Help - Search - Members - Calendar
Full Version: Literal Problems with the Matrix
Dumpshock Forums > Discussion > Shadowrun
FrankTrollman
OK, since it was requested by my estemed colleague DemonseedElite, here is a list of actual rules problems with the Matrix. Note, this is not for problems like "I don't like the way that X is handled!" it's for things like "The rules say that X is handled like This on one page and like That on this other page, what the hell?" In short, things that actually have to be fixed in Unwired, rather than things that one or another person would like changed.

Dice Pools The biggest single problem in the book. When you are hacking into an electronic door lock, your dicepool is defined as Logic + Hacking on pages 124 and 223, and defined as Exploit + Logic on pages 221 and 223. In the former case, the Exploit program is completely worthless because it doesn't actually do anything, in the latter case Logic is useless to Hackers because it doesn't actually go into their dicepools at all.

Jamming What does a Jamming test do? The test is defined on page 124 as being a Logic + Electronic Warfare (Jamming) test. Do net hits add to the effective rating of your jammer? How long do they do that for? It's not actually defined.

Agents Running Programs Let's say you have three Agents in a node running Analyze. Does this count as 3 programs in the node, 4 programs in the node, or 6 programs in the node?

Agents Attacking Nodes An Agent can transfer itself to another node to act there without using up your program limits (see pgs. 227 and 228). Does it have to? Can it just hang back on a commlink you own and attack the same node you're attacking? Is there any possible limit to that?

Independent Unpirated Agents An agent can be left operating while you are not subscribed to it or even off line (see p. 228), how are you then limited to only one if the physical chip with the program on it doesn't need an active connection to the agent while it is operating? Couldn't you just cut the connection and boot it up again while the old copy was still running?

Agent Smith and Subscription An Agent can continue doing what it was last told to do while no longer subscribed (see p. 228). If you have a pirated Agent which can be loaded up iteratively, doesn't that mean that you can load it, give it instructions, send it out, cut it off, and repeat. Forever? With like infinite Agents? All of them performing redundant tasks like chain Medic or Hack assist...

System Slowdown How many programs does it take to slow down a commlink? Which programs count towards that limit? Does a Metalink really drop to 0 response the instant it runs any program?

Command Prgram Seriously, what does this program even do? Is there a difference between rating 1 and rating 4?

---

Obviously, others can contribute. I'll be thinking about it and throwing in a few more I've run into over the years.

-Frank
sunnyside
Actually a bunch of those are addressed in the FAQ to varying degrees.
Moon-Hawk
QUOTE (sunnyside)
Actually a bunch of those are addressed in the FAQ to varying degrees.

Addressed, or solved?
Rotbart van Dainig
QUOTE (sunnyside @ Jun 22 2007, 11:27 PM)
Actually a bunch of those are addressed in the FAQ to varying degrees.

They just got some completly backwards.

'Agents Running Programs' isn't even a problem by RAW:

An Agent running counts as one Program. An Agent has a Pilot, and thus the equivalent to a System equal to its Rating. You can load Programs into Agents by RAW, but those Programs run all the time on that Agent. Those Programs are controlled and limited by the Pilot of the Agent - thus, the Agent counts still as one Program to the Node.

As Agents don't have a Response on their own, the fun starts when they try to access lower Response node and they just have to drop Programs - or crash... Agents Rating 0 don't make any decisions anymore.
FrankTrollman
QUOTE (sunnyside)
Actually a bunch of those are addressed in the FAQ to varying degrees.

The key term here is "to varying degrees". For example, here's a beauty:

QUOTE
Does a reduction in Response from running more programs then the System rating also result in a reduction in System? What happens if Response is reduced to 0?

No, otherwise it's a cascading reduction (lower System lowers the amount of programs, which lowers your Response again, and so on). The overload from running too many programs only affects your Response.

If Response reaches 0, your system is overloaded, and slows to a snail's crawl. Think Windows 98.


