![]() |
![]() ![]() |
![]() |
![]()
Post
#276
|
|
panda! ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 10,331 Joined: 8-March 02 From: north of central europe Member No.: 2,242 ![]() |
so, if your trying to hit a fairly large target some distance away then passive targeting may well be the best solution. but when hunting metahumans its not so effective as the signature is to small?
|
|
|
![]()
Post
#277
|
|
Hoppelhäschen 5000 ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 5,807 Joined: 3-January 04 Member No.: 5,951 ![]() |
Keep in mind that Sensors in SR4 have quite limited ranges sometimes, though.
|
|
|
![]()
Post
#278
|
|
panda! ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 10,331 Joined: 8-March 02 From: north of central europe Member No.: 2,242 ![]() |
ah, noted. im going by feel here as i dont have the book :P
|
|
|
![]()
Post
#279
|
|
Moving Target ![]() ![]() Group: Members Posts: 445 Joined: 18-August 05 Member No.: 7,567 ![]() |
I'm copying and pasting a couple of questions I had about Technomancers from another thread here hoping I might get some answers :)
Reading the rules I actualy have a couple of questions concerning them, and actualy hackers. Wired matrixs. Maybe I'm missing a few things here (which is why i'm here) but unless technomancers get a datajack they can't access a wired network with their living persona? Or atleast thats the way it seems. I'm assuming with a comlink and trodes they could access a wired one...but not with their living persona? Its very confusing i think in that regard since the book itself does make reference to the fact that wired networks exist still and that they're there for security purposes (harder to get to) and or they're obsolete systems that haven't been updated. Another question I had was concerning SIN information and technomancers. SIN's bank acounts all that good stuff in 2070 is stored on your comlink at rating 5 encryption. But Technomancers have no inherent organic memory so how does this work with them? Especialy since it's elluded to in AAA sec zones they would get scaned and their sin checked. Anyways If anyone can answer those questions or point me to where I might find the answers I'd be much obliged |
|
|
![]()
Post
#280
|
|
Immoral Elf ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 15,247 Joined: 29-March 02 From: Grimy Pete's Bar & Laundromat Member No.: 2,486 ![]() |
As far as I know, Technomancers do not need anything extra to interface with the Matrix in any fashion.
As for the second question, there is nothing stopping a Technomancer from carrying a Commlink just for that purpose. |
|
|
![]()
Post
#281
|
|||
Mr. Johnson ![]() ![]() ![]() ![]() ![]() ![]() Group: Dumpshocked Posts: 2,587 Joined: 25-January 05 From: Berkeley, CA Member No.: 7,014 ![]() |
From the other thread: Back to Technomancers and SINs, a regular commlink doesn't necessarily have the actual information of the SIN stored on it (although it might). What it has is references to banks, ID databases, various different locations that constitute your identity (to use 20th century examples, your D/BMV driver's license, your passport, bank accounts, etc.). Whenever someone does an ID check, they aren't comparing against the information on your Commlink (that would be WAY silly)... they are comparing against the identity displayed by your commlink versus a handful (or perhaps a hundred, who knows?) other locations on the Matrix. |
||
|
|||
![]()
Post
#282
|
|
Moving Target ![]() ![]() Group: Members Posts: 445 Joined: 18-August 05 Member No.: 7,567 ![]() |
Actualy acording to sr4 they are on the comlink.
And Technomancers have no inate ability to access wired grids that are not connected to wireless ones. |
|
|
![]()
Post
#283
|
|||
Target ![]() Group: Members Posts: 34 Joined: 10-September 05 Member No.: 7,725 ![]() |
Though connecting a wired grid to a wireless one can be as easy as carrying an extra commlink and plugging it in. |
||
|
|||
![]()
Post
#284
|
|||||
Moving Target ![]() ![]() Group: Members Posts: 445 Joined: 18-August 05 Member No.: 7,567 ![]() |
and thats kinda what i was looking for...is that how it would work? it doesn't realy say in the BBB. That idea makes the most sense as far as i can tell. |
||||
|
|||||
![]()
Post
#285
|
|||
Mr. Johnson ![]() ![]() ![]() ![]() ![]() ![]() Group: Dumpshocked Posts: 2,587 Joined: 25-January 05 From: Berkeley, CA Member No.: 7,014 ![]() |
Typically, yes (SR4, p 259), but if that is the sum of one's identity, then the game would be pretty silly (as you could write just about anything in the identity that you wanted... in fact, if you spoof your datatrail, you probably do this as part of the action). But an ID is more than the encrypted information on the Commlink... see the very next page on p260, under Fake ID. I'm quite certain that as a technomancer you'd be able to spoof your access ID to "show" the information that is cross-referenced for the ID of your choice, including SIN and name and such when this information is requested. |
||
|
|||
![]()
Post
#286
|
|
panda! ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 10,331 Joined: 8-March 02 From: north of central europe Member No.: 2,242 ![]() |
most likely the comlink will only carry some choice bits of data about the persons SIN and credit status. the rest is off system so that you cross refrence the data given by the comlink with whatever database that carry the info you want.
