IPB

Welcome Guest ( Log In | Register )

> what the WMI needs to be
mfb
post Apr 1 2005, 08:30 AM
Post #1


Immortal Elf
**********

Group: Members
Posts: 11,410
Joined: 1-October 03
From: Pittsburgh
Member No.: 5,670



okay. SR4 says it's going to streamline things, especially Matrix things. let's talk about what it should be, especially from a rules perspective. i've listed my requirements in no particular order below. note that while i've put a lot of thought into these concepts, i've put very little into their execution. this is primarily a list of what needs to change, and only secondarily a list of ways to change it.

Tests
a single roll against a TN with little variance should resolve most actions. a wide array of ridiculously high TNs, which are modified by a ridiculously large number of reductors, is completely ridiculous. personally, i think all decker-hackers should use Channels, a la otaku. at least, the mechanic should be similar: a small number of multi-purpose, very expensive programs.

i also think that the ACIFS should be reduced by at least one. get ride of Slaves completely: this is the realm of rigger-hackers. replace all Slave operations with rigger-hacker actions. i think Index and Files could possibly combined; Access and Control can certainly be combined. jesus, you use Access for one thing: Logon to X! it does not deserve its own stat. either that, or expand Access to include all forms of electronic warfare and cryptography in general (since cracking crypto is basically all Access is anyway). want to listen in on your enemies' comms? Access test. want to gank control of a rigger-hacker's drone network? Access test. you get the idea. a name change would be appropriate: Crypto gets my vote.

even better, give hosts one TN, which is then reduced by a decker's programs. for instance, you could have a rating 10 host. if you're performing an Access action--oops, Crypto action!--and your Crypto program (or whatever) is 5, then your TN is 5.

Hackability
everything on a computer should be hackable, and every computer with a network connection should be hackable. i want to play a Comp Sci major who hacks girls' pocsecs for their numbers, goddammit. i want to be able to gank control of the IC that's attacking me, and send it after the security deckers that just popped in. i want to be able to hack another icon and pervert his actions. this includes cyberdecks, or whatever replaces them: the connection is two-way. i want to hack cyberdecks. i want to be able to hack a computer so completely that i can change the ACIFS ratings, reset my security tally, and delete IC--and i want everything in that last sentence to be hard as hell.

Definitions
i want simple, non-detailed definitions for computer-related statistics. basically, i want to know if ACIFS are hardware, software, or firmware. i want to know how much Mp a Red host has. i want to know how many users an Orange-6 host can handle, and i want to know what happens when you overload it with connections.

Crafting
related to the above, i want to be able to build hosts. i want to be able to pay more for a host that's pocket-sized, or nanowoven into my clothes. i want a server in my goddamn sunglasses.

Similarity
everything needs to use the same damn rules. none of this 100Mp wristtop computer / MPCP-8 cyberdeck / Orange-6/10/12/11/10/11 host crap--everything that can be hacked (see Hackability, above) should use the same stats as everything else that can be hacked.

Security
the entire concept of security sheaves should be reworked. it's interesting, but in the end, it's both limiting. the sheaf system means that computers can't proactively respond to intruders (unless the computer operator can afford IC Constructs, and it's a very reactionary proactivity even then). moreover, the reactivity of computers to intruders is incredibly limited. there's no way to respond intelligently to specific methods of attack.

i think that every host should have a security controller. a single piece of IC (larger/more important systems might have more, but one would be the norm) that handles all security for that host. as hackers gain attention, this controller would spawn countermeasures as required. it should be possible, though difficult, to simply take the controller down in combat, neutralizing all security for as long as it takes the host to rebuild the controller (several minutes for low-end hosts, several rounds for high-end). to keep things simple and streamlined, the mechanics controllers use for spawning countermeasures should be similar to summoning nature spirits.

Countermeasures
countermeasures should do more--and less--than just attack things. after all, hackers appear as glitches in the system. in the real world, it's very rare for guards of any stripe to be given shoot-on-suspicion orders, where anything that moves at all (wind, animals, wandering children) gets an automatic three-round burst. yet that's exactly how IC reacts to everything, in SR.

instead, the first response by the security controller (see above) should be to spawn a countermeasure that raises the TN for the specific action that the controller detected, or which allow the controller to gain more information about any further attempts (a la probe or scout IC).

