM
Kagetenshi "As complex as possible"? It's painf... Apr 1 2005, 12:42 PM
Austere Emancipator The Decking section in SR3 is longer than the Rang... Apr 1 2005, 01:10 PM
Kagetenshi Keep in mind that the length of the Decking sectio... Apr 1 2005, 01:12 PM
Austere Emancipator No worries. I think I'm too tired right now to... Apr 1 2005, 01:45 PM
Doctor Funkenstein QUOTE (Kagetenshi) The potentially complicated par... Apr 1 2005, 01:43 PM
mfb pretty much what austere said, kage. you keep sayi... Apr 1 2005, 04:38 PM
Kagetenshi I disagree, but I need to go drive someone to the ... Apr 1 2005, 04:57 PM
Kanada Ten QUOTE (mfb) Tests
a single roll against a TN with ... Apr 1 2005, 05:06 PM
mfb can we take it to a thread in the regular SR secti... Apr 1 2005, 05:15 PM
MYST1C QUOTE (Doctor Funkenstein)my logic being that by t... Apr 1 2005, 08:45 PM
MYST1C QUOTE (Kanada Ten)Getting rid of Mp is an interest... Apr 1 2005, 08:53 PM
mfb that could work. you could have knowsoft links tha... Apr 1 2005, 09:50 PM
Austere Emancipator But then we wouldn't have any more threads abo... Apr 1 2005, 09:48 PM
Deamon_Knight I think that Making "hacking" like spell... Apr 2 2005, 12:46 AM
mfb oh, they exist. they're just a horrifying, ten... Apr 2 2005, 01:36 AM
Kagetenshi QUOTE (mfb) can we take it to a thread in the regu... Apr 2 2005, 03:08 AM
Kanada Ten Cellphones are hackable. They may require a diffe... Apr 2 2005, 03:09 AM
Kagetenshi Define "hackable"? The mobile speed pass... Apr 2 2005, 03:18 AM
Kanada Ten They broke the encryption code. And the speed pas... Apr 2 2005, 03:22 AM
Kagetenshi No, the speed pass doesn't connect to a networ... Apr 2 2005, 03:33 AM
Kanada Ten I'm not saying things should be hackable if th... Apr 2 2005, 03:27 AM
Dissonance Honestly, I don't really care about the rules ... Apr 2 2005, 05:11 AM
mfb i'm not talking about brainhacking, or even cy... Apr 2 2005, 05:54 AM
Kanada Ten QUOTE Walking down a hallway with whatever equipme... Apr 2 2005, 06:11 AM
Dissonance Icing on the cake, mfb. I'm just looking forw... Apr 2 2005, 06:10 AM
Kanada Ten I'm not saying it can't be done, just... d... Apr 2 2005, 06:32 AM
Dissonance Of course, the problem with a wireless matrix is t... Apr 2 2005, 06:37 AM
Kanada Ten I'd expect the danger of being a l33t net rigg... Apr 2 2005, 06:46 AM
Dissonance I'ma cry if they reintroduce MIJI, anyways. W... Apr 2 2005, 07:00 AM
mfb hopefully, MIJI will be introduced as a completely... Apr 2 2005, 07:19 AM
Synner QUOTE (Dissonance) I imagine they'll just make... Apr 2 2005, 08:16 AM
Dissonance Because it'd be really hard to do full-on imme... Apr 2 2005, 08:15 AM
Kesh MIJI? Not familiar with the term. Apr 2 2005, 08:21 AM
Synner And who says (and note I haven't actually seen... Apr 2 2005, 08:22 AM
mfb there's no reason that partial immersion can... Apr 2 2005, 08:38 AM
Dissonance I'm not saying that it's not possible. In... Apr 2 2005, 08:40 AM
mfb i doubt that will be possible. you jump into a dro... Apr 2 2005, 08:43 AM
hobgoblin or the implant allows you to order your body aroun... Apr 2 2005, 07:24 PM
warrior_allanon alright i'm gonna throw my $0.02 in here ... Apr 2 2005, 10:43 PM
mfb i'm not sure what you mean. can you quote the ... Apr 2 2005, 11:03 PM
warrior_allanon top of the page, i realize he is stating what he w... Apr 2 2005, 10:56 PM
hobgoblin i see where mr warrior is going. his post shows ho... Apr 3 2005, 12:54 AM
mfb i'm not saying get rid of programs. i'm sa... Apr 3 2005, 05:46 AM
hobgoblin the thing is that there is a lot of limited effect... Apr 3 2005, 05:47 PM
mfb that's hardly the norm, though. spells are not... Apr 3 2005, 08:43 PM
Kesh More to the point, those single-task programs are ... Apr 3 2005, 11:18 PM
mfb exactly. Apr 3 2005, 10:12 PM
warrior_allanon that is because programs as a general sort are sin... Apr 4 2005, 01:20 AM
mfb if the Matrix were remotely realistic, allanon, th... Apr 4 2005, 04:15 AM
Dissonance I still like my idea of boiling it down into 10 or... Apr 4 2005, 10:38 AM
Janus Sorry to interrupt, but I have some ideas. How are... Apr 4 2005, 10:35 AM
mfb hm. i'll have to check out Metal Head Maximum ... Apr 4 2005, 05:39 PM
Synner Nice ideas Janus. I'd mail them in to you know... Apr 4 2005, 05:43 PM
mfb yes, actually. the thought fills me with a terribl... Apr 4 2005, 05:14 PM
RunnerPaul QUOTE (mfb) i've always thought free low-level... Apr 4 2005, 07:30 PM
Kagetenshi As long as they've got a greater than 70% chan... Apr 4 2005, 09:08 PM
mfb why? it's not like being able to get a rating ... Apr 4 2005, 08:02 PM
Fortune I most definitely do not want to see brain and/or ... Apr 4 2005, 08:28 PM
Janus QUOTE (mfb)hm. i'll have to check out Metal He... Apr 4 2005, 10:14 PM
mfb well, okay. i was using "ghosthacking" a... Apr 4 2005, 11:28 PM
hobgoblin or putting in a fake security guard or drone or so... Apr 4 2005, 11:25 PM
mfb yeah. i mean, that sounds cool, but it also sounds... Apr 5 2005, 01:52 AM
Janus QUOTE (Synner)Nice ideas Janus. I'd mail them ... Apr 5 2005, 09:15 AM
Demosthenes Think of even more fun:
Use a dog-brain or pilot p... Apr 5 2005, 08:14 AM![]() ![]() |
|
Lo-Fi Version | Time is now: 11th January 2026 - 04:51 PM |
Topps, Inc has sole ownership of the names, logo, artwork, marks, photographs, sounds, audio, video and/or any proprietary material used in connection with the game Shadowrun. Topps, Inc has granted permission to the Dumpshock Forums to use such names, logos, artwork, marks and/or any proprietary materials for promotional and informational purposes on its website but does not endorse, and is not affiliated with the Dumpshock Forums in any official capacity whatsoever.