Help - Search - Members - Calendar
Full Version: Stupid Question
Dumpshock Forums > Discussion > Shadowrun
Pages: 1, 2, 3, 4, 5, 6, 7
cetiah
QUOTE (Pyritefoolsgold @ Feb 6 2007, 08:09 PM)
QUOTE


If the two paragraphs say that an agent must be running on the node to interact with it, then this is a contradiction with the rest of the rules and itself. I am not sayin that the rules say so. In fact, you do. RAW can not violate logic and consistency. If it does it is a problem.

I have no problem understanding this, and it seems non contradictory to me. Perhaps you could explain the contradiction. It says agents do specific things, and have specific limitations, and that one of those limitations is that unless they are latched on to a persona, their program has to be running in a node for them to act on that node. It seems very simple, but you seem to want the same rules that apply to agents to also apply to personas. I see no good reason why that has to be the case.

Agreed... sort of.

Regardless of whether or not there's a good reason, in RAW there are certain rules on what a persona is capable of doing and agents are not personas. There are rules that govern what an agent can and cannot do, and because an agent is not a persona, there's no contradiction between the agent's activities and the persona's.

The contradiction comes when it says that an agent can access other nodes independantly if they have the proper passcodes or Exploit program. We know that an agent acting independantly must move node to node because there are rules covering this specific case.

If an agent is not acting independantly, it must be loaded into your persona. As the persona moves, the agent moves, and its Response varies.

If you wish an agent to act independently, you must load it onto a particular node (not just any node!) from your persona (which is in the node at the time). The agent will continue to operate in the Matrix even if your persona goes offline. (Sr4,p228) The agent is just an independant icon loaded into the node. Its attributes are affected by the node it is loaded onto. At no point here does it say that the agent gets a persona or can move once they've been loaded into the particular node. In fact, since they aren't a persona, they can't move, right?

So if that were true, how does this work with "Agents can also access other nodes independantly if instructed to and if they either have the passcodes or are carrying an Exploit program and can hack their own way in (as independant icons)." (Sr4, p.227)

There's the contradiction. Regardless of how you interpret/resolve this contradiction, I disagree with Serbitar's idea that the agent is still loaded back into your comlink's node while it's going about tampering in other people's nodes. That clearly is not supported by RAW. But the rules that support RAW do contradict eachother.

In my interpretation of these events:
1) An agent doesn't have to be able to interact with a node to hack into it. (Huh? Yeah, I know. But that's what the rules say as far as I can tell. I guess the firewall was supposed to be the door and the hacking agent isn't really in yet.)
2) The Agent must hack into the node with its Exploit program, and then load itself onto the note it is accessing.


There's another thing being regarded as a contradiction but is more of a "flaw": If a remote node that is being hacked has a persona uploaded, does that node now running it have less programs that it can run due to its System limit?

I'd have to say no. Becuase the remote node doesn't actually terminate or execute the agent program.

I think this was just mis-handled by the writers because it was never an issue for them. Security systems don't have a limit to how many programs (agents) they can run so it was never a big deal for them.

But it's not really a contradiction. This happens with modern viruses, too - you're CPU usage skyrockets and the user has no idea why.
Pyritefoolsgold
QUOTE (cetiah)
QUOTE (Pyritefoolsgold @ Feb 6 2007, 08:09 PM)
QUOTE


If the two paragraphs say that an agent must be running on the node to interact with it, then this is a contradiction with the rest of the rules and itself. I am not sayin that the rules say so. In fact, you do. RAW can not violate logic and consistency. If it does it is a problem.

I have no problem understanding this, and it seems non contradictory to me. Perhaps you could explain the contradiction. It says agents do specific things, and have specific limitations, and that one of those limitations is that unless they are latched on to a persona, their program has to be running in a node for them to act on that node. It seems very simple, but you seem to want the same rules that apply to agents to also apply to personas. I see no good reason why that has to be the case.

Agreed... sort of.

Regardless of whether or not there's a good reason, in RAW there are certain rules on what a persona is capable of doing and agents are not personas. There are rules that govern what an agent can and cannot do, and because an agent is not a persona, there's no contradiction between the agent's activities and the persona's.

The contradiction comes when it says that an agent can access other nodes independantly if they have the proper passcodes or Exploit program. We know that an agent acting independantly must move node to node because there are rules covering this specific case.

If an agent is not acting independantly, it must be loaded into your persona. As the persona moves, the agent moves, and its Response varies.

If you wish an agent to act independently, you must load it onto a particular node (not just any node!) from your persona (which is in the node at the time). The agent will continue to operate in the Matrix even if your persona goes offline. (Sr4,p228) The agent is just an independant icon loaded into the node. Its attributes are affected by the node it is loaded onto. At no point here does it say that the agent gets a persona or can move once they've been loaded into the particular node. In fact, since they aren't a persona, they can't move, right?

So if that were true, how does this work with "Agents can also access other nodes independantly if instructed to and if they either have the passcodes or are carrying an Exploit program and can hack their own way in (as independant icons)." (Sr4, p.227)

There's the contradiction. Regardless of how you interpret/resolve this contradiction, I disagree with Serbitar's idea that the agent is still loaded back into your comlink's node while it's going about tampering in other people's nodes. That clearly is not supported by RAW. But the rules that support RAW do contradict eachother.

In my interpretation of these events:
1) An agent doesn't have to be able to interact with a node to hack into it. (Huh? Yeah, I know. But that's what the rules say as far as I can tell. I guess the firewall was supposed to be the door and the hacking agent isn't really in yet.)
2) The Agent must hack into the node with its Exploit program, and then load itself onto the note it is accessing.


There's another thing being regarded as a contradiction but is more of a "flaw": If a remote node that is being hacked has a persona uploaded, does that node now running it have less programs that it can run due to its System limit?

I'd have to say no. Becuase the remote node doesn't actually terminate or execute the agent program.

I think this was just mis-handled by the writers because it was never an issue for them. Security systems don't have a limit to how many programs (agents) they can run so it was never a big deal for them.

But it's not really a contradiction. This happens with modern viruses, too - you're CPU usage skyrockets and the user has no idea why.

Here's the way I see it.

You load your agent into node X. Let's say node X is a basic directory node. You give it instructions to hack into node Y, the node for the local branch of Lone Star, and once it is there, to search for a certain name, and once it is found, to delete any files associated with it. Then you get out of dodge.

Your agent begins hacking a way into node Y. It's not in node Y yet, it's just making a passageway to node Y. If successful, it moves into node Y, where it can begin its search action. It gets attacked by IC, and defends itself to the best of it's abilities (not very good, but in this case, adequate.) Then it completes the search, finds five files, and uses it's Edit program to delete them.

I don't see any reason, in the Raw, why the agent should be immobilized just because it lacks a persona.
FrankTrollman
QUOTE (Pyritefoolsgold)
I have no problem understanding this, and it seems non contradictory to me. Perhaps you could explain the contradiction. It says agents do specific things, and have specific limitations, and that one of those limitations is that unless they are latched on to a persona, their program has to be running in a node for them to act on that node. It seems very simple, but you seem to want the same rules that apply to agents to also apply to personas. I see no good reason why that has to be the case.

Here's the thing though: That section of yours that I bolded is not actually stated in the rules.

The rules say that an independently operating Agent has to be running on a node other than your commlink.

The rules say that an Agent is limitted to the stats of the node it is running on.

The rules say that an Agent can access other nodes.

The rules say that an Agent can "move" from node to node by uploading itself and then running on the new node.

---

And none of that says that an Agent can't use its ability to access a node other than the node it is running on to perform operations on that node. It's not even implied. Ever.

