Help - Search - Members - Calendar
Full Version: Decking
Dumpshock Forums > Discussion > Community Projects
Pages: 1, 2, 3, 4, 5, 6, 7
Platinum
QUOTE (Eyeless Blond)
QUOTE (Link)
Tunneling, I gather, is a real world trick. Do you intend to implement it in SR?

Okay, I sense that people are having a hard time figuring out what I mean by
CODE
                                                       
          [RTG]                                      
         /     \                                      
   [LTG1]    [LRG2]                              
     |             |                                
     |             |                                
     |             |                                
     v             v                                
    [D]         [Host1]<-->[Host2]<-->[Host3]        
                              ^                      
                              |                      
                              v                      
                           [Host4]                  


Are these hosts all within the same corporation? if so then the tally carries across... if they aren't then they would not carry across ... here is why..
once you are in a network, you would relog back onto the LTG as a user from that host that you just infultrated. when you log into host2 ... it appears that you came from host1 but you accessed them from the LTG2.

CODE

          [RTG]
         /     \
   [LTG1]    [LTG2]
     |             |
     |             |
     |             |
     v             v
    [D]         [Host1]<-[LTG2]->[Host2]<-[LTG2]->[Host3]        



in Example 2 the tally would carry across because you are in a subsystem.
CODE

          [RTG]
         /     \
   [LTG1]    [LTG2]
     |            |
     |            |
     |            |
     v            v
    [D]        [Host1]<-->[Sub Host2]

Platinum
Eyeless why is there a random security tally for just logging on to an LTG or RTG? That doesn't seem to make any sense to me. People only get suspicious when you start running commands... not just logging in.

In your example how does host2 know what host1's tally is or vice versa?

In order to tunnel out from a host to another you need to either find a back door out to the matrix or have executed a shell command on the server.
Eyeless Blond
QUOTE (Kagetenshi)
A VCR does add directly to your control pool. An RCD is an optional addon for rigging.

Exactly. Headware makes perfect sense adding to pools. Thus why Math SPUs and Encephalons add directly to pools. Why should an external deck add to hacking pool, when external decks (RCDs) don't add to Control Pool?
Eyeless Blond
QUOTE (Platinum)
Are these hosts all within the same corporation?  if so then the tally carries across...

Yes they are. That wasn't clear from the diagram, and the paragraph(s) below explaining it?
QUOTE (Platinum)
In your example how does host2 know what host1's tally is or vice versa?

In order to tunnel out from a host to another you need to either find a back door out to the matrix or have executed a shell command on the server.

...okay, clearly I did not explain the diagram well enough.

The stuff on the right of the diagram--the entire network connected to LTG2--is a corporate intranet--a PLTG, in other words--organized in the heirarchy shown with the arrows. The lines indicate what one host/grid is connected to. Host1, for instance, connects to LTG2 and Host2 ONLY; it doesn't directly connect to, say, Host3 or Host4. Thus, in that particular corporate network, only Host1--the firewall--is directly connected to the LTG; everything else has to go through the firewall to get there. It's a pretty basic setup; I guess I didn't explain it that well.

QUOTE (Platinum)
Eyeless why is there a random security tally for just logging on to an LTG or RTG?  That doesn't seem to make any sense to me.  People only get suspicious when you start running commands... not just logging in.

That's the wrong way of thinking about it. We decided to change this rule to make things less nonsensical, remember? Tally isn't held by a particular user. If you think about it that doesn't really make a whole lot of sense, does it; if you know *which* particular user is messing with the system--the *only* way Tally can come about in the old system--then the moment anyone picks up a single point of tally he should get firebombed to death, instantly. Sure, there's the idea that Masking and Evastion hide what connection you're using, but then how can the system so reliably tag your particular connection with a Tally attribute, but not with the "He's got Tally>0; kill him with fire!" attribute? It just doesn't make a whole lot of sense.

