Help - Search - Members - Calendar
Full Version: Agents and Response
Dumpshock Forums > Discussion > Shadowrun
Pages: 1, 2, 3
hobgoblin
QUOTE (Tarantula)
QUOTE (hobgoblin @ Aug 16 2007, 09:41 AM)
thats what arrows are for wink.gif

Yes, and to view an arrow, either you're connected to its node, or its node is connected to you.

SR4, 215, "Arrow - Virtual representations (usually visual graphics) used to represent things in augmented reality."

where does it say it needs a connection?
knasser
QUOTE (Blade @ Aug 16 2007, 07:58 AM)
QUOTE ("Frank Trollman")
You stop making sense, which is how you fail [...] That's wrong.


Stop acting like you have the perfect and canon truth. Let's face it: there is no official explanation and there's no explanation making any more sense than another.


For myself, what I'm arguing is that the rules allow my interpretation and that there is very good reason to believe that it is the case due to it being so in accord with the flavour, fluff and common sense. I don't say that Tarantula cannot play the game under his interpretation, but this is a public forum where people come to ask for advice and rules clarifications and I think it's wrong to insist that his interpretation is indisputable to others when there are very many who disagree with him. I will say that I play according to my interpretation and it all works out very nicely and that it makes sense to my players. I don't think the same would hold true if I adopted Tarantula's view on things.

We had a four page thread on this, in which it became perfectly clear that many people had read the rules as Frank has (and I am one of them). So if anyone is pushing the view that they have "the official explanation" and all others are wrong, I think it's the person that created a poll to "find out what dumpshock thinks" and consciously ommitted a common view, and proceeded to tell me that I am wrong, wrong, wrong.

QUOTE (Tarantula)

How about a different look at it; SR4, 227, "Agents use the Response attribute of whatever node they are run on; this means that the attributes of an agent operating independently may vary as it moves from node to node."


We've been over this several times now. No-one is disputing that agents use the response of the node they are run on. We disagree with your insistence that an agent cannot interact with a node that it is not running on. I.e. you think that the pocket secretary cannot go off and arrange a meeting or book a flight without having to load its actual executable code onto another node to do so. We think it can book your flights from your commlink, that the search agent can collect data on your behalf without dissapearing off for a while and the wizzer infiltration application can be left alone in at the entrance to Evil Corp™ trying to break in without a human holding its hand.

The VR Matrix represents interaction between agents / personas and nodes, as the former being present in the latter. A persona program is running on your own commlink, so is your stealth program and your Edit program, but the VR matrix represents you being present in Node A using these programs there. You can be attacked, detected, etc. Your interaction with that node is your presence in it. Consider the following situation:

The corp exec has purchased Novatech's new Pocket Secretary 9000 to handle his calls, arrange meetings, etc. He asks it to book a flight. Under our model, it logs into a remote airline system and begins making arrangements. In the meantime, it is still very sensible running on the commlink. While it's doing that, he asks it to alter his meeting schedules and tell his boyfriend he'll be late home. Under your model, the pocket secretary actually loads its code onto a remote system, vanishing from his own commlink, creating a burden on the presumably busy airline system. In the meantime, he can't issue it the other commands, it can't deal with any incoming requests or calls to his own commlink. He doesn't even know for sure where it's gone or if its coming back! His software, with all its knowledge of his affairs, his itinery, past schedules and contacts, is now loaded onto another company's machine! It has sodded off and he's sitting with an empty commlink! This follows inevitably from the way you are interpreting the rules... Unless, that is, the corporate executive accompanies his pocket secretary on all these little jobs, doing nothing at all, but co-existing in the same node so that this mysteriously suddenly enables the agent to do what it would have been able to do anyway. Remember - if you are interacting with a node in a meaningful way, you are present in it, and that is what you are not allowing an agent to do unless it forfeits any actual connection to your own system or commlink - no trail, remember? Your words.

Doesn't that seem absurd, counter-intuitive and hard to twist into any sort of justification to you?
Cthulhudreams
QUOTE (Tarantula @ Aug 16 2007, 10:36 AM)
Except I imagine most nodes would allow guest accounts, for things like browsing a restaraunt menu, or looking at the store directory of a grocery store.

Sure - but what happens if I disable all the accounts on my drone except the administrator account?

You're 'you have to log in to hack a node' model doesn't work any more in that case. How do you even hack a drone?
Mr Jackson
QUOTE (Tarantula)
Yes, they are not a hackers persona, and there is no text stating that they work the same.

Is there text stating that they work differently?

Saying there does not exist text that says they work the same, does not mean they work differently, unless we are told how they work differently.
hobgoblin
there are two things that need to be settled here it seems:

1. how is a data search performed? it it by jumping from node to node, looking for stuff. or is it by sitting back and running the search from the confines of a single node?

2. what happens to a agent at the moment it successfully either logs in or breaks in? is it uploaded to the target node, or does it sit back in the node and just a icon show up in the target node, similar to a hackers persona?

both of these seems to have multiple interpretations flying around.

interestingly, im partial to the latter on 1. and former on 2.

this because:

1. one use a program to do the searching. this to me suggests that the program can reach out to available indexing databases and request info from there without going anywhere.

2. its the behavior agents have in earlier SR versions. if they wanted to change that now, they damn well need to state so clearly. as in, when a "free" agent requests a login to a node, in reality it requests a file transfer (or more correctly a process transfer but thats a digression), and needs to present some kind of credentials for that. said credentials will tell what level of access that transfered program will run under pr default.

thats my take on it, and thats how i will respond until im clearly disproved by some kind of official text in either book or webpage.
Tarantula
QUOTE (hobgoblin)
QUOTE (Tarantula @ Aug 16 2007, 04:58 PM)
QUOTE (hobgoblin @ Aug 16 2007, 09:41 AM)
thats what arrows are for wink.gif

Yes, and to view an arrow, either you're connected to its node, or its node is connected to you.

SR4, 215, "Arrow - Virtual representations (usually visual graphics) used to represent things in augmented reality."

where does it say it needs a connection?

Because without a connection you have no data to represent. Unless its just displaying the location of an RFID tag (which really is just broadcasting its info).
Tarantula
QUOTE (knasser)
For myself, what I'm arguing is that the rules allow my interpretation and that there is very good reason to believe that it is the case due to it being so in accord with the flavour, fluff and common sense. I don't say that Tarantula cannot play the game under his interpretation, but this is a public forum where people come to ask for advice and rules clarifications and I think it's wrong to insist that his interpretation is indisputable to others when there are very many who disagree with him. I will say that I play according to my interpretation and it all works out very nicely and that it makes sense to my players. I don't think the same would hold true if I adopted Tarantula's view on things.

Where have I said that my view is the only possible explanation or that all others must play by it? I merely wanted some discussion on the subject, however, the entire extent of your point of view is merely "I interpret it differently", with no explanations of why or how you came to such a conclusion.

