Basic Matrix Rules, Building up to the full RAW in pixie steps |
Basic Matrix Rules, Building up to the full RAW in pixie steps |
Sep 5 2008, 11:50 AM
Post
#26
|
|
Mr. Johnson Group: Dumpshocked Posts: 3,148 Joined: 27-February 06 From: UCAS Member No.: 8,314 |
So ... do we get to see it, or are you just teasing us?
|
|
|
Sep 5 2008, 12:43 PM
Post
#27
|
|
Awakened Asset Group: Members Posts: 4,464 Joined: 9-April 05 From: AGS, North German League Member No.: 7,309 |
Super-Ninja-Secret: Look at the opening post. Completely forgot to mention that.
|
|
|
Sep 6 2008, 07:01 PM
Post
#28
|
|
Awakened Asset Group: Members Posts: 4,464 Joined: 9-April 05 From: AGS, North German League Member No.: 7,309 |
Please feel free to point out any rules mistakes in the following example (IMG:style_emoticons/default/smile.gif)
KE VSS KnightErrant offers quite a list of security options for any customer who can pay the price. One very common feature is video surveilance. Everyone is doing it, but KE does it well. Physical devices: The VSS is made out of a number of both visible (deterrent) and hidden cameras. Matrix Representation: All cameras are combined into one node (see Clustering, Unwired: min of System/Firewall, average of Response). All devices have a device rating of the customers choice, in case of this example 3. Therfore the matrix node "VSS" has a device rating of 3. Node Function: The node controls all cameras (direction, used vision mode, on/off-state, intruder tracking, guard supervision, recipients of vid footage). You can access the node if you are in signal range of a single camera. Video feeds are stored, and can be manipulate with a successful computers/hacking+edit, usually extended test. Uses for Matrix perception: Take a second to figure out your dicepool. You get the visual representation (+ a bunch of other senses) for free, unless there are hard-to-notice details. If you want more info, you roll matrix perception. I´ll list the main book examples and possible uses: - any ratings (the answer is 3 here, or "not present") The style of a node is only weakly correlated to the danger of hacking it. Find out you can´t before you fail. - type. You want to hack the VSS, not the node of the coffeemaker next to one of the hidden cameras. - alert state. Know if you´ve been noticed. Or someone else. If you fail a spoof attempt, the node will register an illicit command. - find out if video evidence shows signs of tampering. - each other relevant information: is any user looking at the video feed of the hidden camera you just found? - Get a list of all active and passive personae and agents connected to the node, and of any hidden ones if you can beat their Firewall+Stealth test What you can do by spoof: Switch a camera off (vid frozen), change camera direction, change the used vision system (ie to normal vision while wearing a chameleon suit). What you can do with exploit: Get a normal account to see footage of the "kosher" cameras, get a security account for seeing all footage, plus full control over all cameras, including an automatic tracking of any person you want. Track the guards and you are never surprised again. If you get admin access, you can revoke the accounts of the regular guards. How do they compare? - Spoof is simple and fast. A single short command, faked to come from a legitimate source. Getting a legitimate matrix ID can be simple. At the end of every shift, guards are leaving the facility. And any of those has likely a security account on the VSS. Getting into the Human Ressources Server of Knight Errant (a device rating of 4, but behind Chokepoint servers) is theoretically possible, but reserve that approach for weaker prey. Any guard (alive, and blissfully unaware of the runners) is likely broadcasting the ID over a load of game-servers. - Exploit has some big gains. Take a slow approach during prep time, and you have stacked the deck in your favour. On the fly you´ll be facing 6 defending dice, so with a stealth of 5, the second test brings danger of detection. However with a bit of edge, and a solid Exploit program, and some hacking skill, blasting the barrier of 6 hits (device rating 3 + security account 3) is doable, and brings some immediate advantages. GM Decisions Why rating 3? You could say that security devices have a device rating of 4. In this case I judged it to be 3 because a) these are no hidden sentry guns, just cameras, and b) it´s easy to frustrate people that are just learning the rules. (I would recommend to put dedicated hackers into the 12-16 dice bracket (all boni considered), and part-timers at 8-12 dice. Both should be able to beat the VSS, and the dedicated hacker can still be challenged with rating 4 or 5 nodes. Which fits the given examples for device ratings nicely. This example can be adopted for all other kinds of sensor networks, or for single sensors. It favours the use of Exploit, because there are quite a few interesting things to do that require more than a simple command. |
|
|
Sep 7 2008, 05:58 PM
Post
#29
|
|
Awakened Asset Group: Members Posts: 4,464 Joined: 9-April 05 From: AGS, North German League Member No.: 7,309 |
Shiawase "Empress" Door System