OK... but can a Metalink run any programs? The book still says that slowdown happens when the number of programs equals the system. So an OS with a system of 1 has slowdown with just one program. In short, the FAQ says that the cascading slowdown and lockup doesn't happen, but it doesn't actually replace the rules on pgs. 212 and 213 which cause cascading slowdown with anything.

Or how about this gem:

QUOTE
Are programs optional? It says to use Computer or Hacking skill + Logic when "interacting with a device," but to use Computer or Hacking skill + program rating when using a program. So can I just use Logic, or is computer use/hacking impossible without programs?

In most circumstances, you will be using Computer/Hacking + program rating. In cases where a program would apply, but isn't available, the character must default.

Logic is used when you are utilizing a device within its standard parameters (Computer) or trying to bypass those parameters through the device's own OS (Hacking). For example, let's say your character finds an unfamiliar electronic device in a research lab. Computer + Logic would be used to identify the device, figure out what it is, and figure out how to turn it on. Let's say that device happened to be a new holo projector prototype. Computer + Logic would also be used to determine what features it has and how to use them. If the character wanted to bypass the controls that prevent the projector from playing pirated movies, porn, or media feeds from unapproved Matrix nodes, he would use Hacking + Logic. If he wanted to take it apart and see how it worked, he would use Hardware + Logic. If he wanted to edit a holo media file, analyze the device's Firewall, or search its usage log, he would use a program (Edit, Analyze, and Browse, respectively).


So it says that you do use Programs, but then it gives you an example of what is essentially normal hacking that doesn't use programs and simply uses Logic + Hacking. In short, the FAQ answer answers the fundamental dicepool question both ways, which is no answer at all.

-Frank
hobgoblin
Agents Attacking Nodes: my understanding of this one comes from page 227, using agents. by the looks of it there are two ways you can use a agent, independently loaded onto a node, or loaded into your persona.

so imo, you have to either load it into your persona, and that means running it on the comlink that your currently using, or load it onto a node. in the latter case im guessing that it can only affect the node that its currently loaded on, and would have to transfer onto any node you want it to attack. but in the former case, the agent and persona is joined at the hip, and where ever the persona goes, the agent goes.

Command Program: my understanding here is that it works like a virtual remote control. it may provide you with a steering wheel, shifter paddles and so on when driving anything car like and so forth.

if one have ever seen people operate a UAV or mini-sub, thats basically it. only that you using AR or VR to present the screen and control, rather then physical ones.

Independent Unpirated Agents: this have been a problem with "effective" copy control in SR from as early as i have interested in it. best guess is that there is some kind of flash or other storage in the chip that gets flipped when the program or agent is fired up and not reset until one can confirm that the program in question have been safely stopped.

the problem is that DRM just dont work as a concept. but if its removed from the game, we are looking at the agent smith scenario. the SR matrix equivalent of gray goo i guess...
Rotbart van Dainig
QUOTE (hobgoblin)
but if its removed from the game, we are looking at the agent smith scenario. the SR matrix equivalent of gray goo i guess...

At least that goo had cool shades.
Cheops
QUOTE (FrankTrollman)
Dice Pools The biggest single problem in the book. When you are hacking into an electronic door lock, your dicepool is defined as Logic + Hacking on pages 124 and 223, and defined as Exploit + Logic on pages 221 and 223. In the former case, the Exploit program is completely worthless because it doesn't actually do anything, in the latter case Logic is useless to Hackers because it doesn't actually go into their dicepools at all.

Jamming What does a Jamming test do? The test is defined on page 124 as being a Logic + Electronic Warfare (Jamming) test. Do net hits add to the effective rating of your jammer? How long do they do that for? It's not actually defined.

Agents Running Programs Let's say you have three Agents in a node running Analyze. Does this count as 3 programs in the node, 4 programs in the node, or 6 programs in the node?

Agents Attacking Nodes An Agent can transfer itself to another node to act there without using up your program limits (see pgs. 227 and 228). Does it have to? Can it just hang back on a commlink you own and attack the same node you're attacking? Is there any possible limit to that?