In the new ruleset, tally is a host-wide attribute, describing essentially the "defcon" status of that particular host. The thing is, Tally is a very nebulous thing for a host; it's not really tied to a connection, or a person, or even specific actions, but more like a general state of unease felt by the system itself. Because random bugs and glitches happen all the time, even the most infrequently-accessed server will have a few bits out of place here and there, and thus a small amount of security tally just sitting around, before you even go there, just because these are the times in which we live. Hosts have security tally all the time because they're twitchy little bastards; they have been ever since the first Crash.

Essentially, it comes down to: the host doesn't have tally just because you logged on; it has Tally because you're not the only user who was online today, and the host does other things in addition to catering to your every illegal whim.
Link
Considering the subject, your tunnelling explanation was pretty clear (firewall meant a chokepoint and intranet a host-host array to coin the SR vernacular, yes?) After I read it I wondered why introduce a new mechanic that's essentially governed by host logons and access ratings, so I went back and read your earlier posts.
QUOTE
I also like the idea of a new Monitored Operation: Masking Tunneled Connection. Essentially you'd have to spend a Simple Action every Combat Turn to maintain each connection you have tunneled through a firewall/host, unless you want to lose the Masking on your connection. Another reason to get an Encephalon, and to try to bypass the [system of] firewall[s] altogether. smile.gif

Now the reason for the encephalon was its cognitive multitasking right? Does your comment regarding bypassing firewalls refer to logging in onsite to avoid the firewall/chokepoint?
If so, do the aforementioned host logons and access ratings along with chokepoints already represent the aim of tunnelling?

So many questions - hopefully this is constructive.
nezumi
I would assume an LTG or RTG would only have a security tally if someone were trying to directly attack the LTG or RTG itself. If the L/RTG has controlled access and the person is trying to get around that, that would count. Otherwise, popping around to different hosts would be a valid operation. Since, presumably, the L/RTG holds their operational files on a separate host from the public grid, it would seem to me that the only actions which would raise flags would be intercepting comm calls or other forms of communication when not authorized, cyber combat, and somehow trying to crash the host.

I would also still suggest that there be some degree of regionalization. Someone screwing around at the main RTG level shouldn't result in Aztechnology's online book store host having a tally of 20 (otherwise, running up a high enough tally at the RTG would shut down every linked host!) This would also explain why an RTG can have a tally of say 10 without sending a probe after every user on the system (which, I imagine, would rather grind the RTG to a halt). Instead, it only sends out a few probes in the approximate location of the problem and reports the issue out.
Eyeless Blond
QUOTE (Link)
Considering the subject, your tunnelling explanation was pretty clear (firewall meant a chokepoint and intranet a host-host array to coin the SR vernacular, yes?) After I read it I wondered why introduce a new mechanic that's essentially governed by host logons and access ratings, so I went back and read your earlier posts.
Yes, I should have been using "chokepoint" instead of firewall, and an intranet is, in SR terms, a PLTG. Unfortunately I seem to be mixing a lot of RL computer terminology in with my SR terms, mostly because it's been awhile since I've used the SR terms themselves.

QUOTE
Now the reason for the encephalon was its cognitive multitasking right?
Er, right. Sorry, I was already assuming that the Encephalon would be the new one, capable of sustaining a few Monitored Operations for you. Guess I was getting ahead of myself there.
QUOTE
Does your comment regarding bypassing firewalls refer to logging in onsite to avoid the firewall/chokepoint?
Absolutely. When you go onsite you don't have to worry about Matrix chokepoints, as you can plug directly into the target host.
QUOTE
If so, do the aforementioned host logons and access ratings along with chokepoints already represent the aim of tunnelling?
Yes; it's basically an additional penalty that you accrue as a result of having to go through the chokepoint instead of going directly to the target host in meatspace first. A reason for the decker to get out of the house, as Platinum put it.

My opinion is that maintaining a connection through a chokepoint should not be a free lunch. That is, if you're trying to deck a system that has a chokepoint between you and your target host, there should be some small amount of sacrifice going on to keep the chokepoint from detecting that you're essentially reaching your hands through its space to get at your target. Thus the Monitored Operation and introducing the idea of "tunneling".

QUOTE
So many questions - hopefully this is constructive.

