IPB

Welcome Guest ( Log In | Register )

 
Reply to this topicStart new topic
> How do sprites/agents get remote jobs done?
Valatar
post Dec 23 2009, 07:49 PM
Post #1


Target
*

Group: Members
Posts: 29
Joined: 21-October 05
Member No.: 7,871



If you have a spirit, you can tell it, 'Go to Mrs. Hendrickson's house down the street and set her cat on fire. Tibbles has used my tulip patch as a litter box for the last time!' And off it will float to go commit feline arson. No problemo.

But if you have an agent, and tell it, 'Okay Lassie, go get that girl's phone number out of her commlink!', it may bark and run off, but we have a problem. Whereas the spirit can just float right through Mrs. Hendrickson's house's walls to perform its dark deed, Lassie has to perform several specialized functions to hack the girl's commlink, search for the data, copy it, and deliver it back to its deranged stalker owner. This seems to put it outside the reach of smaller agents, and way outside the reach of sprites, in that a Data sprite can get the data but not break in, and a Crack sprite can break in but not get the data. Tell a Machine sprite to try to take over an opponent's drone and you'll just get a stupid look in reply; it has no CFs with which to do the job!

This is exacerbated by the fact that a system is a pile of nodes, each with security to deal with, like a hallway full of locked doors, and the tools for unlocking the doors are mutually exclusive from the tools to do anything when you've gotten past the door. You can't just send an agent to search for data for you once you're past a system's firewall; it'll walk into a data node, the local IC will say, 'Who're you?', the agent will say, 'I'd like that data please.', and the IC will reply, 'Frak you.' and melt the agent's face.

So I can only conclude that I'm missing something important here. The whole point of agents and sprites seems to be having a trustworthy little AI to handle side jobs while the hacker's dealing with the big stuff, but none of them actually seem equipped to handle even side jobs. If I have to hack a node, deal with the IC, decrypt a file, and defuse the data bomb before my agent can get the file, at that point I may as well have just picked the stupid file up myself and saved some time.
Go to the top of the page
 
+Quote Post
Jaid
post Dec 23 2009, 09:33 PM
Post #2


Great Dragon
*********

Group: Members
Posts: 7,089
Joined: 4-October 05
Member No.: 7,813



agents can use any programs you make available to them. i'm not sure why you see this as being horribly problematic. if you're just referring to the fact that low rating agents aren't going to be able to hack into everything as a trivial task, well... what's your point? you bought a cheap piece of crap, did you expect it was going to turn into some uberhacker? you want to break into regular security with ease, you need better than average agents to do it. (but really, even a rating 3 agent can probably hack the average girl's commlink without too much difficulty... just give it stealth and exploit, and make edit and browse available to it).

with sprites, you may need to use a combination, or a fairly high rating sprite. but they aren't really designed to replace the technomancer anyways. they're supposed to supplement the technomancer.

the solution is to (for example) use a crack sprite to get in, create an account for a data sprite, and have that sprite find the information you need.

for machine sprites, their job isn't to take over machines... it's to control machines you have already taken over.
Go to the top of the page
 
+Quote Post
kzt
post Dec 23 2009, 10:46 PM
Post #3


Great Dragon
*********

Group: Members
Posts: 5,537
Joined: 27-August 06
From: Albuquerque NM
Member No.: 9,234



QUOTE (Valatar @ Dec 23 2009, 12:49 PM) *
But if you have an agent, and tell it, 'Okay Lassie, go get that girl's phone number out of her commlink!', it may bark and run off, but we have a problem. Whereas the spirit can just float right through Mrs. Hendrickson's house's walls to perform its dark deed, Lassie has to perform several specialized functions to hack the girl's commlink, search for the data, copy it, and deliver it back to its deranged stalker owner.

