![]() |
![]() ![]() |
![]() |
![]()
Post
#26
|
|||
Moving Target ![]() ![]() Group: Members Posts: 198 Joined: 26-December 03 Member No.: 5,935 ![]() |
If that were the case then why aren't they subject to the limits of the node they are on? |
||
|
|||
![]()
Post
#27
|
|||
Shooting Target ![]() ![]() ![]() ![]() Group: Members Posts: 1,512 Joined: 26-February 02 Member No.: 392 ![]() |
Hmmm...never thought of doing that before. In my games I say that sprites are separate icons with their own (albeit garbled) AID. Thus the TM couldn't log on with the access that the Crack sprite gains. Also, I NEVER used Probe with the Crack sprites. They live to crack security so "real resonance entities" do it on the fly. This meant that for all but the most powerful Crack sprites they raise an alert that was then suppressed. Your bit of brilliance is Stenography. None of us ever thought of that. Bravissimo! :notworthy: As for TMs using a commlink and their persona I'm okay with it. However, that'd be 2 different entities so you'd need separate access for the commlink and it's programs wouldn't work on the living persona. Also, whichever one isn't being used would just sit there and potentially get wailed on by security. Hmm...didn't notice the errata for the actions. Now the TM is faster. I'd say that they are even better than hackers now. With 2 registered rating 3 sprites of the appropriate type you could take a rating 0 CF and say: Free Action, Thread; Simple action, assist; Simple action, sustain. You'd now have the CF at 3+(Software+Resonance) for 3 combat turns without taking a -2 penalty. All it costs you is 6 hours and 1 initiative pass. Interesting... |
||
|
|||
![]()
Post
#28
|
|
Moving Target ![]() ![]() Group: Members Posts: 398 Joined: 16-August 06 Member No.: 9,130 ![]() |
I think there is a fundamental SR4 mechanic I am misunderstanding about stealth.
On the Fly, Mechanic A: IC keep on rolling pilot rating+analyze until they obtain hits=stealth on a single roll only. If I had a rating 5 stealth and they only had 4 dice on this roll it would be impossible for them to detect me. On the Fly, Mechanic B: IC roll for an extended test with the threshold being my stealth. They roll each time until they pile up hits=stealth. Which of these is right? Are they both wrong? How is this properly handled? |
|
|
![]()
Post
#29
|
|
panda! ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 10,331 Joined: 8-March 02 From: north of central europe Member No.: 2,242 ![]() |
second one is the correct one.
|
|
|
![]()
Post
#30
|
|
Neophyte Runner ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 2,377 Joined: 31-December 06 Member No.: 10,502 ![]() |
I'm not so sure you can use stegonography that way. The point of it is hiding data so it can't be found. So when the system looks up your account...nothing.
Also if something hacks in on the fly it gets through, but doesn't get a passcode or anything (though probing usually does). Still you could get in without hacking by using a rating 6 courier sprite with browse and exploit. It could hack in, find the security logs, and edit them to get you in. If the admin list is databombed you'd need to send the crack sprite in after all. Actually given the exceptional ability of technomancers to communicate without interception with sprites they might be able to do what needs doing for you remotely. If a courier does edit you in remember a couple things. -if you log in as an authorised user if the system tries to disconnect you you just roll hacking not hacking+exploit. Meaning you're pretty much gone if the system wants you gone. -patroling IC and more typically spiders may notice something fishy about you. For example the spider may know the guys who have admin access and you aren't one of them. -some systems also require passkeys / RFIDs to get in. I suppose in many cases you could just tell the system that this account doesn't need one, but I'd work fast if I were you. Still having your sprites hack for you isn't a bad idea at all. Works much better than with agents where you never know if the system detected them and is now using the intercept traffic rules to feed you garbage while a trace has already completed(which by the way, is what I have systems and spiders generally do if they would realistically have the software). Question, and I want to say the answers out there I just can't find it. Can sprites be tracked back to the TM like an agent? I'm pretty sure the answer is yes. They certainly have a data trail heading back to the TM (what all those images and files are going over). |
|
|
![]()
Post
#31
|
|||
Running Target ![]() ![]() ![]() Group: Members Posts: 1,251 Joined: 11-September 04 From: GA Member No.: 6,651 ![]() |
Don't forget about the unhackable Resonance link. Its not using a program or technology its just automagical communication. :-) |
||
|
|||
![]()
Post
#32
|
|
Neophyte Runner ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 2,377 Joined: 31-December 06 Member No.: 10,502 ![]() |
I'm away from the book at the moment but I think the issue with the link isn't that it doesn't exist, it's that it can't be spoofed/edited because it's got a little bit of whatever that "resonance" stuff is, and the TM/sprite would notice if things didn't match up.
