What can I do with a hacked cyberarm |
What can I do with a hacked cyberarm |
Dec 15 2010, 02:21 PM
Post
#1
|
|
Neophyte Runner Group: Members Posts: 2,248 Joined: 14-October 10 Member No.: 19,113 |
If I managed to hack into the cyberlimbs of the maniac charging me with a braun cordless chainsword in one hand and ares crusader in the other what can I do?
On a similar vein can I put an agent or sprite into the cyberlimb complete with autosofts? |
|
|
Dec 15 2010, 02:52 PM
Post
#2
|
|
Moving Target Group: Members Posts: 172 Joined: 26-July 10 Member No.: 18,852 |
If the cyberlimb is not connected by DNI with the wireless access turned off they are crazy to start with. But if for some reason they have it slaved to their comms because they have a built in smartlink or scanner they need contact with then I would treat it a devise and use the command program to use the limb. It is not a drone so I do not think you can run it with autosofts. But sprites could command it to take actions like turn off, choke its owner and such.
|
|
|
Dec 15 2010, 02:58 PM
Post
#3
|
|
Running Target Group: Members Posts: 1,373 Joined: 14-January 10 From: Stuttgart, Germany Member No.: 18,036 |
Hit him in the face!
|
|
|
Dec 15 2010, 03:54 PM
Post
#4
|
|
Moving Target Group: Members Posts: 356 Joined: 3-April 10 Member No.: 18,409 |
I would think the wireless signals would be solely for diagnostics, and/or any internal gadgetry. So hitting the owner in the face with it might be right out, but shutting it down would be definitely in.
Then again, perhaps the diagnostics would include movement tests (flexing, extending, etc.). |
|
|
Dec 15 2010, 04:05 PM
Post
#5
|
|
Neophyte Runner Group: Members Posts: 2,248 Joined: 14-October 10 Member No.: 19,113 |
I am a little hazy about how cyberlimbs work, but I had always assumed that they operate by the same tech that makes VR and AR possible. Effectively the owned of the arm has "jumped" into their own body. If thats the case presumably someone else could jump in.
As I say I am not sure about this...as a GM though it would be cool to have a players arm be hacked (as suggested in Unwired), but I would be unsure how many die to roll. I am thinking something like: the arms agility + attack autosoft / skill wire/ hackers personal skill. The "in melee combat modifier" is almost certain to be relevant if a projectile weapon was held. |
|
|
Dec 15 2010, 04:08 PM
Post
#6
|
|
Runner Group: Members Posts: 2,899 Joined: 29-October 09 From: Leiden, the Netherlands Member No.: 17,814 |
Computer security in SR is a sad joke. No cyberarm meant for combat use should have wireless access. It's an unnecessary risk.
That said, suppose you do get access, you can do pretty much anything the arm can do. SR also doesn't really compartmentalize control, so if you control the arm, you control the arm. If it's holding a gun, you can put it to the schmuck's head. You can flail it about wildly to bring him off-balance. You can just shut it down. |
|
|
Dec 15 2010, 04:17 PM
Post
#7
|
|
Running Target Group: Members Posts: 1,113 Joined: 27-November 10 Member No.: 19,186 |
|
|
|
Dec 15 2010, 04:25 PM
Post
#8
|
|
Hoppelhäschen 5000 Group: Members Posts: 5,807 Joined: 3-January 04 Member No.: 5,951 |
A touchlink is there so you can suffer terrible torture with ease – like the sensation of having your skin stripped away by ants.
What you mean is a Skinlink, and no, it should not have that either. Cyberware can be internally connected – and it should, to the single node that has wifi and skinlink. |
|
|
Dec 15 2010, 04:48 PM
Post
#9
|
|
Moving Target Group: Members Posts: 352 Joined: 10-August 10 From: Madison, WI Member No.: 18,916 |
I'm still not sure about this either.
