FrankTrollman
Jan 30 2007, 04:56 PM
QUOTE (Spike) |
I'm the new guy around here, but I'll weigh in.
Technomancers are 'broken' because they cost too much to play.
At a guess, you'll also see that when the Karma starts rolling in the TM starts to outstrip the hacker, since resonance isn't capped. |
I already addressed this exact point some time ago, so I'll just reprint it word for word. Since you're new, I'll assume you missed this discussion the first time around:
QUOTE (Frank) |
Technomancers, as printed, never stop being weak. Ever. The dicepool of the standard "Hacker Adept" will with relatively little Karma and money cap out under the basic game rules at 15 for hacking tests. (That's Skill 6, Improved Ability +3, and a Response 6 Commlink). That's as high as the Hacker Adept can ever get without resorting to improved systems from Unwired which has not been published.
Now the Technomancer is uncapped. Using only the basic rules, her dice pool can go as high as you want to think about. There is literally nothing in the Matrix that could stop a high-end Technomancer (even Sprites ae capped at Rating 8 because higher ratings don't persist long enough to be registered). But wait a minute, how much Karma are we talking? Well... a lot.
A character starts with probably at most 12 Complex Forms. To hack properly you need 18. To match the dicepool of our Hacker Adept we need to raise them all to Rating 9. To do that we need to Submerge ourself three times (42 Karma), actually upgrade Resonance 3 times (72 Karma), and purchase 12 programs from 6 to 9 (288 Karma) and 6 more programs from 0 to 9 (276 Karma). And thats in addition to buying the skill groups up to 6 from 4 like the Hacker Adept has to do (110 Karma). And while we've matched the dicepools, our matrix attributes still blow until we purchase all remaining mental stats up to 6 (probably about 132 Karma).
So yeeah, a Hacker Adept can max out all her Hacking by maximizing two skill groups (110 Karma), upgrading her Commlink (11,000 ), and buying up two points of Magic (21 Karma).
So for a mere 920 Karma a Technomancer who does nothing else in her entire life can match what the Hacker Adept can do on less than 150 Karma and a month's rent. After that, the sky is the fucking limit, the Technomancer is completely uncapped.
But you know what? Who gives a fuck? I have never ever seen a game where the players made 1,000 Karma before it was over, so the Technomancer is always going to be playing second fiddle to the Hacker Adept at the only thing she does - Hack. It's sad.
-Frank |
deek
Jan 30 2007, 05:22 PM
QUOTE (Serbitar) |
QUOTE ("SR4") | Every computerized electronic device—from commlinks to cyberware to vidcams to mainagents—has a set of basic at- tributes for use in certain Matrix interactions.
|
Conclusion: Everything is a node. A node is a CPU. You can run software on it. The node does not care at all what software it is.
You can not just invent stuff and say that it is obvious.
|
Serbitar, I want to first say that I have used pieces of your rules enhancements and respect your opinion on all this stuff, but I think that by not actually playing SR4 or better yet, trying to run a campaign, your perspective is skewed...at least compared to some of us that do play and have to manage these rules on a daily/weekly basis for our players.
Using the above quote, "for use in certain Matrix interactions," sticks out to me. I agree with you that everything is a node, but I don't agree that all nodes are equal. If you want to call it a houserule, fine... But I still think you need to take that into account...there is nothing that supports/defeats the claim that all nodes are the same and therefore all actions can be performed from them...
The examples of downloading music to your jacket...I assume you believe that that means everything electronic has storage capability...while I agree that ANYTHING COULD, I don't believe that means EVERYTHING DOES...maybe that's a fine line, but I think when you have to actually take the rules and pull them into a functioning gaming group, you have to "invent" stuff where the RAW is unclear or indecisive.
@Frank
Let me ask you this...what is your definition of access a device directly? And then define what your definition is of accessing a device with a program? To me, using your hacking a camera example, you would use Logic + Skill if you were sitting in the security control room, punching buttons and swiveling dials. That's direct access.
If you are in VR/AR, in any way, you are using your Program + Skill...and I think that is why they are both in the book...and to me, make sense.
And I think I have had it easy, because the hacker in the group I run for has their logic at 5, hacking and computer at 5 and all his programs at 5...
FrankTrollman
Jan 30 2007, 05:53 PM
Currently, I'm running 3 separate SR4 campaigns.
QUOTE (deek) |
Let me ask you this...what is your definition of access a device directly? And then define what your definition is of accessing a device with a program? To me, using your hacking a camera example, you would use Logic + Skill if you were sitting in the security control room, punching buttons and swiveling dials. That's direct access. |
Well, if you are manually operating and compromising the devices, you roll Logic + Hardware. That's clear.
But if you are hacking a device directly, you roll:
QUOTE (SR4 @ p. 223) |
When you are directly interacting with a device, make Hacking Tests using Hacking skill + Logic. |
I'm not talking about breaking a device open and fiddling with the contents, that's a hardware check. I'm talking about you having a direct wireless connection to the device and attempting to scam yourself an account in it - that's a Logic + Hacking test according to the rules.
