Cheops
Feb 9 2007, 09:39 PM
An agent can run dependently or independently.
As a dependent it is loaded just like you'd load any other program that you use. The agent then subscribes (communicates) with all nodes the hacker communicates with and has identical access that the hacker has. The agent may use any programs that are loaded onto the hacker's commlink (except agent programs) which then count against response limit.
As an independent it is loaded onto a node (any node) and runs from there. It subscribes (communicates) just as any other matrix user does (hacker, node, or drone) and must hack access or be given access to all nodes it enters. It can access multiple nodes at once and has its own matrix access ID. It can use any programs that it has loaded or that it can load from the node on which it runs. Whatever node it is currently active in determines it's response.
IC are treated as either dependent agents (loaded onto the host node) that only runs if an alarm is triggerd or as independent agents (in which case there is only a semantic difference between them and agents). Once an agent is running it follows whatever its orders are like a drone (which may include subscribing and accessing several nodes). All IC traces back to the host node.
kigmatzomat
Feb 9 2007, 09:42 PM
Cetiah,
The simple fact is that I believe the word "icon" means what the word "icon" means; a symbolic representation of something else, nothing more. I have not found anything in the SR4 text that gives an icon more meaning than that.
Target icons in matrix combat only refer to IC, agents and Persona because they are the only "active" objects on a system other than an OS, which can be crashed but not attacked. Passive objects (data files) can be deleted but do not require attacking them to destroy. It's not D&D, you don't need to whack the chest with the sword to break it. Use Edit and wipe the whole file.
cetiah
Feb 9 2007, 09:50 PM
I've made modification to the summary/conclusions above.
Thanks to kigmatzomat, I understand now that I need to EDIT the summary, not stab it with my knife. That saved me so much time.
Moon-Hawk
Feb 9 2007, 09:57 PM
QUOTE (Cheops) |
An agent can run dependently or independently.
As a dependent it is loaded just like you'd load any other program that you use. The agent then subscribes (communicates) with all nodes the hacker communicates with and has identical access that the hacker has. The agent may use any programs that are loaded onto the hacker's commlink (except agent programs) which then count against response limit.
As an independent it is loaded onto a node (any node) and runs from there. It subscribes (communicates) just as any other matrix user does (hacker, node, or drone) and must hack access or be given access to all nodes it enters. It can access multiple nodes at once and has its own matrix access ID. It can use any programs that it has loaded or that it can load from the node on which it runs. Whatever node it is currently active in determines it's response.
IC are treated as either dependent agents (loaded onto the host node) that only runs if an alarm is triggerd or as independent agents (in which case there is only a semantic difference between them and agents). Once an agent is running it follows whatever its orders are like a drone (which may include subscribing and accessing several nodes). All IC traces back to the host node. |
Thanks for summing up both sides, guys. I, for one, appreciate it, and I'm sure others do too.
I think this interpretation makes sense too. Yes, this makes agents a lot more like hackers, to the point where a good agent can actually be better than a mediocre hacker. I don't actually have a problem with that, but I certainly see how some people would.
In some ways it was easier before, when we had dumb frames, smart frames, agents, SKs, and AIs. At least then every program new their place.

Now we have one thing, Agents, trying to take the place of, well, which, exactly? Smart frames through SKs, I think. Dumb frames are gone, they only existed because of memory management concerns. Definitely not AIs. But maybe I'm stretching the SR4 agent too far by trying to include all of that.
cetiah
Feb 9 2007, 10:03 PM
QUOTE (Moon-Hawk) |
In some ways it was easier before, when we had dumb frames, smart frames, agents, SKs, and AIs. At least then every program new their place.  Now we have one thing, Agents, trying to take the place of, well, which, exactly? Smart frames through SKs, I think. Dumb frames are gone, they only existed because of memory management concerns. Definitely not AIs. But maybe I'm stretching the SR4 agent too far by trying to include all of that. |
I don't know what of this stuff is. My last shadowrun experience prior to SR4 was SR2 and that was years ago - I don't remember much from VR 2.0.
Smart frames? Dumb frames? SKs? I think I know what an AI is. Let me just ask you... which in your opinion is the closest analogy to a dog-brain drone? The designers wrote in the book that that was their design and intent and agents were supposed to be equivilent to drones. If they wanted them to be the equivilent of NPC hackers or to function as a replacement to an absent hacker, I think they would have said that instead.
Moon-Hawk
Feb 9 2007, 10:37 PM
QUOTE (cetiah) |
QUOTE (Moon-Hawk @ Feb 9 2007, 04:57 PM) | In some ways it was easier before, when we had dumb frames, smart frames, agents, SKs, and AIs. At least then every program new their place.  Now we have one thing, Agents, trying to take the place of, well, which, exactly? Smart frames through SKs, I think. Dumb frames are gone, they only existed because of memory management concerns. Definitely not AIs. But maybe I'm stretching the SR4 agent too far by trying to include all of that. |
I don't know what of this stuff is. My last shadowrun experience prior to SR4 was SR2 and that was years ago - I don't remember much from VR 2.0.
Smart frames? Dumb frames? SKs? I think I know what an AI is. Let me just ask you... which in your opinion is the closest analogy to a dog-brain drone? The designers wrote in the book that that was their design and intent and agents were supposed to be equivilent to drones. If they wanted them to be the equivilent of NPC hackers or to function as a replacement to an absent hacker, I think they would have said that instead.
|
Most similar to a dog-brain drone? That would be a SR3 smart frame. An SR3 dumb frame is mostly about memory management, and is more or less an obsolete concept in SR4. An SR3 Agent is similar to an SR3 Robot (which is a step-up from a drone's dog brain) There is either no SR4 equivalent, or a high rated SR4 agent could be the equivalent. I'm not sure which. An SK (semiautonomous knowbot) is something just shy of an AI. This probably goes beyond the scope of an SR4 agent.
Cheops
Feb 9 2007, 10:52 PM
I think it's probably more like a sliding scale.
SR4 Agent 1-3 is probably like a SR3 Smart Frame
SR4 Agent 4-6 is probably like a SR3 Agent
The difference in SR3 between the two was just capability. Agents were far more capable than a smart frame.
@Moon-Hawk:
A rating 6 agent definitely beats a hacker 3. But to me the way I presented it makes the rules for agents, hackers, drones, and IC the same so it is easier to use for me.
Dashifen
Feb 9 2007, 11:22 PM
QUOTE (cetiah) |
As for the souce code confusion, yeah, I original felt that way, too and handled things just like Dashifen does. In fact, I think it makes the game better. But strictly speaking, we have rules for Crashed programs. We know what happens when a program crashes and an agent is just like any other program. So my former interpreations and Dashifen's current one is against RAW, but a really cool house rule that I feel helps promotes game balance and gives hackers a view that they are "sticking it to the corps" whenever they trash a good piece of IC. |
Actually, I base my conclusion on the following quotation:
QUOTE (p. 223 SR4 under Crash Program/OS) |
Personas, IC, agents, and sprites may not be crashed -- they must be defeated in cybercombat. |
Thus, agent programs are an exception to the "normal" rules about crashing and restarting programs. What that difference means exactly is not explicitly stated other than that it means you have to defeat agent programs in cybercombat. Since we know that being defeated in cybercombat means that the icon crashes. What happens specifically to IC or an Agent when it is crashed, I think, is up to the GM; only for Persona is it explicitly stated the crashing a persona icon boots the persona, and thus the user, from the matrix.