QUOTE (knasser)
We had a four page thread on this, in which it became perfectly clear that many people had read the rules as Frank has (and I am one of them). So if anyone is pushing the view that they have "the official explanation" and all others are wrong, I think it's the person that created a poll to "find out what dumpshock thinks" and consciously ommitted a common view, and proceeded to tell me that I am wrong, wrong, wrong.

I haven't pushed the view that my interpretation is official in any way, shape or form. I didn't conciously ommit a common view, I was reading through the text as I made the poll, and created the options based on the different outcomes of interpretation I could see from the text. As of yet, despite me asking you a few times, you haven't explained how you reached your conclusion that agents are allowed to run on one node and affect another node. So, I still have no idea how you get there, and I still don't see that interpretation from the rules. Also, I haven't said that you are wrong. In fact, you and Frank are the only ones who've accused someone of being wrong, not me.

QUOTE (knasser)
QUOTE (Tarantula)

How about a different look at it; SR4, 227, "Agents use the Response attribute of whatever node they are run on; this means that the attributes of an agent operating independently may vary as it moves from node to node."


We've been over this several times now. No-one is disputing that agents use the response of the node they are run on. We disagree with your insistence that an agent cannot interact with a node that it is not running on. I.e. you think that the pocket secretary cannot go off and arrange a meeting or book a flight without having to load its actual executable code onto another node to do so. We think it can book your flights from your commlink, that the search agent can collect data on your behalf without dissapearing off for a while and the wizzer infiltration application can be left alone in at the entrance to Evil Corp™ trying to break in without a human holding its hand.

And, again, I ask, where in the rules does it say that an agent can run on one node, and affect a different node? Please, I'd like quote.

Agents are the drones of the matrix. Just like you drone can't execute more than one command at a time, neither can your agents. Your search agent can get data for you, because it runs its browse program, and there you go, it goes nowhere to do so. The infiltration agent can be left alone to break in, without a human holding its hand. Once its in, then its on the evil corp's node, and uses the evil corp's response.

QUOTE (knasser)
The VR Matrix represents interaction between agents / personas and nodes, as the former being present in the latter. A persona program is running on your own commlink, so is your stealth program and your Edit program, but the VR matrix represents you being present in Node A using these programs there. You can be attacked, detected, etc. Your interaction with that node is your presence in it. Consider the following situation:

The corp exec has purchased Novatech's new Pocket Secretary 9000 to handle his calls, arrange meetings, etc. He asks it to book a flight. Under our model, it logs into a remote airline system and begins making arrangements. In the meantime, it is still very sensible running on the commlink. While it's doing that, he asks it to alter his meeting schedules and tell his boyfriend he'll be late home. Under your model, the pocket secretary actually loads its code onto a remote system, vanishing from his own commlink, creating a burden on the presumably busy airline system. In the meantime, he can't issue it the other commands, it can't deal with any incoming requests or calls to his own commlink. He doesn't even know for sure where it's gone or if its coming back! His software, with all its knowledge of his affairs, his itinery, past schedules and contacts, is now loaded onto another company's machine! It has sodded off and he's sitting with an empty commlink! This follows inevitably from the way you are interpreting the rules... Unless, that is, the corporate executive accompanies his pocket secretary on all these little jobs, doing nothing at all, but co-existing in the same node so that this mysteriously suddenly enables the agent to do what it would have been able to do anyway. Remember - if you are interacting with a node in a meaningful way, you are present in it, and that is what you are not allowing an agent to do unless it forfeits any actual connection to your own system or commlink - no trail, remember? Your words.

Doesn't that seem absurd, counter-intuitive and hard to twist into any sort of justification to you?


First, a persona is not a program. SR4, 221, "The persona represents your Matrix alter ego. It is a combination of programs that you use, in conjunction with your device’s OS, to represent yourself to other users and nodes in the Matrix. Your persona’s attributes are determined by the attributes of whatever device/OS you are using to access the Matrix—usually your commlink or terminal, though you may sometimes access via other devices."

If he didn't have an agent, and wanted to do the booking and such himself, he would log into the airline system, and start booking the flight. While hes doing so, he realizes he should let his boyfriend know that he'll be home late, so he can either make a secondary icon in his commlink, and jump between the two to book his flight and let his boyfriend know, or just wait until he finished booking his flight before telling his boyfriend.
Under your model, the agent can be booking a flight, and tell his boyfriend he'll be late at the same time! This clearly isn't possible.
SR4, 218, "It’s common practice for Matrix users to connect to more than one node at the same time—this is just a matter of switching between open windows. There is no penalty to switch your attention between accessed nodes, but you can only act in one node at a time (meaning each action only applies to one node)."

Under my interpretation:
Theres no reason the agent couldn't connect to the airline node via a secondary icon, and perform just as well as the corpman could. Again, they'd be switching off between actions in the airline finding the flight and reserving it, and notifying the boyfriend about being home late.

As a side note:
The agent doesn't have knowledge of his affairs, itenerary, schedules, or contacts, that would all be stored locally on his commlink in a file that the agent has access to.

Why should an agent be able to perform both on his commlink and on a remote node when any other matrix entity can't?
Tarantula
QUOTE (Cthulhudreams)
QUOTE (Tarantula @ Aug 16 2007, 10:36 AM)
Except I imagine most nodes would allow guest accounts, for things like browsing a restaraunt menu, or looking at the store directory of a grocery store.

Sure - but what happens if I disable all the accounts on my drone except the administrator account?

You're 'you have to log in to hack a node' model doesn't work any more in that case. How do you even hack a drone?

I never said you have to log in in order to hack. You have to log in OR exploit in. Either you have a valid account, and you log in. Or you don't have a valid account, so you use exploit to get in.
Tarantula
QUOTE (Mr Jackson)
QUOTE (Tarantula @ Aug 16 2007, 11:16 AM)
Yes, they are not a hackers persona, and there is no text stating that they work the same.

Is there text stating that they work differently?

Saying there does not exist text that says they work the same, does not mean they work differently, unless we are told how they work differently.

Yes there is. The text on 227-228 about agents defines how they work, since it is not the same text as for how personas, they work differently.
knasser
QUOTE (Tarantula)
the entire extent of your point of view is merely "I interpret it differently", with no explanations of why or how you came to such a conclusion.


My jaw is on the floor. Please re-read everything that I have written.

QUOTE (Tarantula)

I haven't pushed the view that my interpretation is official in any way, shape or form.


Rubbish. All we have had from you in this thread and the last is "you're wrong, you're wrong, you're wrong. The RAW specify X and look at this quote, you're wrong!"

QUOTE (Tarantula)
I didn't conciously ommit a common view, I was reading through the text as I made the poll, and created the options based on the different outcomes of interpretation I could see from the text.


