Help - Search - Members - Calendar
Full Version: Nash Equilibria and Matrices
Dumpshock Forums > Discussion > Shadowrun
Pages: 1, 2, 3, 4, 5, 6, 7
FrankTrollman
There is a time and a place for nonsensical adventuring, and it is called Dungeons and Dragons. How does a room full of top predators stay alive and successfully breeding new generations for hundreds if years inside a locked tomb in the middle of the desert? Who cares!? Let's kill them and take their stuff. Stuff which they have, for no reason.

But in games with a "grittier" feel, there is a desire for the world to make some sense. If you're breaking into a building full of monsters and locked doors, someone actually built that building. They also had some well-paid architect go through and design the fire escapes, the locking mechanisms, the floor plan. And you had someone actually put all the monsters there. And they didn't ust put duck-rabbits all over the place in order to fight adventurers and drop loot, they put magical animals in specific locations for use as guards, research subects, and pets. They do not have wandering monsters wandering around their homes and offices because that would cause their employees to get killed. That would be bad.

Nash Equilibrium

The basic concept of Nash Equilibrium is that if you are in conflict with others it is best for you to use your best strategies. Sounds non-controversial, right? Well, the second part about Nash Equilibrium can best be summated with the "Wine in front of me" argument from The Princess Bride - because the people you are in conflict with know that you are going to want to use your best strategies. And you know that they are going to use their best strategies, and they know that you know and all that.

But the third part of Nash Eqilibrium is that your "best" strategy depends upon what your opponents are doing. And your opponet's best strategy depends upon what you are doing. That attacks and defenses evolve, and do so extremely quickly, to maximize the effectiveness of their offenses and defenses against their opponents.

Your Opponents Are Not Static
It is all well and good to plan the perfect heist, the killer crime, the ultimate attack. But the fact is that you are not the only tactician in the world. Other people are also inventing, also perceiving and closing weaknesses, and if you wait long enough your attack will be decidedly less than ultimate. Shaka Zulu did some amazing strategic and tactical innovations right up until he met with gun toting Europeans coming the other way.

So regardless of how the world is described, if there is an exploitable weakness in it which is fixable in a manner which is affordable and simple, that weakness will not last long. If a problem has an easily presentable solution, that problem will be solved. And soon.

Which means that if the game world depends upon the players exploiting some weakness over and over again in order to accomplish things, the solution to that problem cannot be "easy", or the world is inherently unstable. The entire campaign has a very perceivable end which wil approach very very soon.

Budgets are not infinite
A lone nut can, on occassion, stand on the upper story of a book depository and shoot a very important man in the face. This is generally quite difficult because powerfl individuals have people going around looking for guys with firearms and axes to grind. Given enough of these people, they would find all the lone nuts, but as is they merely catch most of them. Vulnerabilities which are sufficiently expensive to solve 100% of the time are not going to be solved 100% of the time.

A really useful fact for the game world is that if security that is good enough to keep out all of the rabble and merely challenging for the player characters happens to be the economical choice based on costs and projected losses - it is reasonable to expect security which is challenging and exciting every time you run into it.

Computer Security
Modern day covert ops teams don't bring computer hackers with them. The reason is multifarious; from the fact that may hackers can do their thing from home, to the fact that most hackers work at least as well on their own, to the fact that hackers tend to not be super good at a lot of "covert ops" style tasks. But the really important part is that computer security that is essentially unbeatable by anyone who does not have your password or physical access to your computer in their laboratory is extremely easy to come by.

Noone has ever hacked a z/OS server and they probably never will. NetBSD is essentially impenetrable, and is likely to stay that way for the foreseeable future. Using the "sneaker net" - that is putting a physical lack of connection between the outside world your data, carrying flash drives with the tranmissable data to networked machines and keeping the secure data in a place which is actually secure - has been shown to be essentially unhackable under any circumsyances.

Nash Equilibrium in the Modern Day
What this means is that the Nash Equilibrium has already been reached in the modern world using realistic computer standards of 2007. Actually secure data cannot be hacked and Navy Seals don't bring hackers on covert missions. Not even into hostile office buildings.

And what that means is that any system which falls back on any of the core assumptions we make about modern computer security - will inevitably result in a Nash Equilibrium which maps to our present experience: covert operations teams don't even bother having a Computer Specialist. And while you could run a game like that quite easily, the Shadowrun conceit is that the team has Dodger, Sally Tsung, and Ghost Who Walks on it. And for that conceit to hold, the Nash Equilibrium has to include computer specialists as its endstage.

Nash Equilibrium in the Shadowrn Future
So here's the important parts: it can't be simple or cheap to keep out a matrix specialist, or people would do that. That means that the air gap, even the sneaker net, can't work. But it's more than that. The cheapest alternative of all of course is simply not having a computer, which means that you're down to one of three possibilities:
  1. People gain benefits from computers which are so astoundingly awesome that they would genuinely be willing to accept the vulnerability of potential hacking anyway.
  2. Not having computers makes you more vulnerable to hacking.
  3. You have some sort of crazy ace that I don't even know.
But in order to make the game work, you are going to have to encode one of those into actual rules. Seriously.

-Frank
deek
Well, couldn't one simply say that in 2071, that AR is so relevant and needed, that people would suffer, say a -6 to all actions? I think that would give the SR world the feel it is trying to put forth in fluff, that everyone has a commlink and everyone is ultra-reliant on AR to function everyday.

I mean, even mages would have to follow this...

There's a solution that doesn't involve brain hacking and is relatively easy to implant into any existing game...
FrankTrollman
QUOTE (deek)
Well, couldn't one simply say that in 2071, that AR is so relevant and needed, that people would suffer, say a -6 to all actions? I think that would give the SR world the feel it is trying to put forth in fluff, that everyone has a commlink and everyone is ultra-reliant on AR to function everyday.

I mean, even mages would have to follow this...

There's a solution that doesn't involve brain hacking and is relatively easy to implant into any existing game...

Saying that people can't accomplish basic life and archetype functions without being plgged directly into a computer would in fact force a Nash Equilibrim in which people ran systems that were hackable.

Would you find that less offensive than a situation in which people who have machines that can directly affect the mind, and attack programs that damage the minds of enemies, could use those two together to damage the minds of enemies directly? I know definitively that I would not. I would find it more insulting if I was unable to effectively shoot a rifle or sneak through the woods without an active computer link than I find the concept of people remotely triggering conformational changes in the nerves of targets who don't have any special antenna equipment on them.

Of course, I don't find the second option at all implausible or far fetched, so the fact that I find the concept of it being in any particular way difficult to fire a gun or walk quietly without computer asistance makes the question pretty one sided.

-Frank
deek
But that is personal taste...I think the SR4 world is open to either of those options, those being:

1) People are so dependent on computers (i.e. AR) that they actually find it harder to do everything without

2) That the brain has been unlocked and a "hacker" with the write tools and knowledge, can target any mind and attack it, regardless of its connectivity to the matrix

Those are both plausible assumptions in 2071.
noonesshowmonkey
So is a post-nuclear holocaust. But that would be Fallout... Or maybe Gamma World.

Either case, its not really "Shadowrun" anymore. Brain hacking your mom for no reason is not necessarily "Shadowrun" except for extremely rare occurances of wtfbbq stuff (otaku etc).

I mean, I am no expert on SR background info, but that seems like a rather severe departure from the accepted reality of the 6th world.

- der menkey

"Certainly there is no hunting like the hunting of man and those who have hunted armed men long enough and liked it, never really care for anything else thereafter."
~ Ernest Hemingway
Eurotroll
Frank, I'm not entirely certain I fully grasp get why you so emphatically reject both air gap and sneaker net. If I understand your point correctly (and please do correct me if I don't!) you consider them the anathema to ShadowRun's long-standing practice of including computer specialists in runner teams.

But the sneaker net doesn't appaer to necessarily preclude, to me, connections between servers behind such a sneaker net. Even if all terminals in a given location are run by sneaker-netting data around, that only seems to serve as even more of an incentive to take the data extraction specialists to the servers so that they may do their job via hardwire access.

That, in turn, strikes me as not at all at odds with the RAW. Granted, the BBB uses "WiFi-repellent paint" and similarly slightly silly gizmos in place of a good old-fashioned guy with a datachip in his pocket (or, to return to more cyberpunk-relevant imagery, in his head). But the principle is the same.