Oh absolutely. I realize that I'm kinda getting ahead of myself alot of the time when I'm proposing ideas and talking about them. I don't think anyone wants to read a 30-page treatise on a proposed set of rules, so I try to condense things as much as possible, with the result that often what I'm saying isn't very clear. I apologize.
nezumi
I understand Blond's assessment, and I do agree to how tough chokepoints should be. They should pretty much guarantee the decker's tally will go up, and I like the idea of them requiring tunneling (he's just working to constantly hide his track through the chokepoint from the host's natural defenses). Like he said, a direct connection through the facility generally means he skips the chokepoint, but has to deal instead with the facility's physical defenses.

Eyeless Blond
QUOTE (nezumi)
I would also still suggest that there be some degree of regionalization.  Someone screwing around at the main RTG level shouldn't result in Aztechnology's online book store host having a tally of 20 (otherwise, running up a high enough tally at the RTG would shut down every linked host!)  This would also explain why an RTG can have a tally of say 10 without sending a probe after every user on the system (which, I imagine, would rather grind the RTG to a halt).  Instead, it only sends out a few probes in the approximate location of the problem and reports the issue out.
Absolutely. This is why I proposed the change here too...

You know, I need to number the proposed changes I put into that post, don't I? Okay:
  1. Security tally is held by the individual host, on the host level, not on an individual level. Think of security tally as a condition monitor attached to the host itself. Rather than measuring damage, however, it represents the level of suspicion of that host that something weird is going on, the "defcon" status in other words. As tally goes up, the host becomes more suspicious that something is going on, and allocates more resources to dealing with the problem.
  2. RTGs don't pass tally RTGs, since they cover such a wide area, don't pass security tally or anything else down to "child" LTGs. Note in the example above there are no arrows, and thus no tally propogation, pointing from RTGs to LTGs, or vice versa.
  3. LTGs do pass tally, but do not receive tally. Since an individual LTG does serve only a few blocks or so, do pass tally down to the hosts connected to them. Note that the LTG doesn't particularly care if one of the hosts connected to it is spazzing out; security tally does not propogate back to the LTG from any individual hosts or PLTGs attached to it. This is noted by the single-direction arrows in the diagram above.
    • 1 and 2 together serve to make RTGs actually different from LTGs in more than just name and coverage area.
  4. PLTGs share tally and alert status between all internal hosts. Hosts linked together into a PLTG share security tally between them. In addition, a passive or active alert is passed along, so if a single host on the system goes to passive or active alert, they all do. This is indicated by the bidirectional arrows between the hosts in the diagram above.
  5. Monitored Operations are now easier AND harder. It totally mystified me as to why it took a Free action every INITIATIVE PASS to keep a monitored operation going. Why should someone with four init passes have to spend four times as many actions over the same time period as the one init pass guy to do the same thing? So, this rule proposes that monitored operations require a SIMPLE action to maintain, but only once every COMBAT TURN, instead of init pass. I'd even be tempted to say a Free action every combat turn, but that might be too good.
  6. Encephalons can help maintain operations for you. This one's actually going on over in the Cyberware thread, but it bears repeating here just as a reminder to everyone.
  7. Connecting to a host via another host imposes penalties. This is meant to be a more sensible way to get the decker out of the basement and encourage him to come along on the actual run. There are two penalties involved here, but note that neither apply to going through an LTG or RTG. I figure those would be better designed to allow connections through them, and it would be far too harsh to impose three levels of penalties before even getting to the target system.
    1. A penalty to Matrix Reaction, determined by the security code of the host. Honestly I think the penalties are a bit harsh, and would limit it to Blue/Green=0, Orange= -1, Red= -2, but this is Platinum's idea so I left it as-is. Note that this applies regardless of the legality of the actions involved.
    2. A new "Tunnel Connection" operation. Connecting through a masked connection and maintaining that masking requires a bit of effort, or at least it should. This rule makes the act of maintaining masking through a tunneled connection--your deck connecting to a host through a connection you already have to another host--a Monitored Operation, which you have to spend extra actions to properly maintain.
  8. Random default security tally. "You are not special. You are not a beautiful or unique snowflake. You are the same decaying organic matter as everything else." You are not the only one generating Security Tally. Security Tally can come from other criminals, sure, but it also comes from the random interaction of programs, minor glitches and buffer overruns, any number of other things that may or may not indicate someone's hacking the system! That last part is important, and is why all systems have a few low-level responses to tally before swarming the place with security deckers and black IC. So I added this:
CODE
System Type                                      Default Tally*
small PLTG, host system with few users (>50)         d6-1
Large PLTG, LTG, host system  with
     moderate number of users (50-500)               2d6-2
RTG, host system for large number of users (>500)    3d6-3
*-Roll each die individually and add together. Rule of Six
does not apply, but you can add it in as a houserule for more
deadly games.