And that means that programs are for suckers (except Stealth and ECCM).
-Frank
deek
Jan 30 2007, 07:13 PM
QUOTE (FrankTrollman) |
Currently, I'm running 3 separate SR4 campaigns.
QUOTE (deek) | Let me ask you this...what is your definition of access a device directly? And then define what your definition is of accessing a device with a program? To me, using your hacking a camera example, you would use Logic + Skill if you were sitting in the security control room, punching buttons and swiveling dials. That's direct access. |
Well, if you are manually operating and compromising the devices, you roll Logic + Hardware. That's clear.
But if you are hacking a device directly, you roll:
QUOTE (SR4 @ p. 223) | When you are directly interacting with a device, make Hacking Tests using Hacking skill + Logic. |
I'm not talking about breaking a device open and fiddling with the contents, that's a hardware check. I'm talking about you having a direct wireless connection to the device and attempting to scam yourself an account in it - that's a Logic + Hacking test according to the rules.
And that means that programs are for suckers (except Stealth and ECCM).
-Frank
|
Good to know, as that gives me a little more perspective of where you are coming from. I know Serbitar isn't actively in any, which sometimes explains the line of thought I perceive from him...90% of his ideas are solid, IMO, and I have used a lot of his matrix rules.
I am not talking about opening a device and fiddling with the contents though, but I agree, that is a Logic + Hardware. I'm talking about physically interacting with the device through its "legal" controls. I think that is the shade that the Logic + Skill, test is referring to, and still feel it is valid.
So:
Logic + Hardware is used when you have the cover off the security camera and you're fiddling with its internals.
Logic + Skill (in this case, Hacking, as you mentioned) is used when you are sitting behind the controls, switching cameras on the monitors (in a security room), hitting buttons and turning dials.
Computer + Program is used when you have an account, accessing the camera via AR/VR, and performing legal actions in the node.
Hacking + Program is used when you have an account, accessing the camera via AR/VR, and performing illegal actions in the node.
That is all RAW and makes sense, at least to me. I think there is an issue with the term hacking, as it really doesn't carry a negative connotation by definition. Hacking pretty much means "fiddling around in a way to learn more". So, someone that is "directly accessing" said camera controls from the security room, without training or so forth, would be "hacking", as they are figuring out how to zoom the camera, switch to view six, etc...
I mean, what good is a Stealth or Command program if you aren't accessing the camera from AR/VR? None. That is why if you are using the controls that are meant to access the camera, i.e. "direct access" by hand, then you would use that Logic + Hacking test...
hobgoblin
Jan 30 2007, 07:24 PM
QUOTE |
And that means that programs are for suckers (except Stealth and ECCM). |
hmm, script kiddies vs 1337
deek
Jan 30 2007, 07:35 PM
Slightly off topic, but the ironic thing here is, I actually use Serbitar's houserule to roll matrix tests as Logic + Skill, using Program Rating + 1 as the max number of successes allowed...I find that a much smoother system in-game and my players like it as well.
But for sake of this debate, I have stuck to RAW, which I don't actually use, in these instances...
FrankTrollman
Jan 30 2007, 07:36 PM
QUOTE |
Logic + Skill (in this case, Hacking, as you mentioned) is used when you are sitting behind the controls, switching cameras on the monitors (in a security room), hitting buttons and turning dials. |
Dude, there's totally a Hardware skill for that. If you are technically manipulating a device, you use the Hardware skill (p. 124).
Or to put it another way:
QUOTE (SR4 @ p. 224) |
Alternately, you can modify the hardware itself to supply a bogus code with a Hardware + Logic (2) Test. |
There really is a "Matrix Action" that calls for Logic + Hacking. It's described on p. 223. There's also a Logic + Computer test called for when "Doctoring up an image for blackmail purposes" or "Editing the logs to eliminate traces of your activities" (p. 218).
Really. It's a very major contradiction. As written if you just voluntarily decide to not use an Edit program, your dice pool has a tendency to go up.
-Frank
deek
Jan 30 2007, 07:51 PM
I understand what you are saying, but I think you are misunderstanding what I am trying to say...I don't think you would be using Hardware skill if you are using the camera's joystick to pan a camera...but anyways...
On page 218, under Using Computer Skill, if you're saying you would never use a "particular device" without utilizing a "particular program", then yes, it doesn't make sense to have two different tests. Personally, while not often, I can see where I would call for a Computer + Logic test (maybe using a fax machine, as the player may not be using an Edit program).
I guess it just comes down to individual tastes. If you are going to require every action requiring a program, than a Computer + Logic test would really never come into play.
Rotbart van Dainig
Jan 30 2007, 08:38 PM
QUOTE (Serbitar) |
Well, in this case the Agent is even better than skillwires, [...] |
Actually, this was the whole point of the example:
You realized that using skillwires and ordering an Agent are not equal concerning the rules.
hobgoblin
Jan 30 2007, 08:42 PM
i would say its a case of programs providing the AR and VR user interfaces for whatever actions you want to do.
only that in AR and VR any kind of action can be the right action (pointing at someone and gesturing as if the hand was a gun to launch a attack program).
but in the physical world your limited by how logical the layout of the physical buttons and switches are
Spike
Jan 30 2007, 09:13 PM
Frank: I'm responding to your somewhat dismissive post.
