OOC: Phoenix Rising, Out of Character thread for the runners |
OOC: Phoenix Rising, Out of Character thread for the runners |
Sep 28 2008, 10:18 PM
Post
#601
|
|
Runner Group: Members Posts: 2,666 Joined: 29-February 08 From: Scotland Member No.: 15,722 |
OK that will let DD perform an Intercept Traffic, although presumably she'll have to Decrypt it first, which ought to let her pick out the relevant Access ID's which is all she will need to start a hack.
If we are really lucky the local system is slaved to whatever is on the other end of this cable. If we're really unlucky she might try to hack the wrong system and bring the whole UCAS Military down on us... |
|
|
Sep 28 2008, 10:22 PM
Post
#602
|
|
Moving Target Group: Members Posts: 651 Joined: 15-September 06 From: Ephrata, Wa Member No.: 9,382 |
Right, dame your lucky with those dice, a bad roll there you would have been fried.
Brent |
|
|
Sep 28 2008, 10:28 PM
Post
#603
|
|
Runner Group: Members Posts: 2,666 Joined: 29-February 08 From: Scotland Member No.: 15,722 |
Frankly that is the most unlikely roll I've ever seen. I usually use an off-line roller and I wouldn't have had the balls to post that, I'd have just re-rolled it.
|
|
|
Sep 28 2008, 10:42 PM
Post
#604
|
|
Moving Target Group: Members Posts: 661 Joined: 23-March 03 Member No.: 4,322 |
So what could we legitimately access through the tap?
|
|
|
Sep 28 2008, 10:46 PM
Post
#605
|
|
Runner Group: Members Posts: 2,666 Joined: 29-February 08 From: Scotland Member No.: 15,722 |
Everything, nothing.
It depends on how good DD is... |
|
|
Sep 28 2008, 10:51 PM
Post
#606
|
|
Moving Target Group: Members Posts: 661 Joined: 23-March 03 Member No.: 4,322 |
|
|
|
Sep 28 2008, 11:12 PM
Post
#607
|
|
Moving Target Group: Members Posts: 765 Joined: 27-July 08 From: England Member No.: 16,167 |
It depends on how good DD is... And just what exactly is hooked up to the main fibre-optic cable. If we're lucky and they're linked to the research computers for sending out updates and backing up the data we can get right in to the information we need. As there aren't any records of signals sent between this place and anywhere else it seems at the very least we can monitor all the communications traffic between this place and whichever base they're reporting to. |
|
|
Sep 29 2008, 12:08 AM
Post
#608
|
|
Moving Target Group: Members Posts: 503 Joined: 3-May 08 Member No.: 15,949 |
Dancing Eyes shouldn't have a problem slowing down one of the spirits for you.
|
|
|
Sep 29 2008, 12:29 AM
Post
#609
|
|
Moving Target Group: Members Posts: 661 Joined: 23-March 03 Member No.: 4,322 |
Just so long as he doesn't take it out, its only force 4. It only has 10 boxes. If you hit it with a Force 5 and get 5 net hits it'll go pop. I suggest Force 4 so at most you drop it 8 boxes, 9 boxes would be good, but if you rolled great and got 5 net hits we'd be in trouble.
If we are going to do this, we need to do this before somebody sets off an alarm or something since its critical that the two of us surprise them. The +6 modifieer will help, but I don't think we could do it without the plus 6. Hey, Brent. How would penalties for having stun damage interact with the penalties from Orgasm? If the spirit is already at -2 from stun, would I still need to hit him with a -4 penalty from orgasm, or would it only need to be a -2? |
|
|
Sep 29 2008, 12:46 AM
Post
#610
|
|
Moving Target Group: Members Posts: 651 Joined: 15-September 06 From: Ephrata, Wa Member No.: 9,382 |
They would stack, I think.
Brent |
|
|
Sep 29 2008, 01:01 AM
Post
#611
|
|
Shooting Target Group: Members Posts: 1,973 Joined: 3-October 07 From: Fairfax, VA Member No.: 13,526 |
They been there about an hour so they have had an appitiser, some drinks, and have just started the meal. Brent As an aside, DD did get access to the restaurant's security cameras, so Truth is broadcasting live video of their meal to anyone on the network who wants it, along with the rotodrone subscribed to the network that's broadcasting aerial camera footage of the restaurant exterior. |
|
|
Sep 29 2008, 01:03 AM
Post
#612
|
|
Moving Target Group: Members Posts: 661 Joined: 23-March 03 Member No.: 4,322 |
|
|
|
Sep 29 2008, 01:49 AM
Post
#613
|
|
Moving Target Group: Members Posts: 199 Joined: 18-August 08 Member No.: 16,250 |
|
|
|
Sep 29 2008, 01:50 AM
Post
#614
|
|
Moving Target Group: Members Posts: 651 Joined: 15-September 06 From: Ephrata, Wa Member No.: 9,382 |
Well I'm looking at it, I think I'll try a game or two on it. I'd love to have some of you guys there.