I've decided that crashing an independent agent means that the agent is trashed. I'd probably allow a hacker to track a datatrail (with appropriate modifiers for redirect actions by the agent) to the location of the cybercombat and, maybe, find the crashed agent and with some software tests reconstruct it (sort of like recovering deleted files nowadays) but that would be handled on case by case basis.
I haven't decided, and it's never come up, what to do differently, if anything, when an agent is acting as part of a hacker's persona. I suspect that I would allow that agent to be re-instantiated by the hacker like any other program because said hacker has a direct link to the agent even after its crashed. It's only because the hacker isn't around to "save" the agent in the first scenario that the agent is lost.
Anyway, I pretty much subscribe to the interpretation that Cetiah posted above, for what it's worth.
cetiah
Feb 10 2007, 12:19 AM
QUOTE (Dashifen @ Feb 9 2007, 06:22 PM) |
QUOTE (cetiah @ Feb 9 2007, 04:38 PM) | As for the souce code confusion, yeah, I original felt that way, too and handled things just like Dashifen does. In fact, I think it makes the game better. But strictly speaking, we have rules for Crashed programs. We know what happens when a program crashes and an agent is just like any other program. So my former interpreations and Dashifen's current one is against RAW, but a really cool house rule that I feel helps promotes game balance and gives hackers a view that they are "sticking it to the corps" whenever they trash a good piece of IC. |
Actually, I base my conclusion on the following quotation:
QUOTE (p. 223 SR4 under Crash Program/OS) | Personas, IC, agents, and sprites may not be crashed -- they must be defeated in cybercombat. |
Thus, agent programs are an exception to the "normal" rules about crashing and restarting programs. What that difference means exactly is not explicitly stated other than that it means you have to defeat agent programs in cybercombat. Since we know that being defeated in cybercombat means that the icon crashes. What happens specifically to IC or an Agent when it is crashed, I think, is up to the GM; only for Persona is it explicitly stated the crashing a persona icon boots the persona, and thus the user, from the matrix.
I've decided that crashing an independent agent means that the agent is trashed. I'd probably allow a hacker to track a datatrail (with appropriate modifiers for redirect actions by the agent) to the location of the cybercombat and, maybe, find the crashed agent and with some software tests reconstruct it (sort of like recovering deleted files nowadays) but that would be handled on case by case basis.
I haven't decided, and it's never come up, what to do differently, if anything, when an agent is acting as part of a hacker's persona. I suspect that I would allow that agent to be re-instantiated by the hacker like any other program because said hacker has a direct link to the agent even after its crashed. It's only because the hacker isn't around to "save" the agent in the first scenario that the agent is lost.
Anyway, I pretty much subscribe to the interpretation that Cetiah posted above, for what it's worth.
|
There's no difference between a program or agent that is crashed independantly or a program or agent that is crashed when a persona is crashed. It works the same way.
Also, when an icon is defeated in cybercombat, it crashes. This can be found under section describing the "Matrix Condition Monitor". This crash is not a different kind of crashing than the standard method of crashing programs and OSes - cybercombat just becomes a necessary prerequisite to trash the program (instead of a crash action).
But the same rules apply for all crashed programs, agents, personas, and OSes, regardless of how they were crashed.
As for your quote, again, these quotes must be taken in context. "Personas, IC, agents, and sprites may not be crashed -- they must be defeated in cybercombat." It's talking about the Crash action. You can't perform the Crash Action - that doesn't mean the program doesn't crash. Under the cybercombat section it mentions that they crash when their condition monitor is brought down to 0. And another section talks about rebooting crashed programs. There's no contradiction here anywhere; the agent is not deleted after being defeated in cybercombat.
If you come back to hack a node an hour later, there will be just as much IC as there was before.
Dashifen
Feb 10 2007, 12:36 AM
So if a host is set to auto-restart crashed IC, does that mean that a hacker could never defeat it?
Or would crashed-then-restarted IC (and thus agents) restart in a "default" way? If yes, then I suspect the average IC is not defaulting to "Blitzkrieg" at all times and, thus, a crashed-then-restarted IC would go back to analyzing or other less active, for lack of a better term, actions.
I can see that, but then how do you resolve the Schroedinger's Agent problem? I think we agree that you shouldn't be able to restart Schroedinger's Agent (regardless of our reasoning) but if Schroedinger's Agent were to be crashed, does it respawn on its "owner's" commlink? If so, how does it know where the commlink is? How does the commlink know what happened?
What about the middle ground (and this also solves Schroedinger's Agent): agents crashed while operating as a part of a persona are not lost but independent agents are. A hacker can track an agent's datatrail to the node in which it was crashed to recover it, but if that datatrail is lost, deleted, spoofed, redirected, etc. and said hacker cannot find the resting place of said agent, then the agent is irrevocably lost. Clearly, if an independent agent is acting within the same node as the persona, then no tracking is necessary.
cetiah
Feb 10 2007, 12:47 AM
QUOTE (Dashifen @ Feb 9 2007, 07:36 PM) |
I can see that, but then how do you resolve the Schroedinger's Agent problem? I think we agree that you shouldn't be able to restart Schroedinger's Agent (regardless of our reasoning) but if Schroedinger's Agent were to be crashed, does it respawn on its "owner's" commlink? If so, how does it know where the commlink is? How does the commlink know what happened? |
Well... there is no respawn.
That contradicts the last statement of my previous post; I know. I shouldn't have wrote that.
Here's the deal. You encounter a piece of IC, you fight it in cybercombat. You defeat it, it crashes. That program now has to reboot. This takes a number of combat turns equal to the System rating of the IC's owner. Once that allotment of time has passed, the owner may load the program (using his persona) and load the IC into his persona or back into the node (if he still access to it). Without a persona to load the program, the IC can't be loaded back into the node.
This process of crashing programs is the same for IC as it would be for, say, an Edit program. It renders the program useless for a short time. The difference is that crashing the Edit program requires a Crash action and crashing the IC requires you to bring its Matrix Condition Monitor down to 0.
cetiah
Feb 10 2007, 12:50 AM
QUOTE (Dashifen @ Feb 9 2007, 07:36 PM) |
I can see that, but then how do you resolve the Schroedinger's Agent problem? |
Technically, "Schroedinger's Agent" doesn't exist within the rules. It only came up as a result of a house rule that said the agent can function independantly without requiring the owner to maintain an active subscription link to the agent; which the rules as written require.
FrankTrollman
Feb 10 2007, 12:59 AM
QUOTE (cetiah @ Feb 9 2007, 07:50 PM) |
QUOTE (Dashifen @ Feb 9 2007, 07:36 PM) | I can see that, but then how do you resolve the Schroedinger's Agent problem? |
Technically, "Schroedinger's Agent" doesn't exist within the rules. It only came up as a result of a house rule that said the agent can function independantly without requiring the owner to maintain an active subscription link to the agent; which the rules as written require.
|
That's only a house rule if you believe that you can maintain an active subscription while you aren't even on line!
QUOTE (SR4 @ p. 228) |
The agent will continue to operate in the Matrix even if your persona goes offline. |
If you believe that you can maintain subscribers while you aren't connected to the Matrix - then maybe you have a point. I find that assertion to be inane however.
