Literal Problems with the Matrix, Not subjective problems |
Literal Problems with the Matrix, Not subjective problems |
Jun 22 2007, 09:23 PM
Post
#1
|
|
Prime Runner Group: Banned Posts: 3,732 Joined: 1-September 05 From: Prague, Czech Republic Member No.: 7,665 |
OK, since it was requested by my estemed colleague DemonseedElite, here is a list of actual rules problems with the Matrix. Note, this is not for problems like "I don't like the way that X is handled!" it's for things like "The rules say that X is handled like This on one page and like That on this other page, what the hell?" In short, things that actually have to be fixed in Unwired, rather than things that one or another person would like changed.
Dice Pools The biggest single problem in the book. When you are hacking into an electronic door lock, your dicepool is defined as Logic + Hacking on pages 124 and 223, and defined as Exploit + Logic on pages 221 and 223. In the former case, the Exploit program is completely worthless because it doesn't actually do anything, in the latter case Logic is useless to Hackers because it doesn't actually go into their dicepools at all. Jamming What does a Jamming test do? The test is defined on page 124 as being a Logic + Electronic Warfare (Jamming) test. Do net hits add to the effective rating of your jammer? How long do they do that for? It's not actually defined. Agents Running Programs Let's say you have three Agents in a node running Analyze. Does this count as 3 programs in the node, 4 programs in the node, or 6 programs in the node? Agents Attacking Nodes An Agent can transfer itself to another node to act there without using up your program limits (see pgs. 227 and 228). Does it have to? Can it just hang back on a commlink you own and attack the same node you're attacking? Is there any possible limit to that? Independent Unpirated Agents An agent can be left operating while you are not subscribed to it or even off line (see p. 228), how are you then limited to only one if the physical chip with the program on it doesn't need an active connection to the agent while it is operating? Couldn't you just cut the connection and boot it up again while the old copy was still running? Agent Smith and Subscription An Agent can continue doing what it was last told to do while no longer subscribed (see p. 228). If you have a pirated Agent which can be loaded up iteratively, doesn't that mean that you can load it, give it instructions, send it out, cut it off, and repeat. Forever? With like infinite Agents? All of them performing redundant tasks like chain Medic or Hack assist... System Slowdown How many programs does it take to slow down a commlink? Which programs count towards that limit? Does a Metalink really drop to 0 response the instant it runs any program? Command Prgram Seriously, what does this program even do? Is there a difference between rating 1 and rating 4? --- Obviously, others can contribute. I'll be thinking about it and throwing in a few more I've run into over the years. -Frank |
|
|
Jun 22 2007, 09:27 PM
Post
#2
|
|
Shooting Target Group: Members Posts: 1,920 Joined: 31-December 06 Member No.: 10,502 |
Actually a bunch of those are addressed in the FAQ to varying degrees.
|
|
|
Jun 22 2007, 09:30 PM
Post
#3
|
|||
Genuine Artificial Intelligence Group: Members Posts: 4,019 Joined: 12-June 03 Member No.: 4,715 |
Addressed, or solved? |
||
|
|||
Jun 22 2007, 09:31 PM
Post
#4
|
|||
Hoppelhäschen 5000 Group: Members Posts: 5,807 Joined: 3-January 04 Member No.: 5,951 |
They just got some completly backwards. 'Agents Running Programs' isn't even a problem by RAW: An Agent running counts as one Program. An Agent has a Pilot, and thus the equivalent to a System equal to its Rating. You can load Programs into Agents by RAW, but those Programs run all the time on that Agent. Those Programs are controlled and limited by the Pilot of the Agent - thus, the Agent counts still as one Program to the Node. As Agents don't have a Response on their own, the fun starts when they try to access lower Response node and they just have to drop Programs - or crash... Agents Rating 0 don't make any decisions anymore. |
||
|
|||
Jun 22 2007, 09:39 PM
Post
#5
|
|||||||
Prime Runner Group: Banned Posts: 3,732 Joined: 1-September 05 From: Prague, Czech Republic Member No.: 7,665 |
The key term here is "to varying degrees". For example, here's a beauty:
OK... but can a Metalink run any programs? The book still says that slowdown happens when the number of programs equals the system. So an OS with a system of 1 has slowdown with just one program. In short, the FAQ says that the cascading slowdown and lockup doesn't happen, but it doesn't actually replace the rules on pgs. 212 and 213 which cause cascading slowdown with anything. Or how about this gem:
So it says that you do use Programs, but then it gives you an example of what is essentially normal hacking that doesn't use programs and simply uses Logic + Hacking. In short, the FAQ answer answers the fundamental dicepool question both ways, which is no answer at all. -Frank |
||||||
|
|||||||
Jun 22 2007, 09:55 PM
Post
#6
|
|
panda! Group: Members Posts: 10,331 Joined: 8-March 02 From: north of central europe Member No.: 2,242 |
Agents Attacking Nodes: my understanding of this one comes from page 227, using agents. by the looks of it there are two ways you can use a agent, independently loaded onto a node, or loaded into your persona.
