Idiot's Guide to the Matrix 2.0 |
Idiot's Guide to the Matrix 2.0 |
Mar 22 2006, 05:48 PM
Post
#1
|
|
Technomancer Group: Retired Admins Posts: 4,638 Joined: 2-October 02 From: Champaign, IL Member No.: 3,374 |
Way back when, a number of us (I know Synner was involved and, if I remember correctly, Kagetenshi) worked on a thread called the Idiot's Guide to the Matrix. It was an SR3 themed thread aimed at a step by step explanation of a decking run. I got involved as the "player" while Synner was acting as a GM for the run. We didn't worry about any real-world stuff, just Matrix actions.
I'm judging from the amount of confusion about the Matrix 2.0 stuff in SR4, that such a thread would be of benefit to the forum members at large. Thus, I humbly throw my hat into the ring as a "GM" for this thread if someone else wants to act as a player. I suggest using either the Hacker or the Technomancer sample characters because that way we all have a common starting point. If we want to involve Rigging we can either start a new thread, or use the Drone Rigger, though I would add a few programs to that character myself. I think the Technomancer provides us perhaps the best opportunity for exploration since the majority of actions performed by Technomancers are the same as those for Hackers (disregarding, for the moment, the semantic difference between programs and complex forms) but the Technomancer provides us all of the Resonance skills, Threading, and Sprites to examine. As I see it there are a number of different scenarios that we could look at:
Any takers? |
|
|
Mar 22 2006, 05:56 PM
Post
#2
|
|
Running, running, running Group: Dumpshocked Posts: 2,220 Joined: 18-October 04 From: North Carolina Member No.: 6,769 |
I'll be the player, however, i would like to submit the character i made for a game instead. it would allow us to examine some of the "what-if's" as well in gear selection and what not. I can host it and post it in the top of the thread for all to see as well, so we all know what's where, but if you're inisistant on the archetype, thats fine as well.
|
|
|
Mar 22 2006, 06:00 PM
Post
#3
|
|
Running Target Group: Members Posts: 1,150 Joined: 19-December 05 From: Rhein-Ruhr Megaplex Member No.: 8,081 |
First thing would probably posting the archetypes with errata worked in, and you can take it from there. Or we could use Aku :D.
Thumbs up for your project. |
|
|
Mar 22 2006, 06:05 PM
Post
#4
|
|
Moving Target Group: Members Posts: 617 Joined: 28-May 03 From: Orlando Member No.: 4,644 |
Hey Dash, I have a Hacker you can use
Leigh O'Rourke Human Female Hacker B:3 A: 6 R: 4 S:2 C: 4 I: 5 L: 5 W: 3 Edge: 4 Init: 9 Matrix Init 9 Cold: 14 Hot: 15 IPs 2 /2/3 Codeslinger (Hacking) Aptitude Hacking Scorched Spirit Bane Addicted Mod/Hash Cracking Group 4 Electronics Group 3 Firearmas 3 Etiquette 3 Dodge 3 First Aid 3 Pilot GC 2 Infiltration 2 Novatech navi Upgraded 5 Firewall 5 System Fairlight Caliban Upgraded 5 response 5 signal AR Gloves Sim Module w/HS Agent Hacking (Exploit/Spoof/Stealth/edit/browse Rating 4 Agent Track (Scan ECCM Decrypt Sniffer Rating 4 Agent Combat (Black Hammer Attack) Rating 3 Edit Rating 3 Track 3 Browse 3 Analyze 3 Encrypt 3 Scan 3 Medic 4 Armor 3 BioFeedBack Filter 3 Defuse 3 ECCM 3 Command 4 Attack 4 Decrypt 4 Exploit 4 Sniffer 4 Spoof 4 Sniffer 4 |
|
|
Mar 22 2006, 06:06 PM
Post
#5
|
|
Target Group: Members Posts: 66 Joined: 24-October 05 Member No.: 7,887 |
What a hacker does, and how he does it in the matrix are pretty clear from the rules, and have been well discussed on this board.