-Frank
Pyritefoolsgold
Feb 10 2007, 01:33 AM
Howabout this: When "Schroedinger's Agent" is on a node, and that node is disconnected, the agent carries out whatever it's instructions were, and then waits around for a reconnect. The hacker who loaded the Agent gets a choice, when the agent goes offline, to either keep that subscription link "open" and unused, or to use it for something else. If he uses it for something else, then the Agent loses it's connection with him and becomes unrecoverable. If matrix access is later reopened, the agent may begin roaming about the matrix, as a "free agent"
FrankTrollman
Feb 10 2007, 01:52 AM
QUOTE (Pyritefoolsgold) |
Howabout this: When "Schroedinger's Agent" is on a node, and that node is disconnected, the agent carries out whatever it's instructions were, and then waits around for a reconnect. The hacker who loaded the Agent gets a choice, when the agent goes offline, to either keep that subscription link "open" and unused, or to use it for something else. If he uses it for something else, then the Agent loses it's connection with him and becomes unrecoverable. If matrix access is later reopened, the agent may begin roaming about the matrix, as a "free agent" |
How about this: that's exactly the Agent Smith debacle, except with extra paper work to keep track of. Since you can just keep popping out these "Free Agents" that you just made up ad infinitum, the goal is simply to give your infinity army advance commands such that they'll be useful for whatever it is you need them for.
Examples:
- Use Medic on any icon connected to this godforsaken node in the corner of cyberspace (congratulations, your persona now regenerates at the cost of one open window you don't even have to look at).
- Wait until high noon GMT and then hack yourself an account on my favorite corp node. When you get one, email it to my address (Helloooo DDOS Attack!)
- Follow the first commcode that is sent to this LTG and use the passcode sent with it. Then attempt to crash any icons there that aren't mine (Agent Smith army Assemble!)
In short, your plan is dumb.
-Frank
cetiah
Feb 10 2007, 02:06 AM
QUOTE |
That's only a house rule if you believe that you can maintain an active subscription while you aren't even on line!
QUOTE (SR4 @ p. 228) The agent will continue to operate in the Matrix even if your persona goes offline.
If you believe that you can maintain subscribers while you aren't connected to the Matrix - then maybe you have a point. I find that assertion to be inane however. |
Yes, you can maintain subscribers when you aren't connected to the Matrix (logged into a node). At this point, you don't have a persona because you are not using the Matrix - there's no interface. That doesn't mean you can't do things like make and recieve comcalls, send instructions to drones, keep subscription nodes open, or yes, access the Matrix if you want to. It's also possible to maintain a subscription with the Matrix when you aren't accessing it.
You keep taking words like access and connection way too literally.
And as I pointed out way back in the early portions of this thread, YOUR PERSONA IS NOT YOUR COMLINK. Just because your persona is offline doesn't mean your comlink is dead or completely cut off from the Matrix. Even when your persona is crashed, you are "disconnected from the Matrix" but that doesn't mean you can't immediately log back in again or that anything bizzare has happened to any of your subscriptions to other nodes, comlinks, drones, or agents. As someone pointed out earlier, this just means that you are simultaenously disconnected from all nodes and have no active persona icons anywhere.
So long as you have a valid signal, wireless activity is possible, your hardware is on and functioning properly, you have the right subscriptions open, and you aren't being jammed, you're fine as far as controlling your agents.
FrankTrollman
Feb 10 2007, 02:19 AM
QUOTE (Cetiah) |
Yes, you can maintain subscribers when you aren't connected to the Matrix (logged into a node). At this point, you don't have a persona because you are not using the Matrix - there's no interface. That doesn't mean you can't do things like make and recieve comcalls, send instructions to drones, keep subscription nodes open, or yes, access the Matrix if you want to. It's also possible to maintain a subscription with the Matrix when you aren't accessing it.
You keep taking words like access and connection way too literally. |
Huh.
Cetiah, we have nothing more to talk about. This conversation has gone on way too long, and has had way too many tangents. But if you seriously have gotten to the point where your perspective requires us to believe that you can access the Matrix while disconnected from the Matrix... I'm just going to declare victory and walk away.
I just beat you in the Platonic dialogue. Your position has revealed its fatal flaw: you have been forced to accept A and ~A to make your argument. I win, you lose.
Good bye.
-Frank
cetiah
Feb 10 2007, 02:24 AM
QUOTE (FrankTrollman) |
QUOTE | In short, your plan is dumb.
|
|
Frank, I am officially requesting that, as a matter of courtesy, you refrain from making any insulting personal judgements or evaluations (either stated or implied) about the people posting in this thread or their intellectual capacities. Feel free to insult people who want to argue with your posts directly or overtly disagree with you (because only an idiot would do that, right?) but do not insult people anymore for trying to come up with general ideas and express them for the community.
cetiah
Feb 10 2007, 02:34 AM
QUOTE |
I just beat you in the Platonic dialogue. Your position has revealed its fatal flaw: you have been forced to accept A and ~A to make your argument. I win, you lose. |
It's really not my fault you use different definitions of terms than what's listed in RAW. Here's how this conversation* breaks down from my perspective:
Cetiah: A is true because B is true.
Frank: No, B is actually this. Therefore B is not true, so A is not true.
Cetiah: Wait, that's not B though. A is still true.
Frank: We can therefore go on to say that B is actually A.
Cetiah: Wait, but lets get back to that B thing. B is true.
Frank: That's rediculous. B is this and therefore not true.
Cetiah: Not your B. Of course your B isn't true. The original B is true.
Frank: Since we've established that B is A, and B is not true, therefore A is not true.
Cetiah: Wait. The original B is true and therefore the original A is true before you changed B to make it not true and therefore A is true when B is true.
Frank: A is true when B is true? Rediluous. You're an idiot.
Cetiah: No, not your B! I meant the original A is true when the new non-original B is not true because the orignal B is still true.
Frank: You're talking crazy now. You're an idiot. I won.
* By this conversation, I mean between me and Frank. Some of the posts arguing against my point of view have been actually fairly accurate to RAW and logical.
QUOTE |
Cetiah, we have nothing more to talk about. This conversation has gone on way too long, and has had way too many tangents. |
Huh. Is this just a standard default "exit response"? Because it doesn't seem to apply to this conversation. Okay, the conversation is long... but so what? It seems pretty cohesive and relatively easy to follow, especially with the summaries posted up recently.
I may just be deluting myself here, but I actually think this conversation is useful to people and is progressing in a direction that will lead to a conclusive result - at least things seem to be more conclusive than they were when the topic was started. At least everyone who has taken sides on the issue has definite reasons now rather than vague interpretations and "it feels right".
But too many tangents? Really, this whole conversation has stayed on-topic pretty well. Tangents have been directed to their appropriate threads. I'm very proud of it and everyone involved - it's been a good discussion on both sides.
fistandantilus4.0
Feb 10 2007, 03:36 AM
I like tangents as much as the next guy, as long as the original issue has been addressed and it stays on an SR topic. But let's not waste space on arguing about arguing or little post shots, 'k?
Dashifen
Feb 10 2007, 04:03 AM
QUOTE (cetiah) |
Here's the deal. You encounter a piece of IC, you fight it in cybercombat. You defeat it, it crashes. That program now has to reboot. This takes a number of combat turns equal to the System rating of the IC's owner. Once that allotment of time has passed, the owner may load the program (using his persona) and load the IC into his persona or back into the node (if he still access to it). Without a persona to load the program, the IC can't be loaded back into the node. |
Alrighty, I can jive with that. I still like the concept of agents crashing means you need a new agent. I already feel like hacker's lack a limiting factor with respect to program ratings, and putting agents (and IC) at risk of destruction due to crashing in cybercombat helped hackers remain a little more conservative with their use. But SOTA house rules are for a different thread.