That's not a deranged stalker. A deranged stalker would want her address, her alarm codes, the maglock codes to her place and her schedule. That doesn't seem to be any harder to get then her phone number.....
Go to the top of the page
 
+Quote Post
DireRadiant
post Dec 23 2009, 10:50 PM
Post #4


The Dragon Never Sleeps
*********

Group: Admin
Posts: 6,924
Joined: 1-September 05
Member No.: 7,667



Your sprite/agent/AI failings are that you view them in a sprite/agent/AI centric way. Take the poor node's point of view sometimes. It's sitting there running umpteen bazillion virtual cyberz rooms and there this teensy blip in of an authorized connection, that happens to be your Agent. Why should it care? The Agent is authorized, just like the umpteen bazillion processes it's got going. Those really important cyberz sessions of hot sim the node owner has going.

Your little spoof or exploit is not the only thing happening in the world.
Go to the top of the page
 
+Quote Post
Falconer
post Dec 23 2009, 10:52 PM
Post #5


Neophyte Runner
*****

Group: Validating
Posts: 2,283
Joined: 12-October 07
Member No.: 13,662



I think you underestimate the difficulties in sending out spirits as well.

The spirit comes from another metaplane. While highly intelligent, they're also reasonably ignorant.

They don't know who Mrs Hendrickson is, or necessarily what her cat looks like... you send the spirit to the location to torch a small animal and it may very well torch a rat doing her a favor. Generally you need to be able to provide a solid astral description of the target so that it knows the aura involved.


As far as an agent, once you've used your own software to identify the commlink via a sniffer program. You'd just set it off w/ instructions to break in and do whatever. The agent itself does not interact w/ the real world so has no idea which commlink it is unless you give it an address. Doing that requires you to use your own ewar/sniffer to give it targetting information. Not that hard IMO.

Generally when dealing with agents, just write up a simple 'script' type instructions.

Another case of above, would be ordering the agent to use the sniffer identify nodes in the immediate area, then tell you their locations. When it got to the girl it would have given you information you wanted, w/o even breaking in. (at least the commlinks ID... if not the login identity).


Go to the top of the page
 
+Quote Post
Tymeaus Jalynsfe...
post Dec 24 2009, 01:26 AM
Post #6


Prime Runner Ascendant
**********

Group: Members
Posts: 17,568
Joined: 26-March 09
From: Aurora, Colorado
Member No.: 17,022



QUOTE (Falconer @ Dec 23 2009, 03:52 PM) *
I think you underestimate the difficulties in sending out spirits as well.

The spirit comes from another metaplane. While highly intelligent, they're also reasonably ignorant.

They don't know who Mrs Hendrickson is, or necessarily what her cat looks like... you send the spirit to the location to torch a small animal and it may very well torch a rat doing her a favor. Generally you need to be able to provide a solid astral description of the target so that it knows the aura involved.


As far as an agent, once you've used your own software to identify the commlink via a sniffer program. You'd just set it off w/ instructions to break in and do whatever. The agent itself does not interact w/ the real world so has no idea which commlink it is unless you give it an address. Doing that requires you to use your own ewar/sniffer to give it targetting information. Not that hard IMO.

Generally when dealing with agents, just write up a simple 'script' type instructions.

Another case of above, would be ordering the agent to use the sniffer identify nodes in the immediate area, then tell you their locations. When it got to the girl it would have given you information you wanted, w/o even breaking in. (at least the commlinks ID... if not the login identity).


This ^^^^^^^

Agents are very useful in this regard... for simple jobs, even a rating 2-3 agent will work just fine... the higher end agents can be almost as competent as a true hacker, thoguh a little bit limited in its decision making processes, as they have no true intuition to draw upon...

Keep the Faith
Go to the top of the page
 
+Quote Post
Jaid
post Dec 24 2009, 05:30 AM
Post #7


Great Dragon
*********

Group: Members
Posts: 7,089
Joined: 4-October 05
Member No.: 7,813



QUOTE (Falconer @ Dec 23 2009, 05:52 PM) *
I think you underestimate the difficulties in sending out spirits as well.

The spirit comes from another metaplane. While highly intelligent, they're also reasonably ignorant.