What can a cyber limb actually do? Diagnostics? Reboot? Shut Down? It's not like it's a completely separate drone on your arm. You couldn't detach it and throw it at somebody. The arm is controlled by the owner's meat brain, not a pilot program or a command program. Could you somehow get into someone's skillwires and make them forget math? There is an example in the core about hacking a gun in which they eject a clip, which is fine. One of the things a gun can do is eject clips. Am I wrong in thinking that diagnostics would be the only thing a cyber arm could actually do? How would a reboot or a shut down even work? |
|
|
Dec 15 2010, 04:55 PM
Post
#10
|
|
Running Target Group: Members Posts: 1,244 Joined: 2-August 07 Member No.: 12,442 |
Idk, probably a full combat turn to power down, then another full combat turn to reboot?
Depending on how you hacked it, you might be able to detact a modular limb. I'm sure you could drop whatever's in the hand of the cyberlimb. |
|
|
Dec 15 2010, 05:15 PM
Post
#11
|
|
Neophyte Runner Group: Members Posts: 2,248 Joined: 14-October 10 Member No.: 19,113 |
I am still struggling with the idea that the hacker cannot do everything that the main user can do. Basically the cyber arm has a set of motors and a set of sensors. There is a computer that reads the sensors and controls the motors. This computer is linked to the wireless system (if nothing else for running diagnostics). However if it can control the motors and read the sensors...then it can control the motors and read the sensors...i.e. do everything that the main user can do. I suspect I am bringing real life into this (I programmed robot control systems as a job for 14 years).
|
|
|
Dec 15 2010, 05:20 PM
Post
#12
|
|
Hoppelhäschen 5000 Group: Members Posts: 5,807 Joined: 3-January 04 Member No.: 5,951 |
The DNI is processed by a computer, so yes, with the Command software, you can control a cyberarm.
The problem is that you need some sensor of actually "seeing" what happens do to so for any complicated action – otherwise, you are pretty limited. |
|
|
Dec 15 2010, 05:27 PM
Post
#13
|
|
Running Target Group: Members Posts: 1,244 Joined: 2-August 07 Member No.: 12,442 |
Yeah, the problem is that while hacking, you can only issue/spoof one command at a time. So a multi-faceted and complex machine would be function as the primary user wanted to, with the exception of 1 very minor action per IP. So you could have to issue multiple commands per IP in order to control the should, biceps, and hand to try and choke the owner. But you could maybe effect the hand momentarily, forcing them to drop their gun.
|
|
|
Dec 15 2010, 05:28 PM
Post
#14
|
|
Running Target Group: Members Posts: 1,373 Joined: 14-January 10 From: Stuttgart, Germany Member No.: 18,036 |
for sure one can redline the arm
|
|
|
Dec 15 2010, 05:34 PM
Post
#15
|
|
Running Target Group: Members Posts: 1,244 Joined: 2-August 07 Member No.: 12,442 |
|
|
|
Dec 15 2010, 05:34 PM
Post
#16
|
|
Running Target Group: Members Posts: 1,244 Joined: 2-August 07 Member No.: 12,442 |
It would be funny to sniffer/scan a partially borged out NPC and discover a cranial bomb. That would be fun to hack....
|
|
|
Dec 15 2010, 05:36 PM
Post
#17
|
|
Hoppelhäschen 5000 Group: Members Posts: 5,807 Joined: 3-January 04 Member No.: 5,951 |
Yeah, the problem is that while hacking, you can only issue/spoof one command at a time. The Command Program is not used to Issue/Spoof Commands – there is in no extra software needed, at all. The Command Program allows you to "drive" a vehicle/drone/device with a virtual dashboard and controls. |
|
|
Dec 15 2010, 05:38 PM
Post
#18
|
|
Advocatus Diaboli Group: Members Posts: 13,994 Joined: 20-November 07 From: USA Member No.: 14,282 |
The book already says that external 'ware generally has the wireless off.