so imo, you have to either load it into your persona, and that means running it on the comlink that your currently using, or load it onto a node. in the latter case im guessing that it can only affect the node that its currently loaded on, and would have to transfer onto any node you want it to attack. but in the former case, the agent and persona is joined at the hip, and where ever the persona goes, the agent goes. Command Program: my understanding here is that it works like a virtual remote control. it may provide you with a steering wheel, shifter paddles and so on when driving anything car like and so forth. if one have ever seen people operate a UAV or mini-sub, thats basically it. only that you using AR or VR to present the screen and control, rather then physical ones. Independent Unpirated Agents: this have been a problem with "effective" copy control in SR from as early as i have interested in it. best guess is that there is some kind of flash or other storage in the chip that gets flipped when the program or agent is fired up and not reset until one can confirm that the program in question have been safely stopped. the problem is that DRM just dont work as a concept. but if its removed from the game, we are looking at the agent smith scenario. the SR matrix equivalent of gray goo i guess... |
|
|
Jun 22 2007, 10:31 PM
Post
#7
|
|||
Hoppelhäschen 5000 Group: Members Posts: 5,807 Joined: 3-January 04 Member No.: 5,951 |
At least that goo had cool shades. |
||
|
|||
Jun 22 2007, 11:08 PM
Post
#8
|
|||
Shooting Target Group: Members Posts: 1,512 Joined: 26-February 02 Member No.: 392 |
1. As someone else pointed out the FAQ answers the problem. Whenever you attempt to use an electronic device in a fashion that doesn't fall under the aegis of a program you use Logic+ something. The one use of Hacking + Logic in that example seems like it is akin to changing system settings that you aren't supposed to be able to change. Kind of like getting rid of the adult filters on your web browser when you are a horny 13 year old. It doesn't take a complicated program to change the settings but it does take some knowledge of how things work. I guess they wanted to use Hacking for something so they used that instead of Computer (could be either in my opinion). 2. Jamming doesn't need a test as per p. 225. You just turn it on. Don't know why you'd want a specialty in something you don't roll. The reference on p.124 makes no mention of rolling for Jamming either. Just that it is a specialty of EW. This may be something that'll come up in advanced jamming rules or some such. 3. It is 6 if you have loaded Analyze into each one or else 7 if you have 3 agents each using the program and the program loaded on the node. Theoretically it could just be 4 programs--3 agents and 1 analyze. However, as soon as those agents are told to use the analyze then the number of programs goes up by +3. The key thing is that any loaded programs or programs in use by agents count against the node/commlink's program limit. They talk about this exactly in the FAQ. 4. An agent is running on some system. If it is loaded into your persona (commlink) then it goes everywhere with you and has the same access and subscription list. It's response would be equal to the response of your persona. If you load it onto a separate node (other than your persona) then it is separate from your persona and needs its own access and has its own subscription list. It would operate at the response of the node on which it is loaded. In either case the agent can operate remotely from the "home" node/commlink. It still counts its programs against the limit of its "home" but it operates at the response of the node on which it is currently active. It would need to independently get access to the remote node for itself (requiring legitimate access or else hacking in). Yes the agent could just hang back on your commlink and attack the same node. It would count as a program that you are running PLUS any programs that it is using. So if it is attacking with armor, attack, and medic that now counts as 4 programs against your program limits. I don't know what you mean by limit. If your system/response drop to 0 then everything crashes and you've hit your limit. 5. This one needs addressing. I just say that that can't happen. Copy protection may be beefed up in Unwired. 