Also, I have been thinking about the vulnerability of brains to haking attempts that you posit as a fundamental to your system. While it makes absolute sense to assume that with ASIST-technology having been around for about half a century, going in the reverse direction would be easily accomplished, I cannot wrap my head around how hacking unconnected brains could work on "targets who don't have any special antenna equipment on them". Surely, whatever else may be necessary in order to perform such a feat, the victim would need to be outfited with one or the other form of DNI transmitter, be it electrodes or datajack? Everything else smacks to me of confusing hacking with Technomancy.

I agree strongly with at least part of your position: Technomancers should have recourse to such actions, even in cases where no DNI interface was involved. But hackers need a go-between to establish the hacker-victim connection. This cannot be optional: for it to be so would be to place one foot on the slope of fallacy. Your main argument is that ASIST makes the brain accessible to hackers -- but if the targets can be hacked without such cybernetics involved, why should hackers be so restricted?

The consequence would be abandoning mundane hackers altogether and making Technomancers the norm. (Which, incidentally, is also the final stage of considering them the next stage of human evolution.) For if there were no difference between the two but for name and BP cost, why uphold the divide?
nezumi
Your post is excellent, but fails to detail one important note - it assumes both players are rational.

People continue to pay twice as much for a product that works only half as well as its competitor, because it has better advertising or looks neater. Everyone knows it's good to eat in moderation and exercise regularly, but we continue to smoke, drink and watch Family Guy. Corporations generally invest not based on long-term financial gain, but on short term rises in perceived value (which sometimes results in their intentionally NOT producing anything of value except their own PR). Government operates such that if you perform underbudget, your budget gets cut next year, so use it or lose it.

Granted, within their perceived worlds each of these players is in fact rational (although not especially bright, since he refuses to look beyond first impressions). But the fact remains, people do not always choose what is best for them. No where is this more clear than when it comes to security.

How many people have a $10 door lock as the only thing protecting their $1,000 computer (and $20,000 in other goods)? Raise your hands? Doesn't this strike you as odd? How many people thinking windows Automatic Update is a pain in the rear and hates seeing that little window pop up when you're busy looking at porn?

Now you're certainly right, Shadowrun computer security should be waaay better than it is. In SR3 it always bothers me that characters will almost always be able to get INTO the system without much trouble, but realistically, getting INTO the system should be the single most difficult step. So definitely, some concessions have been made. However with both SR3 and SR4, the assumption is definitely that technology has become so convenient and so easy to use, everyone uses it. It's just that securing it isn't nearly as easy as using it.
hyzmarca
It's all about the Benjamins.

Productivity is measured in units/time. Any discrete unit of production can be converted into currency. Therefore, productivity is measured in money/time. In this case, it is nuyen/time.

In order to determine profits, one must subtract the productivity from the costs. Remember to keep the units the same. Costs include losses.

The losses incurred from hacking can be measured as nuyen/event and the number of events can be measured as event/time so losses from hacking can be measured as nuyen/time.

The profit from highly hackable networked business is then [(productivity in nuyen)/time - (losses from hacking in nuyen)/time - (other losses in nuyen)/time] while the profit from non-networked businesses is [(Productivity2 in nuyen)/time - (other losses in nuyen)/time]

Now, other losses will be the same, so if productivity-hacking > productivity2, it only makes sense to use extremely hackable networked systems.

Most shadowrunners will be hitting white-collar side of business. There isn't an profit in stealing baby food one can at a time but there is in stealing the brand new secret formula for great-tasting baby food.
There is a great deal of productivity interference in the traditional model of white-collar employment. One has to commute to an office, which wastes valuable time. Since white-collar employees are salaried, commute time comes out the the company's pockets. Virtual telecommuting with remote lock-in (the same technology used by Black IC to prevent jacking out) ensures a most productive middle-management employee. Entirely replacing physical offices with virtual offices also saves floor space which can be put to great use.
Science can benefit from both telecommuting and AR, though it is not possible to eliminate the physical laboratory.
kzt
QUOTE (FrankTrollman)
But the really important part is that computer security that is essentially unbeatable by anyone who does not have your password or physical access to your computer in their laboratory is extremely easy to come by.

Noone has ever hacked a z/OS server and they probably never will. NetBSD is essentially impenetrable, and is likely to stay that way for the foreseeable future. Using the "sneaker net" - that is putting a physical lack of connection between the outside world your data, carrying flash drives with the tranmissable data to networked machines and keeping the secure data in a place which is actually secure - has been shown to be essentially unhackable under any circumsyances.

Frank, I understand where you are coming from, but you are making a fundamental mistake on how computer security exists in the real world. If you think that ANY OS is so secure it can't be hacked or that it's extremely easy to make a network connected machine secure you are living in a dream world. For example look at NetBSD Security Advisories

Any machine connected to the public Internet and offering services to the Internet will eventually be compromised. It's just how these things work.

From one of the leading IT security guys, here is his current (August 3rd) thoughts on the state of computer security vs attackers


# Existing defenses are absolutely ineffective against current attacks. I am struggling to describe the importance of this insight. It does not matter if you are fully patched, "properly configured," not running Javascript, or adopting any number of other current defensive stratgies if you use a Web browser that renders modern rich content. Almost none of the techniques described in the Black Hat talks relies upon exploiting vulnerable software. Almost all of them abuse inherent functionality for malicious reasons.

# Detecting current attacks in "real time" is increasingly difficult, if not impossible. Even if you assume attacks are not obscured by encryption, recognizing and understanding the variety of Web-based attacks shown at Black Hat is almost a lost cause. There is basically no way for defenders to address the expanse of the attack surface exposed by "rich Internet applications" and frameworks. I realized that the "rich" in "RIA" refers to the money intruders will make by exploiting Web clients.

# The average Web developer and security professional will never be able to counter these attacks. Intruders are so far ahead of the defenders with respect to tools and techniques that it is simply not possible to prevent the attacks I saw at Black Hat. This statement will probably offend many people but it's time to face the truth. There is no way to get "ahead of the threat" here.

And yet we still use computers, they are connected into networks, and the networks are connected to the Internet. So I'd argue that their are compelling reasons for people to use systems that greatly increase their vulnerability to being attacked by the entire world without having to go over the edge.
Blade
Okay, the Matrix is everywhere and everything. You can't even legally walk in some places without being connected to the Matrix.

Want to listen to the Radio (or even to your own music albums)? Connect to the Matrix.
Want to be able to contact your friends and be contacted? Connect to the Matrix.
Want to watch TV? Connect to the Matrix.
Want to read a Book? Connect to the Matrix.
Want an official document? Connect to the Matrix.
Want a map of the area? Connect to the Matrix.
Want to check if you forgot something at home? Connect to the Matrix Books?
Want your car to pick you up? Connect to the Matrix.
Want to pay the bus ride? Connect to the Matrix.
And the list can go on.

Not using the Matrix is nearly impossible. Some things we can do today without using any device are harder to do without in 2070 because of the material or infrastructural issues: paying, getting a map of the place, reading a book...
Some other have been lost. Are you able to light a fire with just a piece of wood and a string? Why bother? We have lighters and matches.
Some other are just more trouble without the Matrix. People often forget that AR gives a +2 bonus to any kind of action that could be helped by using it... And there's actually a lot of them.

Sure, there are hackers. Well, that doesn't prevent people from connecting to the Internet in 2007. Brain cancer doesn't prevent them from using mobile phones. Anyway, what's the risk? All their precious data is on "secured" servers. Bank account? My bank takes care of the security. And I think that by 2070 all security companies offer a 3 in 1 physical, magical and matrix protection of your home. In the case of the Matrix, it means your commlink. So everyone who today has some alarm system at home is likely to have a firewall+IC pack for his commlink, with spiders ready to check if an alarm is triggered.

And I think that's a trend that goes further than that. Governments all around the world still have trouble dealing with Internet crime today. In 2070 Matrix Crime is now fully covered by the law, and the Lone Star can come kick the ass of any hacker they catch abusing the citizens of any place they are paid to protect.

So most people have enough to be protected from too simple hacking techniques (low skilled hackers and low rating programs) and governments actively fight higher hacking threats.

[What follows is more a personal take on the Shadowrun universe]

If you add on top of that a closed Matrix, made for and by corps, instead of a mostly free and anarchic Internet, and you'll realize that hackers shouldn't be so many, or at least so many to stay long enough in the buisiness. Widely distributing high rating hacking programs will get you arrested in no time, so most of them are just distributed in small underground networks.