Independent Unpirated Agents An agent can be left operating while you are not subscribed to it or even off line (see p. 228), how are you then limited to only one if the physical chip with the program on it doesn't need an active connection to the agent while it is operating? Couldn't you just cut the connection and boot it up again while the old copy was still running?

Agent Smith and Subscription An Agent can continue doing what it was last told to do while no longer subscribed (see p. 228). If you have a pirated Agent which can be loaded up iteratively, doesn't that mean that you can load it, give it instructions, send it out, cut it off, and repeat. Forever? With like infinite Agents? All of them performing redundant tasks like chain Medic or Hack assist...

System Slowdown How many programs does it take to slow down a commlink? Which programs count towards that limit? Does a Metalink really drop to 0 response the instant it runs any program?

Command Prgram Seriously, what does this program even do? Is there a difference between rating 1 and rating 4?

1. As someone else pointed out the FAQ answers the problem. Whenever you attempt to use an electronic device in a fashion that doesn't fall under the aegis of a program you use Logic+ something.
The one use of Hacking + Logic in that example seems like it is akin to changing system settings that you aren't supposed to be able to change. Kind of like getting rid of the adult filters on your web browser when you are a horny 13 year old. It doesn't take a complicated program to change the settings but it does take some knowledge of how things work. I guess they wanted to use Hacking for something so they used that instead of Computer (could be either in my opinion).

2. Jamming doesn't need a test as per p. 225. You just turn it on. Don't know why you'd want a specialty in something you don't roll. The reference on p.124 makes no mention of rolling for Jamming either. Just that it is a specialty of EW. This may be something that'll come up in advanced jamming rules or some such.

3. It is 6 if you have loaded Analyze into each one or else 7 if you have 3 agents each using the program and the program loaded on the node. Theoretically it could just be 4 programs--3 agents and 1 analyze. However, as soon as those agents are told to use the analyze then the number of programs goes up by +3. The key thing is that any loaded programs or programs in use by agents count against the node/commlink's program limit. They talk about this exactly in the FAQ.

4. An agent is running on some system. If it is loaded into your persona (commlink) then it goes everywhere with you and has the same access and subscription list. It's response would be equal to the response of your persona. If you load it onto a separate node (other than your persona) then it is separate from your persona and needs its own access and has its own subscription list. It would operate at the response of the node on which it is loaded. In either case the agent can operate remotely from the "home" node/commlink. It still counts its programs against the limit of its "home" but it operates at the response of the node on which it is currently active. It would need to independently get access to the remote node for itself (requiring legitimate access or else hacking in).

Yes the agent could just hang back on your commlink and attack the same node. It would count as a program that you are running PLUS any programs that it is using. So if it is attacking with armor, attack, and medic that now counts as 4 programs against your program limits. I don't know what you mean by limit. If your system/response drop to 0 then everything crashes and you've hit your limit.

5. This one needs addressing. I just say that that can't happen. Copy protection may be beefed up in Unwired.

6. Yes, except they would all have to be loaded on nodes separate from your commlink or else your commlink will crash as it hits its limit. Also since they are all operating independently they would all need their own access to go to new nodes. That means each one would have to hack its way in or be given separate access. Also note that you can't get more than +5 dice from teamwork tests.

Personally I would also say that they can't Hack In assist since they have separate AID and thus would be hacking their own access associated with their access ID.

7. As soon as you hit System you get -1 Response. Your system is capped by response. So if you have 5 and 5 and you are running 10 programs you get -2 response. This lowers it to 5/3 but since system=response you are now 3/3. This means all of your programs operate at rating 3 now. The FAQ got rid of the cascading problem by stating that you just add up all the programs and compare to BASE SYSTEM. So if you are running 10 and drop your system to 3 you are not now at -3. It is still only -2.