6. Yes, except they would all have to be loaded on nodes separate from your commlink or else your commlink will crash as it hits its limit. Also since they are all operating independently they would all need their own access to go to new nodes. That means each one would have to hack its way in or be given separate access. Also note that you can't get more than +5 dice from teamwork tests. Personally I would also say that they can't Hack In assist since they have separate AID and thus would be hacking their own access associated with their access ID. 7. As soon as you hit System you get -1 Response. Your system is capped by response. So if you have 5 and 5 and you are running 10 programs you get -2 response. This lowers it to 5/3 but since system=response you are now 3/3. This means all of your programs operate at rating 3 now. The FAQ got rid of the cascading problem by stating that you just add up all the programs and compare to BASE SYSTEM. So if you are running 10 and drop your system to 3 you are not now at -3. It is still only -2. Yes the instant that a metalink operates any of the common use, hacking, or pilot programs it crashes. It is only meant to store data, make phone calls, operate word processors, text messaging, email, etc. 8. The command program allows you to substitute the program for Reaction while piloting a remote control device. So instead of Reaction + Ground Vehicles you can use Command + Ground Vehicles. Basically, as stated by someone else, you are controlling it via joystick/virtual dashboard (to use SR3 terms). ---------- I think that the only things that are missing that seem to anger people are: 1. Advanced Jamming 2. Advanced Encryption/Decryption 3. Advanced Copy Protection |
||
|
|||
Jun 22 2007, 11:15 PM
Post
#9
|
|||
Hoppelhäschen 5000 Group: Members Posts: 5,807 Joined: 3-January 04 Member No.: 5,951 |
Again: Those Programs run on the Agent's Pilot and not on the Nodes System. They are neither limited by it directy nor cause Response loss. |
||
|
|||
Jun 22 2007, 11:27 PM
Post
#10
|
|||||||
Shooting Target Group: Members Posts: 1,512 Joined: 26-February 02 Member No.: 392 |
From FAQ: (emphasis added)
According to the FAQ agents don't run ANYTHING on their own Pilot. It's all run off of whichever node the agent is loaded onto. Maybe your confusion is what slows down the agent? Whether it is how many programs it is currently using compared to its system or if it is the program load on the host node? I'd answer that by saying that all programs being used by the agent count against its system for response loss. This is then applied against its response which = node on which it is active. So if it is active on your commlink which is 5/5 and you are running 10 programs (4 + agent + agent using 5) then your commlink is now 3/3. Let's say that the agent is Pilot 5. It is suffering a -1 penalty because it is using more than it is allowed. This would stack with the penalty from the commlink. So the agent now has system/response of 2/2 (response 3 of host, -1 for program load, system capped by response). This would mean that agents can get a double hit for response loss. The alternative would be that they only get hit once and it is equal to the program load of the system. So in the above example the agent would be 3/3. If the agent then ran independently and moved to a node that has response 3 to begin with then it would be 1/1 (Response 3 -2 from host node's response reduction = 1) This means that agents may have to restrict how many programs they are using when they access a low response system. |
||||||
|
|||||||
Jun 22 2007, 11:31 PM
Post
#11
|
|||||||
Prime Runner Group: Banned Posts: 3,732 Joined: 1-September 05 From: Prague, Czech Republic Member No.: 7,665 |
There seems to be a basic misunderstanding of the purpose of this thread. This is not to place the way your group handles these questions. It is not the place to put which text you think has precedence or how you think these questions can be resolved. This is a thread to keep track of the legitimate questions that exist with regards to the rules. Frankly, I don't give a damn how you run your game for the purpose of this thead. Any post about what you think the answers to these questions are or should be is completely off topic. Seriously, what the fuck is this:
Can you now? Really? Where does it say that? Got a page citation?