want to check someones drivers licence? grab the SIN data of the comlink and then freed said sin into a national or regional database of people that have licences issued. want to id someone? any number of databases can be used. but the more of them you check the more sure you can be that the person is who he claims to be. ie, if both the drivers licence, credit and maybe social security database all give the same info then most likely its the truth. or it can be an elaborate fake identity. if you have maybe 2 or 3 of these sitting around, the only way to tell the real from the fake is by digging until only one keeps showing up. a shadowrunners best bet is to have one deep and 2-3 shallow fake ids, and either put the real one on ice or trash it alltogether. only problem is that with the latter option you risk being used as a guniea pig if you should be caught alive as you do not exist... |
|
|
![]()
Post
#287
|
|||||
Moving Target ![]() ![]() Group: Members Posts: 445 Joined: 18-August 05 Member No.: 7,567 ![]() |
That is correct. You hold all the SIN information with your bank accounts licenses ect there on your commlink. And the way I understand things acording to the way things are layed out in the BBB is that information is then crossreferenced and checked for validity ect. Alright anyways I'm gonna go back to my original question there. Because I don't think its been answered. On your comlink you store your personal info, sin, bank accounts, licenses, which are checked against the database when you're scanned. Technomancers are essentialy living commlinks, however they have no organic storage. So essentialy my question revolves around where do they store this information? Does it automaticaly come encrypted? Do they have to use a subscription slot to have this data be able to be transmited by their brain when they get scanned? I'll note that the technomancer sample char doesn't have any commlink which is what realy brought these questions up in my mind since its not explained anywhere in the stuff about technomancers |
||||
|
|||||
![]()
Post
#288
|
|
Moving Target ![]() ![]() Group: Members Posts: 909 Joined: 26-August 05 From: Louisville, KY (Well, Memphis, IN technically but you won't know where that is.) Member No.: 7,626 ![]() |
A technomancer doesn't need a comm to run his gear. If he runs into a security checkpoint that requests his ID there are 3 scenarios I see.
1. He's got it on a storage device in his pocket with his (fake) SIN data and his Resonance enabled brain ponies up the information as requested. 2. He decides to hack the checkpoint and make it ignore him 2a. He gets nabbed for hacking a security checkpoint. 3. He gets nabbed for not having ID. His brain can handle all comm tasks excluding data storage and wired/skinlink interface. All he needs is to keep a storage device (2070 version of the USB memory stick) in his pocket. |
|
|
![]()
Post
#289
|
|
Moving Target ![]() ![]() Group: Members Posts: 689 Joined: 16-September 03 From: Colorado Member No.: 5,623 ![]() |
Question on hacking. A hacker attempting to break into a node roll's his hacking plus Logic or appropriate program against what? My initial reading of the rules led me to believe that the firewalls rating was the threshold the hacker needed. Is this correct? I looked through the thread and did not see anything on this so if it has been answered already sorry.
|
|
|
![]()
Post
#290
|
|
Moving Target ![]() ![]() Group: Members Posts: 158 Joined: 4-August 02 Member No.: 3,064 ![]() |
It is.
|
|
|
![]()
Post
#291
|
|
Moving Target ![]() ![]() Group: Members Posts: 689 Joined: 16-September 03 From: Colorado Member No.: 5,623 ![]() |
Thanks Sapphire. I figured I had it right but wanted to double check as the matrix part of the game never caught my attention like other parts.
|
|
|
![]()
Post
#292
|
|
Technomancer ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Group: Retired Admins Posts: 4,638 Joined: 2-October 02 From: Champaign, IL Member No.: 3,374 ![]() |
There's actually a more complete answer (no offense, sapphire_wyvern ;)) because you can either hack on the fly or probe the target (both on p. 221). If you're using the probe the target rules, the threshold is System + Fireware for the extended test, but will get you backdoor into the system that you can exploit with a complex action at a later date. The back door might be fixed if security notices you using it, however, so it's still not fool proof.
|
|
|
![]()
Post
#293
|
|
The Dragon Never Sleeps ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Group: Admin Posts: 6,924 Joined: 1-September 05 Member No.: 7,667 ![]() |
It looks like there is little reason to not get both Commlink and Control Rigs installed, at least in terms of cyberware to install. I assume there are a lot of different skills involved.
|
|
|
![]()
Post
#294
|
|
The Dragon Never Sleeps ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Group: Admin Posts: 6,924 Joined: 1-September 05 Member No.: 7,667 ![]() |
I've been following these discussion with some interest. I want to get a feel for what a rigger/hacker can do in some common situations. In the folowing situations, I'd like to get an idea of what's feasible, and what kind of dice rolls might be involved.