And that's where we get back at the Cyberpunk. Real hackers aren't that common. Actually, there should be nearly as few "real" hackers as mages running the shadows (for example). Besides most of them don't target Joe Average. If they're interested in money, they can get much more elsewhere (and Matrix-assisted scams are easier to pull off anyway). Anyway, that's not what most of them are into. Being a real hacker in Shadowrun isn't just being good with computers and using it as a criminal. All hackers share more or less the same traits: they like to discover secrets, they like to deconstruct things to find what's inside... And they like to share it. Information should be free, small hacker communities and all that kind of stuff.
The 2070 hacker isn't the "finance minister of Nigeria", he's not the WaReZ KiNg, he's closer to Richard Stallman, and all those people who fight for free software, or P2P as an ideal. Yes, I know,there's a big legal difference between Free Software and Pirate's Bay. But in 2070 they are all "dangerous criminals".

Well, actually this last part isn't necessary, you can have a small hacker population without them being neo anarchists, but I just happen to like the idea and to think it goes along well in a Cyberpunk world. The main point, regarding the topic of this thread, is that real hackers simply aren't enough to be that much of a threat to Joe Average.

So, basically, I think that the 1st solution is the best, but I'll expand it further:

"People gain benefits from computers which are astoundingly awesome (and actually, society has been too far to pull back: it NEEDS them) and they would genuinely be willing to accept the vulnerability of potential hacking anyway, because the threat is small so the benefits largely outweigh the drawbacks.

I know it leaves some question opens about corporate security, but I'll get back on this later.
CircuitBoyBlue
Essentially, you're saying that it's easy enough for targets to isolate all their important paydata from the Matrix, and if they can do that, why have a hacker?

In 2nd edition, we assumed pretty much the same thing up until the last 2nd ed. campaign I played. It coincided nicely with the fact that until the last campaign, we were all too lazy to actually learn the matrix rules. The big problem with that was that you're left trying to fill that classic Gibson-type cyberpunk void you've suddenly left by isolating every important computer system, which essentially kills the idea of the Matrix. We just started using lots and lots of Johnny Mnemonic-style couriers (who, by the way, really have no use if there IS a matrix). But eventually we put down the beer, learned the Matrix rules, and greatly improved our game, even if it DIDN'T make sense for companies to have sensitive information out there where the Super Deckers of the 6th world could snag it. Sometimes you have to suspend disbelief for the sake of atmosphere. If not, most corps would probably find a better solution to their illegal needs than the fixer/shadowrunner system. "You're willing to do nearly anything for money? Fantastic, let me turn you into damning evidence against me and ask you to pretty please not tell anyone about it!"
Backgammon
Good thread.

I fall back on the "this is cyberpunk" argument. Corporations are well aware their networks are not secure but accept it as a cost of doing business, and hide that fact from Joe Average.

Can Joe Average's bank account be hacked? Oh yes. Is Joe Average concerned about that? No, cause the bank lies to him and tells him it's impossible, or at least if does happen, magical insurance will cover it and he will never notice.

There are cases of people's SINs being wiped out. That's your entire history, your bank accounts, everything. Has that caused anyone to question that maybe the way SINs are handled is perhaps a not very good idea? Nope. Just offer amnesty to those who can sort of prove they used to have a SIN, and those that fall in the cracks can go fuck themselves. Why? Cause nobody cares about anyone else but number 1 in a very deep, deep way.

So SR computer networks operate with huge flaws, but nobody cares. The cost of properly securing them outweighs the benefits.
kzt
QUOTE (Backgammon)
Can Joe Average's bank account be hacked? Oh yes. Is Joe Average concerned about that? No, cause the bank lies to him and tells him it's impossible, or at least if does happen, magical insurance will cover it and he will never notice.

That's actually why people are willing use their credit cards to pay the bill in a restaurant. What does the waitress do when you give her the card? She walks away and goes somewhere else to do something with your card that you can't see and returns with the bill.

If she copied it, how would you know? When you get a bill that shows someone bought a 52" high-def TV, and it wasn't you. Nor was it you that bought power tools all over the midwaest.

But it doesn't really matter, because Visa won't make you pay if you point to them that you didn't actually buy the 52" high-def TV or the power tools. Hence people keep handing their credit cars to the waiter.

(This is actually part of a longer argument by Bruce Schneier)
PlatonicPimp
to be two specific problems wrapped up in here. The first is why, from a narrative perspective, it is at all believable that people and corporations bother with the matrix. The second is why, from a gaming standpoint, they do so. I'll address them one at a time.

First, from a fiction standpoint.

QUOTE
So regardless of how the world is described, if there is an exploitable weakness in it which is fixable in a manner which is affordable and simple, that weakness will not last long. If a problem has an easily presentable solution, that problem will be solved. And soon.



QUOTE
A really useful fact for the game world is that if security that is good enough to keep out all of the rabble and merely challenging for the player characters happens to be the economical choice based on costs and projected losses - it is reasonable to expect security which is challenging and exciting every time you run into it.


The matrix makes money. Aside from actual matrix businesses, the matrix is a great productivity booster. The game doesn't model this because this isn't "Accountant, the ledgering", but be sure that in most corporate offices, the productivity losses of not having matrix would be greater than the potential losses from hacking. Most of the time. The boss won't be turning off the matrix anytime soon.

People merely like being connected. Plus people are irrational. Plus it gets more and more difficult every year not to be one of the fold.

I see it like this: TV commercials are like Brain Hacking. And if you wanted to avoid having your desires hijacked (by the commercials, in this case), you can just turn off the TV. How many of us actually do that? The TV apparently gives us something that we feel is worth allowing companies to brainwash us.

The second problem is where I think you really stand, Frank. Well, I think the problem is that the "carrot" of connectivity, the +1 to +3 bonus to appropriate tasks, is outlined in a sidebar, completely up to GM fiat, and with few to no guidelines. In a game where those bonuses are common, pervasive, and counted on, then getting someone to turn off their PAN in the first place would be a victory, as it would consistently reduce their dice pools. If I were to take the time to write house rules to challenge your new set, I'd start by outlining as many ways as I could think of to get those bonus dice. Those bonus dice would be the cornerstone of MY matrix rules.


Buster
I've actually worked as a network manager at military sites so I can tell you from personal experience that air gaps suck balls.

Yes, keeping your computers completely sealed from the internet definitely helps to keep out hackers, viruses, trojan horses, etc., but the amount of labor needed to keep systems updated is a huge pain in the ass and gets worse every year. I can see how by 2070, computer systems will become so complicated that there will be no choice but to keep your systems hooked up to the internet 24/7 just to make sure your systems are up to date and functioning at least as good as your competitors' systems. As competition comes down to a razor's edge, having your systems running 1% slower than your competitors for 1 day could mean the difference of millions of nuyen of profit and lost opportunities. Keeping your systems updated 24/7 becomes mandatory.

Besides, with the movement towards web applications, I wouldn't be surprised if 100% internet-based systems become the norm rather than the exception. Who would expose their secret software to reverse engineering when you could just make customers connect to your black box web service instead?

However from a game standpoint, I can see why the authors want air gaps and wifi repelling paint: so the characters have to get off the couch and run into dungeons...uh I mean office buildings, and have all kinds of cool sword fights and gun battles.

It all comes down to deciding what kind of game you want:
  • Do you want bunker hackers? If yes, then make air gaps extremely rare in your world.
  • Do you want Mission Impossible special forces hackers? If yes, then make lots of air gap systems in your world.
  • Do you want to give hackers more to do than hack commlinks? If yes, allow brain hacking.
  • Do you want to have non-mages competing for the mage role? If yes, allow brain hacking.
  • Do you want to enforce strict character roles and stereotypes? If yes, do not allow brain hacking or air gaps.
eidolon
QUOTE (Buster)
Do you want to give hackers more to do than hack commlinks? If yes, allow brain hacking.


I realize you're just making a point, but it's this perception that the only things there are to hack are commlinks and the occasional cyberarm is the reason this brainhacking silliness exists in the first place.

Note: The rest this post is "in general" and does not attempt to follow any strict logical protocol in some attempt to win the internet. It's just how I feel about the issue.

I should just put it in my sig, but

If the only thing there is to hack in the game is commlinks, you're doing it wrong. Stop ignoring the rest of the book and the intent of the setting and rules just so you can complain about a made up problem.

Disclaimer blah blah if you don't like it don't use it blah blah blah this isn't directed at any one person blah blah blah disclaimer.
Seven-7
I can connect my brain to a cybernetic appendage and move it around, even blind, deaf, and hearing impaired.