You're both wrong and this is not the place to argue it out. The fact is that the text is ambiguous as to whether a program running on an agent running on a node counts as running on the node. The FAQ doesn't answer that question (or rather, it answers that question in an ambiguous fashion that could be interpretted either way). The point of this thread is not to hash out which way it should work, but merely to hash out which things there is genuine question as to which way they work. -Frank |
||||||
|
|||||||
Jun 22 2007, 11:41 PM
Post
#12
|
|||
Hoppelhäschen 5000 Group: Members Posts: 5,807 Joined: 3-January 04 Member No.: 5,951 |
The only ones wrong are Cheops and the FAQ. If the RAW got one thing basically right, it's the Payload rules on p. 228. The point is valid, though, as the mistaken information should be taken from the FAQ. |
||
|
|||
Jun 22 2007, 11:43 PM
Post
#13
|
|||||||||||
Shooting Target Group: Members Posts: 1,512 Joined: 26-February 02 Member No.: 392 |
p. 220 -- Controlling Devices. If you check Command, under Common Use programs you get the page reference of Drones p. 238. On pg. 238 you get the reference to page 221 which is on the opposite side of the correct quotation.
Right side of pg 220, 2nd to last paragraph, last sentence. The FAQ explicitly says that the program running on an agent running on a node counts against the node that is running the agent. Read the parts of the FAQ that I quoted again. I'm sorry if I derailed your thread. People put up questions that can be answered by the rules as written (BBB/Errata/FAQ). I answered those questions and pointed out the areas that needed more rules. Perhaps the issues isn't that the rules need clarification but that the rules need to be organized better. Before you call me out on something and ask "what the fuck..." maybe you should fucking read the rules. Then maybe you wouldn't have issues with things. |
||||||||||
|
|||||||||||
Jun 23 2007, 03:30 AM
Post
#14
|
|
Uncle Fisty Group: Admin Posts: 13,891 Joined: 3-January 05 From: Next To Her Member No.: 6,928 |
Once again :noflame: The purpose of this thread is simply to list the issues, not discuss it. What was asked for was a clear, concise list, not a debate. Please feel free to open up yet another friendly thread and discuss individual parts to your heart's content.
That being said, chill out. Obviously people feel strongly about some things. Super. Doesn't give anyone the right to start digging in to each other. If people need a day or two to cool down, it can be arranged. Otherwise, please, keep it on topic, make the list, move on. Thanks. |
|
|
Jun 23 2007, 03:48 AM
Post
#15
|
|||
Shooting Target Group: Members Posts: 1,512 Joined: 26-February 02 Member No.: 392 |
Don't know...that seemed like a list to me. |
||
|
|||
Jun 23 2007, 03:54 AM
Post
#16
|
|
Uncle Fisty Group: Admin Posts: 13,891 Joined: 3-January 05 From: Next To Her Member No.: 6,928 |
Please, please don't antagonize.
|
|
|
Jun 23 2007, 01:42 PM
Post
#17
|
|
Neophyte Runner Group: Members Posts: 2,078 Joined: 26-February 02 Member No.: 67 |
Thanks for this thread. I agree this isn't the thread for arguing these viewpoints, though I appreciate when someone points to a page reference or a rules/errata/FAQ quote that may differ with or clarify an earlier statement.
I don't really need the arguing, as I plan to look over these or pass them around to the other writers/devs, but page numbers and quotes are helpful. |
|
|
Jun 23 2007, 02:09 PM
Post
#18
|
|
panda! Group: Members Posts: 10,331 Joined: 8-March 02 From: north of central europe Member No.: 2,242 |
sorry that i misunderstood the point of this thread.
|
|
|
Jun 23 2007, 02:20 PM
Post
#19
|
|
Neophyte Runner Group: Members Posts: 2,159 Joined: 12-April 07 From: Ork Underground Member No.: 11,440 |
Maybe not entirely in the matrix the questions
1. The pilot definition and what is rigger adapted or not. 2. Does GrideGuide rig vehicles to function, ie remote control? |
|
|
Jun 23 2007, 02:27 PM
Post
#20
|
|
Hoppelhäschen 5000 Group: Members Posts: 5,807 Joined: 3-January 04 Member No.: 5,951 |
Connection Limits - Right now, we got two slightly different set ofs rules concerning limited connections: The subscription rules on p. 212, Linking and subscribing and the connection rules on p. 218, Accessing multiple Nodes. What do they intend to limit exactly? Do they really stop us from filesharing with more than 12 peers, or watching more than 12 different news stations at the same time, and make the max size of conference calls 12 users?