Some questions to talk about that I'd find helpful: What isn't clear at all, is what do devices/systems do to detect hackers? After a hacker hacks on the fly, does the system/device stop it's extended test once the hacker is in? When does the system/device get a chance to detect the hacker? What kind of test is it? What can a person in AR do to stop a hacker invading his comm link? What does a "system" look like in AR? VR? How do files work? Is there a directory tree that the hacker needs to go to first, or can he just do a data search +browse/scan once the hacker is in the system? Why would a system NOT put data bombs/encryption on everything? What is the difference between controlling a object (complex action) and issuing a command to an object(simple action)? For example when is a device (like a security camera) considered to be a device that needs to be controlled, and when is it considered to be something that you can just issue a command to? p.s. basically I'm looking for information that a GM would find useful. |
|
|
Mar 22 2006, 06:07 PM
Post
#6
|
|
Runner Group: Members Posts: 3,314 Joined: 26-February 02 From: Lisbon, Cidade do Pecado Member No.: 185 |
The old IGTTM thread is still available here for reference. I still feel bad for not finishing that final run, but my workload has not let up. I'm hoping to develop something similar as a walkthrough for the official SR4 website in the future (you all know better than to ask dates) and meanwhile I think Dashifen's idea is perfect to help people out!
|
|
|
Mar 22 2006, 06:14 PM
Post
#7
|
|
Target Group: Members Posts: 43 Joined: 1-March 06 From: NYC Member No.: 8,325 |
I think I can answer a few of your questions kleaner.
In AR/VR, a system looks like whatever it's programmers want it too look like. You wouldn't put encryption and databombs on everything for the same reason you don't put locks on ALL of the internal doors in your house: convenience. Imagine what would happen to the productivity of the average office if everyone needed to remember a different password to access each and every one one of their files. Now imagine that same office with databombs on all of those files, going off every time somebody got a password wrong 3 times. I'd say the difference between commanding and controlling is in how much 'control' the user has. Issuing a command is like giving a command to a dog. You tell it to go do something, then wait while it goes and does it. Actually taking control of a device is literally taking direct control of that device and directly controlling all of it's actions yourself. |
|
|
Mar 22 2006, 08:02 PM
Post
#8
|
|
Shooting Target Group: Members Posts: 1,651 Joined: 23-September 05 From: Marietta, GA Member No.: 7,773 |
I strongly endorse the existence of this thread.
|
|
|
Mar 22 2006, 08:02 PM
Post
#9
|
|
Moving Target Group: Members Posts: 515 Joined: 19-January 04 Member No.: 5,992 |
This looks like it'll be an interesting challenge. I think what you might want to do is actually make a nice mid-level character, who is focused in hacking, sure, but can do other stuff as well. Sure, your old-school decker could be a meat-wastoid, and your otakus to an even greater extent, but in this'n, you might want to explore secondary skills they'd want.
Like stealth. I'm not saying you'd have to do an entire run with a team of all hackers to explain, but it wouldn't be a bad-wrong idea to include the types of actions that hackers might have to do _prior_ to the actual hacking part, such as stealth and fast-talking. No rolls on those and so forth, but just Helpful Handy Suggestions. I'd also suggest using things straight out of the box with minimal edges and flaws for your first dude, as well as using a real-boy off-the-shelf commlink. Technomancers would also be worth exploring in the not-too-distant future, IMO. But right now? More Power To The Mundane. I loved deckers in SR3. I just hardly ever had a chance to play them, because where I played, almost nobody knew the rules. I'd love to see the geeks get their day in the sun. EDIT: Once this one is actually done? Or possibly once it gets to a point where it can _become_ done for whatever section you're working on? I'd strongly suggest putting a copy up in, like, Community with all the fat trimmed off and with any editorial changes needed. Go Team Hacker! EDIT x 2: Man, it's getting to the point where we ought to get a new Dumpshock site that's still being updated with this kind of stuff. Don't we have some out there that haven't been updated since 2E? |
|
|
Mar 22 2006, 08:03 PM
Post
#10
|
|
Technomancer Group: Retired Admins Posts: 4,638 Joined: 2-October 02 From: Champaign, IL Member No.: 3,374 |
@Aku: post your character, we'll go with that for the moment. Which scenario do you want to tackle?
