![]() |
![]() ![]() |
![]() |
![]()
Post
#1
|
|
Neophyte Runner ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 2,275 Joined: 31-December 06 Member No.: 10,502 ![]() |
Alright I was poking around the old threads here on technomancers.
Generally people seemed to think that they started off weak. This doesn't make sense to me. While they are short on starting progs and may have to thread some from scratch, some programs are "lynchpins" ,if you will, to hacking. Specifically stealth. A starting hacker is limited to rating 5 stealth. So if an opposing system can throw 12+ dice they have to start sweating even if they're taking their time and probing. And getting admin access on the fly gets risky really fast. You can't even spend edge to mess up the systems roll. You just have to wait while your GM relishes taking out die after die to throw at you all the while glancing at their notes for the IC in the system. However a starting technomancer should be able to thread their stealth up to 8-10 and quite possibly not take any damage for 8's or 9's. And if they really want to pull something off they can spend edge to get that 10. Anyway the point is if they've got solid hacking and exploit, and a high stealth they can break into systems undetected that would be highly likely to catch a hacker. (for example if they're trying to probe into a system with everthing at rating 9 a hacker will get caught ~80% of the time, while the technomancer will only get caught ~4% of the time) Anyway so the flip side of that is wondering how a technomancer could be stopped. And hence the spider question. How do you use them in your games? Would it be reasonable that in a high security system there would be multiple spiders(or always active IC I guess) just checking out anything and everything all the time. So as soon as you get inside you start having to roll opposed tests. Even with a larger die pool someone will run out of luck after enough opposed tests. |
|
|
![]()
Post
#2
|
|||
Genuine Artificial Intelligence ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 4,019 Joined: 12-June 03 Member No.: 4,715 ![]() |
The same way you try to stop a hacker. Techno's are too new to have any countermeasures specifically for them, barring the occasional plot device. Technos are specialists. Sure, the techno who focuses on intrusion will get in. You're absolutely right. But what's he going to do then? Does he also have all the CFs he needs to analyze everything, snoop around, find the files, decrypt them, disarm the databomb, etc? Possibly, sure. But if he has all that, does he also have all the combat programs he needs to deal with the IC, when it is triggered? (It's gonna happen sooner or later) If you look at any single task, or even specialized set of tasks, the techno rocks, you're exactly right. But there's a limit to how many CFs they can know out of the box, and it consumes every available BP. Hackers get a very nice commlink, and every single program at a very nice rating for a couple of BP. That's where the technos are deficient, not in any single task. |
||
|
|||
![]()
Post
#3
|
|||||
Shooting Target ![]() ![]() ![]() ![]() Group: Members Posts: 1,512 Joined: 26-February 02 Member No.: 392 ![]() |
Actually the techno is an even better generalist than the hacker but it takes the techno LONGER to do so than the hacker. It takes longer because the techno has to take the complex action to thread or to compile whereas the hacker only takes a free and a simple action to change up their progs. However, as sunnyside pointed out, the techno is a lot less likely to be noticed than the hacker and will have better access (ie. admin) than the hacker. This means that the techno HAS longer to do his job than the hacker. As for defenses I use the same as for against hackers for reasons that Moon-Hawk pointed out. However, I do use the ruling that technos cause a "glitch" type effect in the system that spiders may notice and wonder "WTF?" Basically they are the ghosts in the machine. I usually describe them as having an AID that reads as gibberish (ditto with sprites). |
||||
|
|||||
![]()
Post
#4
|
|
Genuine Artificial Intelligence ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 4,019 Joined: 12-June 03 Member No.: 4,715 ![]() |
Hmmm, good points. I should say that I haven't had anyone actually play a techno in my group yet, so anything I say about them should be taken with a grain of salt. :-)
|
|
|
![]()
Post
#5
|
|||
Neophyte Runner ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 2,275 Joined: 31-December 06 Member No.: 10,502 ![]() |
I guess that's the key thing I'm wondering about. How does an IC neccesarily get activated? Note that I don't want to totally spoil the TMs fun. The hacker could also get to be a sammi/rigger/adept whatever and they are freer to hack lots of little things often without fading or depleting spirit reserves, and they can always jack out. So TMs can have their supercrack. I just don't want to give them free reign of every system in the matrix for as long as they want. (the "lynchpin" skills needed being only analyze, stealth, and diffuse I believe). I suppose a threaded diffuse isn't as sure fire as threaded stealth though. So I guess judicious use of databombs would keep TMs from pilfering Zurich orbital. As for the CF limits it seemed to me that if you are lacking in a couple areas that sprites could fill the gap quickly. Granted going into a run you'll have a limited store of those things from your downtime. Or you could just thread something up and risk a little stun (the first level or two of a CF isn't hard to pick up karma wise and a thread should jack it up to hackerish levels). *EDIT: if a user has admin status databombs are still considered "armed" right. I've always played that way. |
||
|
|||
![]()
Post
#6
|
|||||||||
Moving Target ![]() ![]() Group: Members Posts: 500 Joined: 4-September 06 From: Salt Lake UT Member No.: 9,299 ![]() |
Hmm, I don’t think so. Checked the book and the errata1.5 BBB, pp. 219; side bar “matrix actions�
It actually takes a hacker an extra simple action to swap programs. Edit:
AFIK the only thing that will activate IC after a hacker has succeded in the Exploit test are glitches and taking an action that is not authorized by the user level the hacker has attained.