Requirements for that statement to be true:

1.) The appendage must be connected to the brain.
2.) The appendage must be able to move.
3.) The appendage must have some way of knowing what to do.
-A.) The program that tells the appendage what to do must be on a computer.
-B.) The program must be able to translate brain thoughts into computer language.
-C.) The program must be able to send information (Tactile or otherwise) back to the brain.


This man's brain is already hacked, and we didn't even have to look at the matrix rules.


EDIT: Ok, forgot to post the point to this. Shit like Math SPU's, Encephs, Datajacks linked to Sim moduals linked to knowledge softs, they all send things to the brain that your brain processes and sends information back. To have a VR work at all you've got to send and receive, so we know that shit can go in, the question is how. Alright, so the shit that goes in is data, just data the brain understands. If you can send this data via a cord you can send it over the waves. We know Trode nets send their signal to the brains, because thats how they work. So obviously some part of our brains (Or all) can receive this shit, unless trode nets are magic. So if it's specific, what happens when other parts of our brain get the signal? Does it suddenly go "NO THE BRAIN WONT EXCEPT ANYTHING NOW!" No, it does diddly squat. The parts that do accept it, accept it and take it without question. Easy! So, if I blast you with BrainData ™, the parts that receive take it and like it, cus they're bitches like that. Which means your signal doesnt have to be fine pin point focus.

1. Brains can send and receive data of a specific type.
2. 2070 computers can translate from computer data to brain data.
3. Brains can receive AND SEND this data via cable and air (Trodes).
4. Either the whole brain is able to, or specific parts can do all of the above (Sans 2).
-If it's the whole brain, you do not need a pin point focus.
-If it's specific parts of the brain, you do not need pin point focus
--The parts that can send/receive do.
--The parts that dont send/receive dont.
Adarael
Your logic is faulty. By that rationale, any time your computer connects to the internet, it is being 'hacked'.

To 'hack' an object, one is instructing the object to do something that it would not normally do, or is otherwise ordinarily prevented from doing. Simply sending data to it isn't hacking it.
Seven-7
QUOTE (Adarael)
Your logic is faulty. By that rationale, any time your computer connects to the internet, it is being 'hacked'.

To 'hack' an object, one is instructing the object to do something that it would not normally do, or is otherwise ordinarily prevented from doing. Simply sending data to it isn't hacking it.

Sorry, edited befor after you posted, might want to read it.

Sending data into a brain that it can translate for you to understand and automatically do? Thats fucking definitely hacking.

You dont choose to receive that pop up that passed your filters. The computer send the data to your brain, FORCED YOU TO VISUALIZE IT IN THIS HALLUCINATORY WORLD, and then it happened.


Caps for point focus.
Eurotroll
In the context of SR, it arguably is. Hackers use the Hacking skill with the Spoof program, rather than Spoofing it outright, so that so far as RAW goes, Spoofing is a "subspecies" of Hacking.

EDIT: Seven-7, I think you're steering a little too close to the same ravine Frank is already teetering on the brink of. Brains can only actively send their organic data into a machine by way of a datajack, which directly translates DNI data into machine code, or via trodes, which operate are at one remove (which they must, being non-invasive): they interprete the vastly more sophisticated 2070 analog to today's EEG, and return stimulate the brain through specifically tailored electromagnetic pulses applied to the skull. That is the only way a non-invasive ASIST technology can interact with the human brain, and as a consequence, brain hacking (which is still the overarching theme of this thread) is only possible if you go through their trode set (having hacked their commlink and hijacked the access) or by directly bypassing everything else and plugging yourself directly into the victims datajack, cerebro a cerebro.

There is no way for a mundane to hack the brain of someone who does not possess a datajack, wears a trode rig, or at the very least has a skinlink installed. That is the only restriction I argue for in Frank's ruleset, as it is the most glaring flaw in that system an the one that rightly has many people clamoring. But if this restriction is met, all bets are off.
FrankTrollman
QUOTE (Adarael)
Your logic is faulty. By that rationale, any time your computer connects to the internet, it is being 'hacked'.

To 'hack' an object, one is instructing the object to do something that it would not normally do, or is otherwise ordinarily prevented from doing. Simply sending data to it isn't hacking it.

Actually, in this case it is. The human brain is not set up to receive computer data at all. It is not designed to run computer processes, perform equations with its processing power, send or receive instructions.

It's a biological problem solving lump of meat. The fact that it can be made to interact with a cybereye or an encephalon or a datajack or a blackhammer program is a result of people using the power of artifice to subvert the coding of the brain to make it do something it was never supposed to. Destruction is easier than construction. Entropy flows down hill.

That an external device (nanopaste trodes) could project coherent information into your brain is much harder to believe than that an external device (commlink) could project destructive interference into your nervous system that would kill you.

This is a 2071 where the brain is repeatedly violated. It is opened up, fed information, forced to process that information a trillion times over, and then that information is sucked right back out. People do this to themselves and they do it on purpose. But this is biology not Magic, so the fact that you are willing will purchase you a cup of coffee if and only if you also supply 1.5 nuyen alongside.

Once it is established that the entire brain can be transformed by external electronic impulses into a huge calclator, it is insulting to my intelligence to tell me that it cannot also be turned into a steaming pile of useless pithed meat.

-Frank
Red
Which definition of brain hacking is used here? In one version somebody signs the warrant by hooking up to a DNI.

In another verison of brain hacking is pointing a signal emitter at an unborn fetus in its mother's womb, and hacking its prenatal brain into eternal loyalty for Saeder Krupp. In that world, Singularity has taken hold and the game is over. There is no game to play.

Seven-7
QUOTE (Red)
Alas, that is not the definition of brain hacking as mentioned in previous threads. "Brain hacking" is pointing a signal emitter at an unborn fetus in its mother's womb, and hacking its prenatal brain into eternal loyalty for Saeder Krupp.

Well, we know that shit can go into the brain, thats been proven, and that BrainData is something your brain can comprehend and spit answers out, like a computer, so how does Black Hammer work?

These aggravated BTL-level signals may overload the target’ s neural connections and in turn render him unconscious, trigger psychological disorders, brainwash him, or cause death from stroke, heart failure, ...ect.

This stuff isn't only plausible, its been there for as long as Black Hammer has been in Shadowrun, or ASIST, or Simsense.
raphabonelli
I've been GMing SR4 for little time, but it's funny to think that on my first reading of the core book i just did something like "humm... this trodes and nanopaste thing is quite ridiculous..." and cutted then out of my game.

In my games there is two ways to connect to Matrix. First is with commlink, gloves, glasses and so on... your brain if protected from damage, but you can't VR or use BTLs. Want to do VR, Hot VR or use Simsense and BTLs? Install a Datajack, then your brain could have a two-way connection to your commlink and the Matrix. You can VR, Hot VR, use Simsense, BTLs and so on, but you'll put your brain "in the game". Datajack is the only way to input/output data directly on someone's brain.

Daily Matrix users just do'it through commlink, plus glasses (or cybereyes), gloves to interaction and so on, never experiencing something like VR. Hackers, professionals or people interested in VR games, Simsense or BTLs get datajacks. A hacker can't force hotsim on someone, even if the target is on VR, unless his commlink has been hardware modded to HotSim.

I don't know how many problemas could appear from this decision. As i said, i´ve GMed only a few games, and my players are SR begginers like me (old RPG players, but begginer on SR), but so far no problem with this.

(Sorry for the poor english. Brazilian guy trying hard to be undertood).
(Edit: Little edit for clarification).
hyzmarca
QUOTE (FrankTrollman)
It is not designed [...] perform equations with its processing power, send or receive instructions.


12+B = 2B
12+B-B = 2B-B
12+0 = 1B
B = 12



Yeah. Equation solving it can do. It can also send and receive instructions, albeit in a roundabout way.



Of course, the brain is set up to receive sense input from various nerves throughout the body and it is set up to give instructions of various muscles. It is somewhat fallacious to assume that a mechanical arm which is designed to mimic a human arm so closely as to be functionally identical requires making alterations to the brain or that hacking that arm would allow one to hack the brain. My Playstation 2 connects to my TV but I can't use it to change the channel.
Cthulhudreams
What everyone is ignoring with the productivity arguments is that the accounting data for 'Bobs concrete' isn't actually something that anyone wants.

It could very well be connected to the matrix.

But thats not what shadowrunners do. (Well, maybe in your game that is what they do but whatever)

Shadowrunners

A) Steal new product infomation
B) Circumvent security systems
C) Access extremely sensative infomation.