Your first post stated:
CODE
I'm curious to how my view will hold up to the scrutiny of dumpshockers. I'd like to get this hammered out, as it seems the consensus of dumpshock right now is contrary to my own, so hopefully I can get some good discussion going about this.


And yet, after having a big argument with people in the previous thread, you create a poll asking to determine "the consensus" whilst excluding an option that you know full well many dumpshockers hold. In what way can we reconcile this action with the stated aim of determining consensus. Your options consist of "Agree with Me" or "Contradict the Book" whilst your response to those who have said your poll is missing options is that their choice is not valid. How is that not consciously omitting a common view?

QUOTE (Tarantula)

As of yet, despite me asking you a few times, you haven't explained how you reached your conclusion that agents are allowed to run on one node and affect another node. So, I still have no idea how you get there.


You are not that stupid. You know full well how and why my interpretation falls out from what I've read. I've explained it multiple times and other people here seem to have understood it. If you really "have no idea" then all you have to do is re-read this thread.

QUOTE (Tarantula)

Under my interpretation:
Theres no reason the agent couldn't connect to the airline node via a secondary icon, and perform just as well as the corpman could.  Again, they'd be switching off between actions in the airline finding the flight and reserving it, and notifying the boyfriend about being home late.


So which node is the agent running on when it's in multiple nodes? When the agent has gone off and loaded itself on to the remote airline node how is the exec able to give it further commands as you said earlier "the reason it id using the other nodes Response is because it has no connection to the commlink" ? You have the executive writing down lists of things he wants to instruct the agent for when it comes back. And as you didn't address it, I'll repeat it - isn't it stupid that the PA agent with all his contact lists, itinery, business information, etc. has gone had to go and actually leave his commlink and load itself onto another system just to book a flight? When it could as easily have just continued running on his own system and logged into the airline node remotely. Remember - interaction with a node is VR presence in that node. Why on Earth should it have to download itself in order to do simple tasks like this when we've already established that it can run very complex tasks such as cybercombat in a remote node from his commlink. Your artificial distinction that suddenly says the technology to do this mysteriously vanishes when the human takes his trodes off makes no sense.

QUOTE

As a side note:
The agent doesn't have knowledge of his affairs, itenerary, schedules, or contacts, that would all be stored locally on his commlink in a file that the agent has access to.


Of course it has knowledge of these things. Else it can't function properly. How could it go off and book rooms, arrange meetings, calculate the best flight routes if it doesn't have context for what it's doing. Remember that the agents of 2070 are very advanced constructs. They can hold realistic conversations with human beings, organise your schedules, take sales orders. Under your model, an agent performing any sort of interaction with another system (such as the airline, booking restaurants, collecting sales data, etc.) can only do these tasks if it either loads the whole caboodle onto somebody else's system (got to love that security model) or else if a human, who need do nothing, tags along for no apparent reason.

QUOTE

Why should an agent be able to perform both on his commlink and on a remote node when any other matrix entity can't?


Any other matrix entity can. There's nothing in the rules that prevents an agent being present in more than one node just like everyone else.... except under your interpretation. The way we read it, it works just fine. You can even keep the exec's itinery on his own commlink that way, if you like. wink.gif
DireRadiant
Agents are programs too...

But apparently my Browse programs can do things Agent software can't.
Blade
I respect the solution that agents can act on nodes they aren't loaded on. It makes sense and I don't think it's wrong (but I don't say it's right either).

As for myself, I use the other solution (the one that states that agents can only run on nodes they are loaded on) because that's how it appeared to me when I first read the rules (so it's more inuititve to me) and I'm more at ease with this interpretation as far as games mechanics are concerned.

Some of you seems to think that this vision is totally flawed. I'm not here to support it against all logic and consistency and if I ever see an arugment that can convince me, I will change my mind. But so far, I haven't found any.
I was going to explain why I wasn't convinced by the arguments that were offered, but I don't know if anybody's interested and I don't want to waste my time.
darthmord
Ya know... I just treat agents as though they are a hacker too (except when the RAW explicitly state otherwise). Works well enough and makes sense for me.
Tarantula
QUOTE (knasser)
Rubbish. All we have had from you in this thread and the last is "you're wrong, you're wrong, you're wrong. The RAW specify X and look at this quote, you're wrong!"


You keep saying that i've claimed people were wrong wrong wrong. Please, show me my post where I did so. I'm tired of you putting words in my mouth and using personal attacks against me. I wasn't aware that quoting the rulebook made my view "official". So, does that mean because you haven't quoted it at all, yours is only a house rule?

QUOTE (knasser)
You are not that stupid. You know full well how and why my interpretation falls out from what I've read. I've explained it multiple times and other people here seem to have understood it. If you really "have no idea" then all you have to do is re-read this thread.

Your interpretation falls out from assuming agents are just as capable as a hacker himself. Why should they be? And where is your rules backup. You've never yet used the rulebook to backup any statements you've made.

QUOTE (knasser)
So which node is the agent running on when it's in multiple nodes? When the agent has gone off and loaded itself on to the remote airline node how is the exec able to give it further commands as you said earlier "the reason it id using the other nodes Response is because it has no connection to the commlink" ? You have the executive writing down lists of things he wants to instruct the agent for when it comes back. And as you didn't address it, I'll repeat it - isn't it stupid that the PA agent with all his contact lists, itinery, business information, etc. has gone had to go and actually leave his commlink and load itself onto another system just to book a flight? When it could as easily have just continued running on his own system and logged into the airline node remotely. Remember - interaction with a node is VR presence in that node. Why on Earth should it have to download itself in order to do simple tasks like this when we've already established that it can run very complex tasks such as cybercombat in a remote node from his commlink. Your artificial distinction that suddenly says the technology to do this mysteriously vanishes when the human takes his trodes off makes no sense.


The agents icons are each running in their own node. The one in the pocket sec is on the pocket sec, and the one on the airport node is on the airport node.

Yes, it is stupid that the corpman wouldn't have his agent running in persona mode. He is using AR to interact with his commlink, there is an AR persona. Its unlikely hes running many programs anyway, thats what his agent is for, so theres no reason for him to be using the agent independently. It can keep running on his own system and connect remotely, by being run through his persona. Because, it can only do any tasks (complex or otherwise)in a remote node by being run though a persona. AR hackers have persona's too, so your trode example doesn't work. If you are using your commlink, you have a persona icon in it.

Yeah, agents are like drones. You give them lists of tasks you want them to do, and they do it. Independent mode is analogous to sprites on remote tasks. The difference is technomancers have a resonance link to their sprite so they can give it changes of orders while its out there (assuming its a registered sprite and still has services). Agents just go out and do it. (Also, theres no reason you couldn't make the same public access to the airline node to tell your agent what you'd like it to do instead.)