The FAQ seems to indicate that databombs are armed at certain times of the day, i.e. when people shouldn't be accessing those files. I think it's more realistic your way. |
||||||||
|
|||||||||
![]()
Post
#7
|
|
Technomancer ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Group: Retired Admins Posts: 4,638 Joined: 2-October 02 From: Champaign, IL Member No.: 3,374 ![]() |
The best TM I've seen so far used a real-world normal commlink for almost all hacking needs especially with respect to cybercombat and left stealth, exploit, armor, spoof, and one or two others. Those four, though, made her nigh uncatchable.
For intrusion, she'd thread stealth or exploit or both if she'd had a registered sprite around. Before she intruded, though, she'd usually thread spoof and start redirecting traces all over the damned place to help keep her from being tracked. If she triggered IC or thought she was about to, she'd then thread Armor and laugh as the IC tried to hit her. All in all, it was very effective. Couple those types of strategies with a normal commlink and programs and TMs suddenly become pretty badass. |
|
|
![]()
Post
#8
|
|
Neophyte Runner ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 2,275 Joined: 31-December 06 Member No.: 10,502 ![]() |
Alright a regular comlink merging seemlessly with a living persona seems against the rules. First on the grounds that the rules say that the "cracking" skills that a TM learns are different from the ones a hacker learns. Indicating at the least they'd need to learn those skills twice once for living persona and once for regular hacking.
Second programs like that need to run off of the persona the user is using. Running them on an off comlink would be like bypassing all the response limits by using three comlinks to use all your programs. No. The programs you use seem to have to be "native" Third it would just be broken. I mean seriously. |
|
|
![]()
Post
#9
|
|
Moving Target ![]() ![]() Group: Members Posts: 500 Joined: 4-September 06 From: Salt Lake UT Member No.: 9,299 ![]() |
I agree,
there's no reason you can't physicaly manipulate two comlinks in AR but you can only have one VR persona at a time and your progs have to run on that persona. |
|
|
![]()
Post
#10
|
|
Neophyte Runner ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 2,275 Joined: 31-December 06 Member No.: 10,502 ![]() |
Actually a specific question that potentially affects their power a lot.
Are sprites fundamentally in the "main" matrix and will they "appear" in an isolated node if the technomancer is there. For example let say going into a run a TM has four powerfull sprites registered for tons of tasks. On the run the technomancer goes into a building with RF blocking paint. So they lose matrix while in the foyer, and when they get it back inside a cube farm it's just the corps isolated node. When the TM starts going for paydata the sprites show up right? If not what if TM stayed connected to their comlink the whole time? *Edit. Also assist action is just one task right? *Edit #2: Whoa! Assist action adds to the CF rating! I thought it added extra dice! That makes stealth 15 easily acheivable! |
|
|
![]()
Post
#11
|
|||||
Technomancer ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Group: Retired Admins Posts: 4,638 Joined: 2-October 02 From: Champaign, IL Member No.: 3,374 ![]() |
I don't know, that paragraph from p. 233 seems to indicate to me that it's odd but entirely possible for a TM to know how to hack using resonance and using programming. Especially if the TM, who probably hasn't been a TM for their entire life, was a hacker/decker/programmer before becoming a TM. I'll admit, that I let the character use the same skills for hacking with resonance or hacking with programs mostly because I didn't notice the ruling, but with skillsofts or careful application of karma, it can still be done. |
||||
|
|||||
![]()
Post
#12
|
|
Neophyte Runner ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 2,275 Joined: 31-December 06 Member No.: 10,502 ![]() |
@Dashifen Sure if a TM wants to pick up the "regular" versions of the skills there isn't any reason they couldn't hack using a comlink on the small stuff to keep their health and sprites up for the tough stuff. But that requires either essense draining cyber or Karma/BP spent on even more skills.
