QUOTE (FrankTrollman @ May 26 2009, 09:24 AM)
![*](http://forums.dumpshock.com/style_images/greenmotiv/post_snapback.gif)
No.
It's just like getting cut off from the wireless for the players. But it's distinctly different from getting cut off from the wireless from the standpoint of the base operators because they can still use the wireless!
But only in a limited fashion with trusted nodes. This wouldn't be an option for their busy servers that handle a lot of transactions and communications from a large, uncertain class of nodes. It would only be an option for high security nodes with limited traffic.
QUOTE
It's one thing to give people an "Everyone loses" option where matrix activities just don't work for either side. I don't like that very much, and feel that it is as bad for the game as letting everyone decide to be magic immune for 0 points whenever they want. But at least it's reciprocal, so sometimes it won't happen when you're on a mission.
The Blacklist is not reciprocal. My stuff still works, and their hacking powers don't work at all. No matter what they roll, no matter what they do. That's not good for the game. That's the same structurally as simply erasing the Hacker as a playable archetype. Which is something that I hasten to point out: many groups that do try to use the RAW have actually done.
That's where you're wrong. I can't believe how many of your so-called gripes about the system aren't even based on the RAW. When wireless traffic is blacklisted, a node can still be hacked via direct connection. That means infiltrating a facility and playing with hardware a bit. Last I checked, sneaking into facilities was one of the staples of Shadowrun, not some kind of flaw in the system. If there wasn't blacklisting, the GM would just make high security nodes shielded or non-wireless, with the same effect on the players. You seem to be complaining about the option for the GM to force the hacker to be part of the team instead of doing the whole run from his coffin motel. Again, that's a feature, not a flaw, as much as you might dislike it.
Nor is it true that blacklisting is non-reciprocal. If a node has to talk to more than one specific set of other nodes, then blacklisting is impractical. Even a building's security nexus would be a poor candidate for blacklisting, because it has to talk with incoming deliverires, rearrange schedules accoring to traffic and weather patterns, provide access to the police in case an alarm is triggered... Your conception of blacklisting, as an automatic shutoff for all hostile traffic, is a highly questionable interpretation of the RAW. This is typical Frank. Argue the worst possible interpretation of the RAW to "prove" RAW is broken. Don't admit that other interpretations are possible, because of your deep-seated need to "expose" flaws in the system.
And now that I look, I can't even find the "blacklisting" option. Is the technique in and of itself a made-up "loophole?" Unwired explicitly says that they can limit authorized access to particular IDs, but the Exploit program bypasses normal authentication and thus is unaffected.
QUOTE
As to running a spoof, you have to get a matrix perception on a trusted item before you're even allowed to make a spoof.So if you're stealthing in you can't get access to the goods of the security rigger until he shows up and starts shooting you. Except you know the part where Aaron has said specifically that you don't have to spoof an access ID to hack into a system. Which leaves us back to the very real possibility that we are just hallucinating the possibility of blacklisting Access IDs and that those rules aren't supposed to be in Unwired. But I'm not going to hold my breath for a coherent explanation, because that book is now a year old and we haven't gotten one yet.
I'm thinking it's the latter, and you just haven't read carefully. Check page 63 of Unwired. Access IDs can be authorized, no unauthorized access IDs are allowed in without further authentication. They might be able to get in with a passcode, they might not, depending on the setup. However, Exploit circumvents access ID authorization. So I guess your biggest loophole in the system was fabricated in the first place. And you don't need a dev to tell you it's not there. If it breaks the game, don't use it. If there are two interpretations of RAW available, choose the one that you don't hate. Otherwise you're stabbing yourself in the crotch and crying foul against the devs. You're doing it to yourself for the express purpose of venting your dislike of the system. You have only yourself to blame for deliberately breaking the game with a questionable interpretation -- it would be nice if the devs had written more clearly, but they're not the ones who created blacklisting, it's you.
QUOTE
Nash Equilibrium is essentially the actions that everyone takes when they assume that everyone else is going to be using their best available actions. Essentially it's the endpoint after everyone exhausts all possible "Win in front of Me" arguments. So in the case of nuclear bombs, it actually means that everyone will threaten each other with Mutually Assured Destruction, and then not use their bombs.
The problem is that in the Shadowrun Hacking, there is no Mutually Assured Destruction. The Hacker either wins and gets the data or he is caught and he is shot. There is no meaningful increase in threat available to either of them. The Hacker's actions will - if they succeed - only marginally impact the megacorp. And if the megacorp succeeds, the Hacker is dead. So when people talk about nuclear options, there's really nothing in it for the Hacker to not go there - because the stakes are already "he will die if he doesn't win."
-Frank
Isn't that what you'd expect from an ant attacking a mountain? That's what Shadowrunners are, little ants scurrying around in the shadow of the megacorps. They risk everything just for a payday, while the corporations they attack swat them like flies on a horse, not terribly concerned about it, because flies are not much of a threat to horses. It's only when the Shadowrunners hitch onto another horse (i.e. a great dragon, or another corp, or some kind of uber organization) and get access to powers beyond what's available on the street that they really start to shake things up.