First, I'm not even going to get into the 'ADEPT' hacker right now. Neither am I going to talk about 150 karma in, I'm talking 'straight out the box'...where almost every player approaches character creation.
I can make a TM with 5/5/5/5, representing his mental attributes and resonance with a couple of points left over to boost his physical stats so he's not a total milquetoast. I can spend the same number of skill points as the box hacker (who has slightly more even stats, not needing the straight fives in mental) on the actual hacking skills (for my test bed, I used skill groups to four, but I could easily have broken it up and been a bit pickier about getting select skills to six), for hacking and electronics, and still had some points for the tasking group, which honestly taking decompiling is probably a waste, making it possible get more bang for the buck by leaving it out and just taking the skills (and specializations).
I'll dispute that a TM needs anywhere near 18 Complex forms. Unlike the hacker, the TM can thread a CF he doesn't have for low level applications, like 'command X'. I picked up 8 at level 5 and had 15 points for gear and contacts left over.
True, by the time the hacker, who it should be pointed out at this point is only running a 4/5/3/4 deck (by the book), though I went ahead and bought all his software to 5 (though, again, left off various command programs...) the TM is out of points, and the hacker has 90 BP left (figuring the same base 15 points for gear/conctacts BEFORE buying hacker hardware...) Those 90 points however can't really increase him much, though you could get Codeslinger etc., more likely he'll buy up edge, maybe a metatype, spread some points around for other skills (guns?) making him more of a generalist.
Now, in the final view, the TM is faster and more perceptive, not to mention more versatile with his threading and sprites, but he's a specialist. Of course, you can't take his gear away from him, and only another, rare, TM can attempt to spoof his sprites.
The hacker has the same raw ability but to start out he's weaker in the wireless world due to hardware limits and is more hampered when he doesn't have the right software loaded up.
In the long game, both players can improve roughly the same for a while. Extra dice? yeah, buy up the individual skill and get specializations. To catch up on hardware the hacker has to spend money on better gear, the TM needs to spend Karma... sort of like how a Sam needs better cyber while an adept/mage needs to spend karma. New CF's are dirt cheap (bought like knowledge skills) comparatively.
Neither character is uber specialized, though the TM is more specialized to hacking activities than the 'hacker', which makes sense, neh?
Now, your out of the box hacker adept? So, he's spending some of his 90 points on buying up magic, unless you mean a magic one adept, and sure, his dice adder boost is potent shit. It's a marginal concept if you ask me, and it opens a whole can of worms outside hacking. He's still dependent upon hardware, like the normal hacker, and when the other side's mages see he's adept (or the paracritters...) he's a target, where the TM isn't.
So, let's review: Hacking adept? Broken concept, and I think a marginal one. Call me crazy, but I've never seen anyone ever try it before. Out of the box the TM has the advantage over mundane hackers, and, as the mundane hacker gets the nuyen rolling in for better, custom gear, the gap closes, until we hit... much less than your 920 karma I suspect, where the TM starts Submerging and ignores the caps that keep the mundane hacker back.
So, the TM is weaker in the mid-range, but not excessively. That weakness in 'raw ability' is partially, if not completly negated by the abilities the TM brings that simply can not be matched by straight dice. No limits on numbers of CF forms running, vs program/system limits. Threading, scripting sprites... To make up your 'three point' bonus from being an adept all the TM needs to do is thread his CF's, and if the concentration penality is an issue, hand it off to a sprite for a few combat rounds.
Or do you need me to post the dice pools for all three 'out of the box' characters?
Serbitar
Jan 30 2007, 09:36 PM
QUOTE (Rotbart van Dainig) |
QUOTE (Serbitar @ Jan 30 2007, 06:18 PM) | Well, in this case the Agent is even better than skillwires, [...] |
Actually, this was the whole point of the example: You realized that using skillwires and ordering an Agent are not equal concerning the rules.
|
well, my whole point was to proove that agents are as good as skillwires. And skillwires are capped at 4 agents arent. Got the point?
Serbitar
Jan 30 2007, 09:37 PM
QUOTE (deek) |
Good to know, as that gives me a little more perspective of where you are coming from. I know Serbitar isn't actively in any, which sometimes explains the line of thought I perceive from him...90% of his ideas are solid, IMO, and I have used a lot of his matrix rules. |
???
I am playing SR every week for 5 hours.
Rotbart van Dainig
Jan 30 2007, 09:47 PM
QUOTE (Serbitar) |
well, my whole point was to proove that agents are as good as skillwires. |
Even that isn't the case - Agents are different from Skillwires.
For certain tasks they are better, and usless for others.
Serbitar
Jan 30 2007, 09:58 PM
Again, give one example when they can not do something skillwires can do.