While the threat risk assessment does dictate that stuff that is not sensative is connected to the matrix.

Risk assessments are identifying a threat actor, examining his opportunity, and looking at the impacts.

For bob the concrete guy, threat is low (no-one cares, no automated attackers in the conventional sense), opportunity is high (matrix system exposes him to the entire population of the world), impact is low (he probably has a backup. No-one cares to begin with, hell it might help with some tax evasion)


Contrast this with new drug infomation from Ares. Threat is REALLY VERY HIGH (as people are willing to pay professional criminals to obtain that information! Seriously!), oppotunity is huge (entire world again) and impact is gigantic (you lose hundreds of millions of dollars, possibly billions.)

Seriously, no one is going to accept that level of risk. If you proposed carelessly risking hundreds of millions to your manager today (and it is risking) you'd get stabbed. Potential productivity improvements arn;t going to cover it either. Teams of people working on say.. stuff to treat alzhimers seriously have 3 people in. But lets be generous and say the team has 30, and that they are risking a billion dollars.

Pool of threats: If this facility has matrix connectivity in the secure areas, lets say we are increasing the risk of losing the data to the competition from 10% to 40%. This is not unreasonable. give than I just made the pool of threats like 6 billion people.

Okay so say salaries are on average 150k a head. (I vaguely remember that as being the average salary for pzifer. Lets triple that to factor in overheads. So a productivity boost of 20% from a matrix connection saves 2.7 million a year.

(which its not, because ares employees these people all in a secure installation, but keeps them together, so they can talk to each other (yay!), and makes available a huge range of material. So the things you'd do with the Internet are in fact local. So it's probably less than 20%)

Say 1 in 25 drug programs creates an outcome, so you save 67.5 million a year.

Okay so given that you are risking 300 million (or more!) from that teams potential outcomes or a saving of 67.5 million, your risk of getting stuff stolen via not having matrix separated systems only has to be 20% less than if they are matrix sepereated.

Which given that shadowrunnners and hackers exist, I think it clearly is.

So.. yeah. Simple risk management dictates that it shouldn't be connected. Why would anyone connect a sensative system like that to the matrix?
hyzmarca
The risk is the same, either way. If the new drug fails to make it to the market, the company is out millions, perhaps billions. Patents are first-come firs-serve. If another company is working on the same drug, and one is, it becomes a race to get the patent first. The time-saving nature of the matrix, the ability for scientists to access the lab for across the world and do work without concern for time may outweigh the inherent risk to data theft, particularly since the only companies which can make use of that data or either working on the product themselves or are so far behind in development that the data won't hep them catch up in time.

And, honestly, we're taking about corps that can and do spend billions on toilet paper alone.
Seven-7
QUOTE (hyzmarca)
12+B = 2B
12+B-B = 2B-B
12+0 = 1B
B = 12



Yeah. Equation solving it can do. It can also send and receive instructions, albeit in a roundabout way.



Of course, the brain is set up to receive sense input from various nerves throughout the body and it is set up to give instructions of various muscles. It is somewhat fallacious to assume that a mechanical arm which is designed to mimic a human arm so closely as to be functionally identical requires making alterations to the brain or that hacking that arm would allow one to hack the brain. My Playstation 2 connects to my TV but I can't use it to change the channel.

9,440,500,233,400,323,000,222
x 1,712,787,123,712,376,736,273,627
--------------------------------------------



Don't worry, I'll give you time.



But before you solve that with your brain, code me a Windows Vista program.


Oh, and if you could do me a favor and tell me when the last time your real arm had a modular plug-in flash light that you could turn on and off with thought.



Also, I'm tired and snarky, I apologize.
Mercer
It seems to me (an uneducated rube) that the necessity of brain-hacking comes down to one of two things.

1) Game Balance. Hackers suck unless they can hack brains.

2) Game Logic. The tech level in the game is sufficient to hack brains, so it doesn't make sense to exclude it.

To address the second point first (and you may be asking, "Why didn't you just put the first post second, ass?" and you'd be right), the tech in the game does whatever the game designers or the GM says it does. To borrow a page from Aliens, you can have interstellar travel and 7.62mm rifles and still make a good movie. I'd be more comfortable with hackers hacking brains if computers were more brain-like. (As advanced as SR computers are supposed to be, they still seem to have more in common with the POS I'm clunking my thoughts into now than they do to some sort of dogbot with a brain for an ass.) That is to say, one can include brain-hacking or not depending on their personal preference, but I don't see it as required.

To the first point, maybe Hackers do suck ass. I don't really know, not having played one and being relatively new to SR4. A guy in my regular group plays a hacker and seems to have a good time, but he may be deluding himself. I'll bring that up at the next session. Anyway, my question for my more experienced SR4 players would be, Are Hackers the Clerics of SR4? By that, I mean do people play them not because they want to but because what they do is necessary for the game, and so somebody always ends up saying, "Fine, I'll play the damn hacker"?

It seems to me (again, an uneducated rube) that hackers (like Mages in Mage: The Ascension) benefit the most from player creativity. The rules for the physical world and the magical world are pretty much strictly defined within the system, but the rules for computers are open to a lot of interpretation. That is, the mechanics are in place to tell you how to do something, but what you do is limited only by what the player can come up with and the GM doesn't disallow.
Seven-7
I'm cool with you doing whatever the hell you want in a game. Who am I to decide? However, if you want any sort of logic you've got to rid of a lot of stuff.


Knowsofts
Math SPU's
Encephelon
Virtual Reality
Trodes
Active Softs
Black IC
Some programs...
Red
There is an enormous strawman here. There is a difference between denying DNIs, and pointing a signal emitter at somebody across the room, and hacking raw mundane brain meat. (Third angle would be pointing a microwave gun at somebody's brain.)

Nobody is arguing with the DNI part. That's awesome stuff. As for the original topic, Nash's equilibrium, there are some solid thoughts there. But I don't think that 2070 is enough time for the computing world to hit the final endgame where things are intrinsically secure or insecure as a matter of logical physics. I.E. either FTL is possible is not. Is secure computing possible, or not?
Cthulhudreams
QUOTE (hyzmarca @ Nov 7 2007, 08:17 PM)
The risk is the same, either way. If the new drug fails to make it to the market, the company is out millions, perhaps billions. Patents are first-come firs-serve. If another company is working on the same drug, and one is, it becomes a race to get the patent first. The time-saving nature of the matrix, the ability for scientists to access the lab for across the world and do work without concern for time may outweigh the inherent risk to data theft, particularly since the only companies which can make use of that data or either working on the product themselves or are so far behind in development that the data won't hep them catch up in time.

And, honestly, we're taking about corps that can and do spend billions on toilet paper alone.

you're assuming things about patent law that may or may not apply in a dystopia future. It seems clear to me that the corps do copy each other and wage black warfare to steal each others knowledge - look at the discussion around cybermancy. Or drones. Hell, isn;t that the point?

Anyway, I'd much prefer separated systems in a race case. See, I can infiltrate your network, which effectively gives me TWO teams. Mine, and yours, because I have all the work from your team. Hell, I can pay some research assistants to duplicate it in near real time, (say a day delay to get the video footage, cut it up, and then transport it across to the clean system, which is real time for a project that is going to take years to give fruit) which is cheap, to satisfy the lawyers.

Again, the risks of exposing your systems seem high.

Edit:

QUOTE


Nobody is arguing with the DNI part.  That's awesome stuff.  As for the original topic, Nash's equilibrium, there are some solid thoughts there.  But I don't think that 2070 is enough time for the computing world to hit the final endgame where things are intrinsically secure or insecure as a matter of logical physics.  I.E. either FTL is possible is not.  Is secure computing possible, or not?


Given agent smith armies and impossibly high teamwork checks, weak encryption, the prevelance and avability of hacksofts, short of airgap, I think the answer in the basic book (as distinct from your question) is no
Gelare
QUOTE (Mercer)
...maybe Hackers do suck ass.  I don't really know, not having played one and being relatively new to SR4.  A guy in my regular group plays a hacker and seems to have a good time, but he may be deluding himself.  I'll bring that up at the next session.  Anyway, my question for my more experienced SR4 players would be, Are Hackers the Clerics of SR4?  By that, I mean do people play them not because they want to but because what they do is necessary for the game,  and so somebody always ends up saying, "Fine, I'll play the damn hacker"?