-Frank
Blade
Ok then, if no one but me wants the official answer about that issue, I'll e-mail the devs.

Anyway, the debate can't really take place. We only have 2 or 3 RAW sentences to argue with, and these don't state anything about what matters to us.

Oh, and by the way, for those who said that we don't have agents today, we do... But I don't think we can compare 2007's agents to 2070.
cetiah
QUOTE (FrankTrollman @ Feb 6 2007, 10:26 PM)
QUOTE (Pyritefoolsgold @ Feb 6 2007, 08:09 PM)
I have no problem understanding this, and it seems non contradictory to me. Perhaps you could explain the contradiction. It says agents do specific things, and have specific limitations, and that one of those limitations is that unless they are latched on to a persona, their program has to be running in a node for them to act on that node. It seems very simple, but you seem to want the same rules that apply to agents to also apply to personas. I see no good reason why that has to be the case.

Here's the thing though: That section of yours that I bolded is not actually stated in the rules.

The rules say that an independently operating Agent has to be running on a node other than your commlink.

The rules say that an Agent is limitted to the stats of the node it is running on.

The rules say that an Agent can access other nodes.

The rules say that an Agent can "move" from node to node by uploading itself and then running on the new node.


Not interpretation:
It never says "a node other than your comlink" either,
It says the agent must be loaded either on a node or on a persona.
Agents do not have to enter a node to hack it.
Agents can independantly hack and enter other nodes.
It mentions that if you want an agent to function independantly, it must be loaded onto a particular node.


Interpretation:
I'm reading a lot into that "on a particular node" as the basis for my interpretation. If it meant "on your comlink's node", I think it would just say that. Actually, I'm not even sure if it would need to say anything on the matter,

QUOTE
And none of that says that an Agent can't use its ability to access a node other than the node it is running on to perform operations on that node. It's not even implied. Ever.

-Frank


Not interpretation:
What you are describing is a function of Persona.
Only Personas are described as having this ability.
The book specifically mentions that agents do not have Personas, but exist as independant icons which can be loaded onto nodes.

Interpretation:
I believe this was meant to make agents function differently than users and interact differently within the Matrix, probably because the writers were thinking of IC when they wrote the agent rules and wanted IC to be loaded onto their own nodes.

Going a step further:
Since the Persona is described as your interface between your comlink and "you", it is reasonable to assume anything detached from your Persona is also detached from your comlink. Nothing else (besides a Persona) is ever having been described as providing access to your comlink's programs, storage, resources, etc.
FrankTrollman
QUOTE (cetiah)

Not interpretation:
It never says "a node other than your comlink" either,

QUOTE (SR4 @ p. 228)
If you wish for your agent to operate in the Matrix independently, you must load it on a particular node separate from your persona.


QUOTE (SR4 @ p. 211)
Your persona's attributes are determined by the atributes of whatever device/OS you are using to access the Matrix-usually your commlink or terminal


So yes. It really does actually say a node other than your commlink.

---

I'm beginning to think that you haven't actually read the section of RAW that is being discussed here. It's two pages long. All of the information is on pages 227, 228, and 230. Go ahead and red it carefully before you continue to make pronouncements about what it does and does not literally say.

-Frank
cetiah
QUOTE (FrankTrollman @ Feb 7 2007, 12:03 AM)
QUOTE (cetiah @ Feb 6 2007, 11:49 PM)

Not interpretation:
It never says "a node other than your comlink" either,

QUOTE (SR4 @ p. 228)
If you wish for your agent to operate in the Matrix independently, you must load it on a particular node separate from your persona.


QUOTE (SR4 @ p. 211)
Your persona's attributes are determined by the atributes of whatever device/OS you are using to access the Matrix-usually your commlink or terminal


So yes. It really does actually say a node other than your commlink.

---

I'm beginning to think that you haven't actually read the section of RAW that is being discussed here. It's two pages long. All of the information is on pages 227, 228, and 230. Go ahead and red it carefully before you continue to make pronouncements about what it does and does not literally say.

-Frank

You don't agree so you ignore everything I said and decide to insult me instead. Very mature. Oh, and since we're arrogantly throwing page numbers at eachother, page 211 is important, too.

(pause to take deep breaths)

Okay, you interpreted way too much into those two statements you quoted.
It never says a node other than your comlink. Sorry. It just doesn't. I deliberately made a distinction between what was said and what I interpreted from the text.

If you want your agent to operate in the Matrix independantly, you must load it on a particular node seperate from your persona. Your persona is not your comlink's node. Nothing in the text you quoted describes it as a node. Just because your comlink's stats determine your persona's stats doesn't mean the persona's a node. Big difference between personas and nodes. HUGE. Persona's can't be hacked. Persona's can't be entered. Personas can enter and leave nodes and nodes can't. The Persona provides an interface so that you can use all of your programs and your node exists whether you are using the actively using the Matrix or not. A persona only exists while you are accessing the Matrix..

How do you even come to this conclusion that your persona is a node?

Theoretically, you could have an agent running on your comlink's node plugging away at numbers, running Analyze all day. It wouldn't be able to Analyze stuff on other nodes, just what is on the node it is loaded on. We might theoreticaly want to call this program "IC". And it will stay on that comlink's node despite whether your persona is active or not, despite where it is in the Matrix until you decide to either shut down and unload the agent or load it into your persona instead.
FrankTrollman
Your Persona runs on your commlink (unless you're running through a terminal or a coffee machine). If you want your Agent to operate independently, it has to run on a different node from your Persona.

And that different node would be... not your commlink. By definition.

QUOTE
Theoretically, you could have an agent running on your comlink's node plugging away at numbers, running Analyze all day.


Sure. But then it wouldn't be operating independently. Hence the original statement.

-Frank
ShadowDragon8685
QUOTE (cetiah)
Theoretically, you could have an agent running on your comlink's node plugging away at numbers, running Analyze all day. We might theoreticaly want to call this program "IC". And it will stay on that comlink's node despite whether your persona is active or not, despite where it is in the Matrix until you decide to either shut down and unload the agent or load it into your persona.

Why would we call this program "IC" when we could call it "Smith"?

Hehehe. I bet that'd be a running joke in a good SR4 game. Every hacker and his kid brother's Commlink are running Rating 6 everything Agents that are called "Smith" and styled as a middle-aged, kind-of-red-haired man with a big gun. The really good hackers will back Smith up with Jones and Johnson....


Yeah. I think I just figured out why hacking into hacker's commlinks is a Bad Idea.
ShadowDragon8685
QUOTE (FrankTrollman)
Your Persona runs on your commlink (unless you're running through a terminal or a coffee machine). If you want your Agent to operate independently, it has to run on a different node from your Persona.

And that different node would be... not your commlink. By definition.

QUOTE
Theoretically, you could have an agent running on your comlink's node plugging away at numbers, running Analyze all day.


Sure. But then it wouldn't be operating independently. Hence the original statement.

-Frank

It dosen't matter where Agent Smith starts running, it only matters where he ends up. And is there anything saying he can't operate in the same Node that you are? If not, then I see no problem with the possibility that you load up all the Agents that your commlink can handle and still run yourself, and you all hit the Matrix together, then seperate to do your own jobs.
cetiah
QUOTE
Your Persona runs on your commlink (unless you're running through a terminal or a coffee machine). If you want your Agent to operate independently, it has to run on a different node from your Persona.

And that different node would be... not your commlink. By definition.


It never says a different node.
It says "If you wish for your agent to operate in the Matrix independantly, you must load it on a particular node seperate from your Persona." Prior to this, your Agent was loaded into your Persona. If you drop it off ina node, it is now seperate from your persona, but in the same node. More importantly, on the particular node you want it to function on.