Again on assist action, is the "threaded ratings can't go over resonancex2" still in effect, or is that just for the threading part. I.e. take a starting char w resonance 6 and stealth 6. They want to get inside the cameras of an executive suite fast, but they know if they set off any alert the jig is up. So first they whistle up a low level unregisterd sprite and then thread their stealth, getting 3 hits which they manage to soak easily with 10 die resisting. Then before they make their hacking on the fly run they call in a registered level 6 sprite, pass the thread sustaining off to the low level sprites, and have the big boy assist. Is their effective stealth upon breaking in 12 (resx2) or 15 (CF rating+thread hits+ sprite)? |
|
|
![]()
Post
#13
|
|||
Technomancer ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Group: Retired Admins Posts: 4,638 Joined: 2-October 02 From: Champaign, IL Member No.: 3,374 ![]() |
The last sentence answers your question, I think: the complex form cannot exceed Resonance x 2 so the threaded stealth cannot exceed 12. But, in your example, the complex form must be sustained by the registered sprite since that's a task only registered ones perform. The little guys can't event assist in the exploit operation since they're not registered, unless I missed something in the errata/faqs. |
||
|
|||
![]()
Post
#14
|
|||||
Canon Companion ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 8,021 Joined: 2-March 03 From: The Morgue, Singapore LTG Member No.: 4,187 ![]() |
What does that quote state? It does not state that TMs cannot use their versions in place of the standard version. So while I agree that the spirit of the rule would be not to allow the TM version be used in place of the standard versions but the letter of the rule is not so. |
||||
|
|||||
![]()
Post
#15
|
|
Neophyte Runner ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 2,275 Joined: 31-December 06 Member No.: 10,502 ![]() |
Can we post chunks of rules here? At any rate p233 is really very clear on the matter.
And I am inclined to agree that a threaded CF can't be taken over the 2x limit via an assist. So threading would be for when you need the skill to last a long time (like probing) or when you just want a boost without wasting sprite tasks. And Dashifen is right about the little guy. You'd have to use a registered sprite to sustain. Any comments on sprites coming along into isolated nodes? That's a pretty huge factor. |
|
|
![]()
Post
#16
|
|
Technomancer ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Group: Retired Admins Posts: 4,638 Joined: 2-October 02 From: Champaign, IL Member No.: 3,374 ![]() |
I've allowed it; it's roughly analogous to spirits using the "Metaplanar Shortcut" rules in Street Magic (p. 94) which allow a spirit to bypass mana barriers by jumping to the metaplanes and then back to the astral on the other side of the barrier as long as their summoner is on the other side of it too.
In other words, a sprite could jump from the general matrix to the Resonance Realm, whatever that is ;), and then back into a node within the matrix as long as the TM which has compiled it is within said node. Plus, this uses up a task. |
|
|
![]()
Post
#17
|
|
Moving Target ![]() ![]() Group: Members Posts: 124 Joined: 23-December 02 Member No.: 3,782 ![]() |
the TM itself is a living persona. The sprites are linked to your persona. Therefore anything your connected to they can exist in (which is why they 'disappear' when you leave node that you told one to idle in).
Threading is a free action. I'm starting to wonder if I'm the only person that has been playing a Technomancer like a summoner. Hey crack sprite go to town and find me an exploit to system A with admin rights. A few moments/hours later it returns with a valid exploit method. TM logs in using that exploit. Hey data sprite make me an account here, I'll assist! (just remember to bury it with stenography). Log out then log back in as a valid Admin just in time to cancel any alerts previously tripped. Then go about your business as a valid user. Or at least thats how I do my hacking. |
|
|
![]()
Post
#18
|
|
Neophyte Runner ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 2,275 Joined: 31-December 06 Member No.: 10,502 ![]() |
Actually I'm away from my book at the moment but I do believe it specifically says that sprites can persist in a system after you're gone if that's what you want them to do.
And I think TMs are supposed to be half summoners. I'd use sprites for data search (as I could whistle up a couple weak ones and not fade. And I'd use powerful registered sprites for cybercombat, which I'd rather avoid. However with a crack sprite you have to summon up a powerful one most of the time. And that will get you faded. And since you probably aren't getting many successes you have to recast often. And perhapse more importantly if you're hacking in on the fly others can't use your exploit I don't believe. It's even GM discretion if a probe found exploit can be saved up and used by another. That means while a crack spirit can bust in sometimes it won't have the range of skills needed to do stuff inside. However I think the bottom line is that the fact TMs can't do everything isn't a problem, as they can use spirits. They just need to have certain abilities. (also are you trying to say you can "assist" a sprite? I'm pretty sure they can't have threading or any other bonuses). |
|
|
![]()
Post
#19
|
|
Moving Target ![]() ![]() Group: Members Posts: 124 Joined: 23-December 02 Member No.: 3,782 ![]() |
Well my GM ruled that I can use a crack sprite to exploit for me AS LONG AS I use this exploit in the round that the crack sprite finishes its tests. Its basically a twist on the probing over time (which a sprite can do for you) but with a very very short valid time for the exploit.