Network Transparency - As per p. 212, Logging On/Off, 'the user must leapfrog to the node through other nodes.' if not in direct connection range. Does this really mean that acessing a website at the other end of the world is a dungeon-crawl through every router, backbone and relais in between? What about making a comcall? Do you really have do spend a log in action just to read a web page? What about an Agent seraching the Matrix for infos - does he really have a different dicepool every few turns as he change nodes? Persona Overload - Does your Persona Icon really pops up on every Node you access, with every commcall you make and is present on every digital garment your wear and slaved to your com - cluttering any public node with ideling zombie Personas? What happend to iconless 'tortoise mode' that allowed you basic access? |
|
|
Jun 23 2007, 02:53 PM
Post
#21
|
|||
Mr. Johnson Group: Dumpshocked Posts: 3,148 Joined: 27-February 06 From: UCAS Member No.: 8,314 |
|
||
|
|||
Jun 23 2007, 02:58 PM
Post
#22
|
|
Running Target Group: Members Posts: 1,498 Joined: 4-August 05 From: ADL Member No.: 7,534 |
Im throwing in the old matrix FAQ as I think most of the questions have not been answered and that have been answered got strange answeres that dont answer much and throw up more questions (see Franks Examples).
Note that some stuff should be clarified in Unwired but most of the stuff is realy basic and an actual flaw of the basic rules. Ive marked the important things in bold. So here you go: Q: Do IP augmentations affect AR actions!?!!? --- Q: does a reduction in response from running more programs then the system rating allso result in a reduction in system? --- Q: Do agents have to hop nodes or can they be run on a comlink and only access other nodes? --- Q: Can one Edit the wireless signal between a Rigger and his Drones to input completely different commands? --- Q: After hacking a Drone, does one have to subcribe the Drone to his commlink before he issues commands or "jumps in"? --- Q: Can Agents load Agents and thus spawn the overwhelming hordes? --- Q: Does an Agent loaded into a node count as a program running on that node for purposes of Response reduction? --- Q: "When you are directly interacting with a device, using Hacking skill + Logic. If you are utilizing a program, make tests using Hacking Skill + program rating" This seems to suggest that programs may be optional (hence the "if", not "when"), and also suggests that a Hacker can directly interact with a device (another commlink, a remote host, a drone, etc.) using only hacking + logic. Is this the intended interpetation of the rules, or, as I have heard on this board, is it impossible to do any hacking without using programs? In SR3, I remember programs being supplemental (and very important) to intellect, not a replacement. --- Q: Do Technomancers still need a commlink for everyday stuff? --- Q: Do Technomancers need i.e. contact lenses or cybereyes to use smartlinked guns? Which leads to... --- Q: How do Technomancers percieve AR? Inner eye? Intuition? Like Neo in the Matrix movies? --- Q: Does a jumped-in rigger use agility for gunnery tests? --- Q: Is one able to circumvent the subscription rule by spoofing your ID? --- Q: Is an alarm only triggered by glitches after you successfully hack in? If not, by what else? --- Q: How does patrolling IC work? How do they find out you are an intruder?[b/] --- Q: Is a sim module inlcuded in a cranial comlink? (no in 3rd print, yes in 1.3 pdf) --- Q: Does lowered response affect system and thus programme ratings, or is the lowered rating only used for rolls where response is involved directly (for example matrix reaction) ? --- [b]Q: Do all the programmes loaded into an agent affect the response of your comlink if the comlink is running the agent? --- Q: Do I have to hack 5 comlinks if they are all chained together in a subscription line, to get to the comlink at the end of the line? (ie. A-B-C-D-E the hypen meaning a subscription to aonly accept traffic >from that node) --- Q: Can I change system settings (Accounts, subscription lists) of a node by inserting false traffic into the traffic to that node? --- Q: Does the admin account have any restrictions? --- Q: Can I still be identificated by the system as a hacker once I hacked in as an admin? If yes, how? --- Q: Can I fight a matrix fight in one node and let my icon be repaired by an agent in another node? If not, what are