It doesn't matter where that node is or where your Persona is. Your Persona isn't always in your comlink; it moves around.


QUOTE
QUOTE
Theoretically, you could have an agent running on your comlink's node plugging away at numbers, running Analyze all day.


Sure. But then it wouldn't be operating independently. Hence the original statement.

-Frank


Wowowow. Back up. You mean we disagree on what it means to run indpendantly?! Okay, we need to settle this or the rest is kind of pointless.

If an agent is acting independantly that means that the agent is not loaded onto your persona. That's all it means. It doesn't matter where it is or what its doing or what node its on, or whether or not it is even running off your comlink -- if it is working on any node apart from the interface to a hacker (Persona), it is functioning independantly. It continues to run on its own without the hacker moving it around. (In fact, other than conviniently being able to zip across the Matrix with a hacker, I don't know if there's any advantage to having an agent loaded into your persona. Maybe to protect it against dangerous IC, if it needs protection.)

Thus, IC is always running independantly since its usually not loaded into a security hacker's persona.
cetiah
QUOTE (ShadowDragon8685 @ Feb 7 2007, 12:23 AM)
QUOTE (cetiah @ Feb 7 2007, 01:14 AM)
Theoretically, you could have an agent running on your comlink's node plugging away at numbers, running Analyze all day.  We might theoreticaly want to call this program "IC".  And it will stay on that comlink's node despite whether your persona is active or not, despite where it is in the Matrix until you decide to either shut down and unload the agent or load it into your persona.

Why would we call this program "IC" when we could call it "Smith"?

Hehehe. I bet that'd be a running joke in a good SR4 game. Every hacker and his kid brother's Commlink are running Rating 6 everything Agents that are called "Smith" and styled as a middle-aged, kind-of-red-haired man with a big gun. The really good hackers will back Smith up with Jones and Johnson....


Yeah. I think I just figured out why hacking into hacker's commlinks is a Bad Idea.

I don't know why everyone keeps assuming that Hackers are going to be the Agent Smith problem. It's not the awesome capabilities of hackers that are the main concern for the game. If agents actually worked in such a way as to create an Agent Smith problem, then there's no reason that some corp like Neonet or Renraku wouldn't have a Hacker Response Network that is nothing but a collection of nodes running 10 or more Black IC programs each. When a system owned by Neonet, a subsidiary, or a paying subscriber sends out a small distress call, the system has 10 IC enter that node and tear apart any hackers or agents in there. Alernatively, it can call another node which sends 10 more. And another with 10 more.

If the Agent Smith problem actually exists, the danger isn't hackers against systems. The danger is that any given milllion IC programs on the Matrix can protect every computer connected to the Matrix simultaneously. So who has more Agents, one hacker, or a megacorp? Ultimately, I'm not sure if either one would have more if we assume that copy protection isn't perfect and both sides could have an unlimited supply of copied agents.

This can't be allowed. It must be stopped!

Or maybe not. If you want this sort of situation to appear in the game, you have to abstract it. Don't have an icon and attributes for each agent, but for each group of agents. In fact your basic Hacking skill could represent how well you coordinate, instruct, and use these agents rather than how well you code into the firewall - it's all just fluff at that point.

Either that, or impose limits on the capabilities of agents. Since there is already a distinct difference between agents and AIs in the game, the prescedent for powering down agents is already there. Any real-world equivilent to a "smarter agent" would just be the Shadowrun equivilent of a dumb AI.
Garrowolf
I'm starting to think that the problem lies in if you think of all or just some aspects of this setting to be fantasy. If it is all fantasy then you don't really need to think about it. You just need to prevent or allow things based on if your PCs figure out something. If you are thinking of the scifi parts of the setting and find those actually thought provoking then there is a good reason to have a basis for the matrix in modern computing.

There is no reason to assume that the basic ideas of computer archtechture haven't been worked out. We have a new idea or two now and then but we haven't gotten the basics down I think. We can figure out the matrix based on projections from futurists and our own understanding or we can cling to the system that was written because we paid good money for it.

My point of view, since I almost never share my feelings about things, is that I think that we know enough to come up with a logical matrix based on what we understand and project forward. I think that we can come up with a system that allows for most of the things that the setting needs from the matrix. We can come up with somthing that makes sense for normal users AND for hackers. I think that it can be fairly simple and not slow down game play.

And I think that keeping a Tron like VR system where the metaphor is anything but a metaphor is inimicable to these goals.
Blade
Matrix in the cyberpunk genre is born when the Internet was just some kind of military/scientific project... If you read some older cyberpunk novels it's closer to the old French minitel (where you more or less directly dialed the server you wanted to connect to) than to the Internet.

Of course, things have evolved in Shadowrun, but replacing the Matrix with a realistic computer system will have most of the VR aspect drawn away and replaced by command line hacking... You'll lose all the fun and "poetic" (for lack of a better word) aspect of the Matrix to get something as exciting as cracking a keypad.
Garrowolf
well I think that the game can be just as fun without that part. I never got into the decking rules before because I thought that the system was overly complicated. I guess that is why I am not all that attatched to the idea.

I have seen and read plenty of stuff in cyberpunk. Not all had a matrix and not all got VR confused so I don't think of it as a necessary part. My favorite cyberpunk novel was "When Gravity Fails" by George Alec Effinger. It was gritty and dark about how technology was degrading people but the most advanced communications system in there was a cell phone.

The problem is that people seem to want to hold on to a very specific set of things as fun and they don't care if doing so takes the fun out if it for others. I think that having a silly VR Cybercombat system is insulting to my intelligence and drives me to distraction.
ShadowDragon8685
QUOTE (Garrowolf)
well I think that the game can be just as fun without that part. I never got into the decking rules before because I thought that the system was overly complicated. I guess that is why I am not all that attatched to the idea.

I have seen and read plenty of stuff in cyberpunk. Not all had a matrix and not all got VR confused so I don't think of it as a necessary part. My favorite cyberpunk novel was "When Gravity Fails" by George Alec Effinger. It was gritty and dark about how technology was degrading people but the most advanced communications system in there was a cell phone.

The problem is that people seem to want to hold on to a very specific set of things as fun and they don't care if doing so takes the fun out if it for others. I think that having a silly VR Cybercombat system is insulting to my intelligence and drives me to distraction.

You don't like it?

Good. Go play d20 Future. Absoloutely noooooo VR hacking. In fact, all of hacking is down to a single roll: 1d20+Computers (skill) + miscelanious bonuses.


Decking is the only real reason that brought me to Shadowrun. It's the only thing that Shadowrun has over, say, d20 Future, or d20 Fantasy.
hobgoblin
QUOTE
Good. Go play d20 Future. Absoloutely noooooo VR hacking. In fact, all of hacking is down to a single roll: 1d20+Computers (skill) + miscelanious bonuses.


that is unless you pick up the cyberscape book, where they introduce VR hacking (ita a hardcopy version of some rules that was posted as pdf on the wizards page earlier).

but rather then building a fully seperate system they just reuse a lot of the stats and mechanics. basically the turn the vr hacking into a paralell dimention...
mfb
QUOTE (Garrowolf)
And I think that keeping a Tron like VR system where the metaphor is anything but a metaphor is inimicable to these goals.

that's a completely separate issue. a thread where we're trying to work out the intricacies of agent subscriptions isn't the place to rewrite the entire Matrix section of the book (plus all future Matrix-related books).
Dashifen
QUOTE (cetiah)
It never says a different node. 
It says "If you wish for your agent to operate in the Matrix independantly, you must load it on a particular node seperate from your Persona."  Prior to this, your Agent was loaded into your Persona. If you drop it off ina node, it is now seperate from your persona, but in the same node.  More importantly, on the particular node you want it to function on. 