Hackers don't suck ass, I can tell you that much. (As a side note, clerics suck if and only if you use them exclusively as the heal-bitch. With their buffs, they wipe the floor with everything.) They have a fair amount of stuff they can supposedly do. The problem that I've found in my games is that when the hacker wants to do something - anything, usually Data Search for a public access node of a corp, hack into the corp node, whoops, the node detected me, jack out and try again, whoops, jack out and try again, hack into the internal node from the public access node, find the biographical info on the guy the team's supposed to find so they can kill him and dump his body into the sound - me and the hacker go to one side and throw dice at each other, while everyone else plays Guitar Hero. Then in combat, the hacker hides inside a dumpster and pees himself while the adept kills eight guys with bullets to the head and the mage laughs as the guards bursts into flames. And that sucks.

It may be true that objectively speaking, hackers are the most powerful class out there. They can hack your bank account! They can ruin your SIN! They can go into your commlink and force you to send spam messages filled with ads for Viagra and home refinancing to all your friends! They can do this all day long, with a miniscule chance of getting caught thanks to erasing the datatrails and editing the logs, and if they've really called down the Black IC on their heads they can just turn the damn commlink off. And while the hacker is out ruining the life of every person in a Signal 5 radius, the rest of the team is hanging out drinking soykaf. And that sucks.

The hacker, as part of a Shadowrunning team, should a) represent a clear and distinct archetype, and should b) be able to use the abilities of that archetype to kick ass directly. When a player plays a cybersam, he goes, "Sweet, I get to chrome myself up to seriously superhuman speeds and kill people!" When a player plays a mage, he goes, "Sweet, I get to control peoples' actions, turn them into mounds of Oobleck, heal my wounds afterwards, and then kill people!" When a player plays a hacker, there should be something that allows him to say, "Sweet, I get to [direct action against opponent who is right in front of you with a gun pointed to your face] and then kill people!" That blank should not and cannot be filled with [send spam e-mails] or [hack bank account]. Filling it with [zap my opponent's brain, force him to tap dance to the latest, nova-hot song that's sweeping the nation, and then turn it to sludge] is an acceptable substitute.

God fragging dammit, if I put this much time into my research paper, I'd be done by now. I'm going to get back to productivity. Cheers!
eidolon
QUOTE (Mercer)
1) Game Balance. Hackers suck unless they can hack brains.

2) Game Logic. The tech level in the game is sufficient to hack brains, so it doesn't make sense to exclude it.


But the fact is:
1) They don't, not in the slightest, and certainly don't suck just because their role isn't the same as every other character.

2) It isn't, at least not without DNI and a sim module modified to carry hot sim.

and
QUOTE (Mercer)
That is, the mechanics are in place to tell you how to do something, but what you do is limited only by what the player can come up with and the GM doesn't disallow.


That's the crux, right there. I completely agree that there isn't enough example of what to do exactly in the main book. The expanded book is coming up soonish.

But even with the little we have now, we know some basic things that counter just about every "problem" people have with the matrix as presented, if only you use them.

- Just about all devices produced relatively recently have wireless capability.
- Devices have either a device rating, or more detailed stats at GM discression.
- Hackers hack into devices wirelessly.

I had a hard time with it at first too. At first, I flat didn't think I'd like the idea. Then I read the story and rules and came to like the idea (even if I think the timing was a bit silly or less detailed as I'd like; again, Unwired might help). But I still had trouble figuring out just exactly what the rules were for. Then, after and during some really good conversations, I just sorta had a "SR4 matrix epiphany".

Devices (electronics, mechanical things with onboard computers, anything you say is a "device" as the rules deem a device) usually have wireless capability, and it is too beneficial and useful to want to turn it off. There are actually fluff and mechanical penalties for doing so. Hackers hack devices that have wireless capability. They do this by rolling a pool of dice, made up of skill + program (or other pool if you house rule it) against numbers given in the rules. If they succeed, they get to do stuff.

That's it. It doesn't need to be more complicated. It certainly can, but it doesn't need or have to be.
WearzManySkins
QUOTE (FrankTrollman)
QUOTE (Adarael @ Nov 7 2007, 06:44 PM)
Your logic is faulty. By that rationale, any time your computer connects to the internet, it is being 'hacked'.

To 'hack' an object, one is instructing the object to do something that it would not normally do, or is otherwise ordinarily prevented from doing. Simply sending data to it isn't hacking it.

Actually, in this case it is. The human brain is not set up to receive computer data at all. It is not designed to run computer processes, perform equations with its processing power, send or receive instructions.

It's a biological problem solving lump of meat. The fact that it can be made to interact with a cybereye or an encephalon or a datajack or a blackhammer program is a result of people using the power of artifice to subvert the coding of the brain to make it do something it was never supposed to. Destruction is easier than construction. Entropy flows down hill.

That an external device (nanopaste trodes) could project coherent information into your brain is much harder to believe than that an external device (commlink) could project destructive interference into your nervous system that would kill you.

This is a 2071 where the brain is repeatedly violated. It is opened up, fed information, forced to process that information a trillion times over, and then that information is sucked right back out. People do this to themselves and they do it on purpose. But this is biology not Magic, so the fact that you are willing will purchase you a cup of coffee if and only if you also supply 1.5 nuyen alongside.

Once it is established that the entire brain can be transformed by external electronic impulses into a huge calclator, it is insulting to my intelligence to tell me that it cannot also be turned into a steaming pile of useless pithed meat.

-Frank

OK Frank will work you thru it slowly then. smile.gif

SR4 page 319
QUOTE

Sim Module: The sim module is an ASIST interface that controls the simsense experience. It translates computer signals (simsense data) into neural signals, allowing the user to directly experience simsense programs and virtual reality (edited). A sim module must be accessed via trodes or a direct neural interface (datajack, implanted commlink, etc).

Standard (legal) sim modules only interpret cold sim(see p. 229). It is possible to modify a sim module to allow the user to experience hot sim (p. 229) and BTLs (p. 250) with a Hardware + Logic (10, 1 hour) Extended Test, but this also makes the user more vulnerable to Black IC programs. As a safety precaution, sim mods override your motor functions while you are fully immersed in VR/simsense, so that you don’t blindly thrash around in the real world and potentially injure yourself or break things. This means that your physical body is limp while you’re online, as if you were sleeping. This reticular activation system (RAS) override can also be disabled with a Hardware + Logic (5, 1 hour) Extended Test, at the user’s own risk.


So here it plainly says that the simsense signal must be translated ie transduced into neural signals, not that the simsense signal directly affects the brain. Also states that the Sim Module must have its RAS override disabled.

So the chain of devices is this BTL Chip or Comm Link, then the Sim Module and the last device is the datajack or Trode Net. One note, an implanted commlink simsense signal enters commlink, then the Sim Module then the brain. Think of the trode net as a skinlink,,ie it can not be hacked.

So that means in todays words your IR audio video remote can not microwave your dinner. biggrin.gif Two different devices using two different frequencies. biggrin.gif

As in an another thread this is what actually is the chain of devices is. Not what you "Believe" them to be, for your non shadowrun ideas of balance etc.

So consider your intelligence insulted. biggrin.gif
Mercer
QUOTE (Seven-7)
I'm cool with you doing whatever the hell you want in a game. Who am I to decide? However, if you want any sort of logic you've got to rid of a lot of stuff.

If we were really serious about logic we'd probably have to dump 99% of the game. I mean, its a game about elves and faeries and Japanese corporations; its a game where an ork on a motorcycle can fire an Uzi at unicorn that's been set loose in a shopping mall. It seems a little disingenuous to say, "Its a matter of personal preference, but my way is the only was that makes sense."

There's all sorts of reasons why I don't care for brainhacking, and I'm sure there's all sorts of reasons you like it. For it to be something other than personal preference the system would have to not work without it, either because of:

1) Game Balance. (No one plays hackers because they suck without the ability to fry brains.) Or,

2) Game Logic. (The game makes no sense unless hackers can fry brains.)

It seems like proving either is an uphill battle because 1) People do play hackers, so there must be some players who feel they work even without the ability to fry brains, and 2) The game world has been clicking along for 20ish years without brain-frying hackers.

@Gelare: You seem to be saying that hackers are the most powerful people out of combat and disadvantaged in combat, and to fix this they should be the most powerful people out of combat and equally as powerful as the other characters in combat. Why wouldn't every group be four hackers plus one unlucky bastard they force to play a mage? (I mean, if a hacker can do just what a mage does-- fry brains-- but a mage can't do everything else a hacker does--ruin lives, bank accounts-- doesn't the mage just become the poor sap that's there so the GM can't swamp the group with spirits?)