Yes the instant that a metalink operates any of the common use, hacking, or pilot programs it crashes. It is only meant to store data, make phone calls, operate word processors, text messaging, email, etc.

8. The command program allows you to substitute the program for Reaction while piloting a remote control device. So instead of Reaction + Ground Vehicles you can use Command + Ground Vehicles. Basically, as stated by someone else, you are controlling it via joystick/virtual dashboard (to use SR3 terms).
----------

I think that the only things that are missing that seem to anger people are:

1. Advanced Jamming
2. Advanced Encryption/Decryption
3. Advanced Copy Protection
Rotbart van Dainig
QUOTE (Cheops)
Yes the agent could just hang back on your commlink and attack the same node. It would count as a program that you are running PLUS any programs that it is using.

Again: Those Programs run on the Agent's Pilot and not on the Nodes System. They are neither limited by it directy nor cause Response loss.
Cheops
QUOTE (Rotbart van Dainig)
QUOTE (Cheops @ Jun 23 2007, 01:08 AM)
Yes the agent could just hang back on your commlink and attack the same node.  It would count as a program that you are running PLUS any programs that it is using.

Again: Those Programs run on the Agent's Pilot and not on the Nodes System. They are neither limited by it directy nor cause Response loss.

From FAQ: (emphasis added)

QUOTE
Do all the programs loaded into an agent affect the response of your commlink if the commlink is running the agent?  Only if the agent is using those programs at the same time as the hacker.

Does an agent loaded into a node and running independently count as a program running on that node for the purposes of response reduction?  Yes.

Do all the programs loaded into an agent affect the response of your commlink if the commlink is running the agent?  Only if the agent is using those programs.


According to the FAQ agents don't run ANYTHING on their own Pilot. It's all run off of whichever node the agent is loaded onto.

Maybe your confusion is what slows down the agent? Whether it is how many programs it is currently using compared to its system or if it is the program load on the host node?

I'd answer that by saying that all programs being used by the agent count against its system for response loss. This is then applied against its response which = node on which it is active. So if it is active on your commlink which is 5/5 and you are running 10 programs (4 + agent + agent using 5) then your commlink is now 3/3. Let's say that the agent is Pilot 5. It is suffering a -1 penalty because it is using more than it is allowed. This would stack with the penalty from the commlink. So the agent now has system/response of 2/2 (response 3 of host, -1 for program load, system capped by response). This would mean that agents can get a double hit for response loss.

The alternative would be that they only get hit once and it is equal to the program load of the system. So in the above example the agent would be 3/3.

If the agent then ran independently and moved to a node that has response 3 to begin with then it would be 1/1 (Response 3 -2 from host node's response reduction = 1) This means that agents may have to restrict how many programs they are using when they access a low response system.
FrankTrollman
There seems to be a basic misunderstanding of the purpose of this thread. This is not to place the way your group handles these questions. It is not the place to put which text you think has precedence or how you think these questions can be resolved. This is a thread to keep track of the legitimate questions that exist with regards to the rules.

Frankly, I don't give a damn how you run your game for the purpose of this thead. Any post about what you think the answers to these questions are or should be is completely off topic.

Seriously, what the fuck is this:
QUOTE
The command program allows you to substitute the program for Reaction while piloting a remote control device. So instead of Reaction + Ground Vehicles you can use Command + Ground Vehicles.


Can you now? Really? Where does it say that? Got a page citation?

QUOTE
QUOTE
Yes the agent could just hang back on your commlink and attack the same node. It would count as a program that you are running PLUS any programs that it is using.


Again: Those Programs run on the Agent's Pilot and not on the Nodes System. They are neither limited by it directy nor cause Response loss.


You're both wrong and this is not the place to argue it out. The fact is that the text is ambiguous as to whether a program running on an agent running on a node counts as running on the node. The FAQ doesn't answer that question (or rather, it answers that question in an ambiguous fashion that could be interpretted either way).

The point of this thread is not to hash out which way it should work, but merely to hash out which things there is genuine question as to which way they work.