It doesn't matter where that node is or where your Persona is.  Your Persona isn't always in your comlink; it moves around. 


Nail meet head. That's the exact way I've always looked at it. Separate from your persona doesn't directly mean separate from your persona on a different node. If I'm in my office and I take my wallet out of my pocket and set it on my desk it is now separate from me, so to speak, but it's still in my office. I can then leave my office, and the wallet stays there. The analogy breaks down when you consider that my wallet can somehow leave my office without me, while it explicitly states that Agents can perform that type of action, but you understand what I'm getting at, I hope.


cetiah
QUOTE (Dashifen)
QUOTE (cetiah)
It never says a different node. 
It says "If you wish for your agent to operate in the Matrix independantly, you must load it on a particular node seperate from your Persona."  Prior to this, your Agent was loaded into your Persona. If you drop it off ina node, it is now seperate from your persona, but in the same node.  More importantly, on the particular node you want it to function on. 

It doesn't matter where that node is or where your Persona is.  Your Persona isn't always in your comlink; it moves around. 


Nail meet head. That's the exact way I've always looked at it. Separate from your persona doesn't directly mean separate from your persona on a different node. If I'm in my office and I take my wallet out of my pocket and set it on my desk it is now separate from me, so to speak, but it's still in my office. I can then leave my office, and the wallet stays there. The analogy breaks down when you consider that my wallet can somehow leave my office without me, while it explicitly states that Agents can perform that type of action, but you understand what I'm getting at, I hope.

Your wallet doesn't leave your desk? Happens to me all the time. I have to watch it very carefully just to make sure it doesn't wander off on its own...
ShadowDragon8685
That's a motion-tracking paintball gun automatic security system is for.

Or a motion-tracking automatic ranged taser with an automatic rewind reel. That's a much more fragile system, though... smile.gif
Serbitar
QUOTE (Garrowolf @ Feb 7 2007, 08:48 AM)
I'm starting to think that the problem lies in if you think of all or just some aspects of this setting to be fantasy. If it is all fantasy then you don't really need to think about it. You just need to prevent or allow things based on if your PCs figure out something. If you are thinking of the scifi parts of the setting and find those actually thought provoking  then there is a good reason to have a basis for the matrix in modern computing.

Good Points. But SR is NOT Fantasy. I want everything to be at least handwaved. In a Fantasy setting I would not.
Dashifen
Odd statement, that. I'd rather see handwaving in a fantasy setting but would want crunchiness otherwise. Perhaps we're using handwavery in different contexts. Either way, not sure we want to start the genre debate :swirl:
FrankTrollman
QUOTE (Dashifen)
Separate from your persona doesn't directly mean separate from your persona on a different node.

Since your Persona is just "everything running on your commlink" it actually does mean that. If an Agent were running on your own node, it would by definition not be separate from your persona. It would crash when you crash, lag when you lag, and be jammed when you were jammed.

Since everything running on your node is part of your persona, for something to be separate from your persona it really does have to be running on a different node altogether.

-Frank
Dashifen
QUOTE (FrankTrollman @ Feb 7 2007, 12:34 PM)
Since everything running on your node is part of your persona, for something to be separate from your persona it really does have to be running on a different node altogether.

Not to be a prick, but can you back this one up? I don't see things this way and I'm not convinced (yet) that it's the way the RAW intends things to be seen.
mfb
QUOTE (SR4 page 231)
If your persona icon crashes, you are immediately disconnected from the Matrix.

can't imagine what else other than your commlink would be disconnected when you crash.
cetiah
QUOTE (FrankTrollman @ Feb 7 2007, 12:34 PM)
Since your Persona is just "everything running on your commlink" it actually does mean that. If an Agent were running on your own node, it would by definition not be separate from your persona. It would crash when you crash, lag when you lag, and be jammed when you were jammed.

Since everything running on your node is part of your persona, for something to be separate from your persona it really does have to be running on a different node altogether.

Wrong on just about everything here. I really think you're misinterpreting either what a Persona is supposed to represent or what the node is supposed to represent - I'm not sure which.

If an agent were running on your node, it would be different from your persona. There are times when your persona is not active or when your persona has moved to other nodes, but this doesn't affect your comlink's node in anyway.

Your comlink's node does not crash when your persona crashes. If your persona is defeated in cybercombat, you immediately are disconnected from the Matrix and your persona is gone until you log back in, but your node is still there. The node can, for example, still be hacked even though you've just been defeated in cybercombat.

A persona is a type of icon. Unlike other icons, it has the ability to travel between nodes while its files and such "reside" on its home node. It is not "everything on your comlink" but serves as an interface that allows you to access everything on your comlink, in much the same way that all icons are merely similiar interfaces. It is not "everything on your comlink" but you can load programs from your comlink into the persona to carry around with you and use in the Matrix, on whatever node the persona is located in.

It can be compared to a digital representation of "you" walking around through a building. The nodes would be the individual rooms within that building. Big difference. Huge. They are nothing even remotely similiar.

Your Persona is not your home node.
mfb
QUOTE (cetiah)
Your comlink's node does not crash when your persona crashes. If your persona is defeated in cybercombat, you immediately are disconnected from the Matrix and your persona is gone until you log back in, but your node is still there. The node can, for example, still be hacked even though you've just been defeated in cybercombat.

where in the world are you getting that idea? you need to provide quotes for pretty much everything you just said.
FrankTrollman
QUOTE (Dashifen)
QUOTE (FrankTrollman @ Feb 7 2007, 12:34 PM)
Since everything running on your node is part of your persona, for something to be separate from your persona it really does have to be running on a different node altogether.

Not to be a prick, but can you back this one up? I don't see things this way and I'm not convinced (yet) that it's the way the RAW intends things to be seen.

Yes I can.

QUOTE (SR4 @ p. 211-212)
PERSONA
The persona represents your Matrix alter ego. It is a combination
of programs that you use, in conjunction with your
device’s OS, to represent yourself to other users and nodes in
the Matrix.
Your persona’s attributes are determined by the
attributes of whatever device/OS you are using to access the
Matrix—usually your commlink or terminal, though you may
sometimes access via other devices.
Your persona’s Firewall, Response, Signal, and System attributes
are equal to the device and OS you are using to access the
Matrix. Attacks made against your persona aff ect the device/
OS, though Black IC programs aff ect the actual user directly.

Icon
Your persona’s icon graphically represents you in augmented
reality (and especially in virtual reality, see p. 228),
and in most forms of Matrix communications (email, messaging,
phone calls, etc). Whether you bought your icon off the
shelf or programmed your own, icons are easily customizable
with a library of features and you can trick them out on the fly
with different animated movements, color schemes, mutable
design elements, and other digital skin eff ects. Icons take many shapes and forms, from animated characters and anthropomorphic
creatures to more artsy or abstract designs like mobile
waterfalls or swirling color patterns. All Matrix-capable
devices have default icons loaded in case the user doesn’t have
his own—usually simple blank-white anonymous anthroform
shapes, oft en emblazoned with the device manufacturer’s stylized
logo. Occasionally, programs you have loaded will add
additional elements to your logo’s look, such as the glowing
green force field of an Armor program or the blurring effects
of a Stealth program.

Altering or swapping out your icon takes a Free Action.


So what does this tell us? It tells us that the programs you use, that is the programs running on your commlink, are your Persona. And that running them may make obvious changes to your icon.