They don't know who Mrs Hendrickson is, or necessarily what her cat looks like... you send the spirit to the location to torch a small animal and it may very well torch a rat doing her a favor. Generally you need to be able to provide a solid astral description of the target so that it knows the aura involved.


if you've seen the cat, should be pretty easy. you tell the spirit to find and destroy the cat. the spirit uses the search power (which shouldn't be too hard, the cat is probably not all that far away), locates the cat, and then nukes the crud out of it. *bamf*, service completed.

but otherwise, i agree.
Go to the top of the page
 
+Quote Post
Draco18s
post Dec 24 2009, 05:54 AM
Post #8


Immortal Elf
**********

Group: Members
Posts: 10,289
Joined: 2-October 08
Member No.: 16,392



QUOTE (DireRadiant @ Dec 23 2009, 05:50 PM) *
Your sprite/agent/AI failings are that you view them in a sprite/agent/AI centric way. Take the poor node's point of view sometimes. It's sitting there running umpteen bazillion virtual cyberz rooms and there this teensy blip in of an authorized connection, that happens to be your Agent. Why should it care? The Agent is authorized, just like the umpteen bazillion processes it's got going. Those really important cyberz sessions of hot sim the node owner has going.

Your little spoof or exploit is not the only thing happening in the world.


You're not viewing this from the sprite's perspective.

Hacker Sprite: "Copy? What's Copy?"
Data Sprite: "Spoof? Exploit? I can't reach the target."
Machine Sprite: "++?????++ Out of Cheese Error. Redo From Start." *

*Bonus points for catching the reference.
Go to the top of the page
 
+Quote Post
zeborazor
post Dec 24 2009, 06:04 AM
Post #9


Target
*

Group: Members
Posts: 66
Joined: 4-December 09
Member No.: 17,943



Not to derail this or anything but can someone explain sprites? Can a technomancer summon like a rating 10 sprite? Whats stopping them?
Go to the top of the page
 
+Quote Post
Valatar
post Dec 24 2009, 06:32 AM
Post #10


Target
*

Group: Members
Posts: 29
Joined: 21-October 05
Member No.: 7,871



QUOTE (zeborazor @ Dec 24 2009, 01:04 AM) *
Not to derail this or anything but can someone explain sprites? Can a technomancer summon like a rating 10 sprite? Whats stopping them?


The likelihood of failure and severe wounds. If a technomancer tries to summon above his resonance score, he takes physical damage for fading, just like a mage will take physical damage drain if they try to summon a spirit above their magic score.
Go to the top of the page
 
+Quote Post
zeborazor
post Dec 24 2009, 06:44 AM
Post #11


Target
*

Group: Members
Posts: 66
Joined: 4-December 09
Member No.: 17,943



And if I crash a node with a sprite in it what happens? Is it decompiled? Can a TM call it back to him? does he have to re-compile it?
Go to the top of the page
 
+Quote Post
Valatar
post Dec 24 2009, 09:44 AM
Post #12


Target
*

Group: Members
Posts: 29
Joined: 21-October 05
Member No.: 7,871



QUOTE (zeborazor @ Dec 24 2009, 01:44 AM) *
And if I crash a node with a sprite in it what happens? Is it decompiled? Can a TM call it back to him? does he have to re-compile it?


If the sprite's with the technomancer at the time, I think it's considered to be riding shotgun on his node and thus wouldn't be inconvenienced if the node the TM's standing in goes down. If it's off on its own, it would actually be loaded into the node it was visiting, just like a roaming agent, so dropping the node would kill the sprite. If it was a registered sprite, the technomancer could go on a quest to the resonance to retrieve it. If it wasn't registered, it'd just be gone.

That, at least, is my understanding of the rules.
Go to the top of the page
 
+Quote Post
Da9iel
post Dec 25 2009, 03:52 AM
Post #13


Moving Target
**

Group: Members
Posts: 556
Joined: 28-May 04
From: Moorhead, MN, USA
Member No.: 6,367



Of course if it wasn't registered and it's not riding shotgun with the technomancer, it's on remote service and will be gone when it's done anyway.
Go to the top of the page
 
+Quote Post
Jaid
post Dec 25 2009, 04:48 AM
Post #14


Great Dragon
*********

Group: Members
Posts: 7,089
Joined: 4-October 05
Member No.: 7,813



QUOTE (Draco18s @ Dec 24 2009, 12:54 AM) *
You're not viewing this from the sprite's perspective.