Cthulhudreams
QUOTE (Mercer @ Nov 7 2007, 10:19 PM)
QUOTE (Seven-7)
I'm cool with you doing whatever the hell you want in a game. Who am I to decide? However, if you want any sort of logic you've got to rid of a lot of stuff.


1) Game Balance. (No one plays hackers because they suck without the ability to fry brains.) Or,

2) Game Logic. (The game makes no sense unless hackers can fry brains.)

People are totally okay with playing Dungeons and Dragons the most popular RPG ever, despite the fact it is currently ludicrously unbalanced in favour of spell casting. Lots of people will tell you about their great fighter character in 3.5, despite the fact it is possible to do everything he can do better by being a druid. And then do a whole bunch of other stuff first.

I don't think anyone is disputing that the Shadowrun 4th ed rules don't mostly work, but that isn;t the same thing as being great. What the proposed rules provide is a framework for explaining all the actions in game frank would like to see hackers doing in a clear consistent manner that enables cooperative storytelling, mutual understanding and suspension of disbelief in a way that may not be possible with the current setup. It may be possible for you! But I definately think some elements are much nicer.
hyzmarca
QUOTE
9,440,500,233,400,323,000,222
x 1,712,787,123,712,376,736,273,627
--------------------------------------------
Don't worry, I'll give you time.





Also, I'm tired and snarky, I apologize.

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 I would finish it but that's just tedious. Give me something hard.
blood_kite
QUOTE (Gelare @ Nov 7 2007, 06:14 PM)
When a player plays a hacker, there should be something that allows him to say, "Sweet, I get to [direct action against opponent who is right in front of you with a gun pointed to your face] and then kill people!"  That blank should not and cannot be filled with [send spam e-mails] or [hack bank account].  Filling it with [zap my opponent's brain, force him to tap dance to the latest, nova-hot song that's sweeping the nation, and then turn it to sludge] is an acceptable substitute.

Can the blank be [hack gun and engage safety] followed by [hack cybereyes through smartlink and force them to reboot]?

Someone made a joke about hacking the opposing hacker's commlink and have it send spam pop-ups. How about [hack opposing hacker's commlink and use the admin rights his commlink has been given to the rest of the team's commlinks to send a maximized opaque message pop-up that the user is not authorized to move or close]. Force the opposing team to either remove/shutdown goggles, glasses, contacts or sit there blind while the only thing they see with their cybereyes is a message stating 'The cake is a lie.'
kzt
QUOTE (Cthulhudreams)
So.. yeah. Simple risk management dictates that it shouldn't be connected. Why would anyone connect a sensative system like that to the matrix?

You obviously don't work in the same world that I do....
Hank
There is an alternate fix to the inherent problem with hackers... they pull the GM away, they suxor at combat, etc. Make hacking very quick to play out and a relatively small investment for a character. In other words...
Hacker: Hey, Sammie, can I be on your team? I can hack computers for you from my mom's basement!
Sammie: Uh, no thanks, kid. I can hack just fine. I ain't splitting my take with you.

a.k.a. what Catalyst gave us. indifferent.gif
Cthulhudreams
QUOTE (kzt)
QUOTE (Cthulhudreams @ Nov 7 2007, 05:42 PM)
So.. yeah. Simple risk management dictates that it shouldn't be connected. Why would anyone connect a sensative system like that to the matrix?

You obviously don't work in the same world that I do....

Yeah, people are fantastically bad at risk, and the private sector has a much greater appetite for risk than the public sector.

Factors that are undoubtably all at play smile.gif

But again, I think people underestimate just how.. breachable.. matrix security is in 2070, and everyone is immersed in that breachable environment. I know modern computer security isn't perfect, but compared to 2070 it is a fortress of iron.

(I think the IT profession as a whole today is extremely bad at risk too, usually grossly over and underestimating the value and risk to various systems in often insane ways), but 2070 is a different kettle of fish. It just simply isn't possible to secure a matrix connected system against hackers, even with 'best practise' security procedures.

Kyoto Kid
QUOTE (blood_kite)
Someone made a joke about hacking the opposing hacker's commlink and have it send spam pop-ups. How about [hack opposing hacker's commlink and use the admin rights his commlink has been given to the rest of the team's commlinks to send a maximized opaque message pop-up that the user is not authorized to move or close]. Force the opposing team to either remove/shutdown goggles, glasses, contacts or sit there blind while the only thing they see with their cybereyes is a message stating 'The cake is a lie.'

...had my Matrix Specialist do something sort of like that. Involved a gang of dwarves, a luddite elf (whom they were about to beat up on), and an ultra hardcore dwarven porn site. Managed to get the elf out of there without a scratch. grinbig.gif
Gelare
QUOTE (Mercer)
@Gelare:  You seem to be saying that hackers are the most powerful people out of combat and disadvantaged in combat, and to fix this they should be the most powerful people out of combat and equally as powerful as the other characters in combat.  Why wouldn't every group be four hackers plus one unlucky bastard they force to play a mage?  (I mean, if a hacker can do just what a mage does-- fry brains-- but a mage can't do everything else a hacker does--ruin lives, bank accounts-- doesn't the mage just become the poor sap that's there so the GM can't swamp the group with spirits?)

Well, see, now I just have to make my argument in the opposite direction. Under Frank's optional rules - which is, of course, what we're talking about - hackers can hack brains, but it isn't exceptionally easy, and it isn't completely unlimited like a mage's Control Thoughts spell is. Hacker's can't and shouldn't be able to do everything mages can do. Hacking brains is one significant thing that hackers could do. They cannot use Increase (anything) to make people ridiculous, they can't make people fly, can't make instant walls, can't shatter everything in the room instantly, and can't take control of the brains of everyone in sight at once with a single spell. My point is not that hackers should be as good as mages at what mages do, but they should be reasonably awesome in combat anyway.

I honestly don't know what a sammie does other than shoot people in the face really well - and he does do that better than any mage or hacker - but where hackers and mages are concerned, they both get cool stuff to do. Mages can zap brains, hackers can hack brains. Mages can stunball people, hackers can flood their commlinks. Mages can do astral recon, hackers can do matrix overwatch. Balancing the incentives = win.

QUOTE (blood_kite)
Someone made a joke about hacking the opposing hacker's commlink and have it send spam pop-ups.

Me, how ya doing folks, you've been a great audience, I'll be here all week.
QUOTE
How about [hack opposing hacker's commlink and use the admin rights his commlink has been given to the rest of the team's commlinks to send a maximized opaque message pop-up that the user is not authorized to move or close].  Force the opposing team to either remove/shutdown goggles, glasses, contacts or sit there blind while the only thing they see with their cybereyes is a message stating 'The cake is a lie.'

That is a possibility, but by the time the hacker is able to go through everyone's commlink defenses and do that, he's already got eighty-six boxes on his physical condition monitor filled because while he was sitting in the dumpster trying to hack the opposing team to inconvenience (but not incapacitate or kill them), the enemies shot a rocket at his dumpster, then burned the remains with a fire spirit, then scattered the remains with ricocheting suppressive fire. Combat in SR is nasty, brutish, and short.

One of the problems with the basic model is that hackers can't use their powers to kill anyone who hasn't been so kind as to illegally modify their sim box and has decided to go completely limp in the middle of a firefight, in which case they have problems anyway. Some people are okay with that. I'm not. Even if I could blind all my enemies by flooding their commlinks, they can just turn their commlinks off and shoot me. Let's say you hacked the sammie and made it so his cybereyes go completely opaque. Congratulations! With the -6 penalty from blind fire and eight chances to roll per round of combat, you will be dead in 0.92638 seconds, and then there will be cake. The absolute best you can hope for is that the enemy sammie is so cybered he's got almost no meat left, and you can make him lie quietly on the ground. That's nice, but it's not enough. It really isn't.
Seven-7
QUOTE (WearzManySkins)
QUOTE (FrankTrollman)
QUOTE (Adarael @ Nov 7 2007, 06:44 PM)
Your logic is faulty. By that rationale, any time your computer connects to the internet, it is being 'hacked'.

To 'hack' an object, one is instructing the object to do something that it would not normally do, or is otherwise ordinarily prevented from doing. Simply sending data to it isn't hacking it.

Actually, in this case it is. The human brain is not set up to receive computer data at all. It is not designed to run computer processes, perform equations with its processing power, send or receive instructions.