It also tells us that the icon is a representation of the physical object that you are using to connect to the matrix with. That's important, because:

QUOTE (SR4 @ p. 231)
When all the boxes on the Matrix Condition Monitor are filled up, an icon crashes. If your persona icon crashes, you are immediately disconnected from the Matrix.


So I suppose that it is possible to try to read it that programs you are running are separate from your persona, and thus that when people crash you out of the Matrix that you are disconnected from the Matrix, but your Commlink isn't and all the programs you were running are still churning away with no user input. But that's an incredibly counter-intuitive and stupid reading of those rules and I'm not going to dignify it it as a possibility.

-Frank
Dashifen
@mfb: I'm not sure your quote means what you think it means. It says persona icon which to me indicates to me that the icon of your person can be crashed in a node other than your commlink (or within your commlink for that matter) and if (when) that happens, you're disconnected from the Matrix. That rule is to avoid people saying that their icon was crashed in Node X but that they're still connected to Nodes Y and Z.

@Cetiah:
QUOTE
A persona is a type of icon.  Unlike other icons, it has the ability to travel between nodes while its files and such "reside" on its home node.


I'm not sure I totally agree with that yet. What do you see being the difference between a persona and a persona's icon, then? The quote that mfb posted seems to indicate a difference between the two.

@Frank: running to lunch. wife getting angry at delay ( eek.gif ). I'll read and respond later!
kigmatzomat
Hopefully we all agree that agents and hackers should work as similarly as possible for simplicity except when explicitly stated to be different. Otherwise this all goes out the window.

Remember, agents are legitimate bits of application used by power users the world around, not just hackers. Agents don't work if they have to upload themselves to other servers to get anything done. If I want my agent to go do a datasearch for everything on GlobalDynamX there is no freaking way that Google, Yahoo, AltaVista, and GlobalDynamX are going to let my agent load onto their system. Not happening. The section on IC states pretty clearly that IC are agents with special payload. No way anyone is going to let roaving IC load itself to their system.

An agent is a potentially autonomous program. It is a virtual machine, emulating a hacker and their comm, complete with its own firewall rating. The agent's rating acts as Persona rating in many cases (see matrix combat sections). The quality of that emulation is based on the amount of processing power available, hence the fact that an Agent uses the Response of the node it is running on.

It is potentially autonomous because it can either be loaded as a regular app or, as stated on page 228, it can be independent and be loaded on onto "a particular node separate from your Persona" and operate even when the hacker is offline. The "separate from your Persona" bit does imply it needs to be a node other than your in-use Comm however nothing says this can't be a spare comm that no one is using. Could be a corporate server. Wage slaves use agents to handle tasks while they are busy, which would justify them loading it up to a corporate server.

On page 227 it says that "Agents can also access other nodes independently if instructed to and if they either have the passcodes or
are carrying an Exploit program and can hack their own way in
(as independent icons)."

The key word there is "access," a word that sees use with hackers. If you look on P.118 titled "Accessing Multiple Nodes" it says "It’s common practice for Matrix users to connect to more than one node at the same time—this is just a matter of switching between open windows. Th ere is no penalty to switch your attention between accessed nodes, but you can only act in one node at a time (meaning each action only applies to one node)"

It even has an example of someone playing a game while doing a data search. Page 232 even states that you can be in matrix combat on different nodes simultaneously.

So what I see is that Joe Wage Slave is being slammed, he's got a conference call to be on, some numbers to crunch, a plane to be on and needs to track down some data that the system backup failed to capture. Joe loads his agent onto CorpServer2 and tells it to find the missing data. Joe then hops on his plane and does his conference call while crunching his numbers.

The agent, using Joe's passcodes (or possible passcodes assigned specifically to the agent by the corpsec team), accesses dozens of systems throughout the corp, looking for the files. It does NOT bother to migrate from server to server, instead ACCESSING the other systems while residing on CorpServer2, much as a hacker's Persona accesses multiple systems while residing on their personal Comm.

Now lets say the agent realizes that this is going to take a long time, in part because CorpServer2 is only an Response 2 system. The agent checks to see if CorpServer5 is available (the passcodes it has give it access to CorpServer5 but only if it isn't busy) and transfers itself there to speed up the work.

Here's a shadowrunner example. Hacker Dave is contacted about a meet and given some limited tidbits of information. He wants to know more so he fires up his agent Hal to go do some public data trawling. Dave doesn't like the idea of limiting his active software choices at a meet so he puts Hal on his spare comm and tells Hal to email him the results of the data search. Hal proceeds to make a number of extended data search rolls to compile a basic dossier that is emailed to dave.

At the meet Dave is given the passcodes for a user-level account of the target. Dave decides to do a quick data index of the data available to the account. Because time is of the essence (the account is deleted at midnight) Dave loads Hal into his persona when he connects to the server. Dave and Hal both begin trawling the network as quickly as possible for information.

At 11:55 Dave figures out where the data he needs is but it needs a security account to access it. He decides to split his forces up. He logs off completely, loads Hal onto the spare Comm with some combat utilities and sends Hal back to the target using the still-valid user-level passcodes. Dave, alone on his comm, begins an On-the-Fly hack of the system. He gets in, but triggers an alert.

Dave manages a couple rounds of data theft before the IC finds him and launches its assault. Dave yells for Hal, who begins its own assault. Since Hal was using legit codes, it hadn't been targeted by the IC yet so Hal's attack was a complete ambush. Of course, the system immediately begins to counterattack but the distraction lets dave finish the theft. Hal "sacrifices" itself to let Dave log off. Dave then reaches over and turns off Hal's Comm, breaking the connection.

Dave fires up his car and quickly drives away, not knowing how far the traces on Dave and/or Hal got but since both Comms were sitting side by side either one being successful would be bad.
FrankTrollman
QUOTE (kigmatzomat)
Hopefully we all agree that agents and hackers should work as similarly as possible for simplicity except when explicitly stated to be different.

Well... that's the obvious design intent of the rules as they appear in the BBB. However, I don't think that many people here are convinced that this is necessarily a good idea.

Design criteria of how things should work encompasses three basic concepts:
  1. Simplicity of Systems. That is, there should be as few systems to learn as possible. An Agent shouldn't be a unique game mechanic that everyone has to learn entirely new ways of doing things to use.
  2. Simplicity of Resolution. That is, if I send my scripts off to do something in the Matrix, I should be able to resolve the appropriate die rolls in a finite time period in a manner which makes sense and gets over and done with quickly.
  3. Primacy of the Player Character. The game is Shadowrun, it's about Shadowrunners. it's not called "Wallet Run" or "Who has the most toys?" - whatever the Player does should be the most important thing in determining whether they succeed or fail.

What the rules as written deliver is a system where an Agent functions pretty much identically to a Hacker. Except of course, that an Agent can be duplicated in whole simply by breaking copy protction and throwing it another piece of hardware to run a second copy on. And another piece of hardware to run a third copy on. And so on.

Indeed, the rules fulfill the first criteria perfectly. An Agent runs on pretty much exactly the same rules as a Hacker and the cheese stands alone. Unfortunately the second two design criteria miss the boat entirely. A half-way decent Agent attack involves rolling handfuls of dice dozens of times and the Hacker at the center has a bulge so small over each individual Agent that he is a stastitically minor effect on his overall life.

-Frank
cetiah
QUOTE (FrankTrollman)
Well... that's the obvious design intent of the rules as they appear in the BBB. However, I don't think that many people here are convinced that this is necessarily a good idea.