I'm rather satisfied with the way this turned out. Without offending anyone, I feel like the concerted defense of my position, while not changing anyone else's mind, has helped me understand more intuitively the matrix as it is described. Despite the point of view of others on that interpretation, it works for me.
fistandantilus4.0
Feb 10 2007, 05:11 AM
Sometimes just arguing your point helps you define your own thoughts better, so that makes sense. And besides,even if you don't agree with others, different view points are always a good thing. They give you more to think about and help refind a point of view. Me, I'm just glad someone's happy after 11 pages.
Pyritefoolsgold
Feb 10 2007, 05:32 AM
QUOTE (FrankTrollman) |
QUOTE (Pyritefoolsgold @ Feb 9 2007, 08:33 PM) | Howabout this: When "Schroedinger's Agent" is on a node, and that node is disconnected, the agent carries out whatever it's instructions were, and then waits around for a reconnect. The hacker who loaded the Agent gets a choice, when the agent goes offline, to either keep that subscription link "open" and unused, or to use it for something else. If he uses it for something else, then the Agent loses it's connection with him and becomes unrecoverable. If matrix access is later reopened, the agent may begin roaming about the matrix, as a "free agent" |
How about this: that's exactly the Agent Smith debacle, except with extra paper work to keep track of. Since you can just keep popping out these "Free Agents" that you just made up ad infinitum, the goal is simply to give your infinity army advance commands such that they'll be useful for whatever it is you need them for. Examples: - Use Medic on any icon connected to this godforsaken node in the corner of cyberspace (congratulations, your persona now regenerates at the cost of one open window you don't even have to look at).
- Wait until high noon GMT and then hack yourself an account on my favorite corp node. When you get one, email it to my address (Helloooo DDOS Attack!)
- Follow the first commcode that is sent to this LTG and use the passcode sent with it. Then attempt to crash any icons there that aren't mine (Agent Smith army Assemble!)
In short, your plan is dumb. -Frank |
Except that it's not. Because Free means the Agent doesn't listen to you anymore, it wanders off and gets lost in the matrix. This is what I think should happen whenever you have more agents than your subscription limit: they just go off, get lost, and never come back. If you really wanted the agent back, for whatever reason, you could keep a subscription slot open for it.
cetiah
Feb 10 2007, 06:16 AM
QUOTE (Pyritefoolsgold @ Feb 10 2007, 12:32 AM) |
Except that it's not. Because Free means the Agent doesn't listen to you anymore, it wanders off and gets lost in the matrix. This is what I think should happen whenever you have more agents than your subscription limit: they just go off, get lost, and never come back. If you really wanted the agent back, for whatever reason, you could keep a subscription slot open for it. |
I could see this being a source of lots of urban legends.

"An oppressive ganger and his girlfriend get into an intense physical martial-arts brawl and while they block eachother with weird jerky motions and do back flips for no apparent reason, their conflict takes place... on another level. They're hackers, and each of them has their agents trying to invade eachother's systems. Jaren with her blonde-haired persona sends wave after wave of IC agents invading her boyfriend's system.
Jaren's agents get tracked with IC that follows her to her home node while she breaks her boyfriend's arm and shatters his wristband comlink. The connection is lost, but the IC uses its black hammer to fry Jeren's mind.
And they say... ever since... it's been wandering the Matrix with its large hammer, looking for blonde haired female personas. Jumping from node to node on the hunt, systematically tracing every blonde haired persona it finds.
Hey, don't believe me, babe. I'm just saying... I would pick a different icon, if I were you."
Cheops
Feb 10 2007, 06:32 AM
According to the FAQs definition of Subscription versus Access I can jive with still being able to keep your subscription list, including an independent agent, when you get crashed.
A good analogy would be when subscribed to 3 nodes, an independent agent, and a drone. What happens to your subscription to the drone when you are dumped from the matrix?
According to the RAW in the FAQ subscription means communication. So you still communicate with the drone even after being dumped because you still have a signal/connection with the drone. Crashing doesn't knock it off your list.
I guess the question becomes: what exactly happens to you when you are crashed on the matrix?
ShadowDragon8685
Feb 10 2007, 07:19 AM
QUOTE (cetiah) |
QUOTE (Pyritefoolsgold @ Feb 10 2007, 12:32 AM) | Except that it's not. Because Free means the Agent doesn't listen to you anymore, it wanders off and gets lost in the matrix. This is what I think should happen whenever you have more agents than your subscription limit: they just go off, get lost, and never come back. If you really wanted the agent back, for whatever reason, you could keep a subscription slot open for it. |
I could see this being a source of lots of urban legends.  "An oppressive ganger and his girlfriend get into an intense physical martial-arts brawl and while they block eachother with weird jerky motions and do back flips for no apparent reason, their conflict takes place... on another level. They're hackers, and each of them has their agents trying to invade eachother's systems. Jaren with her blonde-haired persona sends wave after wave of IC agents invading her boyfriend's system. Jaren's agents get tracked with IC that follows her to her home node while she breaks her boyfriend's arm and shatters his wristband comlink. The connection is lost, but the IC uses its black hammer to fry Jeren's mind. And they say... ever since... it's been wandering the Matrix with its large hammer, looking for blonde haired female personas. Jumping from node to node on the hunt, systematically tracing every blonde haired persona it finds. Hey, don't believe me, babe. I'm just saying... I would pick a different icon, if I were you." |
Gives a new double meaning to the term "Ghost in the Machine", dosen't it?
Dashifen
Feb 10 2007, 06:17 PM
QUOTE (Cheops) |
I guess the question becomes: what exactly happens to you when you are crashed on the matrix? |
You are no longer subscribed to the node in which you were crashed?
cetiah
Feb 10 2007, 06:35 PM
QUOTE (Dashifen @ Feb 10 2007, 01:17 PM) |
QUOTE (Cheops @ Feb 10 2007, 01:32 AM) | I guess the question becomes: what exactly happens to you when you are crashed on the matrix? |
You are no longer subscribed to the node in which you were crashed?
|
I don't see why you wouldn't be subscribed. Subscription is a process on your end, isn't it?
I think you just wouldn't have access. You can still listen and send commands to the node all you want; but its ignoring you. Your pathetic commands bounce harmlessly off its firewall while the agent behind it taunts you in an outbrageous french accent.
I think you still maintain the subscription with the node or anything inside it, just fine. But if you want to access that node, you have to break in again... and its on alert.
kigmatzomat
Feb 12 2007, 03:03 PM
QUOTE (cetiah) |
Yes, you can maintain subscribers when you aren't connected to the Matrix (logged into a node).
|
This I kind of, sort of agree with. A subscription list is simply a list of nodes that you have established trust relationships with. For Joe WageSlave that would be his image-linked glasses, chording keyboard, earbuds, home trid, car, and office network. When any of those devices are either in range (direct connection like the glasses, earbuds, keyboard) or online (home trid, office network) Joe can connect to them.