Konsaki
Jan 30 2007, 10:02 PM
Agents can be attached to your commlink's personna or loaded to a node if you have the correct rights to do so.
No matter which way it is loaded, it uses Agent Rating + Program, with respect to the personna/node stats, to determine it's dicepool.
An Agent's dicepool has a max of 12 dice, with Agent Rating being and program both being Rank 6.
Agents CAN load and unload programs stored in its own programming.
Agents CAN NOT load other Agents.
Am I wrong about any of the last five lines?
This last stuff is some of my take on Agents and how they act in the Matrix.
IMO, Agents can be best described as Drones for the Matrix. They take the last command given to them and try to complete it to the best of their ability dependant on the programs they have loaded on them.
FrankTrollman
Jan 30 2007, 10:13 PM
QUOTE (Spike) |
I can make a TM with 5/5/5/5, representing his mental attributes and resonance with a couple of points left over to boost his physical stats so he's not a total milquetoast. |
Yes. You can make a Technomancer with a 5 in every mental attribute, leaving you enough points to have a 2 in every physical attribute. Congratulations. Also you can start with a Resonance of 6 and 10 Complex Forms at rating 6. Again, congratulations.
Now consider the BP you just spent. Now let's give a Hacker a Commlink with a Response and Signal of 5 and a System and Firewall of 6 (see p. 240, 321, and 96 of the basic book). Now let's hand out every single program in the basic book at rating 6. All of that together costs 121,160

- a sizable fortune. A sizeable fortune that sets you back all of 25 build points.
Has that sunk in? I just made a guy with bigger numbers than you in
everything for less BP than it cost you to get 5 complex forms.
And it only ever gets worse, because the Hacker can be an Adept. And the Hacker can have points left over to be a Face or a Street Sam. And the Hacker can get cyberware, and so on and so forth.
---
Really. This is a known balance issue. It's not up for debate, it's egg on the face of the initial design team of 4th edition Shadowrun.
-Frank
Konsaki
Jan 30 2007, 10:17 PM
QUOTE (FrankTrollman) |
QUOTE (Spike) | I can make a TM with 5/5/5/5, representing his mental attributes and resonance with a couple of points left over to boost his physical stats so he's not a total milquetoast. |
Yes. You can make a Technomancer with a 5 in every mental attribute, leaving you enough points to have a 2 in every physical attribute. Congratulations. Also you can start with a Resonance of 6 and 10 Complex Forms at rating 6. Again, congratulations. Now consider the BP you just spent. Now let's give a Hacker a Commlink with a Response and Signal of 5 and a System and Firewall of 6 (see p. 240, 321, and 96 of the basic book). Now let's hand out every single program in the basic book at rating 6. All of that together costs 121,160  - a sizable fortune. A sizeable fortune that sets you back all of 25 build points. Has that sunk in? I just made a guy with bigger numbers than you in everything for less BP than it cost you to get 5 complex forms. And it only ever gets worse, because the Hacker can be an Adept. And the Hacker can have points left over to be a Face or a Street Sam. And the Hacker can get cyberware, and so on and so forth. --- Really. This is a known balance issue. It's not up for debate, it's egg on the face of the initial design team of 4th edition Shadowrun. -Frank |
There is only two points in that where the TM comes out ahead. The fact that the TM's crap cant be taken away or destroyed and the other is Sprites... Never underestimate the power of those little buggers.
Still, I agree that TM's need some love to put them on better ground compared to the starting hacker.
Spike
Jan 30 2007, 10:41 PM
Frank-
Again with the rating 6/6/6/6 thing? Maybe I've had a different gaming life than you do, but the 'upgrade table' that you pointed to? yeah, I've met damn few GM's that would let a starting player go that route. Buy the listed gear and upgrade in game.
You can call it a house rule if you like. Sort of like D&D's 1's are critical failures for everything. It's a house rule, but one that a huge percentage of groups use, enough to be almost standard... almost.
And you still dismiss/ignore threading. You never even adress it. Straight out of the box that TM can potentially have a rating of 10 on his CF's, making his dice pool equal to the 15 of your hacker adept and completely raping the mundane hacker. That's just the Rating + Attribute, not counting any other factors into the pool.
I agree that TM's are pricier and harder to get useful across the board. I just don't think they are completely utterly shit compared to their counterparts, as you do. I still think your '920 karma in the hole' is completely over the top disingenious.
And we STILL haven't got into exactly what they can accomplish with their free sprites!
Of course I suspect you just skimmed part of my post. I gave nothing out at 6. If I did that, then the dice pool jumps to 17, bypassing your hacker. Sure, not every time, I mean, he's got to roll it, after all. And remember, unlike your adept, his dice pool will grow as he gets expirence.
Rotbart van Dainig
Jan 30 2007, 10:58 PM
QUOTE (Serbitar) |
Again, give one example when they can not do something skillwires can do. |
Concerning Matrix: Any defensive roll your Persona has to make is made by it's loaded Programs and your skill - Agents never even get to roll for you.