Design criteria of how things should work encompasses three basic concepts:
Simplicity of Systems. That is, there should be as few systems to learn as possible. An Agent shouldn't be a unique game mechanic that everyone has to learn entirely new ways of doing things to use.
Simplicity of Resolution. That is, if I send my scripts off to do something in the Matrix, I should be able to resolve the appropriate die rolls in a finite time period in a manner which makes sense and gets over and done with quickly.
Primacy of the Player Character. The game is Shadowrun, it's about Shadowrunners. it's not called "Wallet Run" or "Who has the most toys?" - whatever the Player does should be the most important thing in determining whether they succeed or fail.

What the rules as written deliver is a system where an Agent functions pretty much identically to a Hacker. Except of course, that an Agent can be duplicated in whole simply by breaking copy protction and throwing it another piece of hardware to run a second copy on. And another piece of hardware to run a third copy on. And so on.

Indeed, the rules fulfill the first criteria perfectly. An Agent runs on pretty much exactly the same rules as a Hacker and the cheese stands alone. Unfortunately the second two design criteria miss the boat entirely. A half-way decent Agent attack involves rolling handfuls of dice dozens of times and the Hacker at the center has a bulge so small over each individual Agent that he is a stastitically minor effect on his overall life.


Nice evaluation. I completely agree with everything here.
There's probably a few more criteria other people would throw in such as internal consistency, realism, cinematic imitation (fakery?), player choice, GM control, expandibility, etc. etc., but I think these three are perfect starting points that everyone can agree on. At some point (when we clear some of the current threads), you might want to start a new thread with this post.
Kiyote
QUOTE (kigmatzomat)
Remember, agents are legitimate bits of application used by power users the world around, not just hackers.  Agents don't work if they have to upload themselves to other servers to get anything done.  If I want my agent to go do a datasearch for everything on GlobalDynamX there is no freaking way that Google, Yahoo, AltaVista, and GlobalDynamX are going to let my agent load onto their system.  Not happening. 


Actually, letting agents onto their node just may be what Google, Yahoo, AltaVista, and GlobalDynamX are going to do.

QUOTE (SR4 RAW pg. 215)

Note that many nodes also have public access areas (or
may be entirely public)—the Matrix equivalent of websites.


For a normal person, their Persona or Agent would access the public areas of Google’s node. Although the RAW calls is the public area, I personally think of it more as logging in with a heavily locked down "Guest" account that has no password. The persona/agent would run the search program that is on the Google node to search Google's private database for information. The persona/agent would then log off Google node and move onto the public area of AltaVista or some other search engine or whatever. All the logons would be legal and the information would be public information that the search sites probably gained by sending out their own agents to the public areas of other nodes to gather data, or by process data that other sites might send to them.

My point is that the RAW does leave open the use of Agents for normal people, even if the agents have to log onto a node to access what is on the node.
Dashifen
@Frank

QUOTE (SR4 @ p. 211-212)
...It is a combination of programs that you use, in conjunction with your device’s OS, to represent yourself to other users and nodes in the Matrix....


QUOTE (FrankTrollman)
So what does this tell us? It tells us that the programs you use, that is the programs running on your commlink, are your Persona. And that running them may make obvious changes to your icon.


I'm not with you yet. It says that the programs you use make up your persona. In this context I believe they mean "you" to refer to the legitimate user of a commlink. If an illegitimate user hacks a commlink and runs programs on it, then I don't see that these programs should effect the legitimate user's persona.

You stated earlier...

QUOTE
Since everything running on your node is part of your persona, for something to be separate from your persona it really does have to be running on a different node altogether.


... and I still disagree, no offense intended, and I'm not sure how your quotations above are meant to prove otherwise.
cetiah
QUOTE (mfb)
where in the world are you getting that idea? you need to provide quotes for pretty much everything you just said.


"There are times when your persona is not active" (A Persona is present when you are using your comlink to access a node. Do you disagree with this?)

"or when your persona has moved to other nodes," (Personas are frequently refered to as being able to move from one node to another. With the specific exceptions of Agents and Personas, Icons and Nodes are never described this way.)

"but this doesn't affect your comlink's node in anyway."
(I can't provide a page number for a negative condition. If you think moving your persona around alters your node or where your node is located, the burden of proof is on you to provide a reference.)

"Your comlink's node does not crash when your persona crashes."
(Again, a negative condition. The burden of proof is on you to show that your node crashes when a persona crashes.)
(We know that when a Persona crashes, you are no longer connected to the Matrix. Frank surmises that this is due to your Comlink losing the Matrix connection and I don't disagree. Nor do I see it as relavent. Even when your persona is crashed and you are not connected to a Matrix, your comlink's node can still be hacked by any wireless signal in range. Your node has not crashed.)

"If your persona is defeated in cybercombat, you immediately are disconnected from the Matrix and your persona is gone" (Your persona is crashed and you are disconnected from the Matrix. This is not in dispute.)

"until you log back in," Under Terminate Connection on page 223, it says that a hacker whose connection is terminated can attempt to simply log back in.

" but your node is still there. The node can, for example, still be hacked even though you've just been defeated in cybercombat." (I'll have to provide a page number for you when I get home. The comlink functions as a router for your PAN. It's node can be hacked by hackers who want access to your devices. Nowhere does it say that this doesn't apply if the persona is crashed through cybercombat. If you believe this to be the case, specify a page number.)

"A persona is a type of icon." (I'll get the page number and quote for you tonight.)

"Unlike other icons, it has the ability to travel between nodes while its files and such "reside" on its home node." (There is no actual reference to "files" residing anywhere; it was an analogy I used based on interpreted data. If you challenge the statement that only Personas can do this, I'll go into more detail on how I came to this interpretation. If you find any references to non-Persona non-Agent icons being able to perform this function, please specify a page number.)

"It is not "everything on your comlink" but serves as an interface that allows you to access everything on your comlink," (No page numbers on hand, but I'll provide one later. It's in the very first paragraph of the description for Persona.)

"in much the same way that all icons are merely similiar interfaces." (I'll provide page numbers and quotes later tonight.)

"It is not 'everything on your comlink' " (It's not. It doesn't say that anywhere. If it does, provide a page number. The burden of proof is not on me.)

"but you can load programs from your comlink into the persona to carry around with you and use in the Matrix, on whatever node the persona is located in." (This one I have. p.227. Loading and Using Programs. "In order to activate a program, the user must first have the program available (on his comlink or one of his networked devices). The program must then be loaded into the Persona's memory and run, which takes a Complex Action." Later I will provide a page number to show that you use these programs through your persona and your persona moves from node to node to interact in the Matrix. It's in the description for Personas.)

"It can be compared to a digital representation of "you" walking around through a building. The nodes would be the individual rooms within that building." (I'll provide page number and quotes later. In the meantime, feel free to read up on the description for Nodes.)

"Your Persona is not your home node." (I don't need to prove a negative condition; the burden of proof is on you to show where in RAW it says that a Persona is a Node.)
(There are numerous examples where it specifies rules and description that applies to one and there's nothing to show that it applies to another. For example, nodes cannot be crashed. Ever. OSes can be crashed, icons can be crashed, Personas, agents, but nowhere is it ever said that nodes can be crashed - a node can only be "shut down". Another example is that it says numerously that Personas can move from node to node, but it never says that nodes have this ability. Nodes need to be "accessed" and can be protected with firewalls but nowhere does it say that Personas do. If you find references to any of this, specify page numbers. I can't provide page numbers for rules that you are interpreting that aren't anywhere in the book. I can only point out their absense.)
kigmatzomat
QUOTE (Kiyote)
QUOTE (kigmatzomat)
Remember, agents are legitimate bits of application used by power users the world around, not just hackers.  Agents don't work if they have to upload themselves to other servers to get anything done.  If I want my agent to go do a datasearch for everything on GlobalDynamX there is no freaking way that Google, Yahoo, AltaVista, and GlobalDynamX are going to let my agent load onto their system.  Not happening. 