Your subscription to a drone doesn't go away when the drone's batteries die, the connection is terminated. The same goes in reverse, you remain subscribed to remote hosts when your connection is dead but there is no connection to send/receive data.
It is an unadressed issue if you send an Agent off in independent mode and unsubscribe it. It's my opinion that once an agent establishes connection with it's owner's Comm and finds out it is unsubscribed that it automatically terminates. However if it can't reach the comm (owner is off-net due to power outage, sub-orbital flight, etc) to find out it is unsubscribed then it maintains itself indefinitely. At least, until whatever node is hosting it is shut down or an Admin notices an Agent that's been active for waaaay too long.
QUOTE |
At this point, you don't have a persona because you are not using the Matrix - there's no interface. That doesn't mean you can't do things like make and recieve comcalls, send instructions to drones, keep subscription nodes open, or yes, access the Matrix if you want to. It's also possible to maintain a subscription with the Matrix when you aren't accessing it.
|
Ummmm... no. If you are accessing the matrix, either AR or VR, you have a persona active on those remote hosts. Phone calls are simply connections to the regional grid, where you connect to the wireless backbone, thus your persona is connected to the LTG.
Same goes for commanding drones, you have a connection to the drones and thus your persona is on the drone CPU. Otherwise the process for spoofing wouldn't work, since you have to take a matrix perception action to analyze the controller's persona so you can try to emulate it and interject commands into the owner/drone data stream.
QUOTE |
You keep taking words like access and connection way too literally.
|
And you keep ignoring the actual meanings of words. We (frank & I) are literalists. You have a much more....liberal approach to reading comprehension. I am not as literal as a lawyer but that's because much of my work is mathematical, and math is inherently a more specific means of communication than english.
cetiah
Feb 12 2007, 07:25 PM
QUOTE |
Ummmm... no. If you are accessing the matrix, either AR or VR, you have a persona active on those remote hosts. Phone calls are simply connections to the regional grid, where you connect to the wireless backbone, thus your persona is connected to the LTG.
Same goes for commanding drones, you have a connection to the drones and thus your persona is on the drone CPU. Otherwise the process for spoofing wouldn't work, since you have to take a matrix perception action to analyze the controller's persona so you can try to emulate it and interject commands into the owner/drone data stream |
Hmmm. Interesting.
I agree with all of that.
QUOTE |
And you keep ignoring the actual meanings of words. We (frank & I) are literalists. You have a much more....liberal approach to reading comprehension. I am not as literal as a lawyer but that's because much of my work is mathematical, and math is inherently a more specific means of communication than english. |
Yes and no. I just think we are using the same terms in different contexts. When I look at a word like "access" for example, I try to interpret it based on the book's definition of access not the literal real world definition. I do this because I understand that the word was selected to be the closest approximation to communicate the basic idea behind the term in the context being used. Using the word "access" to describe the in-game mechanic effect of entering a remote node is better than inventing a whole new word for that process.
I think its unfair to take a term away from the context its being used, use it in a different context, and thus try to define meaning out of the way you choose to use words just because your more familiar with that context. Here's an example:
"Note that you can issue the same command to multiple agents, drones, or sprites at once with the same action; different commands, however require seperate actions." In this statement the words agent, drone, sprite, action, and command all are words that can be confusing if real-world contexts are applied to them instead of the in-game mechanics and description. Would it have been better to use different, new words instead so that you don't confuse the context? "Note that you can gerifohm the same pethrimat to multiple slhee, rhegnors, or kibiwites at once with the same peth; different gerifohm, however require seperate peths." I don't think that's an improvement.
Whenever any word is used in the game text, the internal context of the game text must be applied first and must supercede all other potential meanings and contexts of the word. This includes obvious things like personas, signal, agents, attack, etc. but also less obvious things like access, connection, trace, node, login, character, probing, reboot, issuing, crash, terminate, wireless, virtual reality, etc.
When discussing house rules I don't mind re-defining the context (which is often the purpose of my house rules) but for a RAW discussion the heirarchy of valid contexts is pretty much a given. You say that my definitions are more "liberal" but the exact opposite is true - I have less room for interpretation because I'm trying not to draw from material outside those strictly listed in the rules whenever possible.
QUOTE |
And you keep ignoring the actual meanings of words. |
If don't ignore the meaning of words. But if a given word has Definition A in real life and Definition B from the rulebook, then yes, for purposes of a rulebook discussion I am ignoring Definition A and going with Definition B.
kigmatzomat
Feb 12 2007, 08:39 PM
QUOTE (cetiah) |
QUOTE | And you keep ignoring the actual meanings of words. We (frank & I) are literalists. You have a much more....liberal approach to reading comprehension. I am not as literal as a lawyer but that's because much of my work is mathematical, and math is inherently a more specific means of communication than english. |
If don't ignore the meaning of words. But if a given word has Definition A in real life and Definition B from the rulebook, then yes, for purposes of a rulebook discussion I am ignoring Definition A and going with Definition B.
|
I agree that game definitions must supercede the real world. However I don't believe that new definitions should be inferred for words from implied context when the same text can be read in a fashion complying with explicit game terms and the common-usage definition. Further more, I believe that inferences should be used as little as possible when interpreting mechanics, especially if the inference would suggest diverging from existing rules if no divergence is specified.
Unfortunately, I believe that you are inferring definitions for game terms when it is unnecessary, and, when confronted with omissions of mechanics, making inferences that diverge from the existing mechanics.
I point out that the term "icon" is defined in the SR4 book in the sidebar Matrix Jargon as being a noun, meaning a graphical representation. You have inferred that an icon, in the specific case of an Agent, is in fact the Agent based on some contextual statements where the word "icon" could be parsed as "valid targets' graphical representation" without bothering to spell out all the valid targets.
You have inferred that Agents do not access remote systems the same way that hackers do, based on a single sentence and your inference about icons, despite the lack of any contextual material that says, explicitly or implicitly, there is a divergence between Agents and Hackers in this regard.
In short, you're building a house of cards based on the assumption that there will be no wind to knock it down simply because the big bad wolf is dead.
cetiah
Feb 12 2007, 09:14 PM
QUOTE |
I agree that game definitions must supercede the real world. However I don't believe that new definitions should be inferred for words from implied context when the same text can be read in a fashion complying with explicit game terms and the common-usage definition. Further more, I believe that inferences should be used as little as possible when interpreting mechanics, especially if the inference would suggest diverging from existing rules if no divergence is specified.
Unfortunately, I believe that you are inferring definitions for game terms when it is unnecessary, and, when confronted with omissions of mechanics, making inferences that diverge from the existing mechanics.
I point out that the term "icon" is defined in the SR4 book in the sidebar Matrix Jargon as being a noun, meaning a graphical representation. You have inferred that an icon, in the specific case of an Agent, is in fact the Agent based on some contextual statements where the word "icon" could be parsed as "valid targets' graphical representation" without bothering to spell out all the valid targets.
You have inferred that Agents do not access remote systems the same way that hackers do, based on a single sentence and your inference about icons, despite the lack of any contextual material that says, explicitly or implicitly, there is a divergence between Agents and Hackers in this regard.
In short, you're building a house of cards based on the assumption that there will be no wind to knock it down simply because the big bad wolf is dead. |
kigmatzomat, let me just start off saying this sums up our differing perspectives quite nicely, especially in context with the exchange before it. You are the first person who has ever told me what I am saying/doing/arguing on a forum while disagreeing with me and not misrepresenting me or my arguments (except for that last sentence of course). You have my sincere admiration. Wow.