QUOTE (knasser)
Any other matrix entity can. There's nothing in the rules that prevents an agent being present in more than one node just like everyone else.... except under your interpretation. The way we read it, it works just fine. You can even keep the exec's itinery on his own commlink that way, if you like.


I said the agent can exist both on the commlink and on a remote node by making multiple icons. You were claiming that it could actively handle calls and make schedules in the corpmans pocket secretary AT THE SAME TIME that it was searching for a flight and booking it. NO matrix entity can do that, hacker, agent, technomancer, or sprite.

Uh oh, I'm quoting the book again... SR4, 211, "The persona represents your Matrix alter ego. It is a combination of programs that you use, in conjunction with your device’s OS, to represent yourself to other users and nodes in the Matrix. Your persona’s attributes are determined by the attributes of whatever device/OS you are using to access the Matrix—usually your commlink or terminal, though you may sometimes access via other devices.

This defines the persona as programs in use with a devices OS. It nowhere requires that you must have a brain along with it to have a persona. I see no reason why you couldn't have 2 commlinks, your persona in run, and load the agent into the others persona. Tracks would trace back to the 2nd commlink, but the agent would be utilizing that commlinks response, because its running through a persona. The downside, is that when the agent connects to a node, the agent and the persona show up. SR4, 211, "Attacks made against your persona affect the device/OS, though Black IC programs affect the actual user directly." So, attacks against the persona crash the commlink (as a persona is part of its OS) and attacks against the agent would crash the agent.

This view lets you have your agents operating on one commlink and able to affect other nodes without taking a response hit, but there is a downside to it (undefended persona).
fistandantilus4.0
I know this has been a long debate back and forth. For the most part , it's been free of the kind of venom that usually pops up by now. Let's keep it that way please and keep snarky comments out. smile.gif
FrankTrollman
QUOTE (Tarantula)

You keep saying that i've claimed people were wrong wrong wrong. Please, show me my post where I did so.


Let's start with the fact that your core contention: that Agents behave differently than hackers except where specified differently; and your secondary contention: that the ability of Agents to move their code from one node to another necessitates that they do that before they can interact with other nodes - is extremely contentious. And despite the fact that you know this to be the case, you knew this to be the case you nevertheless chose to make a poll asking people how they thought these things worked and yet none of the poll options included or allowed questioning your base assumptions.

That's dishonest. And reflects poorly on your character.

It's like Master Shake's or all over again.

-Frank
fistandantilus4.0
Not nearly as bad as Master Shake's.

Tarantula, any objection to editing in another poll option on your original post?
Moon-Hawk
QUOTE (fistandantilus3.0)
Tarantula, any objection to editing in another poll option on your original post?

Unless all of the votes are cleared and the poll reset, I would think that any results will be misleading at best.
I would very much like to see the results of the poll with all popular answers included, but I would be concerned that adding options after voting has begun would skew results.
fistandantilus4.0
Create a new thread and link then. smile.gif
Moon-Hawk
QUOTE (fistandantilus3.0)
Create a new thread and link then. smile.gif

Just what we need. Another thread about the exact same topic. sarcastic.gif
Oh no. I've already gotten more involved in this mess than I wanted to.
DireRadiant
Mechanically I look at an agent and see that when I make a check or roll I will be doing the following.

Agent Skill + Program Rating

When a Hacker does "stuff" they also do

Hacker Skill + Program Rating



When I read how Agents "Can be loaded" onto a different node, I treat this more of a "Can Also", rather as a "Can Only", where the specific descriptive text is describing an additional non standard capability of Agent software.

You'll note the rules for everything else follow this pattern where there is a general case or pattern, and then where there is something specific that supplements or contravenes an existing general rule, that specific case is written explicitly. Writing RPG rules the other way is very bloated and redundant.

For a non matrix example, you can look at the Yamaha Sakura Fubuki which has special rules when using it that are not described in the general combat and firearms section.
knasser
QUOTE (fistandantilus3.0)
I know this has been a long debate back and forth. For the most part , it's been free of the kind of venom that usually pops up by now. Let's keep it that way please and keep snarky comments out. smile.gif


I think I may be nearing done here. The questions that Tarantula is asking I have already answered a couple of times. They haven't satisfied him and from this point on its going to be increasingly repetitious. Tarantula is plainly not going to be persuaded (nor am I demanding that he should be), and more neutral participants and readers have enough arguments on both sides that they can make their own minds up.

My goal in this has been to represent what I consider a perfectly valid and even preferable interpretation of the rules and to prevent newcomers to the Shadowrun game coming away with the impression that Tarantula's take on the rules represents some sort of authoratitve Shadowrun statement. Hence my continued argument here and in the previous thread. That is done. I don't think any readers of this thread wont understand the point of view of Frank, myself and others. And I can personally say that it has been balanced in play and I find that it makes very solid sense according to the flavour and the fluff. It's even in line with the previous edition wherein a Semi-Autonomous program would roam the Matrix but leave a Matrix trail back to its "native host."

My position, though much condensed from the weight of five or six pages of argument in this thread and the last, could reasonably be summed up as follows:

1.) It's natural to assume that agents can interact with nodes other than the one they are running on because of the precedent of other Matrix entities.
2.) The line about "independent" agents doesn't change this default view because on my initial and subsequent readings I have taken that word to mean agents that are not running on your commlink (and incidentally, not leaving a Matrix trail back to your commlink because of that). I don't believe it refers to just any agent that merely interacts with any remote system.
3.a.) It makes no sense that the technology exists for a software program to run fully from one system whilst operating on another, without any oversight or input from a human that happens to be present in the same node, but for the technology to cease to exist when the human goes elsewhere in the system. In the former case, the human can even fall asleep whilst jacked in and nothing in fluff or rules suggests active involvement on the part of the human to guide the agent is needed. So why should we suppose the technolgy is radically dependent on this uninvolved human presence. The artificiality of having to have the human there holding the agent's hand is striking.
3.b.) The model of forcing every software agent that does research, books flights, arranges meetings or takes calls, to load itself and all necessary (and personal) data onto a remote system (whilst simultaneously removing itself from the owner's system) in order to accomplish anything useful, is both insanely insecure and highly implausible to me.
4. Various oddities of rules if the forcing of agents to run on any node they are present in is followed; such as how you would resolve the abilities with agents in multiple nodes.

Of course, there is a lot more that I have said on the subject and it's all there for anyone to read through if they wish. I think everyone has heard enough now to decide what is appropriate for their games. I repeat that I'm not saying that anyone can't play with Tarantula's interpretation. I am insisting that the interpretation I and plenty of others took from the text is valid under RAW and makes a very large amount of sense.

All that remains is to address a couple of comments which I resent and then I hope we're almost done here.

QUOTE (Tarantula)
You keep saying that i've claimed people were wrong wrong wrong. Please, show me my post where I did so. I'm tired of you putting words in my mouth and using personal attacks against me.