Actually, letting agents onto their node just may be what Google, Yahoo, AltaVista, and GlobalDynamX are going to do.

QUOTE (SR4 RAW pg. 215)

Note that many nodes also have public access areas (or may be entirely public)—the Matrix equivalent of websites.


Okay, no. Accessing a host is different from uploading executable code. When you access a website, the system generates some information and sends it to your browser; you respond by clicking, requesting additional data using a particularly limited format.

Some sites may have some degree of application functionality but that was coded by the site owners and at no point do you upload an .exe/.pl/.asp/.vb/.bin/.dll file to the web site server.

The same goes for a matrix site, it sends VR data to your Comm, you move the AR interface/think motions so the comm sends those motions back in the VRml format and the server generates the next round of data. Again, the ONLY executables were specifically placed there by the company or are inherent in the VR interface (animations, movement, physics, lighting, etc).

Hmmm, I think I just defined the difference between "user" and "security" grade access. Users have to use the standard tools, Security-approved users get to upload their own tools (aka Agents). Admins get to do whatever they want.

QUOTE (Kiyote)

My point is that the RAW does leave open the use of Agents for normal people, even if the agents have to log onto a node to access what is on the node.


My point is that the RAW does let normal people use Agents without agents needing to execute on remote nodes.
Dashifen
QUOTE (kigmatzomat)
Hmmm, I think I just defined the difference between "user" and "security" grade access. Users have to use the standard tools, Security-approved users get to upload their own tools (aka Agents). Admins get to do whatever they want.

That's basically how I look at it. Users may also have restricted access to certain nodes, namespaces, devices, or files as well. Thus, you could hack yourself a user account and use the Computer skill to edit files owned by your account but you'd still roll Hacking + Edit to deal with the security logs of your access since those files were above your security clearance (citizen).
cetiah
QUOTE (FrankTrollman)
Yes I can.

No, you can't. Nodes are not personas. None of your quotes say otherwise.

QUOTE
The persona represents your Matrix alter ego.
Now show me where it says a node represents your Matrix alter ego.

QUOTE
It is a combination of programs that you use, in conjunction with your
device’s OS, to represent yourself to other users and nodes in
the Matrix.

We know programs (agents at least) can be loaded onto Nodes. This quote tells us that a Persona can also load programs. Okay, point scored.

"In conjunction with your device's OS?"

"Your persona’s attributes are determined by the
attributes of whatever device/OS you are using to access the
Matrix—usually your commlink or terminal, though you may
sometimes access via other devices."
No problem here, but it still doesn't say your Persona is a Node.

QUOTE
Your persona’s Firewall, Response, Signal, and System attributes
are equal to the device and OS you are using to access the
Matrix.

Personas have signal ratings?! Wow, I missed that.
Saying that your persona is a node just because they both use attributes derived from your comlink is pointless. Everything that has attributes beyond "program rating" uses attributes derived from your commlink: personas, agents, and nodes. Personas are not nodes anymore than an agent is.

QUOTE
Attacks made against your persona affect the device/OS, though Black IC programs affect the actual user directly.

Uh huh. And ...? Under page 231, Black IC attacks, it specifies that damage done to a persona with Black IC affects the hacker. However, the Black IC has to trace the user to send a security hacker to the hacker's node to collect evidence. Clearly here, the persona and the node are not the same thing.

QUOTE
Icon
Your persona’s icon graphically represents you in augmented
reality (and especially in virtual reality, see p. 228),
and in most forms of Matrix communications (email, messaging,
phone calls, etc). Whether you bought your icon off the
shelf or programmed your own, icons are easily customizable
with a library of features and you can trick them out on the fly
with different animated movements, color schemes, mutable
design elements, and other digital skin eff ects. Icons take many shapes and forms, from animated characters and anthropomorphic
creatures to more artsy or abstract designs like mobile
waterfalls or swirling color patterns. All Matrix-capable
devices have default icons loaded in case the user doesn’t have
his own—usually simple blank-white anonymous anthroform
shapes, oft en emblazoned with the device manufacturer’s stylized
logo.

I don't know what the point was of posting all of this. It also does not say anywhere that agents are nodes.

QUOTE
Occasionally, programs you have loaded will add
additional elements to your logo’s look, such as the glowing
green force field of an Armor program or the blurring effects
of a Stealth program.
Altering or swapping out your icon takes a Free Action.

We know programs have to be loaded into the persona before they can be used. P.227, loading and using programs. It seems perfectly reasonable to me that if a persona has a program loaded then its icon is changed. As for "you" loading programs and "your logo" changing, the Persona is defined as the Matrix representation of "you". "You" (your persona) can't use programs unless you (your Persona) has loaded them.

P.227 also specifies another requirement. That the program must be available on your comlink. That tells us that programs can reside in the comlink that are not loaded into your Persona. These programs can be accessed by a hacker hacking into your comlink's node, but not one hacking into your hacker's Persona (because a Persona can't be hacked - but it can be traced back to its home node and then the node can be hacked.)

QUOTE
So what does this tell us? It tells us that the programs you use, that is the programs running on your commlink, are your Persona.

No, no, no. It says that programs loaded into your Persona affect the Persona, which is not unreasonable. The comlink itself must also have those programs as specified on page 227.

QUOTE
And that running them may make obvious changes to your icon.

You are changing words here to make it sound like the evidence is supporting your argument. To use a program, it must be loaded into your comlink, which effects your persona icon.

QUOTE
It also tells us that the icon is a representation of the physical object that you are using to connect to the matrix with.

That's important, because:

QUOTE (SR4 @ p. 231)

When all the boxes on the Matrix Condition Monitor are filled up, an icon crashes. If your persona icon crashes, you are immediately disconnected from the Matrix.


If this worked the way you say it does, then crashing your icon would damage your comlink. This never happens in RAW. What actually happens is that the hacker can be damaged, in the case of Black IC. The Persona is a representation of the hacker.

In actuality though, I'm sure Unwired will introduce IC that attacks the comlink with the justification that the Persona is interfacing with both the hacker and the comlink's OS. But the Persona is not the OS, nor is it the hacker. Hackers and OSes aren't nodes either, so this wouldn't help the "node = Persona argument" anyway.

Also, as I've said before, just because you are disconnected from the Matrix and the Persona is crashed, it doesn't say anywhere that someone can't hack into your node if they can connect to it wirelessly.


QUOTE
So I suppose that it is possible to try to read it that programs you are running are separate from your persona,

No, it's not possible. Programs must be loaded into your persona to be used. The only exceptions are Agents, which it specifically mentions that you can load onto nodes.

QUOTE
and thus that when people crash you out of the Matrix that you are disconnected from the Matrix, but your Commlink isn't and all the programs you were running are still churning away with no user input.

All the Agents do, yes. This is basically what agents are for.

QUOTE
But that's an incredibly counter-intuitive and stupid reading of those rules and I'm not going to dignify it it as a possibility.

No, it's a correct reading. One "counter-intuitive and stupid" example of these rules in effect is if you want to have IC protecting your PAN when you are not logged in or after your persona is defeated in cybercombat.


mfb
ugh. the insistence of people on accepting the more more complicated, less realistic, less usable explanation for how things work over the simpler, more realistic, more usable one never ceases to amaze me.

you want to believe that your persona is magically separate from the node that it's based in, go ahead. have fun making an entire new ruleset to support how it works.
cetiah
QUOTE
Okay, no. Accessing a host is different from uploading executable code. When you access a website, the system generates some information and sends it to your browser; you respond by clicking, requesting additional data using a particularly limited format.