I would like to contribute a little more detail to my (apparently 'flawed') position that should make your analysis complete: I do not assume relationships or comparisons are valid when none is specified and implied context can be infered otherwise. I'll even be so audaciously illogical as to assume that a real-world relationship/similiarity does not exist because I feel the implied context suggests that it isn't the case.
My heiarchy of importance: (for a strictly RAW discussion)
1) explicit rules
2) game considerations or gaming goals
3) internal consistency
4) implicit implications (sometimes based on 1-3 or simply infered through context)
5) lack of evidence otherwise
So yes, I will assume hackers and agents do not access remote systems the same way based on inferred contextual interpretation on a single sentence rather than assuming they do access remote systems the same way even though there is no evidence presented that they should other than drawing on outside references.
I also think that you are choosing to ignore a lot of what I and others have been saying. There has been much more evidence presented in this thread than just one sentence, but that evidence is no less inductive and based on inferred context. This does not invalidate the evidence since priorities #1-3 do not invalidate it and considerations from #5 do not have the authority to invalidate it.
kigmatzomat
Feb 12 2007, 10:24 PM
That sums up the big difference. Your base assumption rejects the current model of computer operation as being relevant, which eliminates a large number of common-usage defintions for common english words. Since the SR4 text lacks explicit definition for these terms, you are forced to infer definitions and do so in intentionaly disregard existing context.
IMO, that is comparible to rejecting the current lexicon of firearms and having to infer a new definition for "fire," "magazine," or "revolver." Both are equally integral to the game.
If this were a pure fantasy game (D&D, Earthdawn, RuneQuest) or a significantly alternate quasi-modern world (DragonStar) I'd accept a rejection of real-world models. However since SR4 is explicitly stated to be based on the "real world," at least until the 1990s, it is patently unwise to reject all current models of technology.
I would dispute that I miscategorized your position with the house of cards. You refute, in essence, any similarity to real-world weather conditions and those that exist within the game and, since it can be inferred that the big bad wolf is dead, assume that houses of cards will not be blown down.
cetiah
Feb 12 2007, 10:31 PM
QUOTE (kigmatzomat @ Feb 12 2007, 05:24 PM) |
I would dispute that I miscategorized your position with the house of cards. You refute, in essence, any similarity to real-world weather conditions and those that exist within the game and, since it can be inferred that the big bad wolf is dead, assume that houses of cards will not be blown down. |
...in RAW.

I fully permit and invite you to apply any form of meteorlogical modifications you wish to apply to your campaigns, or make suggestions for alternate models with which to add hurricanes and tornadoes to make the game more fun if you wish. I'd even love to help you do it.
But if we are using RAW as our only model for a hypothetical debate in which house rules were already excluded (by your side)... the the cards stand. And if you try to tell others that their ideas for building the house of cards are stupid because they are sticking with RAW rather than this week's weather report, then I will always help defend them.
I don't believe one has a right to belittle the other, insult them, or even state or imply that those people are wrong because they insist that the house of cards is safe according to RAW. According to RAW it is. You could persuade them that your model is better, but you can't tell them they are applying their model wrong because they aren't.
I know you aren't doing that here, kigmatzomat... but it's how this thread was started. And its why I ended up on the side I ended up on.
Crakkerjakk
Feb 14 2007, 02:21 AM
Okay, dipping my toe in the water for the first time here.
pg212, core rules
QUOTE |
In game terms, your persona maintains a subscription list of nodes that you are accessing and that are allowed to establish communication with you. The subscription list may be unlimited in size, but the number of nodes, agents, or drones that a persona may actively subscribe to (access) at any one time is limited to the persona's System x 2. |
(my emphasis added)
Doesn't this say that actively subscribing IS accessing? And I think that maintaining subscribers is separate from having them on a subscription list.
Has this been brought up yet?
Dashifen
Feb 14 2007, 02:22 AM
To a certain extent, kigmatzomat, isn't that what we do with firearms, though? The RAW works by abstracting the real world concepts into things that might exist 70 years from now. In keeping with our meteorological examples, I notice that in the real world, wind is a major problem for shooters when firing at long distance, but that the RAW have decided that this modification is not necessary to represent within our abstraction.
I completely ignore all real-world concepts with respect to any game understanding that the game's abstraction may redefine those terms. However, when the game's abstraction does not redefine those terms, it is only at that time that the real-world's context begins to apply.
Crakkerjakk
Feb 14 2007, 02:31 AM
However, Dashifen, range does affect accuracy, and it could be argued that a smaller target profile, combined with windage and elevation adjustments, are factored into the blanket dice pool penalty for range, could it not?
*EDIT*
Because I can't fricken' spell.
Cheops
Feb 14 2007, 03:42 AM
QUOTE (Crakkerjakk) |
Okay, dipping my toe in the water for the first time here.
pg212, core rules
QUOTE | In game terms, your persona maintains a subscription list of nodes that you are accessing and that are allowed to establish communication with you. The subscription list may be unlimited in size, but the number of nodes, agents, or drones that a persona may actively subscribe to (access) at any one time is limited to the persona's System x 2. |
(my emphasis added)
Doesn't this say that actively subscribing IS accessing? And I think that maintaining subscribers is separate from having them on a subscription list.
Has this been brought up yet? |
Yes I brought this up by referencing the FAQ but most people seem to be ignoring the FAQ in this argument:
"The act of subscribing is merely the act of creating and maintaining a connection between two nodes. Subscribing does not automatically grant access to a node (unless it happens to be a public all-access node) -- that is the purview of accounts. Subscribing is essentially the "handshake" that occurs between two nodes, a protocol check and very basic form of authentication so that each node knows it's connecting with the right other node."
Subscribing is not accessing. Your commlink can subscribe to an unlimited number of nodes but you may only access System x2. So I can have 1000 Internet Explorer windows open but only 12 of them will actually show me the website at any one time.
Crakkerjakk
Feb 14 2007, 04:11 AM
Cheops, I would respectfully disagree with you there. Your commlink can have a subscription list of 1000 nodes. I think it's a peice of terminology that should be kept thematically separate from subscribing. I would argue that in context, the act of subscribing is something that is actively done, while a subscription list is passive. A lot like a list of "trusted" sites that your firewall won't automatically restrict access to(access and firewall in the real world, not SR4 speak.)
As for the FAQ, in general I don't find it very helpful, as often times it seems to directly contradict the rules as they appear in the book, making it more of an errata than a FAQ. If you would like me to give some concrete examples of this, I'll try to dig em up. But for the time being I'm going to assume we agree that the FAQ is poorly named. In my personal opinion, I like the book when combined with the errata(flechette really needed that +5 to AP) but I find the FAQ one has to pick and choose.
However, even looking at the context of the FAQ text, I would say that when they say "subscribing" what they are describing is closer to the "active subscription" from the text than the "subscription list" portion. Do you agree with this?
Cheops
Feb 14 2007, 04:56 AM
Not to be a dick but the FAQ comes from the DEVELOPERS of the game. So any rulings or clarifications made in the FAQ, no matter how flawed or how much you dislike them, are OFFICIAL. And therefore RAW (Rules As Written).
In this case the FAQ is very clear as written.
I do like your distinction between subscription list and subscription. That makes it a little easier to understand how it works.