Because of this, it's the busier networks--those with lots of programs interacting with each other--that have higher default tallies. It's the only way for Security Tally to make much sense as it is; otherwise the default should be: Tally 1: passive alert; send 100x Black IC. Tally 2: Active alert; send 100x superior-level security deckers. If you have a small amount of tally around just as background noise, then it makes more sense having different response levels like you see in the rules.Any I'm forgetting?
Platinum
QUOTE (Eyeless Blond)



QUOTE (Eyeless Blond)

QUOTE (Platinum)
Are these hosts all within the same corporation?  if so then the tally carries across...

Yes they are. That wasn't clear from the diagram, and the paragraph(s) below explaining it?

Sorry I skimmed the paragraph below and missed some of the interpretation.

QUOTE
QUOTE (Platinum)
In your example how does host2 know what host1's tally is or vice versa?

In order to tunnel out from a host to another you need to either find a back door out to the matrix or have executed a shell command on the server.

...okay, clearly I did not explain the diagram well enough.


I misunderstood ... since they are both on the same network, I am fine with them sharing a security tally.

QUOTE (Eyeless Blond)
QUOTE (Platinum)
Eyeless why is there a random security tally for just logging on to an LTG or RTG?  That doesn't seem to make any sense to me.  People only get suspicious when you start running commands... not just logging in.

That's the wrong way of thinking about it. We decided to change this rule to make things less nonsensical, remember? Tally isn't held by a particular user. If you think about it that doesn't really make a whole lot of sense, does it; if you know *which* particular user is messing with the system--the *only* way Tally can come about in the old system--then the moment anyone picks up a single point of tally he should get firebombed to death, instantly. Sure, there's the idea that Masking and Evastion hide what connection you're using, but then how can the system so reliably tag your particular connection with a Tally attribute, but not with the "He's got Tally>0; kill him with fire!" attribute? It just doesn't make a whole lot of sense.

In the new ruleset, tally is a host-wide attribute, describing essentially the "defcon" status of that particular host. The thing is, Tally is a very nebulous thing for a host; it's not really tied to a connection, or a person, or even specific actions, but more like a general state of unease felt by the system itself. Because random bugs and glitches happen all the time, even the most infrequently-accessed server will have a few bits out of place here and there, and thus a small amount of security tally just sitting around, before you even go there, just because these are the times in which we live. Hosts have security tally all the time because they're twitchy little bastards; they have been ever since the first Crash.


I was wondering should there also be a mechanic every turn that allows an increase in tally? as other users goof around in there.

I think if this is the case ... then it would be in a decker's best interest to hack the host and work on resetting the security tally through admin access.

When I monitor attacks on my firewall, I usually watch ip's individually instead of global attacks. I think in general you can tie attacks to an individual ip. Sure there are bot nets that can cycle their attacks, but if someone does that they are usually very sophisticated. Distributed multiblock attacks are not very common place as of yet .. but that could change.
nezumi
I like all of Eyeless Blond's suggestions. Assumedly IC will still be dispatched to the point of the infraction and begin searching there, and you would see more wandering IC every where else as the tally goes up, sort of like how the human body reacts to the introduction of a foreign substance.
Platinum
QUOTE (Eyeless Blond @ Mar 24 2007, 04:51 PM)
[*]A penalty to Matrix Reaction, determined by the security code of the host. Honestly I think the penalties are a bit harsh, and would limit it to Blue/Green=0, Orange= -1, Red= -2, but this is Platinum's idea so I left it as-is. Note that this applies regardless of the legality of the actions involved.

