IPB

Welcome Guest ( Log In | Register )

2 Pages V  < 1 2  
Reply to this topicStart new topic
> New and Modified Cyberware Suites, (because the book is uncharacteristically lacking)
Shadow
post Dec 7 2008, 10:32 PM
Post #26


Why oh why didn't I take the blue pill.
*********

Group: Dumpshocked
Posts: 6,545
Joined: 26-February 02
From: Gloomy Boise Idaho
Member No.: 2,006



Considering how easy it is to hack/disrupt a comlink I would think the last thing a runner would want, was an internal commlink. The first thing I do after runs is smash mine into a million pieces right before I set it on fire. Those damn things are like a giant hunters mark above your head.

"COME HERE THE GUY WHO JUST PERPATRATED TEH CRIME IS HIDING RIGHT HERE"

No thank you. If it was internal you would have to see a street doc after every job.
Go to the top of the page
 
+Quote Post
KCKitsune
post Dec 7 2008, 11:31 PM
Post #27


Neophyte Runner
*****

Group: Members
Posts: 2,188
Joined: 9-February 08
From: Boiling Springs
Member No.: 15,665



QUOTE (Fortune @ Dec 7 2008, 05:26 PM) *
The question is though, is just any 'Response 4 Node' capable of running any Program, and being utilized as a Commlink?


I would say that the first line under Clusters would give you an idea (page 55 in Unwired for your reference):

QUOTE
Sometimes, you have a lot of low-powered devices, but what you really need is a single node able to sustain several personas and/or run a lot of programs at once


That to me screams that you can run it as a Commlink.


QUOTE (Shadow @ Dec 7 2008, 05:32 PM) *
Considering how easy it is to hack/disrupt a comlink I would think the last thing a runner would want, was an internal commlink. The first thing I do after runs is smash mine into a million pieces right before I set it on fire. Those damn things are like a giant hunters mark above your head.

"COME HERE THE GUY WHO JUST PERPATRATED TEH CRIME IS HIDING RIGHT HERE"

No thank you. If it was internal you would have to see a street doc after every job.



That is if you are a paranoid hacker. Another way a hacker can do it is run maxed out Stealth, maxed out Spoof, and maxed out Encrypt.

Also who's to say HOW a commlink states its ID. I would think that a real hacker has his "MAC Address" (or whatever the hell they use in SR) erased and changeable every single run. In fact this is how I would see a hacker &/or every other member of a team prep themselves for a 'Run:

  1. backup the "Safe, normal citizen" MAC Address of their 'Links
  2. backup personal data to a data chip and leave it in a safe deposit box
  3. "flash" in the new false MAC Address into each 'Link
  4. change the registration ID of their OS and Firewall
  5. make sure both Encrypt AND Firewall are up to date
  6. make sure IC and Attack programs are up to date
  7. do the 'Run
  8. get to a safe place, unload paydata
  9. "flash" their links back to their "Safe, normal citizen" MAC Address
  10. change the registration ID of their OS and Firewall back
  11. lay low for a few days
  12. Profit
Go to the top of the page
 
+Quote Post
Stahlseele
post Dec 7 2008, 11:36 PM
Post #28


The ShadowComedian
**********

Group: Dumpshocked
Posts: 14,538
Joined: 3-October 07
From: Hamburg, AGS
Member No.: 13,525



much too complicated . . use two comlinks, one that has everything a runner needs and NOTHING that a runner wants, one that has NOTHING a runner wants and NOTHING that a runner wants . .
read: spam and advertising and such things and no security to speak of but also nothing valuable on the civilian . .
before run deposti civilian link into said box, after run exchange for runner link and visa a vis . .
Go to the top of the page
 
+Quote Post
Fortune
post Dec 8 2008, 12:25 AM
Post #29


Immoral Elf
**********

Group: Members
Posts: 15,247
Joined: 29-March 02
From: Grimy Pete's Bar & Laundromat
Member No.: 2,486



QUOTE (KCKitsune @ Dec 8 2008, 10:31 AM) *
I would say that the first line under Clusters would give you an idea (page 55 in Unwired for your reference):



That to me screams that you can run it as a Commlink.


I don't have the book with me at the moment, so all I can go on is your quote. That being said, all that says to me is that it can run a few more programs than the normal toaster. It doesn't state which programs the Cluster is capable of running, nor does it state that the Cluster has any other functions of a Commlink.
Go to the top of the page
 
+Quote Post
Tachi
post Dec 8 2008, 08:54 AM
Post #30


Moving Target
**

Group: Validating
Posts: 664
Joined: 7-October 08
From: South-western UCAS border...
Member No.: 16,449



I basically just ruled that brand name commlinks are all just "standard" ware if implanted. If you want a better grade it has to be custom. Don't forget the "Spoof Chip" to keep your headware commlink anonymous. AND have a throw away commlink for your fake SINs/licenses/daily BS. But hey, that's just me.
Go to the top of the page
 