SIMPLICITY
jesus christ, hacking should be simpler. none of this crap with 500,000 programs that take up 15613.54Mp which you then have to find the square root of in order to discover how much time it takes to get to hell with that. operations should be action-based: write up a definition of what an Index action is, or a File action, or an Access/Crypto action. we don't need four seperate Logon to X actions. we don't need umpteen billion Locate X actions that all use the same goddamn program, subsystem rating, and skill anyway.
Go to the top of the page
 
+Quote Post

Posts in this topic
- mfb   what the WMI needs to be   Apr 1 2005, 08:30 AM
- - Kagetenshi   I disagree with just about everything you say. ~J   Apr 1 2005, 12:01 PM
- - Austere Emancipator   I suspect Kagetenshi is truly embracing this whole...   Apr 1 2005, 12:22 PM
- - Kagetenshi   No, I quite honestly disagree with almost the enti...   Apr 1 2005, 12:19 PM
- - Austere Emancipator   You honestly think it's a good idea for the ha...   Apr 1 2005, 12:45 PM
- - Kagetenshi   "As complex as possible"? It's painf...   Apr 1 2005, 12:42 PM
- - Austere Emancipator   The Decking section in SR3 is longer than the Rang...   Apr 1 2005, 01:10 PM
- - Kagetenshi   Keep in mind that the length of the Decking sectio...   Apr 1 2005, 01:12 PM
- - Austere Emancipator   No worries. I think I'm too tired right now to...   Apr 1 2005, 01:45 PM
- - Doctor Funkenstein   QUOTE (Kagetenshi) The potentially complicated par...   Apr 1 2005, 01:43 PM
- - mfb   pretty much what austere said, kage. you keep sayi...   Apr 1 2005, 04:38 PM
- - Kagetenshi   I disagree, but I need to go drive someone to the ...   Apr 1 2005, 04:57 PM
- - Kanada Ten   QUOTE (mfb) Tests a single roll against a TN with ...   Apr 1 2005, 05:06 PM
- - mfb   can we take it to a thread in the regular SR secti...   Apr 1 2005, 05:15 PM
- - MYST1C   QUOTE (Doctor Funkenstein)my logic being that by t...   Apr 1 2005, 08:45 PM
- - MYST1C   QUOTE (Kanada Ten)Getting rid of Mp is an interest...   Apr 1 2005, 08:53 PM
- - mfb   that could work. you could have knowsoft links tha...   Apr 1 2005, 09:50 PM
- - Austere Emancipator   But then we wouldn't have any more threads abo...   Apr 1 2005, 09:48 PM
- - Deamon_Knight   I think that Making "hacking" like spell...   Apr 2 2005, 12:46 AM
- - mfb   oh, they exist. they're just a horrifying, ten...   Apr 2 2005, 01:36 AM
- - Kagetenshi   QUOTE (mfb) can we take it to a thread in the regu...   Apr 2 2005, 03:08 AM
- - Kanada Ten   Cellphones are hackable. They may require a diffe...   Apr 2 2005, 03:09 AM
- - Kagetenshi   Define "hackable"? The mobile speed pass...   Apr 2 2005, 03:18 AM
- - Kanada Ten   They broke the encryption code. And the speed pas...   Apr 2 2005, 03:22 AM
- - Kagetenshi   No, the speed pass doesn't connect to a networ...   Apr 2 2005, 03:33 AM
- - Kanada Ten   I'm not saying things should be hackable if th...   Apr 2 2005, 03:27 AM
- - Dissonance   Honestly, I don't really care about the rules ...   Apr 2 2005, 05:11 AM
- - mfb   i'm not talking about brainhacking, or even cy...   Apr 2 2005, 05:54 AM
- - Kanada Ten   QUOTE Walking down a hallway with whatever equipme...   Apr 2 2005, 06:11 AM
- - Dissonance   Icing on the cake, mfb. I'm just looking forw...   Apr 2 2005, 06:10 AM
- - Kanada Ten   I'm not saying it can't be done, just... d...   Apr 2 2005, 06:32 AM
- - Dissonance   Of course, the problem with a wireless matrix is t...   Apr 2 2005, 06:37 AM
- - Kanada Ten   I'd expect the danger of being a l33t net rigg...   Apr 2 2005, 06:46 AM
- - Dissonance   I'ma cry if they reintroduce MIJI, anyways. W...   Apr 2 2005, 07:00 AM