I don't think anyone can have read to this point in the thread without having seen numerous comments where you told myself and others that our interpretations of the rules were wrong. If anyone is unsure of that (including yourself) then feel free to re-read this thread and the last one. As to personal attacks, I don't recall any and I think the worst thing that I said was "you're not that stupid" in reference to what I perceived as willful refusal to see my point of view. If I've said anything worse than that then I apologise... but I don't recall anything and I'm usually quite strict about avoiding ad hominems. Where I've said that something makes no sense in relation to your argument, I don't see how this can be construed as a personal attack.

From here on, I consider my view put forth. If anyone has questions on it, then please feel free to ask, but I want to avoid going endlessly round the "Quote page 217.->Point out we disagree on the context of "Indpendent" ->Quote page 217." cycle any more times than I already have.

If there's a new poll with appropriate options then I will vote in it, but personally, I don't see True and False being determined by popular vote. We have our interpretations, Tarantula has his. The main thing is that people who come to Dumpshock seeking help can now see all the interpretations people are playing with and choose that which makes most sense to them and their players.

Regards,

-Khadim.
Tarantula
Actually, I was thinking about this at work today, and came upon a realization.

QUOTE (Tarantula)
Uh oh, I'm quoting the book again... SR4, 211, "The persona represents your Matrix alter ego. It is a combination of programs that you use, in conjunction with your device’s OS, to represent yourself to other users and nodes in the Matrix. Your persona’s attributes are determined by the attributes of whatever device/OS you are using to access the Matrix—usually your commlink or terminal, though you may sometimes access via other devices."

This defines the persona as programs in use with a devices OS. It nowhere requires that you must have a brain along with it to have a persona.


When an agent is being run through your persona, you control the persona via your commands, and the agent piggybacks on the persona with its own, able to execute its own commands.

When an agent is running independently, it controls its own persona. SR4, 228, "If you wish for your agent to operate in the Matrix independently, you must load it on a particular node separate from your persona."
Why must you load it on a node seperate from your persona? Because its controlling that nodes persona. This allows it to act exactly like a hacker, as if the hacker was plugged into the particular node that is seperate.

So, while there are 2 methods an agent can run, through a hackers persona, and independently; independently is just a fancy way to say the agent controls a devices persona entirely.

So, in conclusion, agents acting independently utilize the response of the node they are loaded into, and can affect remote nodes the exact same as a hacker who was plugged into their source node.

What this means, is that any company wanting halfway decent matrix security will spend at least 5k on a transys avalon, with 1,500 on a novatech navi. And 10k per agent, + whatever programs they want availible to it on the system. Most likely, analyze, armor, stealth, track, attack, and possibly blackhammer/out. It would only run 3 at once, so likely analyze, stealth and armor, and swapping analyze for attack once detecting an intruder. 400 for analyze, and 4000 each for armor, stealth, track, analyze, and blackhammer/out. Total is 5000 + 1500 + 10000 + 400 + 20000 = 36,900 per agent (assuming they can't just copy the programs). Throw a few (4-6) of these in the node containing all your vital data, and hackers won't stand a chance to avoid their constant analyzing (6 times each a combat turn, x 4 = 24 opposed test every 3 seconds).

If the corp can just copy software, then you get a cost of 6500 (for the hardware) for each extra agent instead. Easily leading to 10-20 agents in a corps node.

While I don't like it, this is how it is, and it does need to be addressed. Since this makes hacking virtually undoable, as you can't do it steathily (as you'll get found with that many opposed tests eventually), and once you're detected, they can just kick you out without much issue, whether through attacks, or if an agent is crashed, the node can just kick all active connections until the agent can be rebooted.

Final verdict, while your reasoning didn't convince me that agents could remotely act in nodes the same as a hacker, continued extrapolation on it finally got me there. Agent smiths unite.

Lastly: You quoted me as saying "wrong wrong wrong". I never did. In fact, I never used the word "wrong" until you quoted me as having said it. Thats what hit my buttons. Misquoting me to try to convince people I'm being childish.
knasser
QUOTE (Tarantula @ Aug 18 2007, 12:55 AM)
Lastly:  You quoted me as saying "wrong wrong wrong".  I never did.  In fact, I never used the word "wrong" until you quoted me as having said it.  Thats what hit my buttons.  Misquoting me to try to convince people I'm being childish.


I'm sincerely sorry for any offence caused. I was summing up how I felt, but you didn't use the word "wrong" and if that was taken badly... as I say, I apologise for any false implications. Taking over the "device's persona" is an interesting way of looking at it which hadn't occured to me.

You're right that the Agent Smith Army is a potential problem, though it wouldn't be the first time that the 4th edition rules have introduced an unthought of power loop. I deal with it a few ways which I'll summarise if anyone's interested.

One thing that I noticed in your post is that you have IC repeatedly scan for the intruder, forcing the hacker to make successive opposed Hacking + Stealth rolls. Much like not requiring a physical intruder to make Infiltration rolls vs. the security guard every round, I only allow the IC one attempt to spot the intruder. I would allow a second attempt if circumstances changed for some reason, of if the hacker was present for an excessive length of time, but I've normally reserved this as a GM call. I know that others use the same model as you do however, so I'm interested to know what other GMs have ruled generally. The one chance model doesn't change your point that multiple IC is very dangerous for the hacker, though it puts it below the level of suicidal for the hacker. wink.gif

Anyway, apologies again for where I got too heated in the debate.

Regards,

-Khadim.
Blade
I think that, until we get a definite canon answer about this, new GM should consider each possibility and choose which one suits him best. Here is my take of what you get with each interpretation:

1) An agent can be loaded and running on node A but act on node B:
- The same rules apply to all Matrix entities (ie. personas)
- You can have high rating IC on low rating nodes.
- You can have as much IC on a node that you want.
- Agents are "Hackers in a Box", a rating 5 agent is just as efficient as a hacker with 5 across the board. (Except that it's not "intelligent")

2) An agent has to be loaded on a node to act on it:
- Agents are different from personas
- You can't have too much IC running on a node
- IC's rating will be limited by the node's rating

Solution 1 gives powerful attacking agents but also potentially powerful protections. It's useful to allow a character to hack without being a hacker, and is especially useful if the team doesn't have any hacker. It also uses the same rule for everyone, which might make it easier for some GM.
With solution 2, agents are more of Matrix drones rather than full-blown hacker. They can still help the hacker when going with him, but they aren't that useful on their own. On the other hand, the number and rating of ICs on a node are limited.

I tried to be as objective as I could. If you think it's not correct, missing something or showing some bias please let me know.
hobgoblin
looks about right to me.
knasser
QUOTE (Blade)
I tried to be as objective as I could. If you think it's not correct, missing something or showing some bias please let me know.