-Frank
Rotbart van Dainig
QUOTE (FrankTrollman)
You're both wrong and this is not the place to argue it out.

The only ones wrong are Cheops and the FAQ.
If the RAW got one thing basically right, it's the Payload rules on p. 228.

The point is valid, though, as the mistaken information should be taken from the FAQ.
Cheops
QUOTE (FrankTrollman)
There seems to be a basic misunderstanding of the purpose of this thread. This is not to place the way your group handles these questions. It is not the place to put which text you think has precedence or how you think these questions can be resolved. This is a thread to keep track of the legitimate questions that exist with regards to the rules.

Frankly, I don't give a damn how you run your game for the purpose of this thead. Any post about what you think the answers to these questions are or should be is completely off topic.

Seriously, what the fuck is this:
QUOTE
The command program allows you to substitute the program for Reaction while piloting a remote control device. So instead of Reaction + Ground Vehicles you can use Command + Ground Vehicles.


Can you now? Really? Where does it say that? Got a page citation?

QUOTE
QUOTE
Yes the agent could just hang back on your commlink and attack the same node. It would count as a program that you are running PLUS any programs that it is using.


Again: Those Programs run on the Agent's Pilot and not on the Nodes System. They are neither limited by it directy nor cause Response loss.


You're both wrong and this is not the place to argue it out. The fact is that the text is ambiguous as to whether a program running on an agent running on a node counts as running on the node. The FAQ doesn't answer that question (or rather, it answers that question in an ambiguous fashion that could be interpretted either way).

The point of this thread is not to hash out which way it should work, but merely to hash out which things there is genuine question as to which way they work.

-Frank

p. 220 -- Controlling Devices. If you check Command, under Common Use programs you get the page reference of Drones p. 238. On pg. 238 you get the reference to page 221 which is on the opposite side of the correct quotation.

QUOTE
Remotely controlling a drone would take a Command + vehicle skill Test..."


Right side of pg 220, 2nd to last paragraph, last sentence.

The FAQ explicitly says that the program running on an agent running on a node counts against the node that is running the agent. Read the parts of the FAQ that I quoted again.

I'm sorry if I derailed your thread. People put up questions that can be answered by the rules as written (BBB/Errata/FAQ). I answered those questions and pointed out the areas that needed more rules. Perhaps the issues isn't that the rules need clarification but that the rules need to be organized better.

Before you call me out on something and ask "what the fuck..." maybe you should fucking read the rules. Then maybe you wouldn't have issues with things.
fistandantilus4.0
Once again extinguish.gif The purpose of this thread is simply to list the issues, not discuss it. What was asked for was a clear, concise list, not a debate. Please feel free to open up yet another friendly thread and discuss individual parts to your heart's content.

That being said, chill out. Obviously people feel strongly about some things. Super. Doesn't give anyone the right to start digging in to each other. If people need a day or two to cool down, it can be arranged. Otherwise, please, keep it on topic, make the list, move on.

Thanks.
Cheops
QUOTE (Cheops)
1. Advanced Jamming
2. Advanced Encryption/Decryption
3. Advanced Copy Protection

Don't know...that seemed like a list to me.
fistandantilus4.0
Please, please don't antagonize.
Demonseed Elite
Thanks for this thread. I agree this isn't the thread for arguing these viewpoints, though I appreciate when someone points to a page reference or a rules/errata/FAQ quote that may differ with or clarify an earlier statement.

I don't really need the arguing, as I plan to look over these or pass them around to the other writers/devs, but page numbers and quotes are helpful.
hobgoblin
sorry that i misunderstood the point of this thread.
WearzManySkins
Maybe not entirely in the matrix the questions

1. The pilot definition and what is rigger adapted or not.

2. Does GrideGuide rig vehicles to function, ie remote control?

Rotbart van Dainig
Connection Limits - Right now, we got two slightly different set ofs rules concerning limited connections: The subscription rules on p. 212, Linking and subscribing and the connection rules on p. 218, Accessing multiple Nodes. What do they intend to limit exactly? Do they really stop us from filesharing with more than 12 peers, or watching more than 12 different news stations at the same time, and make the max size of conference calls 12 users?