But that's not really the point: *if* you can gain access to a cyberlimb, you can make it turn off or reboot. You can't make any attack actions, because that's just unreasonable. I *know* Unwired suggests that you can, but it's just too crazy; you'd need LOS and a huge (-8, -10?) DP penalty for trying to use someone else's arm on someone else's body to attack from a completely foreign perspective. Anyway, see Unwired p102. -- Spoof Command uses Spoof (the program). Issue Command is a Simple Action, which is what I understood klinktastic to be referring to (correctly). |
|
|
Dec 15 2010, 06:30 PM
Post
#19
|
|
Target Group: Members Posts: 26 Joined: 20-September 10 From: Kraków, PL Member No.: 19,059 |
I think it should be treated as jumped-in-drone: no control possible, DNI trumps everything.
|
|
|
Dec 15 2010, 06:36 PM
Post
#20
|
|
Immortal Elf Group: Members Posts: 10,289 Joined: 2-October 08 Member No.: 16,392 |
Computer security in SR is a sad joke. Given that the OP managed to hack into a cyberarm while the owner of said arm was barreling down on him with a chainsaw.... Yes. Computer security is a joke and hacking cyberlimbs in this manner should result in a "No." from the GM. There's no reason, ever, that a hacker should be able to stop a cyber-monkey that quickly. It is of my opinion that "hacking active combatants" is one of the least effective things you can do. I mean, hell, it takes you an IP to scan for wireless nodes, plus one more to spoof a single command. Or you can go all out and waste 4 IPs to have complete control (I don't know about you, but taking 4 IPs worth of bullets to stop those bullets from continuing doesn't sound like a good trade). |
|
|
Dec 15 2010, 06:39 PM
Post
#21
|
|
Advocatus Diaboli Group: Members Posts: 13,994 Joined: 20-November 07 From: USA Member No.: 14,282 |
That's true: if you're going to allow this, then you have to also include the limitations and speed bumps. It's like complaining combat spells are overpowered if you houseruled that drain doesn't exist. (IMG:style_emoticons/default/smile.gif)
|
|
|
Dec 15 2010, 06:41 PM
Post
#22
|
|
Running Target Group: Members Posts: 1,083 Joined: 13-December 10 From: Rotterdam, The Netherlands Member No.: 19,228 |
Actually, the system "memorising" the instructions to a cyberarm's motor controls in subsets of 'scratch nose' would make sense for both data compression and movement fluidity.
I wouldn't find saying a cyberlimb's system could have some sort of 'body awareness' too much of a long shot. The long shot, in my book, would be that motor control system being accesible from any kind of wireless link. It shouldn't be slaved to a comlink, as it needs no electronic input (assuming normal nerve potential is used to control it, as opposed to DNI's general application to the central nervous system, which would make most sense, it being the 'natural way' to control a limb) for its motor functions to function. If it is wirelessly accesible for some reason, DNI should trump it indeed. I'd say you could access peripherals that work outside of a normal limb's motor control, through the Command program. As suggested, redlining should be one of those. Accessing diagnostic data should be a given. Again though, wireless accessibility should be none in most situations, or Signal 0 when it isn't. |
|
|
Dec 15 2010, 06:51 PM
Post
#23
|
|
Running Target Group: Members Posts: 1,244 Joined: 2-August 07 Member No.: 12,442 |
I believe in Unwired, p. 90 there is a reference to turning off cyberarms in the Jackpoint. The response is "Maybe, but probably not." Also, I think there's another part of the book that references hacking cybereyes, but allowing you to turn them off, or implant false imagines of them committing crimes (which you an later leak and get the 5.0 on them for).
|
|
|
Dec 15 2010, 06:55 PM
Post
#24
|
|
Advocatus Diaboli Group: Members Posts: 13,994 Joined: 20-November 07 From: USA Member No.: 14,282 |
As I mentioned: Unwired, p102.
|
|
|
Dec 15 2010, 06:58 PM
Post
#25
|
|
Hoppelhäschen 5000 Group: Members Posts: 5,807 Joined: 3-January 04 Member No.: 5,951 |
Of course, digital recordings do not constitute evidence anymore in Shadowrun, for the very reason.
|
|
|
Lo-Fi Version | Time is now: 29th March 2024 - 01:44 AM |
Topps, Inc has sole ownership of the names, logo, artwork, marks, photographs, sounds, audio, video and/or any proprietary material used in connection with the game Shadowrun. Topps, Inc has granted permission to the Dumpshock Forums to use such names, logos, artwork, marks and/or any proprietary materials for promotional and informational purposes on its website but does not endorse, and is not affiliated with the Dumpshock Forums in any official capacity whatsoever.