As for the FAQ description I don't agree with you. Here's an analogy. You show up at a party. At first you are in the doorway all by yourself. You make your way around the house saying hello to everyone. Eventually you have made your greetings and gravitate towards the room with the people you are friendliest with. You find a seat and start talking to the people around you. Over the course of the evening you change chairs, conversations, and even rooms until eventually you are back in the cloak room getting ready to leave.
Think of the entrance as logging on. Your icon then travels around to the different rooms (RTGs) talking (subscribing to various nodes). While you are at the party you are maintaining all the people on your subscription list. However, you are only accessing the people who are sitting next to you. You can talk to anybody in the room (or even the next) by shouting across the conversation at them. However, access to people at the party is easiest with those nearby. So you have access up to the number of people who are sitting next to you (determined by the size of your system).
The FAQ doesn't describe subscribing as anything more than just saying hello to each node. Subscribing is just a handshake.
With the description in the FAQ I'd take the line in the book "actively subscribe to (access)" to be a clumsier way of saying "you may only have access to system x2 nodes, agents, or drones at a time." Active subscription = access. Subscription does not = active subscription. Active subscription are the people you are actively engaged in conversation with. Subscription is just the people at the party. The FAQ gives the distinction.
It even goes so far as to define the difference between people you know and those you don't. That's what access is. You talk to someone you don't know (subscribe). You introduce each other and have some things in common. You begin to actively subscribe to that person. Access is granted because you both like the same things. Now you go and talk to the hot chick in the corner. You subscribe to her as you approach but she greets you icily. Access is denied. You can leave her on your subscription list and continue to recognize the fact that she is still in the room or you can completely ignore her and take her off you list.
Crakkerjakk
Feb 14 2007, 10:15 AM
Okay. So revised thoughts:
1) Subscription list- This is a list of nodes that you have encountered and decided it's okay for you commlink to attempt to access. Whether or not you actually are allowed to access it is a different story, but you have a list of nodes you know about. I imagine a similar parallel would be a list of IPs.
2)Actively subscribing- This is what I don't understand. I believe that when the developers say "actively subscribing" they mean exactly the same thing as " subscribing." Unless maybe they meant access, in which case they managed to muddle the waters mightily.
3) Subscription- The first step of accessing a node. As the FAQ states, it is the act of "creating and maintaining a connection between two nodes." Essentially, subscribing to a password protected node would get you to a login screen.
It seems to me that subscribing, actively or otherwise, can be done irregardless of the number of nodes your signal(whatever you want to call it, icon, persona, etc) has to hop through to reach the node you are subscribing to. From the text as I read it, especially considering the FAQ that says you don't need to hack every single node in a daisy chain, when you subscribe to a node, you're ignoring all the nodes in between you and it. Subscribing limits apply only in parallel, when you're trying to access multiple nodes at once(keeping four tabs open on firefox), instead of moving data(somehow) through a series of nodes to say, place a comm call.
The only way I can make all three variations of subscription work, in my mind, is if I say, "Subscription is the initial handshake process." and "Actively subscribing is accessing a node after having subscribed to it." However, if this is the case, you can only ever access something after you subscribe to it, so there is no difference between active subscription and access, except semantics.
And finally, the thing that really messes me up, is the part in the FAQ that says you
don't have to hack through every node in a daisy chain. In my mind, this somehow means that if I have some way of knowing the address, or access ID, or whatever it is that lets a node be on my subscription list, I don't have to hack my way past any ice on a corporate server except for the stuff on the node that has my paydata. Now, that CAN'T be right, yet it says that
FAQ, Hacking section
QUOTE |
This means that even if multiple nodes are daisy-chained together, each subscribed or slaved to the next, you don't need to hack/spoof them all in order to hack/spoof the last one -- you can go straight to the last node and attempt to hack/spoof it. |
My emphasis added.
So no matter how many firewalls I put in front of my supersecret prototype data, if someone can find whatever it is that allows me to add that node to my subscription list, I can hop right to it, bypassing all the IC and whatnot in between me and it, and only hack the one node. Obviously, I can put the node with my paydata in a room coated in wireless paint, but my impression was that Matrix runs tended to be a progression through a series of nodes.
Thoughts? What do you think of a) the difference between the three types of subscriptions b)the FAQ problem I'm having?
By the way, I'd like to thank everyone thats contributed to this and the many other posts about the matrix. I don't have a whole lot of experience with this aspect of the game, so it's nice to hear more experienced players argue out their thoughts. Never would ahve thought of the Agent Smith or Shroedinger's Agent problems on my own.
cetiah
Feb 14 2007, 10:39 AM
QUOTE |
So no matter how many firewalls I put in front of my supersecret prototype data, if someone can find whatever it is that allows me to add that node to my subscription list, I can hop right to it, bypassing all the IC and whatnot in between me and it, and only hack the one node. Obviously, I can put the node with my paydata in a room coated in wireless paint, but my impression was that Matrix runs tended to be a progression through a series of nodes. |
This is all correct. Basically, no matter what you are doing (unless its something really weird or you have a creative GM), you should never have to hack into more than one node to accomplish a given task. If you know what node the paydata is on, you can just login there directly.
This is a move away from previous editions where you had to login to multiple nodes concurrently, essentially creating what Garrwolf calls "NodeQuest", a sub-game which only involves the GM and hacker while everyone else goes to lunch or something.
If you want to protect paydata on this node, you don't "add more firewalls". You use a better firewall, you add plenty of IC on that node, and maybe add data bombs and encryption on the paydata. Anything more extreme than that will probably involve directly removing the node from the Matrix (requiring the hacker to be in Signal range) or having an actrive security hacker or ten monitoring the secure node.
kigmatzomat
Feb 14 2007, 02:49 PM
QUOTE (Dashifen) |
To a certain extent, kigmatzomat, isn't that what we do with firearms, though? The RAW works by abstracting the real world concepts into things that might exist 70 years from now. In keeping with our meteorological examples, I notice that in the real world, wind is a major problem for shooters when firing at long distance, but that the RAW have decided that this modification is not necessary to represent within our abstraction.
|
I agree. Abstraction is necessary for enjoyable gaming. You should know that IRL I am an engineer whose primary job function is hydraulic modeling; building simulations of real world pipe networks factoring in things like groundwater and rainfall as well as human usage. The devil really is in the details. For every extra factor you account for, your calibration process increases almost exponentially. For 95% of cases, you can ignore a wide swath of factors as being effectively constant. In those 5%, your hair turns gray as you slog through a massive matrix of potentially variable factors.
It isn't worth the effort to account for those 5% in detail. At worst, let the DM assign a -2 environmental penalty for particularly severe conditions.
QUOTE |
I completely ignore all real-world concepts with respect to any game understanding that the game's abstraction may redefine those terms. However, when the game's abstraction does not redefine those terms, it is only at that time that the real-world's context begins to apply. |
You may have summed up my position better than I did.
The game does define "icon" but not "access." Defining "icon" means they want to be sure the definition is clearly in relation to the game. Applying any additional meaning to "icon" beyond the explicitly provided in-game one or even beyond common usage, is specious reasoning.
Likewise, assuming that term "access," which is undefined in game terms, is other than common usage when common usage definitions will function within the given context is also specious.
Cheops
Feb 14 2007, 03:50 PM
@kigmatzomat:
I believe you are correct that access = active subscription and the only difference is semantics.