Network Transparency - As per p. 212, Logging On/Off, 'the user must leapfrog to the node through other nodes.' if not in direct connection range. Does this really mean that acessing a website at the other end of the world is a dungeon-crawl through every router, backbone and relais in between? What about making a comcall? Do you really have do spend a log in action just to read a web page? What about an Agent seraching the Matrix for infos - does he really have a different dicepool every few turns as he change nodes?

Persona Overload - Does your Persona Icon really pops up on every Node you access, with every commcall you make and is present on every digital garment your wear and slaved to your com - cluttering any public node with ideling zombie Personas? What happend to iconless 'tortoise mode' that allowed you basic access?
Aaron
QUOTE (FrankTrollman)
Command Prgram Seriously, what does this program even do? Is there a difference between rating 1 and rating 4?
Serbitar
Im throwing in the old matrix FAQ as I think most of the questions have not been answered and that have been answered got strange answeres that dont answer much and throw up more questions (see Franks Examples).

Note that some stuff should be clarified in Unwired but most of the stuff is realy basic and an actual flaw of the basic rules. Ive marked the important things in bold.

So here you go:

Q: Do IP augmentations affect AR actions!?!!?
---
Q: does a reduction in response from running more programs then the system
rating allso result in a reduction in system?
---
Q: Do agents have to hop nodes or can they be run on a comlink and only access other nodes?
---
Q: Can one Edit the wireless signal between a Rigger and his Drones to
input completely different commands?
---
Q: After hacking a Drone, does one have to subcribe the Drone to his
commlink before he issues commands or "jumps in"?
---
Q: Can Agents load Agents and thus spawn the overwhelming hordes?
---
Q: Does an Agent loaded into a node count as a program running on that
node for purposes of Response reduction?

---
Q: "When you are directly interacting with a device, using Hacking skill
+ Logic. If you are utilizing a program, make tests using Hacking Skill +
program rating"

This seems to suggest that programs may be optional (hence the "if", not
"when"), and also suggests that a Hacker can directly interact with a
device (another commlink, a remote host, a drone, etc.) using only hacking
+ logic. Is this the intended interpetation of the rules, or, as I have
heard on this board, is it impossible to do any hacking without using
programs? In SR3, I remember programs being supplemental (and very
important) to intellect, not a replacement.

---
Q: Do Technomancers still need a commlink for everyday stuff?
---
Q: Do Technomancers need i.e. contact lenses or cybereyes to use
smartlinked guns? Which leads to...
---
Q: How do Technomancers percieve AR? Inner eye? Intuition? Like Neo in the
Matrix movies?
---
Q: Does a jumped-in rigger use agility for gunnery tests?
---
Q: Is one able to circumvent the subscription rule by spoofing your ID?
---
Q: Is an alarm only triggered by glitches after you successfully hack in?
If not, by what else?
---
Q: How does patrolling IC work? How do they find out you are an intruder?[b/]
---
Q: Is a sim module inlcuded in a cranial comlink? (no in 3rd print, yes in
1.3 pdf)
---
Q: Does lowered response affect system and thus programme ratings, or is
the lowered rating only used for rolls where response is involved directly
(for example matrix reaction) ?
---
[b]Q: Do all the programmes loaded into an agent affect the response of your
comlink if the comlink is running the agent?