I am fine with the lower adjustments you made ... it was just kind of a suggestion.
You can just make it a flat -1 per hop, to reflect the relay effect. the more bouncing the slower things get. It also helps to offset the really high reactions we will allow, evening the score with ic. Also encourages people to deck onsite or close.

I was just thinking there should be something, and that high level systems would require a little more maintenance, but if you make the tweak to add tunneling, where you have to dedicate a simple action once every combat turn to maintaining the tunnel, I like that a lot. (maintenance can be handled by and encephalon) it also encourages people to hack more satellites because it's 1 hop to cross the country to another ltg and not 4-5.

I am really liking these tweaks.
Eyeless Blond
So, everyone like those rules for security tally? If so, let's move on to IC and the other security trigger steps.
  1. One thing we need to do there is make IC and the other triggered events not automatically find the offending decker, especially as with these rules there absolutely will be more IC and other trigger steps active, even before the decker himself gets near the system. I'd go so far as to say that particularly sensetive Red systems will be at Passive Alert at least a few times a week, just from background Tally.
  2. Maybe the way Security Deckers are used on an alert should be changed as well?
  3. I like the SR4 idea of Agents, IC, and drone Pilot programs basically being constructed the exact same way, and I really like the freedom that the SR4 rules give those Agent/IC/Pilots. Is there any way to replicate that here, and how would we do it?
  4. How about the different options for IC? I know we're looking at changing the Trace program; any others?
  5. (Somewhat OT, but): Other than being used to avoid traces and the Evade Detection maneuver, what else does Evasion do? I can't seem to remember it doing anything else. Should it be more important?
Link
QUOTE
# Monitored Operations are now easier AND harder. It totally mystified me as to why it took a Free action every INITIATIVE PASS to keep a monitored operation going. Why should someone with four init passes have to spend four times as many actions over the same time period as the one init pass guy to do the same thing? So, this rule proposes that monitored operations require a SIMPLE action to maintain, but only once every COMBAT TURN, instead of init pass. I'd even be tempted to say a Free action every combat turn, but that might be too good.
# Encephalons can help maintain operations for you. This one's actually going on over in the Cyberware thread, but it bears repeating here just as a reminder to everyone.

I agree with the free action/turn. The idea with monitored ops is just to keep your attention, otherwise a 1 action/turn decker would be severely impaired - using a simple action would preclude complex actions.
There was an idea on the forums that an encephalon allow 2 free actions per phase in a similar fashion to an adept power from SOTA 64- its name escapes me.

QUOTE
# Random default security tally.

QUOTE
I was wondering should there also be a mechanic every turn that allows an increase in tally? as other users goof around in there.

Or decrease the tally, as the host resolves some issue unrelated to our decker.

On Tunnelling; would it matter how many hosts you pass through or just the chokepoint. A defence to deckers would be to string out many hosts.
I'm think the addition of tunnelling, while well thought out, may complicate decking rules for an effect that can be achieved by increasing the access rating and adding IC to a chokepoint. But I guess it's all optional and it's a modular rule you can add or not.

This could be a new host trick; "Firewall IC"(?) that's found on chokepoint hosts. It penalises deckers reaction but using the "Tunnelling" monitored operation would can reduce the penalty assisted by your "Wombat" utility. 'Cause, ya know, wombats live in burrows down under grinbig.gif
Eyeless Blond
QUOTE (Link)
QUOTE
So, this rule proposes that monitored operations require a SIMPLE action to maintain, but only once every COMBAT TURN, instead of init pass. I'd even be tempted to say a Free action every combat turn, but that might be too good.

I agree with the free action/turn. The idea with monitored ops is just to keep your attention, otherwise a 1 action/turn decker would be severely impaired - using a simple action would preclude complex actions.
There was an idea on the forums that an encephalon allow 2 free actions per phase in a similar fashion to an adept power from SOTA 64- its name escapes me.
Yeah, so what? So a lowgrade idiot can't maintain a monitored operation and work on another at the same time in a combat turn. He'll just have to finish what he's doing before he tries to do the next task. I don't see a problem with that. Besides, despite this even the most lowgrade computer user running pure DNI will have INT+2d6 initiative, meaning everyone will have the possibility of two init passes in a Turn.