Actually, many programs and servers are starting to explore this concept of using computer agents to provide a variety of functions as it travels to other people's hosts. I've been researching this concept in reaction to some of the posts on this thread, and I was surprised how much progress has been made in this area. In addition to the security concerns of protecting a host from malicious agents, a great deal of work and study is going into protecting an agent from malicious hosts. It sounds almost sci-fi-ish.

Google punched up lots of fascinating results to "mobile agent" keywords.

It may be new and unfamiliar to most home users, but its not so uncommon or unreasonable.

Check these out, for starters:
Wikipedia - Mobile Agent (computer science)
Intelligent Agents
Pyritefoolsgold
QUOTE (mfb)
ugh. the insistence of people on accepting the more more complicated, less realistic, less usable explanation for how things work over the simpler, more realistic, more usable one never ceases to amaze me.

you want to believe that your persona is magically separate from the node that it's based in, go ahead. have fun making an entire new ruleset to support how it works.

Or we could, you know, just use RAW.
mfb
yes. which, the way i read it, links personas to the nodes they are based in.
cetiah
QUOTE (mfb @ Feb 7 2007, 04:28 PM)
yes. which, the way i read it, links personas to the nodes they are based in.

Personas are linked to the nodes they are based in. Or rather they are linked to the OS that can be accessed through your node.

But the Persona itself is not a node.
Explain to me how a Persona can be hacked or "Exploited" like a node.
Explain to me how a node can move from one node to another like a Persona.
cetiah
QUOTE (mfb @ Feb 7 2007, 04:07 PM)
ugh. the insistence of people on accepting the more more complicated, less realistic, less usable explanation for how things work over the simpler, more realistic, more usable one never ceases to amaze me.

you want to believe that your persona is magically separate from the node that it's based in, go ahead. have fun making an entire new ruleset to support how it works.

I'm just telling you what's in RAW because you disagree. If you don't like the rules, that's fine by me. I'm not saying it "should" work that way. I have custom house rules that work very differently. They are simpler, more realistic, and more useable. I'm just telling you what's in RAW. I don't like RAW. I'm not advocating it. I just disagree with everyone attacking it by making assumptions that aren't supported by the text. There are plenty of more legitimate reasons to be attacking RAW.

(I just got the image in my head of RAW's icon and my persona engaged in cybercombat...)
mfb
oh, gosh! you're right! a persona isn't a node, i've been wrong all al--wait, i never said a persona is a node! nobody said that. nobody said personas can be exploited, or that nodes can move around. i think you may be unwell, cetiah, for you are clearly seeing things that are not actually there.

what i said, and what the rules indicate to me, is that if your persona gets knocked offline, the commlink it is based in--the one that its stats are based on--is also knocked offline.

QUOTE (cetiah)
I'm just telling you what's in RAW because you disagree. I'm not saying it "should" work that way.

no, you're reading the RAW and interpreting it in such a way that it is broken. it can quite easily be interpreted in other ways--ways which you choose to ignore. in cases where the RAW is unclear, as it is here, you can choose to interpret it such that it makes sense, or such that it doesn't make sense. you are choosing the latter, and then saying "see? see? it's broken! use my house rules instead!"
Dashifen
QUOTE (mfb)
yes. which, the way i read it, links personas to the nodes they are based in.

Links yes, requires that personas remain within, perhaps not.

I repeat a question that I think got lost in the shuffle: What, if any, is the difference between the persona and the persona icon? To me, the persona does stay, as mfb has stated above, in the home node of the person who is represented by the persona (i.e., the hacker's commlink). The persona icon, however, is the representation of that persona in the nodes that are accessed by that persona.

Thus, the persona remains in the home node and this explains why the persona's attributes do not change. However, the icon of the persona can be used to represent the persona in various nodes at the same time (hence the problems of getting attacked in more than one node).

Am I the only person here who actually things the RAW for hacking is perfectly fine?
cetiah
QUOTE (mfb @ Feb 7 2007, 04:37 PM)
oh, gosh! you're right! a persona isn't a node, i've been wrong all al--wait, i never said a persona is a node! nobody said that. nobody said personas can be exploited, or that nodes can move around. i think you may be unwell, cetiah, for you are clearly seeing things that are not actually there.

what i said, and what the rules indicate to me, is that if your persona gets knocked offline, the commlink it is based in--the one that its stats are based on--is also knocked offline.


Well... that's not my fault. You kind of jumped in the middle of an argument I was making against Frank's earlier statments when he used "seperate from your Persona" interchangeably with "in a node other than the one your Persona is located in" as an argument about how independant agents are loaded in nodes (and whether an agent loaded in your comlink's node should be considered independant).

Sorry about that. But I've stayed on topic since I jumped into this whole "node does not equal persona" argument and will do so until the issue is resolved so we can get back to evaluating the previous arguments in the bigger picture.

But your statements aren't supported by RAW either and are equally wrong. wink.gif

(1)If this were to happen, the comlink would no longer be protecting your PAN. (2)This means your firewall and all your IC are offline, too. (3)They would no longer be protecting any of your devices from incoming hackers. (4) Further, your programs and files would be immune to being accessed by hackers.

Show me where in the book it indicates that you comlink is offline as a result of a persona crash, or that any of the 4 effects above happen as a result of being defeated in cybercombat.

What actually happens is that your persona crashes, you are no longer running programs loaded into the persona, and your connection to the Matrix (or to any remote host if you are not connected to the Matrix) is terminated. NOTHING ELSE.

Further, there is a paragraph describing what happens when your connection is terminated. It never says that anything happens beyond that the connection is terminated and the hacker has to log back in (and the node may be in alert). It actually implies that nodes can terminate connections and are therefore not affected by a terminated connection. (i.e., terminating connection does not equal "shutdown node") Connections can be severed, and this does not imply an effect on anything else beyond the connection. This doesn't even cause dumpshock.
cetiah
QUOTE (Dashifen)
Am I the only person here who actually things the RAW for hacking is perfectly fine?

Probably. smile.gif
mfb
QUOTE (cetiah)
(1)If this were to happen, the comlink would no longer be protecting your PAN. (2)This means your firewall and all your IC are offline, too. (3)They would no longer be protecting any of your devices from incoming hackers. (4) Further, your programs and files would be immune to being accessed by hackers.

for the love of mike.

1. no, your PAN is not "unprotected" when your commlink goes down, it's offline. the individual devices are up and running, but they aren't communicating with anything because you've turned off their ability to do so when you set up your PAN--if you didn't, then your commlink's not protecting anything.

2. yes, your Firewall and IC are both offline. this doesn't matter, because your commlink is offline, and is therefore immune to Matrix intrusion.

3. your individual devices are immune to hackers while your commlink is offline, because unless you're an idiot, your individual devices have had their wireless capabilities disabled, so that they can only be accessed via skinlink through your commlink. if your devices haven't had their wireless connectivity disabled, then they're prone to being hacked whether your commlink is online or not.

4. and lastly, yes, if your commlink is offline, your files are indeed immune to being accessed by hackers. i don't need to point out chapter and verse because there isn't any, because those effects are the logical consequence of your commlink being offline. show me in the book where it says that if you die, your heart stops beating.

having your connection to a particular node severed != getting kicked offline. if you are banned from a website, that doesn't cause Firefox to lock up--you just can't access that website anymore.
This is a "lo-fi" version of our main content. To view the full version with more information, formatting and images, please click here.
Dumpshock Forums © 2001-2012