Seems factually correct, but is very game specific. There are implications to number two for the wider fluff world as detailed earlier, e.g. pocket secretary example.
FrankTrollman
Agent Smith is problematic regardless of whether you use Option #1 or Option #2. It's just a problem. Heck, it was problematic in earlier versions of Shadowrun with the SAKs (it was just that noone ever bothered to buy huge amounts of memory and load multiple SAKs copies into memory because the rules were so complicated that just explaining it to the GM was probably more trouble than it was worth).

In Option #2 you still have Dr. Legion Smith and DDOSmith. In Option #1 you basically have nearly every kind of Smith problem you can imagine - but at least both sides can always play.

---

For those of you who don't know, Dr. Legion Smith is a series of arbitrarily large numbers of Agent copies who all pack Medic and repair your icon whenever they can reach it. So long as you maintain a copy of your icon in a node with Dr. Legion Smith in it, you heal all Matrix damage every single Initiative Pass. DDOSmith is a hilarious abuse of Option #2 where you are simply trying to cut off Matrix activity from a location. So your entire legion of Mr. Smiths attempts to log on to a Node with a standard account. Once they do so, they start running programs - or at least try to. Since they count as programs running on the node in question in version #2 (and arguably, so too do the programs they bring with them), they'll pop into existence and immediately drop the Response of the Node down to zero - blue screen of death. The entire system has to reboot from the memory overdraw and your Agent army can keep it suppressed by simply doing it again when it comes back up.

---

Fundamentally, the fact that "an" Agent is defined as getting its own set of die rolls to take specific Matrix actions breaks the setting.

-Frank
hobgoblin
outfit a drone with the smarts and a medikit and you have the same issues but in real ilfe.

only that there i guess your working with physcial restrictions, while this is not so in the matrix.

and another thought, i would say that some of the agent issues depends on how you interpret the skills and programs to work. as in, when using data search and similar, is the user jumping from node to node, or sitting there hamemering searches into a number of google like services?

this is not fleshed out, so it can go either way.

and something else, some people have shows problems with what one can call a spirit storm. isnt that the magical equivalent to the agent smith problem? that one can at any moment become a virtual one man army by calling on resources one have on standby or can whistle up at a moments notice?

as in, the agent smith problem isnt isolated to the matrix. its just that it may be most severe there as there are no limitations (physical space, drain and so on) or costs involved when one can spread the load of the agents across multiple nodes (kinda like having someone else take the drain of a summoning) and can pirate the agent rather then paying for it (kinda like hijacking a truckload of drones rather then buying them).

hmm, is there a comprehension test available in SR4? i cant recall reading about one but it may be my memory failing.

as in, a test where the user rolls when giving orders, and if he rolls badly it will limit the number of dice a agent or similar can deploy when doing its own test. this because badly given orders confuse the "dog brain" of the agent.

sure, one could counter that by doing rerolls or buying hits. but when one start walking down that path one run into the classical "every offense has a counter". trying to outsmart a player by writing rules may not work in the long run...
Blade
Yes, option #2 requires a bit more fluff explanation than option #1.

Also option #2 requires fixes for the Agent Smith problem while some people can be fine with option #1 allowing both sides to use this (but some GM might want to prevent this from happening with house rules or by considering the drawbacks of an abuse of this system).
But because #2 is stating that agents don't work the same way as personas, it can lead to simple fixes.

Anyway, the entire Matrix rules need GM interpretation if not houseruling...
On one hand I hope that Unwired fixes this but on the other hand I'm afraid of some of the ways they can fix it.
FrankTrollman
QUOTE
outfit a drone with the smarts and a medikit and you have the same issues but in real ilfe.


First Aid takes time (round or more per box), and is not repeatable. Matrix Medic stacks, is instantaneous, and can be retried an indefinite number of times. Having a large pile of medical machinery is awesome. Having access to Dr. Legion Smith allows you to simply ignore Matrix damage altogether.

QUOTE
and something else, some people have shows problems with what one can call a spirit storm. isnt that the magical equivalent to the agent smith problem? that one can at any moment become a virtual one man army by calling on resources one have on standby or can whistle up at a moments notice?


I got the primary method of that removed (wherein a player would chain summon spirits on remote service). The current rules read that spirits on remote service still count against your limit of bound or unbound spirits. The Spirit Storm was in the original rules, just as Agent Smith was - but it was easy enough to remove.

The problem is that the limitting factor on your spirit storm is the number of Magicians you can put together, while the limitation on how big your Agent Smith army is cleaves to the number of Commlinks you can duct tape together. Merely slapping a "limit" on Agent Smith like I did for Unbound Spirits wouldn't do anything to people willing to shill out for another Hermes Ikon or twelve.

-Frank
virgileso
Do you have a solution to the Agent Smith problem, Frank?
Ol' Scratch
The solution is easy and identical to most solutions in the game for problem areas:

GM: "No."
FrankTrollman
QUOTE (virgileso)
Do you have a solution to the Agent Smith problem, Frank?

I am concerned that it might not be possible within the limits of what can be done with errata and Unwired. Spirit Storm was a seriously easy fix. There was only one line of text that permitted it and nothing fundamental about the magic system implied its existence. All that really had to be done is writing the entire Spirit section of Street Magic as if that line didn't exist and then delete it from the basic book with errata.

The Agent Smith problem centers on the fact that scripts run on computers and the computers run on belt buckles. As long as programs are abstracted (like Attack and Stealth are), that works fine. But as soon as it becomes important how "many" scripts are running the game falls apart if you look at with scrutiny.

You don't run a "number" of Reality Filters, you simply are either running or not running it and that works fine. But Agents are defined as an actor which causes your programs like Attack and Medic to be rolled an extra time. It really can't do that because there really no limits at all to how "many" programs you can run somewhere in the world.

What should probably happen is for "Agent" to be reimagined as an abstracted program in the same manner as Stealth that allows you to fall back on skills while you aren't willing or able to act yourself. Having each Agent divide and multiply the activities of the arbitrarily large computer network to which they are connected is simply impractical.

QUOTE (Dr. Funkenstein)
The solution is easy and identical to most solutions in the game for problem areas:

GM: "No."


Heh. That is the best solution for a game, but it is the worst solution for the game.

In my home games I simply say "We're going to be abstracting Agents, everyone cool with that?" and people sort of shrug and we move on. Problem "solved". But from the standpoint of someone who has their name in Shadowrun books, that doesn't make me happy.

I don't want to be in the position of handing strangers a rule book and then saying "Yeah, these are the rules you probably shouldn't use because they are broken. Sorry about that." I'll do it if I have to, and it can be done, but I find it to be a bad solution. For one thing, I can't actually talk to every stranger who picks up a Shadowrun book and the implications of problems like Agent Smith and Bloodzilla aren't necessarily obvious to everyone.

-Frank
knasser

I covered some of my answers to the Agent Smith problem earlier in this thread. I didn't really go into the reason corps don't use agent swarms because I've gone at length about that elsewhere. It's two parts fluff and one part rules implications. I can rehash it if people are interested.