Don't let my challenging the idea discourage you btw; I'd actually be perfectly fine either way. I just think this route may be more balanced, as well as help make the encephalon worthwhile.

As to the Encephalon adding free actions, yeah, that was an idea I had too. Well, someone else might have come up with it before that.

QUOTE
QUOTE
# Random default security tally.

QUOTE
I was wondering should there also be a mechanic every turn that allows an increase in tally? as other users goof around in there.

Or decrease the tally, as the host resolves some issue unrelated to our decker.
Possible, but Matrix work involves a lot of behind the scenes dicework as it is. Rolling for random tally every turn or something seems like extra work for not enough real benefit.

QUOTE
On Tunnelling; would it matter how many hosts you pass through or just the chokepoint. A defence to deckers would be to string out many hosts.
I'm think the addition of tunnelling, while well thought out, may complicate decking rules for an effect that can be achieved by increasing the access rating and adding IC to a chokepoint. But I guess it's all optional and it's a modular rule you can add or not.
Well the idea is to create a continuing problem. As it stands, once you've passed a chokepoint that's it; the chokepoint doesn't affect you anymore. I like the idea that the chokepoint is still causing problems; even though you're through it, it's still there, gnawing at the back of your mind.

QUOTE
This could be a new host trick; "Firewall IC"(?) that's found on chokepoint hosts. It penalises deckers reaction but using the "Tunnelling" monitored operation would can reduce the penalty assisted by your "Wombat" utility. 'Cause, ya know, wombats live in burrows down under grinbig.gif

Riiight. ohplease.gif grinbig.gif
Eyeless Blond
Cross-posted from the Initiative and Timing thread:

The timing issue is really not because of initiative, but because of the differences between systems. In particular the decker is the real problem here. Walking through scripted metaphors creates an all-important symbolic barrier between him and the rest of the team. It's too confusing and distracting for the rest of the team to be constantly interjecting about what fantasy realm the decker is dealing with today, and the result is usually his part of the run is resolved either before or after everyone else, in the rare cases where deckers are even used.

There's also the issue that the way security tally and IC triggering and suppression encourages a smash-and-run mentality when it comes to decking, as opposed to the Overwatch mentality that would be much more beneficial to a concurrently-working team. Look at the Infiltration Challenge thread for a beautiful example of how the Overwatch mentality, rather than endless obsessing over seperate-but-equal metaphors can make for a great decking run, that works concurrently with the meatspace run. Note also that the deck and decking rules had to be seriously twinked just to keep the decker in the system long enough to actually be *able* to do any Overwatch without getting instantly smashed.

Again, though, these are not really issues related to initiative and timing so much as they are a result of the current Decking rules, and they actually should be discussed in there.


In short, I think we should consider these two things:

1) As cool flavor-wise as those fully-immersive sculpted metaphors are, for the most part during an actual run they don't really help. During a run they don't add to the atmosphere, and extra time the GM has to spend describing the decker's actions take away from the rest of the team. The best way to fix this IMO would be to have some sort of switchable mode that made it favorable for the decker to use the nonstandard metaphors when not actually in a run, but would be preferable to switch off when doing activities during an actual run.

2) As it is, the rules for accumulating Security Tally necessitate a smash-and-run mentality to decking, especially at low levels. Tally accumulates so quickly when your DF is less than 11-12 that even in the most lax of systems you can't usually manage to stick around for more than a few dozen or so actions before activating a bunch of IC, or even an alert. This is fine for datasteals, but an actual run usually involves more than the decker spending 45 seconds raiding the server for data, then sending everything into lockdown because of his intrusion. What we need is a way for the decker to be subtle in his actions when he needs to be, possibly in exchange for some tradeoff, so he can actually still be in the system when his teammates need his help rather than being chased all over the place by IC.