Concerning the rest... uh, well, about everything not covered by the very limited skillset of the Agent.
hobgoblin
Jan 30 2007, 11:00 PM
QUOTE (Serbitar) |
Again, give one example when they can not do something skillwires can do. |
for some reason i suspect that this argument could be used against any source of dice that do not require the character to have the actual skill and/or stat...
hmm, a SR medic kit anyone?
hobgoblin
Jan 30 2007, 11:04 PM
QUOTE (Rotbart van Dainig) |
QUOTE (Serbitar) | Again, give one example when they can not do something skillwires can do. |
Concerning Matrix: Any defensive roll your Persona has to make is made by it's loaded Programs and your skill - Agents never even get to roll for you.
Concerning the rest... uh, well, about everything not covered by the very limited skillset of the Agent.
|
err, i think serbitars idea was that the agent would be the only "persona" present in the host. it would have a subscription back to your comlink to take commands from you, but otherwise would be on its own.
kinda like having a soldier in the field being micromanaged by a general back at base

something tells me that comprehension tests should be in order
Serbitar
Jan 30 2007, 11:54 PM
QUOTE (Rotbart van Dainig @ Jan 30 2007, 11:58 PM) |
QUOTE (Serbitar) | Again, give one example when they can not do something skillwires can do. |
Concerning Matrix: Any defensive roll your Persona has to make is made by it's loaded Programs and your skill - Agents never even get to roll for you.
Concerning the rest... uh, well, about everything not covered by the very limited skillset of the Agent.
|
The persona is not there. Only the agent is out there, with you watching on a tramper, see what the agent sees in your home node. The persona is never in danger, only the agent is, which is obviously rolling its own defence.
Furthermore, agents ratings covera all skills used in the matrix.
Please tell me that those two are not your main objections I am wasting my time on. If this is really the case I will have to wonder whether it is useful to regard your reasoning in the future. At the moment it seems like you only disagree because you want to disagree.
@Hobgoblin: thanks, exactly.
Serbitar
Jan 30 2007, 11:57 PM
QUOTE (hobgoblin) |
QUOTE (Serbitar @ Jan 30 2007, 10:58 PM) | Again, give one example when they can not do something skillwires can do. |
for some reason i suspect that this argument could be used against any source of dice that do not require the character to have the actual skill and/or stat...
hmm, a SR medic kit anyone?
|
True, but nothing is as valuable and important as hacking, except magic.
And we all know that the "magic" agent, spirit of man with spells, is a problem itself.
Serbitar
Jan 31 2007, 12:00 AM
QUOTE (deek) |
The examples of downloading music to your jacket...I assume you believe that that means everything electronic has storage capability...while I agree that ANYTHING COULD, I don't believe that means EVERYTHING DOES...maybe that's a fine line, but I think when you have to actually take the rules and pull them into a functioning gaming group, you have to "invent" stuff where the RAW is unclear or indecisive. |
But it wouldnt be "indecisive" at all, when you would just give those devices a Response rating of 1 or 2.
You wouldnt have to worry about these things. Everything is just a node, and SR4 is designed with this in mind, for streamlining and simplcitiy, you can find that in allmost every part of the matrix chapter.
If response was independent from system, the ruleset would instantly gain a lot.
Serbitar
Jan 31 2007, 12:05 AM
QUOTE (FrankTrollman) |
Has that sunk in? I just made a guy with bigger numbers than you in everything for less BP than it cost you to get 5 complex forms.
And it only ever gets worse, because the Hacker can be an Adept. And the Hacker can have points left over to be a Face or a Street Sam. And the Hacker can get cyberware, and so on and so forth.
---
Really. This is a known balance issue. It's not up for debate, it's egg on the face of the initial design team of 4th edition Shadowrun.
-Frank |
QFT!
Serbitar
Jan 31 2007, 12:08 AM
QUOTE (Konsaki) |
There is only two points in that where the TM comes out ahead. The fact that the TM's crap cant be taken away or destroyed and the other is Sprites... Never underestimate the power of those little buggers.
Still, I agree that TM's need some love to put them on better ground compared to the starting hacker. |
You cant take away an implantet commlink. Make it delta and it will hardly show up on scanners.
TM Spirits are broken because there is no limit for services. Every TM will try and spend 100% of his free time to register sprites to make up for the lack of CFs.
There is a thread on DSF that discusses that. It actually proves (and its not me who does this) that a TM is only usable as a sprite registering machine.
Konsaki
Jan 31 2007, 01:42 AM
I wont disagree with you on that point, Serb. Even so, using that tactic they 'work' even though it isnt just like a hacker.
This is straight out of RAW too.
Like I've said in the past though, I would like to see TM love to get them on par with most of the other archtypes.
Rotbart van Dainig
Jan 31 2007, 06:18 AM
QUOTE (Serbitar) |
The persona is not there. |
That's a premise, which does not need to hold true.
In which case differences you asked for become obvious.