---
Q: Do I have to hack 5 comlinks if they are all chained together in a
subscription line, to get to the comlink at the end of the line?
(ie. A-B-C-D-E the hypen meaning a subscription to aonly accept traffic
>from that node)
---
Q: Can I change system settings (Accounts, subscription lists) of a node
by inserting false traffic into the traffic to that node?
---
Q: Does the admin account have any restrictions?
---
Q: Can I still be identificated by the system as a hacker once I hacked in
as an admin? If yes, how?
---
Q: Can I fight a matrix fight in one node and let my icon be repaired by
an agent in another node? If not, what are the restrictions?
---
Q: What exactly does the Command software do? If it's used with drones,
when is it used and how?
---
Q: Can an agent/pilot program be given a Computer skill program to help
with/automate the programming process of new hacking programs?
---
Q: Are there any situations where the opposed test for running a Reality
Filter is not actually required? (i.e. when running it while performing
tasks on your own commlink)
---
Q: Is it possible to modify a Sim Module to disable the emotive tracks of
simsense, or is feeding your AR/VR through the various *-Link implants
(Image Link, Sound Link, Touch Link...) instead of using a sim module the
only way to avoid simsense-induced emotion?
---
Q: What are the benefits of having a system use Linked Passcodes or
Passkeys over Basic Passcodes? The rules for Hacking on the Fly and for
Probing the Target don't seem to care what type is used.
---
Q: Can a Matrix Perception Test tell the difference between a user who
logged in using a Linked Passcode / Passkey, and a user logged in under an
account that doesn't have a Linked Passcode / Passkey because their
account is a backdoor created using the Probing the Target method?
---
Q: What exactly does it mean to encrypt a device? A signal?
---
Q: When using Edit to manipulate data in real time (video feeds, etc.) are
there any guidelines for what the program is and isn't capable of?
---
Q: A node on Alert gains a Firewall bonus against the intruder who
triggered the alert. However, under both types of breaking-in scenarios
(Hacking on the Fly, Probing the Target), it is possible to trigger an
Alert and fail your break-in attempt at the same time. Can a Node identify
a specific intruder even when they fail to break in? In other words, if an
intruder attempts to break in, fails and triggers an alert, does the
Firewall get the Alert bonus if they try a second time to break in?
---
Q: When exactly is the Data Bomb program considered to be running?
---
Q: What determines whether a character is a Hacker or not, for the
purposes of awarding points for Simsense Vertigo?
---
Q: A Technomancer's organic wireless link allows them manipulate EM fields
to be able to receive and broadcast a wireless signal. Does it also allow
them to manipulate the electrical field on the surface of their skin,
thereby letting them communicate directly with skinlinked devices without
any additional hardware?
---
Q: What happens when Response drops to 0 as a result of running too many
programs? Does the device simply refuse to run any more programs?

---
Q: On page 216, it notes: "Note that standard electronic devices only have
admin accounts, as there is no need for other accounts for their
software."
Are commlinks standard electronic devices for this purpose? Could you
please give examples of other standard electronic devices?.
---
Q: When sending an Agent of to perform a Datasearch, he jumps Nodes. As
his Response is defined by those, what dicepool does he have when
searching the entire Matrix?

---
Q: On page 216, it notes: "Note that standard electronic devices only have
admin accounts, as there is no need for other accounts for their
software."

When attempting to break in to a standard electronic device (whether using
Hacking on the Fly or Probing the Target) do you automatically fail if you
attempt to gain User-Level or Security-Level access?
---
Q: Why are drones and devices treated differently? Why is Pilot an OS and not just a program? Is an agent an OS because it has a pilot rating?
---
Q: Can I hack an opponent's cybereyes and guns? Do they count as standard
devices? If so, is it necessary to install ICE or unplug these devices?
How would I do so?
---
Q: Can Agents perform or assist in Teamwork tests?
---
[Q: Is it possible to insert a Pilot as the OS of a commlink and/or device?
---
Q: If the above is possible could a Pilot Commlink hack for itself (with
adequate instructions)
---
Q: Does "flavour" programs like Wallspace, Virtual Person etc affect
Response?
---
Q: How many "pre-set" commands can I give a Pilot? Could I limit what
kinds of orders it is allowed to receive, what language they have to be in
for example?
---
Q: How many standing orders can I have for an agent? Can it doublecheck
orders from a controlling persona for a drone to prevent spoofing?
---
Q: Can Agents use medic on each other or the hacker?
---
Q: For agents to affect each others with programs (medic for example) do
they have to be in the same node.
---
Q: What happens to a Commlink with Response 1 who runs 1 program - Does it
shut down?
---
Q: Can vehicles perform Jamming with their Electronic Warfare Autosoft
alone or do they need some kind of hardware?
---
Q: Are all Drones classed with average matrix attributes of 3 or does (for
example) the Steel Lynx classifies as a "Security vehicle" and then have
Matrix Attributes of 4?
---
Q: How do drones, nodes, agents and autosoft fit together?
Is a drone a node that is running an agent (the pilot programme) of rating
3 that is in return running the autosoft?