A thought I had to solve both of these problems in one shot would be to re-purpose the reality filter to the task. As it stands the reality filter is a little-used piece of optional hardware that only works on rare occasions, and tends to incur large penalties if unsuccessful. My idea is to make the filter an integrated part of all decks, much like Evasion and Masking chips are, though it wouldn't have a rating. The reality filter would be a switchable mode that, when active, would reliably strip away the sculpted metaphors (to solve problem 1), as well as providing some sort of bonus to DF (+3-6 would be good I think, to solve problem 2).

The only problem I'm having is deciding what kind of penalty could be assigned such that the filter wouldn't be used when not in run-mode, but still useful in run-mode. Maybe the book penalty of reducing MPCP of 1 would work, along with reducing Sensor rating by 3? This is the part that I'm having trouble with.

Other thoughts?
nezumi
So your suggestion for #1 is to make it so deckers can somehow... interact with the wired world while still doing stuff in the real world? Instead of doing stuff totally in VR, doing stuff in real life with the VR overlaid on top of it, like some sort of... Augmented Reality?

Crazy talk.
Kagetenshi
I agree. That really seems like a ridiculous idea unless we're going to entirely throw out the Matrix as it is.

~J
Eyeless Blond
QUOTE (Kagetenshi @ Mar 28 2007, 05:58 AM)
I agree. That really seems like a ridiculous idea unless we're going to entirely throw out the Matrix as it is.

Not at all; to be honest I could care less that deckers have to lay themselves out while decking. Mages do it while projecting and riggers while jumping into vehicles; dealing with a comatose body isn't a problem unique to deckers. Though fully implementing AR would probably solve the problem, I doubt that a full implementation as presented in SR4 would be wise or within the scope of this project.

(Edit): This is not to say that I don't think that AR is not already implied in the rules. Look at the virtual dashboard that you get while jacked into a vehicle, even a non-rigger-adapted one. If you can get an HUD pumped into your brain while driving--in other words, not laying yourself out--to get a bonus to driving, then gatting an HUD while jacked into a computer to get similar bonuses for said computer use should be allowed as well.

What I'm getting at with number 1 is that the sculped systems that are supposed to be everywhere in SR3 decking are a major distraction, and are one of the primary reasons most games insist that the decker is an NPC character. Outside a run, while everyone is doing legwork and such, it's perfectly fine for the GM to go into detail about what this new system looks like, and the details of how to interact with it. But, whenever the decker jumps in during a run, the GM is forced into the awkward position of having to describe a completely seperate visual metaphor for the decker, while feeding the rest of the team the visuals associated with the actual run location. Because of this, there should be an option in the rules that makes it a good idea to not bother with seperate metaphors during an actual run, to keep the focus on the decker helping the team rather than the decker being off on some sidequest.


Even worse, most decker characters need some major DF-twinkage to stay functional in a host for the total length of a run (2). This encourages a hit-and-run mentality for decker characters, making them functionally unavailable for the majority of the run, save for a few small episodes where he completely interrupts the flow of events to zip around his own little sidequest. Put these together, and it's no wonder most people don't want to run deckers.
nezumi
I agree with 2, reduce how quickly the tally counts up if he isn't doing anything. If anything, it should decrease if he sits there quietly for an hour or two. I think some of the solutions we've suggested with dealing with tally deal with that problem.

As for 1... In reality, I wouldn't mind something vaguely similar to AR. Not real AR< but the virtual dashboard. Something to allow the decker to multi-task, doing stuff IRL, then jumping back to his idle persona when necessary. The most graceful solution to this, IMO, is to break down more of what the deck actually does. It should be its own, self-contained node (like what Hiro has in Snow Crash, with its own dictionary, atlas, files, etc. that you can interact with without having to be online), and with more useful tools he can bring with him INCLUDING access to the video feed from his deckboard camera, his deck's mic, and the ability to transmit through the deck cell phone/transceiver/speaker, all undetectable and using free actions. So while he's technically in the matrix, he has a window into the real world so he can see what is going on. He's still stationary, but at least he isn't isolated.
Platinum
I think the an AR interface is neat, but in reality it is just a fancy dumb terminal or GUI that sits on top of the matrix. In the matrix you can actually edit the dataflow and are interfacing with the host processors, AR is clicking on a mouse that executes an instruction set or program that does the interfacing to the host processor for you.