On the other hand, if it is true and you did not load the Agent into your Persona, it will be limited to the Enemy Node's rating and only as good as the IC, while when using skillwire, such limitations would not exist.
In that case, the benefit of using an Agent is only that you can save yourself time whith tossing a coin instead of rolling dice.
QUOTE (Serbitar) |
Furthermore, agents ratings covera all skills used in the matrix. |
Not Electronic Warfare. Which is only available as Autosoft for Drones.
It's fun to see how you stack up premises and go the extra mile to not admit how work by proxy is different from doing things yourself, though - especially since this is implicit.
Serbitar
Jan 31 2007, 09:16 AM
QUOTE (Rotbart van Dainig) |
It's fun to see how you stack up premises and go the extra mile to not admit how work by proxy is different from doing things yourself, though - especially since this is implicit. |
You still have not proven that.
Rotbart van Dainig
Jan 31 2007, 11:03 AM
QUOTE (Serbitar) |
You still have not proven that. |
I have.
You only accepted that when the result was better for the Agent than for Skillwires, though.
So let's make another example, which shows the opposite:
Skillsoft 4 + Program 6, run per Persona vs. Agent 6 + Program 6 - starting on Home Node with Device Rating 6, evading detection on a Proxy Node with Device Rating 3 and IC 3 + Program 3 and hacking the chained Target Node with Device Rating 3 OTF for user clearance.
Step-by-step:
Hacking Proxy Node:
10 dice for skillwires, 12 for Agents - both Tests uncritical as VR-probing is used.
Both Icons will enter the Proxy node most likely undetected, the Agent being potentially faster - though on average, both will need two hours.
Evading Detection on Proxy Node:
10 dice for Skillwire, 6 for Agent (Pilot & Program capped by Respones of Proxy Node) - 6 dice for IC.
However, inside the Proxy Node, the Agent is more likely to be detected by IC - in fact, it's 50:50.
Hacking Target Node:
10 dice for Skillwire, 6 for Agent - test critical as hacking OTF, 3 hits needed.
The subsequent hacking of the target node will take the Agent two turns on average, the Skillwires one - in which case the Agent is twice as likely to be detected by the Firewall than the Skillwires.
Conclusion:
The Agents performance degrades with the performance of the target network, removing any advantage derived from ratings.
PS: Using low Response Chokepoints, Agents loaded with more than one Program will have their effective Response dropped to 0, too.
Serbitar
Jan 31 2007, 12:13 PM
QUOTE (Rotbart van Dainig @ Jan 31 2007, 12:03 PM) |
Evading Detection on Proxy Node: 10 dice for Skillwire, 6 for Agent (Pilot & Program capped by Respones of Proxy Node) - 6 dice for IC. |
Wrong. The proxy node rating is only then relevant, when the agent is uploaded to and run by the proxy. It is not. It is still running on the hackers commlink. There is no need to upload it at all.
But finally I know why you think what you think. Thanks for clearing that up.
Rotbart van Dainig
Jan 31 2007, 12:29 PM
QUOTE (Serbitar) |
The proxy node rating is only then relevant, when the agent is uploaded to and run by the proxy. |
You got that at least that one.
QUOTE (Serbitar) |
It is still running on the hackers commlink. |
No. Agent's run either within the Hackers persona, and thus on his commlink (acessing every Node the Persona accesses), or, when running independently, on the node they are acessing right now.
QUOTE (SR4v3 @ p. 227, Agents) |
Agents use the Response attribute of whatever node they are run on; this means that the attributes of an agent operating independently may vary as it moves from node to node. |
That's the reason why this whole 'OMG, Agent Smith!!!111oneoneone' talk is based on nothing more than a mistaken interpretation of the rules.
Serbitar
Jan 31 2007, 12:38 PM
QUOTE (Rotbart van Dainig @ Jan 31 2007, 01:29 PM) |
No. Agent's run either within the Hackers persona, and thus on his commlink, or on the node they are acessing right now. |
Thats why the agent is running on the hackers commlink. The presence of the persona is irrelevant, it doesnt do anything anyways, the agent is doing everything. Relevant is where the agent is using the resources, thats where it counts toward the program limit, and where it is using the Reponse rating.
You dont really believe that an agent is hijacking system resourcets wherever he goes (even if he goes somewhere leaglly) and uploading himself to the node, while he could just be run by the commlink he originated and just interact with the other nodes like every software does, do you?
Of course you can do that, to free yourself from the impact on your CPU, if the target nodes allow it (or if the agent hacks the rights to load itself up every time) but you need not.
Please show me the part of the rules that say, that the agent has to go wherever the persona goes.
Rotbart van Dainig
Jan 31 2007, 12:47 PM
QUOTE (Serbitar) |
QUOTE (Rotbart van Dainig) | No. Agent's run either within the Hackers persona, and thus on his commlink, or on the node they are acessing right now. |
Thats why the agent is running on the hackers commlink. The presence of the persona is irrelevant.
|
Oh, no - in that case, you have an sitting-duck Persona on every System you 'command' your Agent - which you claimed isn't the case for your perfect matrix-skillwire-replacement.