Hacker is in the Mall, knows the target is shopping, but not exactly where. What can the Hacker do to track down the target in the Mall? Hacker is in street, and sees someone interesting. What does the hacker do to surreptitiously discover that persons identity? Hacker (w/control rig) is walking downtown, and is being followed by a drone. What can the Hacker do? Take over the drone? Spoof it so it follows someone else? |
|
|
![]()
Post
#295
|
|||||||
Mr. Johnson ![]() ![]() ![]() ![]() ![]() ![]() Group: Dumpshocked Posts: 2,587 Joined: 25-January 05 From: Berkeley, CA Member No.: 7,014 ![]() |
Data Search + Scan (p 220, 1st column, 4th paragraph). You may have to go full VR to "fly around" until you can find the person, especially in a large building like a mall (since AR typically only deals with things that are within your current vision).
Get the person's Access ID, then cross-reference it against known databases. Alternatively, if you can get the person's personal information (hacking into the commlink or whatnot), you can check that against databases. The database check is a standard Data Search + Browse Extended test, AFAIK, while the Access ID would be from a Matrix perception test (Computer + Analyze). If the Access ID is spoofed and doesn't check against anything, you may need to go off of different information and other, more specialized databases (up to the GM's discretion).
Either option is viable, especially if the drone is on "autopilot" (I'm not sure if there are rules for "contesting" the control of a jumped-in drone). You'd either use Spoof to run a different command on the drone (masquerading as the rigger) or "jump into" the drone and manually fly it elsewhere. You can also just simply cause the drone to shut down. However, you'll have to hack into it first, using Brute Force hacking unless you happen to also have a passkey for the drone.
|
||||||
|
|||||||
![]()
Post
#296
|
|
The Dragon Never Sleeps ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Group: Admin Posts: 6,924 Joined: 1-September 05 Member No.: 7,667 ![]() |
What happens to the rigger if you successfully jam against a jumped in drone?
|
|
|
![]()
Post
#297
|
|
Moving Target ![]() ![]() Group: Members Posts: 349 Joined: 16-January 05 Member No.: 6,984 ![]() |
Dumpshock, most likely
|
|
|
![]()
Post
#298
|
|||||
Moving Target ![]() ![]() Group: Members Posts: 112 Joined: 26-February 02 Member No.: 1,896 ![]() |
I thought you were able to open whatever nodes that you wanted in AR. Everything I've read seems to indicate that VR is just AR but faster and requires your body to go limp. Or were you referring to something else by "fly around"? |
||||
|
|||||
![]()
Post
#299
|
|
Mr. Johnson ![]() ![]() ![]() ![]() ![]() ![]() Group: Dumpshocked Posts: 2,587 Joined: 25-January 05 From: Berkeley, CA Member No.: 7,014 ![]() |
Right, but you aren't going to be seeing someone's commlink unless they are in your line of sight somehow (within range of your Commlink's signal, I suppose, would be more accurate). While you can get to any node in the world through AR, you have to know where to look first, and more often than not it is the physical location of the node (unless you happen to already have the Access ID of the person, which you can use for a Track function). Now, I suppose you can hack into the mall camera network and jump from cam to cam until you find your guy, then examine his commlink from a hacked drone. But if you can go VR, then it would be easier to simply hop from node to node virtually until you are within range of that fella ("flying around" so to speak).
|
|
|
![]()
Post
#300
|
|
Moving Target ![]() ![]() Group: Members Posts: 112 Joined: 26-February 02 Member No.: 1,896 ![]() |
But in AR you can still open windows to nodes, right? And you could still hop from one node to another just like you could in VR, you're just constrained to meat speeds, right?
If not, I must have missed something when I read through the Matrix chapter... :( |
|
|
![]() ![]() |
![]() |
Lo-Fi Version | Time is now: 12th March 2025 - 06:53 PM |
Topps, Inc has sole ownership of the names, logo, artwork, marks, photographs, sounds, audio, video and/or any proprietary material used in connection with the game Shadowrun. Topps, Inc has granted permission to the Dumpshock Forums to use such names, logos, artwork, marks and/or any proprietary materials for promotional and informational purposes on its website but does not endorse, and is not affiliated with the Dumpshock Forums in any official capacity whatsoever.