@Magus: wait in the wings, I'll jump to you for a different scenario when we get there and we can use this character. @Synner: thanks for the linkification. I'm available when you want to finish the run, I'll just have to bone up on SR3 again :D @Others: If you look at the original IGTTM thread, there were questions interspersed throughout the major activity of the run. So don't worry about questioning or commenting on the system as we go along. Perhaps we'll use more color-coding to help distinguish the "meat" of the thread from the other questions. I propose yellow for the information about what Aku's character and my systems are doing and orange for the mechanics (die rolls, rules explanations, etc) within the thread. Then the normal typeface can be used for general questions or comments and we should all have a relatively easy-to-read thread. Until, of course, we forget about the conventions :D Edit: Also, since this thread stands to have a number of different questions from many different people, please do your best to indicate who asked each question when quoting (as I did with the post below this one). This post has been edited by Dashifen: Mar 22 2006, 08:28 PM |
|
|
Mar 22 2006, 08:22 PM
Post
#11
|
|||||||||||
Technomancer Group: Retired Admins Posts: 4,638 Joined: 2-October 02 From: Champaign, IL Member No.: 3,374 |
Firstly, the system gets a test to detect the intrusion when the character breaks in (see Breaking In, p. 221). After that, the text on p. 222 suggests the following: security hackers, patrolling IC, and glitches. Hackers and IC would have to be equipped with the Analyze program to watch for Stealthy icons. I particularly like using glitches to bring the attention of a hacker or IC onto the hacker while critical glitches trip an alert right away. Technically, as well, the host could be running the Analyze program itself, giving it not only the intrusion test(s), but the chance to notice the hacker's icon when they log in to the system, but this would be up to the GM's interpretation of the Analyze program's ability to perform rudimentary matrix perception tests without the interaction of a Pilot or Hacker.
I run it as yes. The text in the book states "Each time you make a test to hack in, however, the target node also gets to make a free Analyze + Firewall (Stealth) Extended Test. If the node detects you--whether you hack in or not--an alert is triggered." I see the Extended Test as having an interval of the same length as the Extended Test to hack on the fly. Thus, for every interval of the hacker's extended test, the target node makes an Analyze + Firewall (Stealth) test, adding any hits to all previous hits like any other Extended Test. Thus, if the node beats the hacker's stealth before the Hacker beats the system's Firewall (plus any mods for security/admin access), an alert is triggered. However, since after breaking in the hacker will no longer be performing "a test to hack in" the system stops getting this free test and must rely on secondary detection methods like those above.
There is the intrusion test which depends on whether your hacking on the fly or probing the target. If hacking on the fly, it's an Analyze + Firewall (Stealth) extended test as explained above. If probing the target, it's a single Analyze + Firewall (Stealth) test when the intrusion is successful. After that the system/device may not get another test at all, unless the GM rules that the system's Analyze program can run rudimentary perception tests similar to a character's Analyze program as described in the last paragraph of p. 217.
Turn off the commlink, turn off the commlink's wireless capabilities, skinlink their commlink, engage the hacker in cybercombat, use agents (IC) to engage the hacker in cybercombat, shoot the hacker, have friends shoot the hacker, etc.
That's up to the GM. I ran one system that had a seperate file storage device so that needed to be detected prior to the files being available to the hacker. Thus, there was a Perception test necessary to find the file storage device followed by a data search + browse extended test to find the file in question. However, there's no real need for that first perception test unless the GM is trying to pull a fast one. I thought the other few questions you asked were nicely handled by Guye Noir. |
||||||||||
|
|||||||||||
Mar 22 2006, 08:26 PM
Post
#12
|
|
Moving Target Group: Members Posts: 617 Joined: 28-May 03 From: Orlando Member No.: 4,644 |
Spiffy Dashifen, always glad to help. Your last thread with Synner opened me up to Deckers in SR3.
|
|
|
Mar 22 2006, 08:39 PM
Post
#13
|
|
Moving Target Group: Members Posts: 137 Joined: 21-February 06 From: Lenexa, Kansas (Yes Kansas, we ain't all hicks y'all.) Member No.: 8,291 |
Yay! I can't wait to see this get done. My new character is a decent hacker and it would be great to have a clear guide as to how it all works. I am precisely the kind of Idiot this guide should be aimed at!