On the part of hackers, there are two counts against the use of agent smith storms in attack. One is simply the resources involved if you're running them from commlinks, etc. You can get extra agents, but if you're going for the silly numbers, then that actually piles up to a hefty chunk of money to throw away on an attack. As at least some of the agents will be traced, you can't really consider it a recoverable expense. It's possible to have your agents remotely loading onto other nodes via Exploit, but there are disadvantages unique to this which is why it's important to cover any problems with having them all run from a large collection of commlinks.

Of course a corp can afford a lot of commlinks to blow on an attack, but I see this as more of a political issue than a technical one - much like lots of countries have long range missiles so they avoid launching them at each other.

So when it comes to agents loading themselves onto target nodes, we have a couple of issues. Firstly, the more agents you use, the more chances the opposition gets to spot you. If you throw six agents at a node, it is six times as likely to notice an attack as with a single agent or hacker. Because I think secrecy is very important in most hacking jobs, the agent army is actually counter-productive. If a node really sees a whole mob of coordinated assailants, it can sever connections or shut down. If you follow the sequence through, it can just get this done before the agents have a chance to do anything, even when they're hacking on the fly. A GM may allow a group of agents to take a single test using the team work rules and reduce the detection risk. I personally don't, but I know Tarantula has said that he does. I don't think this is something that can be argued as its a GM judgement call as to whether team work tests are allowed, based on his view of how the agents are actually working. I would expect that the node or any IC gets a chance to detect each one of them if they all attempt to enter the node however. In either case though, the number of extra dice on a team work test is capped as per the SR4 Errata.

Of course, forcing your target to pull up the drawbridge and sever communication with the rest of the Matrix is a victory, I'm not offering complete solutions here, but I think it will often not be the victory that you are looking for.

The Sixth World is a dangerous place. Going in with a swarm of agent programs may be effective within the narrow confines of a dungeon-crawly game session, but realistically, it creates a lot more avenues for being tracked down and identified than the softly softly approach. Being noticed can get you killed, so I think it will be avoided. Remember that you have two options - the agents are running from your commlink collection (or whatever) and that can open a lot of mundane avenues of investigation as well as Matrix ones; or else the agents are all moving about independently in which case you have to ask yourself are they stopping to erase their presence in the nodes that they've loaded themselves into, what percentage of them will not be successful in that, and which nodes are they loading themselves into? With large numbers of agents, you're going to be alerting someone (even Lonestar's Matrix division) who may begin damage control or counter action, and with reduced and safer numbers of agents being used to avoid that, you diminish the purpose of having an agent swarm in the first place,

So I don't have a magic sword with which to kill the Agent Smith Army problem, but I do have a very good collection of paper cuts and lemon juice that work quite well. The problem, as Frank has pointed out, is we don't get to give this information to everyone who picks up a copy of the SR4 rules.

-Khadim.
Tarantula
I agree, the Agent Smith method for attack is virtually worthless. Yes, you'll get in, but they WILL be noticed, its not cost effective, and all it does is effectively shut off that node (as it can easily cut all connections/reboot). Nothing really accomplished.

Where agent smith becomes a problem is corp defense. How much do you think the yearly salary for a security spider is? Say, 100k. A full commlink of rating 4 agent, and rating 4 analyze, armor, stealth, track, attack, blackhammer costs the company 36.9k. This assumes they won't get a bulk discount either. Assuming they do this, they can buy 3 fully loaded agents with dedicated commlinks every year. IF they can write the programs themselves, then they can get instead 15 agents per year at the cost of 6,500 per commlink, and the programs are free.

What this means, is that hacking corps is suicide (as even giving each agent only 1 shot per hacker, 10-20 agents will succeed.) I in fact lean toward the 1 test per hacker routine, because of the way you can set your analyze program to check a node for new icons/users and notify you. One test per user/icon, if you win, you see it, if you don't, you don't. Each agent just needs to have an icon in each important thread (able to have up to 8 active connections) and set their analyze programs in each one. As soon as it detects something unauthorized, they jump to that icon (free action) and begin tracking/attacking/activating alerts/telling other agents its unauthorised.

This makes hacking anyone with semi-decent resources completely unfeasible.
Buster
If you spread your agent army all over the matrix (as any ddos attack does), there will be no problems with being detected. How many ddos attackers have ever been caught in the real world?

We only need a rule saying that a system is smart enough to know that more agents over some threshold is not normal and hard blocks additional connections and\or exes from starting on a node.

This rule doesnt stop a system from sending an army after intruders though.

Tarantula
Or from just having an army that utterly destroys any intruders.
Buster
The easiest fix would be to say that agents require specialized hardware. If you say that agents/ic/pilots must run from network appliances with dedicated neural circuits, etc. that cost thousands of nuyen then all problems go away. No more "what node do they run from?" questions, no more "agent smith army" (for hackers or defenders). . . and no GM fiat.
hobgoblin
or just rip out the ability to upload a agent onto the net.

if you want to use a agent, you have to run it on your "home node"...

but then you cant put a agent into a johnsons comlink, and tell it to give a shout when the johnson calls the office...
knasser
Tarantula's right when he says that the problem isn't hackers attacking with agent armies, but corps defending with them. But there's a glimmer of hope in that the players are playing the hackers and not the corps, leaving it in the GMs power to justify what corps do.

I do use IC running on remote nodes to provide security elsewhere in a Matrix system, but it's actually the minority case. The metagame reason for this is that I want to create systems that are challenging but fun for the players. The in game justifcations are either rules based (as follows) or fluff. The rules issues are as follows:

1. If you have any sort of network or subscription problem, say someone turns on a jammer in your wireless office, your security on the node the IC is supposed to be protecting vanishes with a scream of static. This could be a significant problem. And there are more sorts of problem that can occur than deliberate sabotage also. If your IC is loaded on the node it's guarding, then you can be assured that node is as safe as the IC can provide. There are no easy ways around it.

2. Assuming that the corp does have a collection of IC supporting nodes from which the agents run, it can create a point of vulnerability that can be attacked. These can be shut down or interfered with. Perhaps large quantities of IC can be subverted in one go.

On the fluff side of things, I also consider the expense. As Tarantula points out, the costs are not astronomical. However, I do find the likelihood of corps writing their own software a small one. There are issues of project management, maintenance of the software, security patches, who the manager sues when security is compromised and even simple one of trust of hiring Random Programmer instead of a reputable Megacorp. Though if you're running against Renraku, then this obviously wont be an issue so the expense argument doesn't really help you in these cases. frown.gif

But broadly speaking, even greedy, save every penny corps can spend fifty - sixty thousand on security software without blinking. The problem is that you can come up with very good fluff reasons why it would be worse in reality but which aren't supported by the level of detail in the rules. For example, it's reasonable to think that software ratings would degrade with time. This would represent it getting more out of date, new exploits being found, etc. But this isn't represented in the rules. It's also reasonable to assume that a corp buying a program isn't just buying that program, but support agreements, update licences, etc. This means that the money you spend on IC and even the hardware it runs on, is money that you have to keep re-spending. It still costs Microsoft the same amount of money in sending out the install DVD whether you put it on one machine or a hundred, but they still charge you more for the licence to put it on a hundred. But again, all we have in the Gear section of the book is a purchase price.