Hacker Sprite: "Copy? What's Copy?"
Data Sprite: "Spoof? Exploit? I can't reach the target."
Machine Sprite: "++?????++ Out of Cheese Error. Redo From Start." *

*Bonus points for catching the reference.



well, yeah, but funny story... a lot of people originally complained that sprites basically make the technomancer obsolete in terms of doing anything for themselves.

so your sprites aren't the greatest at doing things alone. put them in teams. nobody complains that a secure facility requires more than one shadowrunner to break into, and that's way more resources than sending 2 sprites.
Go to the top of the page
 
+Quote Post
Saint Sithney
post Dec 26 2009, 10:00 PM
Post #15


Runner
******

Group: Members
Posts: 2,705
Joined: 5-October 09
From: You are in a clearing
Member No.: 17,722



QUOTE (Tymeaus Jalynsfein @ Dec 23 2009, 05:26 PM) *
the higher end agents can be almost as competent as a true hacker, though a little bit limited in its decision making processes, as they have no true intuition to draw upon...


Can you install Fuzzy Logic circuits in a comlink? (IMG:style_emoticons/default/grinbig.gif)
Go to the top of the page
 
+Quote Post
Valatar
post Dec 27 2009, 10:09 AM
Post #16


Target
*

Group: Members
Posts: 29
Joined: 21-October 05
Member No.: 7,871



I was surprised to find out that the humble Courier can actually handle entering a node to find data on its own, if it's at least a 6 rating to allow for adding Browse and Exploit. All this time I'd skimmed over Courier without paying it much heed, thinking, "Why would I want to compile a sprite to ferry some data? They have this great thing called e-mail already." Well, turns out that the delivery boy sprite has the holy trinity of Stealth, Exploit, and Browse. Sleuth sprites do as well, but aren't accessible by the bulk of technos. So while I still wouldn't trust a sprite to hack an entire system for me, it seems that it is at least possible to send one to fetch lightly-defended stuff on its own.
Go to the top of the page
 
+Quote Post
Tymeaus Jalynsfe...
post Dec 27 2009, 07:14 PM
Post #17


Prime Runner Ascendant
**********

Group: Members
Posts: 17,568
Joined: 26-March 09
From: Aurora, Colorado
Member No.: 17,022



QUOTE (Saint Sithney @ Dec 26 2009, 03:00 PM) *
Can you install Fuzzy Logic circuits in a comlink? (IMG:style_emoticons/default/grinbig.gif)


Not sure... probably not though... it would be interesting if you could though...

Keep the Faith
Go to the top of the page
 
+Quote Post
Jaid
post Dec 28 2009, 04:17 AM
Post #18


Great Dragon
*********

Group: Members
Posts: 7,089
Joined: 4-October 05
Member No.: 7,813



QUOTE (Valatar @ Dec 27 2009, 05:09 AM) *
I was surprised to find out that the humble Courier can actually handle entering a node to find data on its own, if it's at least a 6 rating to allow for adding Browse and Exploit. All this time I'd skimmed over Courier without paying it much heed, thinking, "Why would I want to compile a sprite to ferry some data? They have this great thing called e-mail already." Well, turns out that the delivery boy sprite has the holy trinity of Stealth, Exploit, and Browse. Sleuth sprites do as well, but aren't accessible by the bulk of technos. So while I still wouldn't trust a sprite to hack an entire system for me, it seems that it is at least possible to send one to fetch lightly-defended stuff on its own.


well, you also need edit (IMG:style_emoticons/default/wink.gif)
Go to the top of the page
 
+Quote Post

Reply to this topicStart new topic

 



RSS Lo-Fi Version Time is now: 27th April 2024 - 03:04 PM

Topps, Inc has sole ownership of the names, logo, artwork, marks, photographs, sounds, audio, video and/or any proprietary material used in connection with the game Shadowrun. Topps, Inc has granted permission to the Dumpshock Forums to use such names, logos, artwork, marks and/or any proprietary materials for promotional and informational purposes on its website but does not endorse, and is not affiliated with the Dumpshock Forums in any official capacity whatsoever.