|
|
|
Mar 22 2006, 09:51 PM
Post
#14
|
|
panda! Group: Members Posts: 10,331 Joined: 8-March 02 From: north of central europe Member No.: 2,242 |
looking forward to see this thread in motion :)
i have even learned something from it. i had missed that the hack-on-the-fly detection test was a extended one. makes it much more nasty to do it the fast and noisy way :P as for how stuff looks in ar. think of it somewhat like the desktop of today, only that stuff is floating in the air in front of you. to find a specific node in the matrix, you fire up a program that search diffrent directory services (google, msn, yahoo and so on), other databases like dns and whois records, and maybe other sources to (i realy depends on how the program your using is designed). ones found the node would probably appear as a "arrow", that when activated allows you to send commands to said host as if you where using it directly (kinda like how remote desktop is a window with the desktop of a remote system in it). given how desktop search is a hot topic today, i belive that all content of the nodes are indexed into infinity. and if diffrent nodes are linked into a network they may allso share indexes. so to locate a file you formulate the search terms and see what pops up. if you realy wanted to you could probably get a index dump that shows the diffrent metadata as folders and then you can look under each to check if it contains interesting files. so in that way you get a directory "tree" but the system itself will probably be using a database as a filesystem and have some hardcoded search terms as "folders" on your AR hud (music, video, pictures, simsense, latest modified files, programs and maybe others). you can probably allso create your own permanent searches... going VR and things turn into something that should be very similar to the good old days... |
|
|
Mar 22 2006, 09:57 PM
Post
#15
|
|
Moving Target Group: Members Posts: 515 Joined: 19-January 04 Member No.: 5,992 |
I kind of figured that AR mode works a lot like it does in, say, Ghost in the Shell, or at least the S.A.C that they're playing on television nowadays. You have your regular reality, but also the capability to open up real-time windows in your perception and so-forth, whereas, yeah, VR mode goes back to the SR3 days.
Which makes sense, really. When you're at home and aren't going anywhere, I'd rather use VR mode from the comfort of my coma-chair and so-forth. And speaking of the ARO stuff, I'm thinking back to the introductory cola wars run: How the heck could you do what the hacker did in there, what with the map overlay? As a runner, I'd find that _incredibly_ useful, knowing where hostiles were in realtime. |
|
|
Mar 22 2006, 10:02 PM
Post
#16
|
|||
Shooting Target Group: Members Posts: 1,651 Joined: 23-September 05 From: Marietta, GA Member No.: 7,773 |
An Analyze (interpret sensor feeds) + Edit (create/update map) agent would do the trick. |
||
|
|||
Mar 22 2006, 10:04 PM
Post
#17
|
|
panda! Group: Members Posts: 10,331 Joined: 8-March 02 From: north of central europe Member No.: 2,242 |
hacked cameras, all team comlinkes subscribed, some creative ARO work?
hell if i know but i would give the hacker a complex action to update the map... a lot of people have interpeted it as being something similar ot the battletac stuff, as it basicly does the same job. if some we may see it appear in arsenal or unwired. you will notice that there is stuff in the SR4 fluff that there are no rules for (like say a ghoul character iirc)... |
|
|
Mar 22 2006, 10:12 PM
Post
#18
|
|||
Technomancer Group: Retired Admins Posts: 4,638 Joined: 2-October 02 From: Champaign, IL Member No.: 3,374 |
Well, if I were going to do that the first thing would be an extended Data Search + Scan test to locate the RFID transmissions in the building. As a GM, I would assume that the RFID information that would be transmitted by the tags would indicate whether the tag is on an employee or, say, a wall hanging or fluorescent light bulb. The threshold on that test would be high and would depend on the size of the area being searched. If the player wanted to limit the information to, say, just people in motion, I'd lower the threshold because the Scan program could quickly remove certain data from the overall system. The interval would be based on the Search Table (p. 220) so since you're searching one network for data, it'd be 1 combat turn. Now to present the overlay, you could have gotten the floorplan from some form of public archive prior to the run. Perhaps you had someone fast talk their way into the building to scope out the hallways and what not. I long for the days of the old orientation system cyberware. If that one comes back, then you could be making the floorplan on the fly based on what that cyberware is able to produce. Without a pre-run map available, I'd probably allow another Data Search + Browse test with a hard threshold within the network to try and find any maps that the system maintains -- perhaps for fire alarms or even for internal employee tracking. If the hacker can find such a map at this time, then it's a simple matter of putting the little dots from the RFID's in the first search on top of the overlay from the second and viola! you have an overlay showing the location of anyone not in the party. Course this relies on the fact that the employees have embedded chips, that there isn't signal dampening technology in effect somewhere (producing empty sections of the map) etc. Thus, it's going to change from host to host. The availability of such an overlay would probably be best determined prior to the run during legwork, I'd say. |