--
Q: What happens if the agent (mentioned above) is running more than two autosofts?
---
Q: Are the encryption rules meant to be that way?
(A moderate hacker, everything rating 3, can hack the best available
encryption in 18 seconds.)
---
Q: Do you need a rigger control to jump into a vehicle?
---
Q: Can agents load and unload new programmes?
---
Q: Isnt a rating 6 agent running on his own comlink better or equal to
most maxed hackers. What stops anybody (especially runners) from just
letting rating 6 agents do all the work?

---
Q: Because of the differences in how a Technomancer's Living Persona's
ratings are generated compared to a normal Commlink, is a Technomancers'
System rating limited by their Response rating? It doesn't seem that
Technomancers' forms affect their Response, so would the Response still
affect the rating of System?
---
Q: Put hopefully more simply: Is a technomancers System rating the lowest
of (Resonance or Logic), or is it the lowest of (Resonance or Logic or
Intuition)?
---
Q: Do Technomancers have a "living node" that houses their persona? If so,
can it be hacked by others? If so, can a hacker screw up the
Technomancer's normal neurological functions?
---
Q: Could you clarify the game-mechanics effect of subscripting a device to
only accept input from another device (say, a drone to the rigger's
commlink)? Is this simply fluff text, or does it make the peripheral
device completely unhackable except through the master device?

---
Q: Do drones need to remain within Signal range of their rigger, or can
they be remotely rigged via Matrix coverage?
---
Q: When crack sprites trigger an alarm it is suppressed for several turns
- if in the meantime the sprite hacks in, can the alarm be disabled?
---
Q: When you trigger an alert, will security automatically spot you, or do
they still need to succeed in an opposed matrix perception test?
---
Q: Matrix Condition Monitors (SR4 p. 231) are defined as using
8+(System/2) to calculate the number of boxes. But what about sprites? Is
the MCM for a sprite determined by the node it currently resides in? Does
it use the System of the living persona of the technomancer that summoned
it, or should you use either the Rating or Response of the sprite? Should
you use the highest value of any of the attributes (Response, Firewall)
that can be higher than Rating?
---
Q: Can sprites be detected in a node?
---
Q: How do they avoid being noticed?
---
Q: Do they need an account to avoid being flagged as an intruder?
---
Q: Do they have to be inthe node with the TM to aid the TM ?
---
Q: In one of the Shadowrun Missions (Best Served Cold I think) the runners
get pinged by a security drone to check their commlinks. Does this mean
that if you have LOS on a person you can automatically ping them to
determine what mode their commlink is in without having to use Scan to
check all nodes?
---
Q: Can Crack sprites hack a system for a TM and pass along the back door
to him?
---
Q: Since System and Firewall are programs is it possible to encrypt them?
Specifically can a TM use a courier sprite at rating 1 to prevent the
system from communicating with the firewall?
---
Q: If a character implants a simrig, full arms, legs, torso, skull, and
builds a neck brace could he be rigged like an anthroform drone?
---
Q: Can spirits and critters (i.e. dragons) use AR?
This is a "lo-fi" version of our main content. To view the full version with more information, formatting and images, please click here.
Dumpshock Forums © 2001-2012