the restrictions? --- Q: What exactly does the Command software do? If it's used with drones, when is it used and how? --- Q: Can an agent/pilot program be given a Computer skill program to help with/automate the programming process of new hacking programs? --- Q: Are there any situations where the opposed test for running a Reality Filter is not actually required? (i.e. when running it while performing tasks on your own commlink) --- Q: Is it possible to modify a Sim Module to disable the emotive tracks of simsense, or is feeding your AR/VR through the various *-Link implants (Image Link, Sound Link, Touch Link...) instead of using a sim module the only way to avoid simsense-induced emotion? --- Q: What are the benefits of having a system use Linked Passcodes or Passkeys over Basic Passcodes? The rules for Hacking on the Fly and for Probing the Target don't seem to care what type is used. --- Q: Can a Matrix Perception Test tell the difference between a user who logged in using a Linked Passcode / Passkey, and a user logged in under an account that doesn't have a Linked Passcode / Passkey because their account is a backdoor created using the Probing the Target method? --- Q: What exactly does it mean to encrypt a device? A signal? --- Q: When using Edit to manipulate data in real time (video feeds, etc.) are there any guidelines for what the program is and isn't capable of? --- Q: A node on Alert gains a Firewall bonus against the intruder who triggered the alert. However, under both types of breaking-in scenarios (Hacking on the Fly, Probing the Target), it is possible to trigger an Alert and fail your break-in attempt at the same time. Can a Node identify a specific intruder even when they fail to break in? In other words, if an intruder attempts to break in, fails and triggers an alert, does the Firewall get the Alert bonus if they try a second time to break in? --- Q: When exactly is the Data Bomb program considered to be running? --- Q: What determines whether a character is a Hacker or not, for the purposes of awarding points for Simsense Vertigo? --- Q: A Technomancer's organic wireless link allows them manipulate EM fields to be able to receive and broadcast a wireless signal. Does it also allow them to manipulate the electrical field on the surface of their skin, thereby letting them communicate directly with skinlinked devices without any additional hardware? --- Q: What happens when Response drops to 0 as a result of running too many programs? Does the device simply refuse to run any more programs? --- Q: On page 216, it notes: "Note that standard electronic devices only have admin accounts, as there is no need for other accounts for their software." Are commlinks standard electronic devices for this purpose? Could you please give examples of other standard electronic devices?. --- Q: When sending an Agent of to perform a Datasearch, he jumps Nodes. As his Response is defined by those, what dicepool does he have when searching the entire Matrix? --- Q: On page 216, it notes: "Note that standard electronic devices only have admin accounts, as there is no need for other accounts for their software." When attempting to break in to a standard electronic device (whether using Hacking on the Fly or Probing the Target) do you automatically fail if you attempt to gain User-Level or Security-Level access? --- Q: Why are drones and devices treated differently? Why is Pilot an OS and not just a program? Is an agent an OS because it has a pilot rating? --- Q: Can I hack an opponent's cybereyes and guns? Do they count as standard devices? If so, is it necessary to install ICE or unplug these devices? How would I do so? --- Q: Can Agents perform or assist in Teamwork tests? --- [Q: Is it possible to insert a Pilot as the OS of a commlink and/or device? --- Q: If the above is possible could a Pilot Commlink hack for itself (with adequate instructions) --- Q: Does "flavour" programs like Wallspace, Virtual Person etc affect Response? --- Q: How many "pre-set" commands can I give a Pilot? Could I limit what kinds of orders it is allowed to receive, what language they have to be in for example? --- Q: How many standing orders can I have for an agent? Can it doublecheck orders from a controlling persona for a drone to prevent spoofing? --- Q: Can Agents use medic on each other or the hacker? --- Q: For agents to affect each others with programs (medic for example) do they have to be in the