- - mfb   hopefully, MIJI will be introduced as a completely...   Apr 2 2005, 07:19 AM
- - Synner   QUOTE (Dissonance) I imagine they'll just make...   Apr 2 2005, 08:16 AM
- - Dissonance   Because it'd be really hard to do full-on imme...   Apr 2 2005, 08:15 AM
- - Kesh   MIJI? Not familiar with the term.   Apr 2 2005, 08:21 AM
- - Synner   And who says (and note I haven't actually seen...   Apr 2 2005, 08:22 AM
- - mfb   there's no reason that partial immersion can...   Apr 2 2005, 08:38 AM
- - Dissonance   I'm not saying that it's not possible. In...   Apr 2 2005, 08:40 AM
- - mfb   i doubt that will be possible. you jump into a dro...   Apr 2 2005, 08:43 AM
- - hobgoblin   or the implant allows you to order your body aroun...   Apr 2 2005, 07:24 PM
- - warrior_allanon   alright i'm gonna throw my $0.02 in here ...   Apr 2 2005, 10:43 PM
- - mfb   i'm not sure what you mean. can you quote the ...   Apr 2 2005, 11:03 PM
- - warrior_allanon   top of the page, i realize he is stating what he w...   Apr 2 2005, 10:56 PM
- - hobgoblin   i see where mr warrior is going. his post shows ho...   Apr 3 2005, 12:54 AM
- - mfb   i'm not saying get rid of programs. i'm sa...   Apr 3 2005, 05:46 AM
- - hobgoblin   the thing is that there is a lot of limited effect...   Apr 3 2005, 05:47 PM
- - mfb   that's hardly the norm, though. spells are not...   Apr 3 2005, 08:43 PM
- - Kesh   More to the point, those single-task programs are ...   Apr 3 2005, 11:18 PM
- - mfb   exactly.   Apr 3 2005, 10:12 PM
- - warrior_allanon   that is because programs as a general sort are sin...   Apr 4 2005, 01:20 AM
- - mfb   if the Matrix were remotely realistic, allanon, th...   Apr 4 2005, 04:15 AM
- - Dissonance   I still like my idea of boiling it down into 10 or...   Apr 4 2005, 10:38 AM
- - Janus   Sorry to interrupt, but I have some ideas. How are...   Apr 4 2005, 10:35 AM
- - mfb   hm. i'll have to check out Metal Head Maximum ...   Apr 4 2005, 05:39 PM
- - Synner   Nice ideas Janus. I'd mail them in to you know...   Apr 4 2005, 05:43 PM
- - mfb   yes, actually. the thought fills me with a terribl...   Apr 4 2005, 05:14 PM
- - RunnerPaul   QUOTE (mfb) i've always thought free low-level...   Apr 4 2005, 07:30 PM
- - Kagetenshi   As long as they've got a greater than 70% chan...   Apr 4 2005, 09:08 PM
- - mfb   why? it's not like being able to get a rating ...   Apr 4 2005, 08:02 PM
- - Fortune   I most definitely do not want to see brain and/or ...   Apr 4 2005, 08:28 PM
- - Janus   QUOTE (mfb)hm. i'll have to check out Metal He...   Apr 4 2005, 10:14 PM
- - mfb   well, okay. i was using "ghosthacking" a...   Apr 4 2005, 11:28 PM
- - hobgoblin   or putting in a fake security guard or drone or so...   Apr 4 2005, 11:25 PM
- - mfb   yeah. i mean, that sounds cool, but it also sounds...   Apr 5 2005, 01:52 AM
- - Janus   QUOTE (Synner)Nice ideas Janus. I'd mail them ...   Apr 5 2005, 09:15 AM
- - Demosthenes   Think of even more fun: Use a dog-brain or pilot p...   Apr 5 2005, 08:14 AM


Reply to this topicStart new topic

 



RSS Lo-Fi Version Time is now: 11th January 2026 - 04:51 PM

Topps, Inc has sole ownership of the names, logo, artwork, marks, photographs, sounds, audio, video and/or any proprietary material used in connection with the game Shadowrun. Topps, Inc has granted permission to the Dumpshock Forums to use such names, logos, artwork, marks and/or any proprietary materials for promotional and informational purposes on its website but does not endorse, and is not affiliated with the Dumpshock Forums in any official capacity whatsoever.