Brent |
|
|
Sep 29 2008, 02:32 AM
Post
#615
|
|
Moving Target Group: Members Posts: 199 Joined: 18-August 08 Member No.: 16,250 |
Im in (IMG:style_emoticons/default/biggrin.gif)
|
|
|
Sep 29 2008, 05:26 AM
Post
#616
|
|
Moving Target Group: Members Posts: 503 Joined: 3-May 08 Member No.: 15,949 |
I've used OpenRPG, and it's great and all, but I can't commit to being anywhere at any particular time. Sure, I'm usually on afternoons and weekends, but I can't count on it. If I could, I'd be in a tabletop game. My lack of posting isn't just lack of stuff to do. I'm simply not here.
Just so long as he doesn't take it out, its only force 4. It only has 10 boxes. If you hit it with a Force 5 and get 5 net hits it'll go pop. I suggest Force 4 so at most you drop it 8 boxes, 9 boxes would be good, but if you rolled great and got 5 net hits we'd be in trouble. Sounds about right to me. |
|
|
Sep 29 2008, 02:55 PM
Post
#617
|
|
Moving Target Group: Members Posts: 651 Joined: 15-September 06 From: Ephrata, Wa Member No.: 9,382 |
Fuchs: DD at turn 6 10d6 = 3 hits You crack the decryption, But I need a Computer + Browse (6) to locate the right information flow.
The system's perception test Firewall 6 + Analyze 6 = 12d6 = 6 Right now the system detects your tap. |
|
|
Sep 29 2008, 03:14 PM
Post
#618
|
|
Dragon Group: Members Posts: 4,328 Joined: 28-November 05 From: Zuerich Member No.: 8,014 |
Well, if possible I spend one edge on the sniffer test:
rerolling failures on the sniffer test (5d6.hits(5) =1) Still getting detected anyway. Browse+Computer (if it's an extended test): Browse + computer to check data flow (12d6.hits(5) =2) Browse + computer to cehck data flow (12d6.hits(5) =3) Browse + computer to cehck data flow (12d6.hits(5) =0) Browse + computer to cehck data flow (12d6.hits(5) =2) |
|
|
Sep 29 2008, 04:10 PM
Post
#619
|
|
Moving Target Group: Members Posts: 661 Joined: 23-March 03 Member No.: 4,322 |
Was any bonus given from the critical success of placing the tap?
|
|
|
Sep 29 2008, 04:14 PM
Post
#620
|
|
Runner Group: Members Posts: 2,666 Joined: 29-February 08 From: Scotland Member No.: 15,722 |
|
|
|
Sep 29 2008, 04:27 PM
Post
#621
|
|
Moving Target Group: Members Posts: 661 Joined: 23-March 03 Member No.: 4,322 |
|
|
|
Sep 29 2008, 05:05 PM
Post
#622
|
|
Dragon Group: Members Posts: 4,328 Joined: 28-November 05 From: Zuerich Member No.: 8,014 |
Can't do much more than spend edge, sorry. Bad luck someone was monitoring the exact node we were tapping.
|
|
|
Sep 29 2008, 05:15 PM
Post
#623
|
|
Moving Target Group: Members Posts: 765 Joined: 27-July 08 From: England Member No.: 16,167 |
Erk. This could get very very messy then....
Say, we have access to the place she's having her meals security system right? I wonder if triggering the fire alarm to pull her outside might be a good idea, because I suspect we're going to need to shoot her pretty quickly if the hacking has been detected. @Brent - Is there anywhere nearby which has good line of sight to the front door (or the point people are gathered to during a fire alarm) and is within extreme submachinegun range? |
|
|
Sep 29 2008, 05:18 PM
Post
#624
|
|
Runner Group: Members Posts: 2,666 Joined: 29-February 08 From: Scotland Member No.: 15,722 |
Thing is I'm not sure that is how it works.
Intercept Traffic is for wired comms. Imagine you have three nodes, two that are communicating and a third that is merely the telecommunications hub between them. A-------------HUB------------B Like so. You can Intercept Traffic between A and B by running sniffer on HUB. You can only detect the Intercept by making a Matrix Perception test whilst accessing HUB. What we've done is inserted my commlink thus. A----------TAP-----------HUB-----------B This allows DD, who I'm allowing access to traffic to run Sniffer in her own Comm-link on the traffic passing through our network which I've physically inserted into the data-stream. The Spider can detect her Sniffer program but only if he has access to her comm-link. Which he doesn't unless he wants to hack his way through mine. |
|
|
Sep 29 2008, 05:34 PM
Post
#625
|
|
Dragon Group: Members Posts: 4,328 Joined: 28-November 05 From: Zuerich Member No.: 8,014 |
The rules say the matrix perception must be done on the node the sniffer program runs in. If that's the commlink, and not the closest node it's tapping, well then we're fine.
|
|
|
Lo-Fi Version | Time is now: 11th January 2025 - 01:47 AM |
Topps, Inc has sole ownership of the names, logo, artwork, marks, photographs, sounds, audio, video and/or any proprietary material used in connection with the game Shadowrun. Topps, Inc has granted permission to the Dumpshock Forums to use such names, logos, artwork, marks and/or any proprietary materials for promotional and informational purposes on its website but does not endorse, and is not affiliated with the Dumpshock Forums in any official capacity whatsoever.