Otherwise, like I said, the Agent wouldn't be able to make any defensive rolls for the Persona carrying him, but crashing together with her.
Wich basically makes that taktic very stupid.
QUOTE (Serbitar) |
You dont really believe that an agent is hijacking system resources wherever he goes (even if he goes somewhere leaglly) and uploading himself to the ndoe |
An independent Agent does that per RAW.
QUOTE (SR4v3 @ p. 227, Agents) |
Agents use the Response attribute of whatever node they are run on; this means that the attributes of an agent operating independently may vary as it moves from node to node. |
QUOTE (Serbitar) |
while he could just be run by the commlink he originated and just interact with the other nodes like every software does, do you? |
Only a Persona can do that.
QUOTE (Serbitar) |
Please show me the part of the rules that say, that the agent has to go wherever the persona goes. |
Please show me where the rules state that the Agent has a Persona at all.
Hint: They don't, but seperate between Persona, Agent, IC, Sprite and Program, especially for the purpose of Cybercombat.
To summarize:
There is neither a practical application for the Agent Smith scenario, nor is it allways possible to let an Agent subistitute for you Skills.
hobgoblin
Jan 31 2007, 12:52 PM
serbitar, page 227, the apart about using agents clearly (to me atleast) state that eithter the agent is loaded as just another program into the persona or have to be uploaded onto a external node to act independently.
its cant use a node as a home base and roam the matrix. it either has to jump from node to noe, or be surgically attached to a persona...
Serbitar
Jan 31 2007, 12:57 PM
QUOTE (hobgoblin @ Jan 31 2007, 01:52 PM) |
serbitar, page 227, the apart about using agents clearly (to me atleast) state that eithter the agent is loaded as just another program into the persona or have to be uploaded onto a external node to act independently.
its cant use a node as a home base and roam the matrix. it either has to jump from node to noe, or be surgically attached to a persona... |
If you interpret the rules that way, then Rotbart is right. Especially concerning his last post.
Now somebody has to tell me, why you can not run your agent on your commlink and just let it access other nodes but have to load it up to the node it just wants to interact with.
This would be completely insane.
Its like having to load your browser software onto the apache-server to look at the http content.
Rotbart van Dainig
Jan 31 2007, 01:01 PM
QUOTE (Serbitar) |
Now somebody has to tell me, why you can not run your agent on your commlink and just let it access other nodes but have to load it up to the node it just wants to interact with. |
Obviously - to limit them.
Which actually works too well, as long as there is no distinction between subscription and connection.
QUOTE (Serbitar) |
This would be completely insane. |
Do you finally understand why I'm complaining that even with the FAQ, ordering an Agent to search the Matrix creates a definition problem for the dice you roll on the extended test?
hobgoblin
Jan 31 2007, 01:04 PM
because the rules say so?
sure, there are no "logical" reason why one can not do so...
while its not spelled out anywhere, it seems that a independent agent simulates a persona, but does so by running itself on the node its currently interacting with or something like that.
it has all the stats of a persona. and it appears to have all the capability's of a persona. but unlike a persona it does not have a home node as its just another program jumping running on the node.
hmm, i think i have equaled a agent with a virtual node before. maybe i should have equaled it with a virtual persona
Rotbart van Dainig
Jan 31 2007, 01:08 PM
QUOTE (hobgoblin) |
hmm, i think i have equaled a agent with a virtual node before. maybe i should have equaled it with a virtual persona |
It's an Icon that is more like a virtual node - it count's a one Program to the Node, but runs multiple Programs on it's own System.
AFAIS, you can't directly hack a Persona, but must track back it's datatrail to it's home node.
Serbitar
Jan 31 2007, 01:09 PM
Well, i personally think once more that the matrix rules are screwed up beyond I dont know. The counter intuitiveness is a monstrosity beyond compare.
As a side note: Would you give your examples a little bit earlier next time and not after I asked for them 3-4 times? Would have helped a lot.
Serbitar
Jan 31 2007, 01:13 PM
QUOTE (hobgoblin @ Jan 31 2007, 02:04 PM) |
it has all the stats of a persona. and it appears to have all the capability's of a persona. but unlike a persona it does not have a home node as its just another program jumping running on the node. |
But why the hell can it acces other nodes (meaning interacting with them without being uploaded to the node) when connected to a persona, but it cant do this without a persona and must upload itself.
How can agents do searches at all? They need the right to upload themselves. Who in his right mind would give others per default the right to run their programs on their host?
INSANE!
I think Ill have to take a break or something.