It's a biological problem solving lump of meat. The fact that it can be made to interact with a cybereye or an encephalon or a datajack or a blackhammer program is a result of people using the power of artifice to subvert the coding of the brain to make it do something it was never supposed to. Destruction is easier than construction. Entropy flows down hill.

That an external device (nanopaste trodes) could project coherent information into your brain is much harder to believe than that an external device (commlink) could project destructive interference into your nervous system that would kill you.

This is a 2071 where the brain is repeatedly violated. It is opened up, fed information, forced to process that information a trillion times over, and then that information is sucked right back out. People do this to themselves and they do it on purpose. But this is biology not Magic, so the fact that you are willing will purchase you a cup of coffee if and only if you also supply 1.5 nuyen alongside.

Once it is established that the entire brain can be transformed by external electronic impulses into a huge calclator, it is insulting to my intelligence to tell me that it cannot also be turned into a steaming pile of useless pithed meat.

-Frank

OK Frank will work you thru it slowly then. smile.gif

SR4 page 319
QUOTE

Sim Module: The sim module is an ASIST interface that controls the simsense experience. It translates computer signals (simsense data) into neural signals, allowing the user to directly experience simsense programs and virtual reality (edited). A sim module must be accessed via trodes or a direct neural interface (datajack, implanted commlink, etc).

Standard (legal) sim modules only interpret cold sim(see p. 229). It is possible to modify a sim module to allow the user to experience hot sim (p. 229) and BTLs (p. 250) with a Hardware + Logic (10, 1 hour) Extended Test, but this also makes the user more vulnerable to Black IC programs. As a safety precaution, sim mods override your motor functions while you are fully immersed in VR/simsense, so that you don’t blindly thrash around in the real world and potentially injure yourself or break things. This means that your physical body is limp while you’re online, as if you were sleeping. This reticular activation system (RAS) override can also be disabled with a Hardware + Logic (5, 1 hour) Extended Test, at the user’s own risk.


So here it plainly says that the simsense signal must be translated ie transduced into neural signals, not that the simsense signal directly affects the brain. Also states that the Sim Module must have its RAS override disabled.

So the chain of devices is this BTL Chip or Comm Link, then the Sim Module and the last device is the datajack or Trode Net. One note, an implanted commlink simsense signal enters commlink, then the Sim Module then the brain. Think of the trode net as a skinlink,,ie it can not be hacked.

So that means in todays words your IR audio video remote can not microwave your dinner. biggrin.gif Two different devices using two different frequencies. biggrin.gif

As in an another thread this is what actually is the chain of devices is. Not what you "Believe" them to be, for your non shadowrun ideas of balance etc.

So consider your intelligence insulted. biggrin.gif

You proved two things:


Jack



Shit


That is all.
Cthulhudreams
QUOTE (Gelare)

I honestly don't know what a sammie does other than shoot people in the face really well - and he does do that better than any mage or hacker - but where hackers and mages are concerned, they both get cool stuff to do. Mages can zap brains, hackers can hack brains. Mages can stunball people, hackers can flood their commlinks. Mages can do astral recon, hackers can do matrix overwatch. Balancing the incentives = win.

I think the 'archetypical' sammie clearly has to be a bio sammie with no detectable illegal modifications, that non MAD scnable pistol and a monowhip.

Then he has a trick that no-one else does, which is he can walk into an extremely high secure areas and still kill everyone. The rest of the team flashes big red 'DANGER WILL ROBINSON' signs when they turn up - he is completely inconspicuous.
Gelare
QUOTE (Cthulhudreams)
QUOTE (Gelare @ Nov 7 2007, 11:42 PM)

I honestly don't know what a sammie does other than shoot people in the face really well - and he does do that better than any mage or hacker - but where hackers and mages are concerned, they both get cool stuff to do.  Mages can zap brains, hackers can hack brains.  Mages can stunball people, hackers can flood their commlinks.  Mages can do astral recon, hackers can do matrix overwatch.  Balancing the incentives = win.

I think the 'archetypical' sammie clearly has to be a bio sammie with no detectable illegal modifications, that non MAD scnable pistol and a monowhip.

Then he has a trick that no-one else does, which is he can walk into an extremely high secure areas and still kill everyone. The rest of the team flashes big red 'DANGER WILL ROBINSON' signs when they turn up - he is completely inconspicuous.

Hey, don't look at me, I never play sammies. Like I said, I honestly don't know what they do other than shoot people - there's gotta be something they spend all those build points on, I just don't know what. Feel free to enlighten me. You're right, of course, that to a bored security guard, Hatchetman looks a lot more conspicuous than a non-cybered person. It is implicit in my examples that we're talking about generic combat where everyone can use their abilities to their fullest capacity, and that's not always, or even usually, how Shadowrun works. Of course, maybe the sammie shot all the guards on the way in. Heck if I know. The important bit, I think, is that when everyone, hackers included, has something productive they can do in pitched combat, then that's a Good Thing™. I'll admit though, I'm a bit of a combat junkie. I play D&D, too - so sue me. nyahnyah.gif
Fortune
QUOTE (Gelare @ Nov 8 2007, 02:42 PM)
One of the problems with the basic model is that hackers can't use their powers to kill anyone who hasn't been so kind as to illegally modify their sim box and has decided to go completely limp in the middle of a firefight, in which case they have problems anyway.

This is just a really flawed premise. Hackers can use pretty much everything in the surrounding environment to screw over, or even physically damage or kill an opponent, all without ever even considering hacking that opponent's commlink or cyber (let alone their brain).

This whole conversation about making the Hacker 'class' equal to other 'classes' is just strange. One of the strengths of the Shadowrun system is that there is no real 'class' system. There is a choice of using Magic (or Resonance), or no Magic (or Resonance), but other than that the options are all there for each and every character to use.
Gelare
QUOTE (Fortune @ Nov 8 2007, 12:13 AM)
QUOTE (Gelare @ Nov 8 2007, 02:42 PM)
One of the problems with the basic model is that hackers can't use their powers to kill anyone who hasn't been so kind as to illegally modify their sim box and has decided to go completely limp in the middle of a firefight, in which case they have problems anyway.

This is just a really flawed premise. Hackers can use pretty much everything in the surrounding environment to screw over, or even physically damage an opponent, all without ever even considering hacking that opponent's commlink or cyber (let alone their brain).

You're really going to have to give me some examples on this one, 'cause I think it's a pretty sound premise. Sure, a rigger can kill his opponents five ways to Sunday, but what's a hacker going to do? Make the toaster hop viciously toward his opponent, heating elements glowing ominously? And no, an easily hackable car located conveniently nearby is not a typical component of combat in SR, not in my games, anyway.

Edit to your edit:
QUOTE (Fortune)
This whole conversation about making the Hacker 'class' equal to other 'classes' is just strange. One of the strengths of the Shadowrun system is that there is no real 'class' system. There is a choice of using Magic (or Resonance), or no Magic (or Resonance), but other than that the options are all there for each and every character to use.

This is totally true, and it's one of my favorite things about the SR system. But there are archetypes in the BBB for a reason, and I use 'class' synonymously with 'archetype'. If I say sammie, we all know roughly what I mean, because that's a class. If I say mage, hacker, rigger, adept, pornomancer, we all understand. So call them classes, call them archetypes, call them specializations, whatever you like, the fact of the matter is maybe players like to play a character like that, and discussion about them is valuable.
Cthulhudreams
QUOTE (Fortune @ Nov 8 2007, 12:13 AM)
QUOTE (Gelare @ Nov 8 2007, 02:42 PM)
One of the problems with the basic model is that hackers can't use their powers to kill anyone who hasn't been so kind as to illegally modify their sim box and has decided to go completely limp in the middle of a firefight, in which case they have problems anyway.

This is just a really flawed premise. Hackers can use pretty much everything in the surrounding environment to screw over, or even physically damage or kill an opponent, all without ever even considering hacking that opponent's commlink or cyber (let alone their brain).

I thought half of the point of frank's argument was that the nash equilibrum encouraged by the rules (as opposed to the fluff, we are shooting to match those up here) was that the hacker COULDN'T use the environment because pretty much none of that stuff would be connected up to the 'trix because of the danger of a hacker hacking into the drone/mobile crane system/security system/ED-209/toxic waste dispenser and using it.
This is a "lo-fi" version of our main content. To view the full version with more information, formatting and images, please click here.
Dumpshock Forums © 2001-2012