Sprites can persist outside of things you have connected if they are sent on a remote task. If its an unregistered sprite the remote task consumes all remaining tasks to perform this action. What I mean by assisting a sprite. Typically a sprite has rating x2 in dice pool for most of its 'prefered' actions. Unless the TM has threaded out the wazoo the sprite will have more dice then the TM. So the sprite does the main action and the TM then follows the normal assist rules. Similar can be done for say Edit, Defuse, Decrypt. However there are some actions I dont feel would be appropriate such as Exploit since I dont feel assisting would work well with the supression power or rather it would be more complication to then figure out who triggered the alert since supression only works if the sprite triggers the alert. |
|
|
![]()
Post
#20
|
|||
Moving Target ![]() ![]() Group: Members Posts: 324 Joined: 18-July 06 From: Charleston, SC Member No.: 8,911 ![]() |
So what kind of action is Assist Sprite? simple, complex? Its fine to monkey with things but I don't agree that TM's should assist sprites just because the sprite might have more dice in a particular task. But I do agree that a sprite can hack in on the fly and let you in provided you enter immediately after (which is more like you enter at the same time) or enter while the sprite is still in the node and undetected (i.e. you haven't logged off at any point in-between) so you could use them to hold open a connection for a few minutes until your ready (trojan horses do just that). But i'd also have the system scan you and the sprite both when you entered, possibly doubling your chances of being detected. Much like trying to sneak more than one girl up to your room when you lived at your parents house. |
||
|
|||
![]()
Post
#21
|
|
panda! ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 10,331 Joined: 8-March 02 From: north of central europe Member No.: 2,242 ![]() |
Given that the book talks about loading a agent into ones persona and sprites being a cross between a spirit and a agent, i would expect that one could 'load' a sprite note the living persona...
|
|
|
![]()
Post
#22
|
|||
Moving Target ![]() ![]() Group: Members Posts: 107 Joined: 21-December 06 Member No.: 10,413 ![]() |
TM's don't store anything in there living persona, if theres is something to be stored it has to be in separate physical device. ( Pg. 233, Paragraph 4 SR4) |
||
|
|||
![]()
Post
#23
|
|||||
Moving Target ![]() ![]() Group: Members Posts: 693 Joined: 26-March 03 Member No.: 4,335 ![]() |
I don't think that applies here. TMs have no storage, but Sprites also require no storage, for themselves. Data storage sure, Sprites? no. I think that anywhere a TM can go, he can bring his sprites with him. That's why they are never limited by any system ratings. They are part of him. Special, extremely complex software constructs running on a massively parellel system .i.e. the TMs brain. |
||||
|
|||||
![]()
Post
#24
|
|||
Moving Target ![]() ![]() Group: Members Posts: 324 Joined: 18-July 06 From: Charleston, SC Member No.: 8,911 ![]() |
Sprites can be called/dismissed anywhere the TM's persona is. They don't really get stored in his brain or anywhere. They are products of his resonance and connection to the resonance realms. If you load a sprite on a commlink, it doesn't count as a program for response. So essential Lantzer is right, except the TM doesn't carry or bring them, they come from resonance (think matrix metaplanes). A dismissed sprite or one on standby doesn't exist anywhere in the matrix (unless you tell it to). It goes back to the resonance until needed. It is connected to the TM that summoned it by the same resonance (and shares the same signature). Sprites are not defined/limited/ or in anyway concerned with physical space limitations. If the TM can connect to any node, so can his registered or summoned sprites. |
||
|
|||
![]()
Post
#25
|
|||
Moving Target ![]() ![]() Group: Members Posts: 107 Joined: 21-December 06 Member No.: 10,413 ![]() |
Actually Sprites are matrix objects, once compiled they exist in node they were created and tend to follow the TM. ( Unless sent on a remote service or after a failed attempt to register it and it goes free.) |
||
|
|||
![]() ![]() |
![]() |
Lo-Fi Version | Time is now: 10th February 2025 - 06:27 PM |
Topps, Inc has sole ownership of the names, logo, artwork, marks, photographs, sounds, audio, video and/or any proprietary material used in connection with the game Shadowrun. Topps, Inc has granted permission to the Dumpshock Forums to use such names, logos, artwork, marks and/or any proprietary materials for promotional and informational purposes on its website but does not endorse, and is not affiliated with the Dumpshock Forums in any official capacity whatsoever.