same node. --- Q: What happens to a Commlink with Response 1 who runs 1 program - Does it shut down? --- Q: Can vehicles perform Jamming with their Electronic Warfare Autosoft alone or do they need some kind of hardware? --- Q: Are all Drones classed with average matrix attributes of 3 or does (for example) the Steel Lynx classifies as a "Security vehicle" and then have Matrix Attributes of 4? --- Q: How do drones, nodes, agents and autosoft fit together? Is a drone a node that is running an agent (the pilot programme) of rating 3 that is in return running the autosoft? -- Q: What happens if the agent (mentioned above) is running more than two autosofts? --- Q: Are the encryption rules meant to be that way? (A moderate hacker, everything rating 3, can hack the best available encryption in 18 seconds.) --- Q: Do you need a rigger control to jump into a vehicle? --- Q: Can agents load and unload new programmes? --- Q: Isnt a rating 6 agent running on his own comlink better or equal to most maxed hackers. What stops anybody (especially runners) from just letting rating 6 agents do all the work? --- Q: Because of the differences in how a Technomancer's Living Persona's ratings are generated compared to a normal Commlink, is a Technomancers' System rating limited by their Response rating? It doesn't seem that Technomancers' forms affect their Response, so would the Response still affect the rating of System? --- Q: Put hopefully more simply: Is a technomancers System rating the lowest of (Resonance or Logic), or is it the lowest of (Resonance or Logic or Intuition)? --- Q: Do Technomancers have a "living node" that houses their persona? If so, can it be hacked by others? If so, can a hacker screw up the Technomancer's normal neurological functions? --- Q: Could you clarify the game-mechanics effect of subscripting a device to only accept input from another device (say, a drone to the rigger's commlink)? Is this simply fluff text, or does it make the peripheral device completely unhackable except through the master device? --- Q: Do drones need to remain within Signal range of their rigger, or can they be remotely rigged via Matrix coverage? --- Q: When crack sprites trigger an alarm it is suppressed for several turns - if in the meantime the sprite hacks in, can the alarm be disabled? --- Q: When you trigger an alert, will security automatically spot you, or do they still need to succeed in an opposed matrix perception test? --- Q: Matrix Condition Monitors (SR4 p. 231) are defined as using 8+(System/2) to calculate the number of boxes. But what about sprites? Is the MCM for a sprite determined by the node it currently resides in? Does it use the System of the living persona of the technomancer that summoned it, or should you use either the Rating or Response of the sprite? Should you use the highest value of any of the attributes (Response, Firewall) that can be higher than Rating? --- Q: Can sprites be detected in a node? --- Q: How do they avoid being noticed? --- Q: Do they need an account to avoid being flagged as an intruder? --- Q: Do they have to be inthe node with the TM to aid the TM ? --- Q: In one of the Shadowrun Missions (Best Served Cold I think) the runners get pinged by a security drone to check their commlinks. Does this mean that if you have LOS on a person you can automatically ping them to determine what mode their commlink is in without having to use Scan to check all nodes? --- Q: Can Crack sprites hack a system for a TM and pass along the back door to him? --- Q: Since System and Firewall are programs is it possible to encrypt them? Specifically can a TM use a courier sprite at rating 1 to prevent the system from communicating with the firewall? --- Q: If a character implants a simrig, full arms, legs, torso, skull, and builds a neck brace could he be rigged like an anthroform drone? --- Q: Can spirits and critters (i.e. dragons) use AR? |
|
|
Lo-Fi Version | Time is now: 25th April 2024 - 10:00 PM |
Topps, Inc has sole ownership of the names, logo, artwork, marks, photographs, sounds, audio, video and/or any proprietary material used in connection with the game Shadowrun. Topps, Inc has granted permission to the Dumpshock Forums to use such names, logos, artwork, marks and/or any proprietary materials for promotional and informational purposes on its website but does not endorse, and is not affiliated with the Dumpshock Forums in any official capacity whatsoever.