I don't think that it can't be sniffed. What I don't know is if you can track someone from something like that. I.e lets say I know I've got a target that likes to make calls to a little island somewhere, and I happen to know that the island has one centralized node with a satalite uplink that provides service to the entire island. So I hack that node and sniff around until a call comes through. The target didn't visit the node I'm in par se. Their traffic is just being routed through it. Am I now able to use a track program on them? I'm thinking yes. |
|
|
![]()
Post
#33
|
|||
Shooting Target ![]() ![]() ![]() ![]() Group: Members Posts: 1,512 Joined: 26-February 02 Member No.: 392 ![]() |
Yes but you'd have to make a Matrix Perception on them when they are talking on the phone and get 1 success to learn their access ID. Then you could track them as long as they are still on the phone. Hacking on the fly still has to generate some sort of account otherwise you couldn't get security or admin access (there'd be no difference). Hmm...you are right about the system being confused by Stenography. Oh well, cool while it lasted. As to the other points sunnyside had, yes they are an issue. However, an IC might not be smart enough to know what to do with an entity that doens't have a proper AID and admins might not check their admin list every few minutes. If you aren't doing anything that your access doesn't allow then there shouldn't really be any red flags. TMs may only be tracked by other Resonance beings. Makes TMs hell for security to deal with. You should be able to sniff a TM if you can intercept one of his current active wireless communications. You just can't hack his end and his AID again comes up as garbage (unless you are also a TM). |
||
|
|||
![]()
Post
#34
|
|
Neophyte Runner ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 2,377 Joined: 31-December 06 Member No.: 10,502 ![]() |
Is there something I missed in raw about resonance beings not being able to be tracked? Does that apply to TMs as well? If so that's a huge huge boost compared to being trackable.
Actually even if it is just that sprites are untrackable it's a massive thing. Usually the reason you can't just hack all the livelong day with agents is that something could go wrong and you get found in real life. Even if you run the agent off of a seperate node you eventually have to hook up with them and they could have been followed etc. If sprites are immune to that it means you can hack remotly with sprites at zero real life risk. There is nothing that can go wrong aside from not getting whatever you were after and losing your sprite. I guess even if the TM is trackable through the sprite connection they could still just send sprites out purely remotly. Since a sprite can't be hacked/spoofed there isn't any risk in that. I guess maybe that means that TMs really are like mages in the physical world. The only way to deal with them is to have your own. |
|
|
![]()
Post
#35
|
|||
Shooting Target ![]() ![]() ![]() ![]() Group: Members Posts: 1,512 Joined: 26-February 02 Member No.: 392 ![]() |
You are correct. TMs and sprites are untraceable. Yes, TMs can only be truly beaten by other TMs. You can stop a TM but you can't figure out where he is and send a strike team. Unfortunately, according to the fluff corporations can't really use their own TMs since they are rare, and people aren't fully aware of them yet (wait for emergence). |
||
|
|||
![]()
Post
#36
|
|
Neophyte Runner ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 2,377 Joined: 31-December 06 Member No.: 10,502 ![]() |
Can anyone back that up in the book? Especially for the TM themselves?
aha page 235 "Like agents, a sprite’s datatrail also connects back to the technomancer’s datatrail." Sure looks like they're traceable from that. |
|
|
![]()
Post
#37
|
|||
Shooting Target ![]() ![]() ![]() ![]() Group: Members Posts: 1,512 Joined: 26-February 02 Member No.: 392 ![]() |
hoho...looks like I may have thought of this one incorrectly. I believed that Matrix Signatures (p 237) included for the purposes of tracking. Looks like TMs can be traced. |
||
|
|||
![]() ![]() |
![]() |
Lo-Fi Version | Time is now: 16th August 2025 - 03:23 AM |
Topps, Inc has sole ownership of the names, logo, artwork, marks, photographs, sounds, audio, video and/or any proprietary material used in connection with the game Shadowrun. Topps, Inc has granted permission to the Dumpshock Forums to use such names, logos, artwork, marks and/or any proprietary materials for promotional and informational purposes on its website but does not endorse, and is not affiliated with the Dumpshock Forums in any official capacity whatsoever.