||
|
|||
Mar 22 2006, 11:28 PM
Post
#19
|
|||
Running, running, running Group: Dumpshocked Posts: 2,220 Joined: 18-October 04 From: North Carolina Member No.: 6,769 |
Gear is too ugly to copy from the excel spreadsheat, so i'll add that as a clicky in a moment as soon as i get hosted. One minor rule the GM allowed was he let me code and build my own software and commlink. as this is an idiots guide, i dont think the costs of such things really matter, but i'm letting everyone know of that now. i think that's the difference though, and im not sure if it's a "difference" he was just liberal in the amount of time that was usable prior to game start time. geargear Not that it matters, but the history for the character went something like this: My past is mostly a mystery to me. All i know is what Jenny Heathrow (contact 1 6/4 the only true friend thats stuck with me through the rest of this story) and Ken Redbull Mcduff (fixer 4/5) Have told me. Apparently, my mind works on a 15 year cycle. Every 15 years on my half-birthday, i've dropped into a coma, only to wake up 6 months later, on my birthday. No clue as to who i am. I know how to do and use everything i did before, but none of the people. At First, im told, i had alot of people behind me, helping me. But as this became a recurring problem, they slowly dwindled away, until there were two. I am now 8 years into my cycle. Hopefully, this time, i'll know what th frag is going on, before i get to 15 and ahalf years. |
||
|
|||
Mar 23 2006, 12:00 AM
Post
#20
|
|
Moving Target Group: Members Posts: 137 Joined: 21-February 06 From: Lenexa, Kansas (Yes Kansas, we ain't all hicks y'all.) Member No.: 8,291 |
John Barnes fan? That is a very cool book.
|
|
|
Mar 23 2006, 12:50 AM
Post
#21
|
|||
Grand Master of Run-Fu Group: Dumpshocked Posts: 6,840 Joined: 26-February 02 From: Tir Tairngire Member No.: 178 |
Because Data Bombs are programs, and too many programs will lower your Response/System. If a typical commlink is like a typical PC, only with unlimited memory, even the average user could have hundreds of files. You wouldn't even be able to get close to securing all of them before you crashed your OS. Let's assume that Zurich-Orbital, the super-nasty holy grail of the Shadowrun matrix, has an even 10 in all stats. It handles millions of transactions per day, and has multiple accounts for each and every megacorp on the planet. Even with this supersystem, if it tried to Data Bomb only 100 of the trillions of accounts it has, it'd come crashing down. And that assumes that Z-O would have no IC running at all! |
||
|
|||
Mar 23 2006, 12:51 AM
Post
#22
|
|||
Running, running, running Group: Dumpshocked Posts: 2,220 Joined: 18-October 04 From: North Carolina Member No.: 6,769 |
who was this directed at? |
||
|
|||
Mar 23 2006, 01:09 AM
Post
#23
|
|
Great Dragon Group: Members Posts: 7,089 Joined: 4-October 05 Member No.: 7,813 |
i have a couple of questions...
can you hack a technomancer? if so, what happens when you do? |
|
|
Mar 23 2006, 01:15 AM
Post
#24
|
|
Target Group: Members Posts: 66 Joined: 24-October 05 Member No.: 7,887 |
head explodes! haha...
well, it seems that if you hack them you can crash them giving them dumpshock, but since they don't store any files in the head, you'd have to get any paydata from comlinks subscribed to their noggin. |
|
|
Mar 23 2006, 01:19 AM
Post
#25
|
|
Great Dragon Group: Members Posts: 7,089 Joined: 4-October 05 Member No.: 7,813 |
ok. i'll put some more specific questions...
can you use command on the technomancer? can you create an account on the technomancer? can you edit their memory? can you unsubscribe them from things (for example, drones)? can you make them go into VR? can you make them go out of VR? just curious for opinions =P don't think these are really explained in the rules at present =P |
|
|
Lo-Fi Version | Time is now: 6th January 2025 - 01:27 PM |
Topps, Inc has sole ownership of the names, logo, artwork, marks, photographs, sounds, audio, video and/or any proprietary material used in connection with the game Shadowrun. Topps, Inc has granted permission to the Dumpshock Forums to use such names, logos, artwork, marks and/or any proprietary materials for promotional and informational purposes on its website but does not endorse, and is not affiliated with the Dumpshock Forums in any official capacity whatsoever.