IPB

Welcome Guest ( Log In | Register )

 
Reply to this topicStart new topic
> Cybercombat question, undetected icons
Eryk the Red
post Feb 23 2007, 05:41 PM
Post #1


Moving Target
**

Group: Members
Posts: 633
Joined: 23-February 06
Member No.: 8,301



I've not run much hacking in my game (the group operates as sort of a blunt instrument on runs). I'm trying to figure something out. A Stealthed icon (decker, IC, whatever) resists the matrix perception test, and if they win, the icon making the perception test doesn't detect their presence. (Side note: I'll probably just make the Stealth program into the threshold for simplicity, though I know that makes it a bit more powerful on average. Doesn't matter too much, though.)

So how would you run cybercombat attacks from an undetected icon? My gut says there should be a penalty to defense or something (at least an initiative bonus). I don't use the surprise rules as written, so that's not an option for me.

Also, would attacking immediately reveal the icon? Or would the target have to keep trying to detect it?
Go to the top of the page
 
+Quote Post
ornot
post Feb 23 2007, 07:08 PM
Post #2


Running Target
***

Group: Members
Posts: 1,266
Joined: 3-June 06
From: UK
Member No.: 8,638



Well my gut would be that the attacker attacks as normal, but the defender doesn't get to retaliate. EDIT: until he passes a matrix perception test. If your analyse program isn't up to it, tough cookies.

It depends on how you view the matrix, but ultimately the Attack program is not a physical blow, but malicious code. I wouldn't permit the defender to go on full defense as they don't know where the Attack program is coming from, but they would get their normal response+firewall check, as that is inherent in the hardware and software being attacked.

Likewise, Armour is redundancy programming, so would still operate. to resist damage.
Go to the top of the page
 
+Quote Post
Eryk the Red
post Feb 23 2007, 08:22 PM
Post #3


Moving Target
**

Group: Members
Posts: 633
Joined: 23-February 06
Member No.: 8,301



Yeah, I get what you're saying. I really don't like that the defense roll is all hardware and software. I especially don't like that all of your comm attributes (other than signal) are involved in resisting attacks. It seems silly. Also, it means that defense in cybercombat is not an activity you engage in, as it is in other types of combat. It's completely passive. Hrrm.

That's just my trigger-happy house-ruling at work.

Anyway, I think you're right. At the very least, the effect is that they cannot perform any action (like attacks) targeting the icon until they detect it.
Go to the top of the page
 
+Quote Post
cetiah
post Feb 24 2007, 02:19 AM
Post #4


Moving Target
**

Group: Members
Posts: 745
Joined: 2-January 07
From: Los Angeles, CA
Member No.: 10,510



There isn't really such a thing as an undetected icon, as far as I know. The stealth program works by disguising your icon as inconspicuous whereas matrix perception would reveal what your icon really is (an unauthorized hacker) like an analyze icon action. So, in a sense, you're just an unidentified icon.

Attacks from an unidentified icon would work like attacks from any other icon, except that your inconspicuous nature would be instantly revealed as fraudulant to the IC under attack.

Basically, if the IC fails its Matrix Perception Test, there isn't really any reason to attack it. If it makes the Matrix Perception Test then it will attack you or you will attack it. If it fails the Matrix Perception Test but you attack it anyway, you have the exact same basic situation as if the IC had made the Matrix Perception Test in the first place.


Go to the top of the page
 
+Quote Post
Eryk the Red
post Feb 24 2007, 05:56 PM
Post #5


Moving Target
**

Group: Members
Posts: 633
Joined: 23-February 06
Member No.: 8,301



Far as I'm concerned, "inconspicuous" and "undetected" are similar enough. I kinda like that idea of the stealth program confusing your readings of where the attack came from. Basically, stealth might make your icon seem like a natural part of the matrix architecture.

At least, that's how I intend to run it. I'll see how I like it in practice.
Go to the top of the page
 
+Quote Post
knasser
post Feb 24 2007, 06:00 PM
Post #6


Shadow Cartographer
*******

Group: Members
Posts: 3,737
Joined: 2-June 06
From: Secret Tunnels under the UK (South West)
Member No.: 8,636



QUOTE (cetiah)
There isn't really such a thing as an undetected icon, as far as I know. The stealth program works by disguising your icon as inconspicuous whereas matrix perception would reveal what your icon really is (an unauthorized hacker) like an analyze icon action. So, in a sense, you're just an unidentified icon.

Attacks from an unidentified icon would work like attacks from any other icon, except that your inconspicuous nature would be instantly revealed as fraudulant to the IC under attack.

Basically, if the IC fails its Matrix Perception Test, there isn't really any reason to attack it. If it makes the Matrix Perception Test then it will attack you or you will attack it. If it fails the Matrix Perception Test but you attack it anyway, you have the exact same basic situation as if the IC had made the Matrix Perception Test in the first place.


I quite like that idea. I can visualise it quite clearly:

"Wait - did that Word document just attack me?" :D
Go to the top of the page
 
+Quote Post

Reply to this topicStart new topic

 



RSS Lo-Fi Version Time is now: 31st July 2025 - 09:37 AM

Topps, Inc has sole ownership of the names, logo, artwork, marks, photographs, sounds, audio, video and/or any proprietary material used in connection with the game Shadowrun. Topps, Inc has granted permission to the Dumpshock Forums to use such names, logos, artwork, marks and/or any proprietary materials for promotional and informational purposes on its website but does not endorse, and is not affiliated with the Dumpshock Forums in any official capacity whatsoever.