Rotbart van Dainig
Jan 31 2007, 01:23 PM
QUOTE (Serbitar) |
How can agents do searches at all? They need the right to upload themselves. Who in his right mind would give others per default the right to run their programs on their host? |
Actually, this has been the case in SR3, 2 and 1.
hobgoblin
Jan 31 2007, 01:27 PM
QUOTE |
But why the hell can it acces other nodes (meaning interacting with them without being uploaded to the node) when connected to a persona, but it cant do this without a persona and must upload itself. |
because in the first instance the persona of the hacker acts as a kind of bridge?
there have been suspected since as long as i have hanged around dumpshock that the persona is a small bit of program running on the host/node your accessing.
also, a agent that keeps uploading itself from machine to machine is being envisioned IRL. yes its a security nightmare, but thats a different story. the best way to secure a node is to take it offline.
or if your really paranoid: unplug it from network and power, encase in concrete and depleted uranium. sink it to the bottom of the ocean at its deepest spot. post very well payed naval units over said spot. maybe then can you consider the data on the node secure.
i believe that said statement have been used about SR matrix rules since the days of SR1 (but i have no empirical evidence since i got into it post VR2.0)...
Serbitar
Jan 31 2007, 01:31 PM
QUOTE |
QUOTE (Serbitar @ Jan 31 2007, 03:13 PM) | How can agents do searches at all? They need the right to upload themselves. Who in his right mind would give others per default the right to run their programs on their host? |
Actually, this has been the case in SR3, 2 and 1.
|
And this makes it better?
Serbitar
Jan 31 2007, 01:35 PM
QUOTE (hobgoblin @ Jan 31 2007, 02:27 PM) |
because in the first instance the persona of the hacker acts as a kind of bridge? |
And you need a sentient being for that bridge? You cant just plug in the agent AI for that?
Very mystical . . .
QUOTE |
there have been suspected since as long as i have hanged around dumpshock that the persona is a small bit of program running on the host/node your accessing.
|
Why isnt the persona using the hosts attributes then (like an uploaded agent), but the commlinks?
Once I believed in consistency and streamlining . . .
Does anybody know some good yoga or such? I have this twitching in my right arm since your first post in this thread today.
hobgoblin
Jan 31 2007, 01:38 PM
never apply logic to SR rules, it will only lead to insanity.
hmm, come to think of it. chould SR rule books contain parts of the necronomicon?
Thain
Jan 31 2007, 01:50 PM
The Agent must run on the node for the same reason your persona needs to "enter" it. Hacking the matrix is a 'server-side' not 'client-side' process, essentially.
Shadowrun computers do not work like ours. They work like thirty-decade more advanced versions of what we thought computers would look like seventy years in the future fifteen years ago.
So, take 1980's computer technology (and more importantly, poplar cultures knowledge of 1980's computer technology) and "look forward" seventy years to 2050. Now, take the resulting tech, and advance it another 20-years.
The Matrix isn't based on Ars Technica whitepapers, it is based on Tron, Neuromancer, and the like.
Moon-Hawk
Jan 31 2007, 03:24 PM
QUOTE (Serbitar) |
QUOTE (FrankTrollman @ Jan 30 2007, 11:13 PM) | Has that sunk in? I just made a guy with bigger numbers than you in everything for less BP than it cost you to get 5 complex forms.
And it only ever gets worse, because the Hacker can be an Adept. And the Hacker can have points left over to be a Face or a Street Sam. And the Hacker can get cyberware, and so on and so forth.
---
Really. This is a known balance issue. It's not up for debate, it's egg on the face of the initial design team of 4th edition Shadowrun.
-Frank |
QFT!
|
It's also worth mentioning that with approximately 2-3 days work from said hacker, he will have cracked the copy protection on all of those programs, including the OS.
So every other member of the team only has to pay the 2-3 BP, or maybe one good run's worth of nuyen to have a commlink that's just as good.
Really, with how easy it is to copy programs I think it would be easier to just have commlinks cost a little bit more and roll attribute+skill for everything. Programs are barely worth including in the game at this point.
Hmmm, that idea may actually be worth some serious consideration. I'll have to think about that. It would definitely be more "streamlined". Maybe keep program names for keeping track of response degredation, but just losing rating and cost.
I'm going to stop, I'm spiraling into a wild tangent.
Serbitar
Jan 31 2007, 04:09 PM
QUOTE (Thain @ Jan 31 2007, 02:50 PM) |
The Agent must run on the node for the same reason your persona needs to "enter" it. Hacking the matrix is a 'server-side' not 'client-side' process, essentially.
Shadowrun computers do not work like ours. They work like thirty-decade more advanced versions of what we thought computers would look like seventy years in the future fifteen years ago.
So, take 1980's computer technology (and more importantly, poplar cultures knowledge of 1980's computer technology) and "look forward" seventy years to 2050. Now, take the resulting tech, and advance it another 20-years.
The Matrix isn't based on Ars Technica whitepapers, it is based on Tron, Neuromancer, and the like. |
This is not about technology (!!!), this is about consistency.
The persona is only interacting with the node, it is not running on the node (I know this for sure, because the persona uses the commlinks attributes, not the nodes it is interacting with). Why does the agent have to RUN on the node to interact with it?
And why CAN an agent interact with a node while loaded onto a persona, but CANT when not with a persona?
Consistency, not technology!
Do it either this way or that, but please be consistent.
Yours, Serbitar, spiraling down into madness, LUNACY, INSANITY.