+Quote Post
streetangelj
post Dec 8 2008, 09:31 AM
Post #31


Target
*

Group: Members
Posts: 95
Joined: 23-June 07
From: Akron, OH
Member No.: 11,993



In my games most of the PCs have Internal custom commlinks with maxed out encrypt and analyze (at the vey least) running in hidden mode (when they're running them at all - I hadn't thought about spoof chips, so I'll probably retcon them in) connected to shadow MSPs which they use only for running. They have throw away commlinks which they have for daily and public use with attached IDs, licences and program packages that they replace often enough that I built them as a package of hardware/software/services. (In case anyone's curious, the package is: Novatech Airware Commlink, Iris Orb OS, Sim Module, Holoprojector, FTL Matrixware Netwizard software suite, Rating 4 Fake ID w/ 1 rating 4 Professional Liscense (Bodyguard, Courier, P.I., Military Veteran, whatever best fits) and whatever MSP comes with the lifestyle registered to that ID- Cost:6,330 (IMG:style_emoticons/default/nuyen.gif) - a roughly 15% discount). And if they want to upgrade or replace their tricked-out "running links", even the ones with implants simply require a few hours at the Street Doc for some outpatient surgery once they have the replacement link the way that I rule them.
Go to the top of the page
 
+Quote Post
Tyro
post Jan 29 2009, 02:52 PM
Post #32


Shooting Target
****

Group: Members
Posts: 1,768
Joined: 31-October 08
From: Redmond (Yes, really)
Member No.: 16,558



QUOTE (streetangelj @ Dec 5 2008, 12:50 PM) *
You just illustrated one of the reasons why I don't include the commlink in grade multipliers. Besides, I see them as being very similar to the way persona modules for cranial cyberdecks worked from previous editions.

Edit: So in the 150+ non posted views of this thread I was just wondering how many of you agreed with the way MJBurrage (at least originally) and myself interpreted internal commlinks working?

P.S. I also envisioned a sort of mental switch that would shut down the commlink's signal for security reasons and force it to route data through a datajack to facilitate external communication, kinda like the old headware radio/transducer combo.

I very much agree that only the base (IMG:style_emoticons/default/nuyen.gif) 2,000 should be factored in.
Go to the top of the page
 
+Quote Post
KCKitsune
post Jan 30 2009, 05:00 AM
Post #33


Neophyte Runner
*****

Group: Members
Posts: 2,188
Joined: 9-February 08
From: Boiling Springs
Member No.: 15,665



Maybe we can get someone from Catalyst to chime in on this question. We can also ask them to answer what a super cluster can and can not do.
Go to the top of the page
 
+Quote Post
The Jake
post Jan 30 2009, 05:55 AM
Post #34


Shooting Target
****

Group: Members
Posts: 1,849
Joined: 26-February 02
From: Melbourne, Australia
Member No.: 872



QUOTE (KCKitsune @ Dec 7 2008, 11:31 PM) *
I would say that the first line under Clusters would give you an idea (page 55 in Unwired for your reference):



That to me screams that you can run it as a Commlink.





That is if you are a paranoid hacker. Another way a hacker can do it is run maxed out Stealth, maxed out Spoof, and maxed out Encrypt.

Also who's to say HOW a commlink states its ID. I would think that a real hacker has his "MAC Address" (or whatever the hell they use in SR) erased and changeable every single run. In fact this is how I would see a hacker &/or every other member of a team prep themselves for a 'Run:

  1. backup the "Safe, normal citizen" MAC Address of their 'Links
  2. backup personal data to a data chip and leave it in a safe deposit box
  3. "flash" in the new false MAC Address into each 'Link
  4. change the registration ID of their OS and Firewall
  5. make sure both Encrypt AND Firewall are up to date
  6. make sure IC and Attack programs are up to date
  7. do the 'Run
  8. get to a safe place, unload paydata
  9. "flash" their links back to their "Safe, normal citizen" MAC Address
  10. change the registration ID of their OS and Firewall back
  11. lay low for a few days
  12. Profit



This is how we assume in my group it works, otherwise it becomes a game of Shadowrun: Accounting rather than Shadowrun the RPG.

Also, are there rules for cybersuites? Otherwise I'd love to create my various UniSol and T-800 Cybersuites.... (I've always wanted to play a street sam that can soak/heal fully automatic gunfire easily). (IMG:style_emoticons/default/grinbig.gif)

- J.
Go to the top of the page
 
+Quote Post

2 Pages V  < 1 2
Reply to this topicStart new topic

 



RSS Lo-Fi Version Time is now: 17th November 2025 - 11:59 PM

Topps, Inc has sole ownership of the names, logo, artwork, marks, photographs, sounds, audio, video and/or any proprietary material used in connection with the game Shadowrun. Topps, Inc has granted permission to the Dumpshock Forums to use such names, logos, artwork, marks and/or any proprietary materials for promotional and informational purposes on its website but does not endorse, and is not affiliated with the Dumpshock Forums in any official capacity whatsoever.