Not everything has to be wireless. Shiawase has just the right choice of household doors for any user who is both security- and comfort-minded. In the future, any door will be open for those who have the necessary rights to open it, and closed to all others. Grounding your child is easy if you bought the system for every door. Physical devices: The system consists mostly of mag-locked doors, although some users invest into windows from the same catalogue. Matrix Representation: This upper-class system has a device rating of 4. Each door has it´s own matrix node. The individual doors offer skinlink functionality over their whole surface, wireless links are available for the garage only. All doors are linked via wired connection to the central household telekom. Node Function: Simple: Keeping anyone who may not enter out. Everyone, including guests and personell, get normal user accounts. The respective "room owners" have security accounts, and can lock everyone but other "room owners" and admins out. If you have an admin account, you can always open any door. So if you want into the living room, any account will do. If you want into the master bedroom, better be close friends with an owner. The household telekom can be used (by those without skinlink) to relay orders to the doors as long as it is in active mode. Uses for Matrix perception: Not much really, as there are few functions. - any ratings (the answer is either 4 or "none present") The style of a node is only weakly correlated to the danger of hacking it. Find out you can´t before you fail. - alert state. Know if you´ve been noticed. If you fail a spoof attempt, the node will register an illicit command. - each other relevant information: is the door locked normally or by security account? What you can do by spoof: Open the door, if the person you are pretending to be could open the door. Lock the door. What you can do with exploit: Open the door any time you want and the account level permits. But only that single door. How do they compare? - Spoof is simple and fast. A single short command, faked to come from a legitimate source. Which is all you want in this case. You need to find someone with the right access ID, either someone with admin access, or a valid account for each door you need to pass, security access preferred. If you have only normal access, you´ll have to pray that the door is not owner-locked. - Exploit is a fail here, unless you have to pass one door again and again and again, or can not have any risk of failure, at all (like on the fallback escape route). The simplicity of the necessary orders does not justify the effort and risk of exploit well. GM decisions There are of course cheaper variants of this system, on the other hand some important security chokepoints might easily have even better locks. The Spoof dicepool should be higher than 2*device rating, as single orders are rarely worth a point of edge. Exploit can be different. |
|
|
Sep 7 2008, 09:33 PM
Post
#30
|
|
Awakened Asset Group: Members Posts: 4,464 Joined: 9-April 05 From: AGS, North German League Member No.: 7,309 |
Then there are drones/vehicles. Look at the sample device ratings table to determine rating. Utility depends on the type of drone/vehicle of course, with rigger adaption, nearly all functions can be controlled from the matrix. All drones are rigger-adapted.
MCT FlySpy The guards don´t want to die, and are too clumsy to sneak up on runners anyway. So they send out a scout drone. MCT Rotordrone The guards don´t want to die, and are too fragile to effectivly fight runners anyway. So they send out a remote-controlled firebase. Physical device The drone. Duh. The Rotordrone comes armed with an assaultrifle that has both smartlink and underbarrel grenade launcher. Matrix Representation: A single node with device rating 3 (Flyspy) or 4 (Rotordrone). Node Function: Drone control. The drone node offers displays for all available sensor data, and controls for all functions like flight direction, speed etc. It also provides storage for any sensor data. The Rotordrone has an additional weapon control system, including virtual controls for all smartlink functions. Ammo count /current target/target priorities for autonomous mode... Uses for Matrix perception: Some basic ideas: - any ratings (the answer is 3 here, or "not present"). - type. You want to hack the drone, not the tactical network of the assaulting KE team. - alert state. You care only if your presence is not well-known anyway. - find out if the drone is in independant mode (as in: not piloted by the security rigger). What you can do by spoof: Send GOTO orders, disarm a weapon system, disable all recording functions, put "target" on friendly list, reboot (sometimes very efficient, as it takes time), change sensor mode (only useful for patrolling drones, as scout drones are usually monitored, and modes switched right back), dump ammo of smartlinked weapons. What you can do with exploit: Get full access to the drone, including the ability to jump in. Rigging is a story for another time. How do they compare? - Spoof is simple and fast. But you need the matrix ID of the controller first, and if the drone is not in autonomous mode, any falsified orders are immediately revoked. (Unless the damage is already done, see dumping ammo) - Exploit has some big gains. Not that interesting in the case of scout drones (bring your own), but very interesting in case of combat drones. Mind the security rigger! Shutting down a drone works for both sides, as does matrix combat. |
|
|
Sep 8 2008, 08:13 AM
Post
#31
|
|
Dumorimasoddaa Group: Members Posts: 2,687 Joined: 30-March 08 Member No.: 15,830 |
I have to say birllient sample bits I know the rules well and this even helps me think about there uses in "diffrent" ways.
|
|
|
Lo-Fi Version | Time is now: 28th November 2024 - 01:43 AM |
Topps, Inc has sole ownership of the names, logo, artwork, marks, photographs, sounds, audio, video and/or any proprietary material used in connection with the game Shadowrun. Topps, Inc has granted permission to the Dumpshock Forums to use such names, logos, artwork, marks and/or any proprietary materials for promotional and informational purposes on its website but does not endorse, and is not affiliated with the Dumpshock Forums in any official capacity whatsoever.