We all remember those great cyberpunk movies with the totally unrealistic VR interfaces and giant viewscreens that served no purpose other than showing the totally unrealistic cyber-action to the audience. At least, we should.
The above quote from Hackers sums up what makes cyberpunk Matrices so fragging cool. It sums up exactly what the current wireless matrix is not. Since the posting of house rules has become popular, I've decided to create a framework within which the cyberpunk flavor can be re-established. I hope this works.
Supplementing the comlinkA) Comlinks are expensive, they really are. A few hundred nuyen doesn't seem like much at chargen, but for a 5
per hour soy flipper, it is damned outrageous. The cheapest comlink system, including easily lost interface devices, costs 450
. That's a month's wages for some people and doesn't even include program costs, which are another 150
minimum. And don't even get me started on nanopaste trodes which cost :100: nuyen whenever a character wants to use a DNI device because there is no way in hell that the paste is reusable.
I also dislike the very idea of a fully decentralized network global as being very un-cyberpunk.
Thus: Divide User Interface Decive (AR gloves, trodes, Matrix goggles, etc.) costs by 10.
and
Public TerminalsThe most common Matrix access device is not the personal comlink; it is the Public Wireless Matrix Terminal. Terminals are, in essence large comlinks, physically anchored to a location to avoid theft, which anyone can access using AR gloves, wireless keyboards, trodes, or other access devices. Most Terminals also have physical ports for wired device, though these are limited in number. For DNI access, all terminals have their own built-in cold Sim Modules.
Any individual can subscribe an interface to a public terminal and use it though software alterations to the terminal itself are impossible without administrator access and all activity is typically logged and spydered for suspicious activity. Terminals come with all Common Use programs at (Rating) and wireless connections to a terminal are automatically encrypted with the terminal's Encryption program. There are two common flavors of Public Terminal. A (Standard) Public Terminal can support up to Rating x 20 Subscribed users at once. A Mass Public Terminal can support up to Rating x 200 users.
Is that a Credstick in your pocketDespite the desire of some to phase out the credstick in favor of the personal comlink, it is still the most popular identification and payment device due to the ubiquity of public terminals and the potential dangers of transmitting financial data wirelessly.
Agents are users (Cutting Agent Smith's hamstring)Agents interface with the nodes that they run on using User Interface Device protocols rather than as a program, which means that they count against the node's subscription limit.
My Icon or YoursEvery node, device, user interface, drone, or agent, subscribed to a node (comlink or terminal) has its own icon within the node and counts against the node's subscription list subscription. Icons represent a connection. Users accessing remote nodes through the matrix will have two icons, one their home node and one on the remote node.
Crash & SuppressionThere are two Matrix Condition Monitors, Icon Monitors and Persona Monitors. Both are calculated using the Matrix Condition Monitor rules on SR4 p. 231
Each Icon has its own Icon Monitor and all icons from a home node share the same Persona. Icon Damage overflows onto the Persona Monitor
New Attack ProgramsSuppression
Suppression damages an Icon's condition monitor.
Mass Suppression
Can target (Rating) Icons at once.
Crash (Formerly Attack)
Directly damages a Persona's monitor
Mass Crash
Can target multiple icons at once.
[b]Things to do with a suppressed Icon[b]
Once suppressed, an Icon cannot take any action, including logout.
A suppressed icon may be kicked from a system (a forced disconnect which causes dumpshock) by any other icon on that system with a complex action.
A suppressed icon may be hijacked to gain access (or high level access) to its home node. This requires a (Exploit + Hacking) vs (Firewall) test. Successes give access equal to the Icon's user level.
Suppressed icons remain vulnerable to all attack programs.