If you expand a very small amount beyond the SR4 BBB, then it becomes easyish to justify corps not using Agent Smith Armies for defence. Certainly sufficiently for a GM wanting to preserve the balance of a role-playing game by satisfying his players' need for realism. The abuse of agents by players is handled by rules balances, so between those two, you can more or less stop the ASA popping up in your game and breaking it. It is something that needs to be looked at in Unwired for clean-up though. Even a optional rule sidebar introducing Program Rating Degredation would go some way to resolving the issue.

I was going to finish there, but it occured to me that I haven't clarified where I do use remote and roving IC. For the most part, I use it only as a set of re-inforcements when the alerts are triggered. At that point, they may be activated and sent out into the system to deal with intruders. But I use them sparingly, unless the players are trying a run against a Renraku head office.

-K.
Veggiesama
QUOTE (Buster)
The easiest fix would be to say that agents require specialized hardware. If you say that agents/ic/pilots must run from network appliances with dedicated neural circuits, etc. that cost thousands of nuyen then all problems go away. No more "what node do they run from?" questions, no more "agent smith army" (for hackers or defenders). . . and no GM fiat.

Glad someone agrees with me! <3
Tarantula
And that fix buster removes agents from PC grasp. They already cost quite a lot, and if you make pilots require it as well, then that means drones have that hardware. I'd just take the hardware outta a few dozen microdrones, and use that to make my agent army.

Knasser, the problem goes away if you think about server rooms, and assume they're still in use in 2070. (Reasons for this are ease of maintenence, stable environment, and physical security keeps all servers out of reach, instead of needing seperate defences for each server). Put the IC in i too, and plug them directly in to all the other servers. Now, getting the server you want is just as easy as disabling the IC. And if you go the hacker way, you get owned by the dozens of IC on the system. (Even buying the programs, its almost 40k per rating 4 agent, and you could drop this alot by just taking out the hacking programs, it really only need analyze, and then have the server kick out all active connections when it sees an intruder). That drops the cost for a rating 4 agent to very cheap. 6500 for a rating 4 commlink. 20k for 2 rating 4 agents. and 800 for 2 rating 4 analyze programs. Total is 27,300 for 2. Or 13,650 for one. The security comes from terminating the connection. System does firewall +4 for active alert, + system vs expoit + hacking. Chances of the hacker winning aren't great. If it fails to kick the hacker off, the system can then just reboot.
Sma
How does making agents cost thousands (!) of nuyen do anything at all to stop corporations from using them ?

And if corporations get to use them you have successfully removed the Hacker archetype from gameplay.
hobgoblin
oh brother, did they have to open that can of worms again...
Buster
It doesn't stop them. If they cost lots of money, it just keeps them from building super armies. Corps don't have infinite resources; they can't field armies of hackers either. It doesn't stop players if they aren't too expensive, you would have to play test the nuyen amount.
Tarantula
Corps don't need super armies though, just a few dozen decently rated agents is enough to lockdown a node to any hacker trying to stealth his way through, and any force large enough to take down all the agents is enough for the system to just shutdown instead of trying to fight it.
Veggiesama
QUOTE (Sma)
How does making agents cost thousands (!) of nuyen do anything at all to stop corporations from using them ?

Assume that the larger the corporation, the more nodes they have to protect. More nodes require more active agents.

Even if a system alert is called, you can't pull all those agents off of the nodes they're required to monitor and protect, lest another hacker come in and clean up in its absence. Hence the second line of defense may rely on your friendly neighborhood hacker. Once he hears the distress call, he can pop right on and adjust to the situation faster than any scripted agent-based defense system could.

QUOTE (Tarantula)

  And that fix buster removes agents from PC grasp. They already cost quite a lot, and if you make pilots require it as well, then that means drones have that hardware. I'd just take the hardware outta a few dozen microdrones, and use that to make my agent army.


Not necessarily. At least in my house rules, the price of agents don't change. They're just assumed to be specialized firmware that come with a commlink-like house. And yeah, I guess you could pick up a handful of Shiawase Kanmushi microdrones and tear out the Pilot part for 1/3rd of retail price, but that "problem" (if one sees it as such) has always been there. Yippee, Pilot 3.

Maybe another way would be to just make agents a lot cheaper and require them to "inhabit" a commlink and control the hardware as their own. That way the agent is treated just like a regular hacker in every way. Shrug.
Tarantula
And thats exactly what they do, then the connect remotely to another node, just like a hacker can, and then pwn intruders in that node, along with the other 20 agents doing the exact same thing.
Odsh
QUOTE (virgileso @ Aug 14 2007, 10:02 PM)

The teamwork rules cap the number of extra dice by the skill of those involved, so the average agent (rating 3) can at most get three extra dice on a test. This is very much assuming that the GM allows identical agent programs to use the team work rules. They do, after all, have identical knowledge and techniques. You run the same program eight times, you get the same results eight times. wink.gif At any rate, I certainly don't think you can apply it to Stealth rolls which is the most important. If you slavishly allow teamwork rolls for everything, then you're going to get forty-strong Shadowrunning teams strolling invisibly through corporate compounds as they throw in Infiltration dice to each other. smile.gif


I like this solution, and I think it makes sense to limit the teamwork rule to agents.
Agents are just programs, and in most cases running the same program several times in parallel is not very useful. For example, if you "fix" the vulnerability exploited by a virus, this will ward of any attack made by this kind of virus, regardless of the number of attacks.
I think we should not forget that any matrix action is composed of a multitude of such basic actions, and that if we look more closely at these, there is no way that the effectiveness of several agents can be proportional to the number of agents involved in the task. Each agent, unlike real hackers, is the exact copy of the same program and has therefore the same basic approach to a given problem. I don't mean that they will act exactly in the same way, but fundamentally the algorithms they are using are the same and are therefore not very effective when cumulated.

And I agree with you, I wouldn't apply the teamwork rule in case of reactive tests (e.g. defensive or stealth rolls), since only a single agent is targetted by the offensive action ad there is no reason to allow other agents to help him out on that test. So a horde of agent would still have the same chances of being detected as before.

It seems to be an elegant and logical solution to me and doesn't require a complete review of the matrix rules.
This is a "lo-fi" version of our main content. To view the full version with more information, formatting and images, please click here.
Dumpshock Forums © 2001-2012