I like the fact that you only ever have to hack one node now. The NodeQuest got fairly tedious and turned lots of people off the Matrix. The way I run security now is linking matrix to physical and focusing more on detection of active runs than on prevention. If security can detect the hacker they can track to his source and deal with it that way. Black IC is now fairly common in my games. 4000 nuyen gets you Blackout 4 and a -2 threshold to your track attempt.
@cetiah:
Another good measure are agents that monitor passcode lists and cross-reference with working hours lists. If any new passcodes are added or if it detects a log-on by a user that doesn't normally log in at that time it alerts a spider who can take appropriate action like tracking.
Cheops
Feb 14 2007, 06:06 PM
To Extend my example:
The House is the Host's persona. Firewall is the door, response are the corridors, signal is the size of the house, and system is the size of each room. The host moves around the party entertaining his guests and is thus more "mobile" than most of his guests who stay in relatively the same room (RTG) all night (like nodes).
Over the course of the night he finds that his child (agent) has snuck down to see what's going on. The host has two choices: send the child back to bed (don't use) or let the child stay up (load the agent). In this case the host lets the child stay up but tells the kid to stay near him (loads the agent to his persona). The child gains a subscription list of all the guests and actively subscribes = accesses all the guests that its father also accesses.
Later in the evening the host orders the kid to go around and refill all the bowls of chips (makes the agent independent). NOTE THAT THE KID IS STILL IN THE HOUSE (COMMLINK). However it is now operating independently although still loaded onto the hacker/host's commlink. The kid now goes from room to room refilling chip bowls.
However, whenever the kid goes into a room (RTG) to access the chip bowl (targeted icon) he has to converse with the people around the chip bowl (access different nodes to get at the target icon). The kid is now engaged in a conversation with multiple guests while he refills the chip bowl. How fast the conversation is (response) depends on how fast the guests are asking it questions (response of the accessed nodes).
EDIT: If the agent were not allowed to operate on multiple nodes as the other side of this debate asserts then the child would only talk to one guest at a time -- ignoring the others until he was finished with the current one. I don't think that's the way it was meant to work.
Eventually the child refills all the chip bowls and returns to the host (hacker). The host now decides that it is way past bedtime so he takes the child to bed (unloads the agent). The host now returns to the party.
Crakkerjakk
Feb 14 2007, 06:50 PM
Okay, back to the subscription thing. If Actively subscribing=access, and subscribing = initial handshake process, then how can one be subscribed in any way to an agent when one isn't online? I'm okay with being able to do stuff with your commlink when offline, but nothing that we can't do currently with no connections to outside computers. I mean, you wanna dictate a document, check you address book, or listen to some music you downloaded, no problem. But maintaining a connection to something else, even if it's with no nodes between you and the connection, both of you just using your own wireless range, you have to be online to do that. My laptop has a little switch on it. I slide the switch one way, it disconnects my wireless antenna and I can't access anything. In my mind, that is "offline."
I'm also okay with being able to pick connections back up when you hop back online. But I don't see how it's possible, or where it's indicated in the text, that you can maintain a subscription(not a subscription list) while offline.
Cheops
Feb 14 2007, 10:29 PM
When you are completely offline, no you probably can't maintain your subscriptions anymore. Basically you're logged off of everything (in the deepest darkest jungle or behind 3m of jamming paint).
However, the book does make a distinction when it comes to logging off and jacking out. You can jack out and still be connected to everything. Basically your persona is still there but it is motionless and does nothing. Everything still works but may start to time out or disconnect. Logging off is what actually signs you out of a node. To get completely off-line you'd have to take a simple action to log off of each accessed node. Presumably you also have to "turn off" you subscription list too but it doesn't give rules for this. I'd say probably a single simple action would sever the connection to all of you subscription list of inactive nodes.
cetiah
Feb 14 2007, 11:36 PM
QUOTE ("Cheops") |
@cetiah:
Another good measure are agents that monitor passcode lists and cross-reference with working hours lists. If any new passcodes are added or if it detects a log-on by a user that doesn't normally log in at that time it alerts a spider who can take appropriate action like tracking. |
This is the kind of stuff Garrowolf brings up a lot - that the system should just know certain things about you like what passcodes you're using and whatnot. However, I don't think you could/should actually do this in the Matrix. Determining that you are using an access ID that shouldn't be accessing the computer at that moment still requires a successful Matrix perception test against the icon. There is no "master list" of everyone logged into the node by default Matrix rules. If you want to include this "master list" as a function of a node within an individual game, that's a cool effect to give a little more life and flavor to some of the nodes but be aware that this has many more uses to hackers than it does to security. My players would love to have master lists like these lying around in a node waiting to be hacked, read, or modified.
Basically what you are describing could be interpreted within the game as a piece of IC that successfully analyzes your icon. Instead of (or in addition to) attacking you, it runs off to find a security hacker or a gang of IC buddies. Or a general alarm. The effects could all be different but the cause is roughly the same. And adding more IC will make it more effective.
Cheops
Feb 14 2007, 11:49 PM
p. 216
"Every time you are online...your presence is logged. Every device, terminal, and wired jackpoint has a unique serial number assigned by the manufacturer.... This access ID is associated with all your online transactions and typically logged by any device you access. This record is called your datatrail..."
It says right there that everything you access keeps a log of your aID when you access it (presumably not when you inactively subscribe).
p. 225 Hackers and Editing
"Note that many hackers use their Edit program to eliminate any records of their tampering or illicit activity on a node."
So the datatrail also includes all activities taken on a system.
So every month make a list of who was on at what time matched to their aID. Corporate HR has a list of all employees with associated aID's (could even have an office and a home aID for each employee so they can telecommute). Match the two and voila! A list showing which employee is accessing at what time from what terminal. If Joe Blow has worked there for 6 months and never logged on at 2 am then it is a safe bet that it is worthwhile to have the spider follow up and ask him about that.
The agent basically sits there watching the Edit logs and cross checking with the aID list. Red flags are reported to the spider. This should be a relatively easy thing for an agent to do since I imagine most reconciliation work is probably done by agent with a human accountant verifying the final result.
Crakkerjakk
Feb 15 2007, 01:17 AM
I would say that circumventing all the various clever tricks like having an agent monitoring the access logs are covered with the simple hacking roll and your stealth program. If we take the view that program rating are not constant, and that software is improving over time, then we have to admit that a rating 6 (or even 7, hot hot hot) programs is cutting edge stuff. They already thought of this, and it's already included in what the program does, be it a spoof, stealth, analyze, etc.
If you keep coming up with little tricks to make things more difficult, Shadowrun turns into a game of, "Read the GM's mind." I had a GM like that, and while we it made us paranoid as shit, it wasn't really any fun. It would just piss us off when we got caught again for the new thing that the GM thought up. There's so many ways to screw your players, I figure most of those are incorporated into dice rolls. I figure players should be rewarded for thinking sneaky, by basically assign bonuses to dice pools or reducing thresholds. Making the players think to check for the exact thing that you thought up to trip them up either turns into an exercise of railroading if you want them to find it, or frustration if they don't.
The worst part of this is that it slows down the game. The GM says something innocuous, and the players go to red alert cause they think it's another sneaky ploy, and it takes you 20 minutes to explain that when you described the street as strewn with rubble, it didn't mean that an ambush was imminent and they can continue on to the damn meet.