Now that being said, you can add some create flavour in there, but it is a layer that sits on top of the matrix.
Eyeless Blond
QUOTE (nezumi)
I agree with 2, reduce how quickly the tally counts up if he isn't doing anything.  If anything, it should decrease if he sits there quietly for an hour or two.  I think some of the solutions we've suggested with dealing with tally deal with that problem.

Well, so far all the rules we've presented that actually impact tally would effectively increase it. Random default tally, penalties for going through firewalls, getting rid of Masking Mode. The only rule we've proposed so far that would limit tally would actually just delay or limit the effects it has on the decker, and that's the notion that IC has to successfully locate the intruder before attacking*. Ideas that would reduce tally would be stuff like these:
  1. Opposed rolls made by IC don't increase your tally. Not succeeding in an action against a hostile program is bad enough; no need to compound it by
  2. System Operations involving the Index subsystem (Browse, Scanner utilities) don't increase your tally. Especially Scanner, as you're not even really doing anything to the host when you're looking at an icon.
  3. System Operations involving the Analyze utility don't increase your tally. Analyze operations are typically information-gathering, and are thus usually not as potent as say a Spoof action. Analyze actions still cost you time and actions; maybe that's enough.
  4. Maybe there should be a system operation you can do to lower your tally? Really unsure about this one, but I figure we can throw it out there.

These are all separate from the idea above of making the Reality Filter more common, even making it a default include for all cyberdecks and even some cyberterminals, having it work all the time, and not having it affect Matrix Initiative. I still have no idea how we can balance that to make it something you'd only choose to activate during a run, however.

*While we're on the subject, I think that we should get rid of the table giving TNs for hitting a legitimate icon, and instead make the TN equal to the icon's Evasion rating (or IC rating, as the case may be). Anything that gets rid of a table, especially a table that you have to refer to in the middle of combat, is IMO a good idea.


As for AR, I agree with people who say it should exist, but I also agree with people saying it should not be appropriate for someone who plans on seriously decking. You want to do a little typing, check your email, use a calculator, look up the scores for last night's football game, all while walking down the street or driving your car? Sure (though the later will make an accident more likely). You want to hack into an Orange-hard system and steal a new prototype nuclear warhead or trick the security cameras into thinking your buddy is invisible? No way.
Kagetenshi
Another possibility is to let tally accrue at its current rate, but lengthen the distances between events on the security sheaf for most host types. That way the clock ticks down just as fast, but on weak hosts there's more time left on it.

As for on-the-fly decking (neither Augmented Reality nor Mediated Reality cover what we're talking about here, which is basically a fancy HUD and input method) I say implement it with an imagelink (or displaylink), transducer, datajack, and something on the other end of a datacable (or built-in, for those who swing that way). I figure it's basically a hands-free, mobile Tortoise mode.

~J
fistandantilus4.0
This thread, and the other SR3R threads are being moved over to Community Projects. The original Shadowrun 3rd Revised thread will remain in the Shadowrun forum. They're getting quite a lot of traffic and are sticking to the top of the Shadowrun forum, but would be more appropriately placed in Community Projects.
Eyeless Blond
QUOTE (Kagetenshi)
Another possibility is to let tally accrue at its current rate, but lengthen the distances between events on the security sheaf for most host types. That way the clock ticks down just as fast, but on weak hosts there's more time left on it.

We may want to do that too, if it turns out that the above fixes still don't completely solve the problem. Something else that II, and III do*, however, is help to restore the balance between actions. I mean, clearly Analyze Icon is not as far-reaching or cinematically important a test as Control Slave, but under the current rules both give the system the same amount of power to detect the decker's intrusion. I really think that, like Perception Tests in meatspace, Analyze operations should be essentially "free", save for the actions required to use them. Keep in mind that, under the new "default tally" rule, there will likely be at least one piece of IC out on a given system almost all the time, so spending all day sitting around gawking at everything is a dangerous waste of valuable time and resources.

The same, essentially, for Browse-enabled operations, though admittedly the case is a bit weaker there. I just don't think that Locating an access node should give the system the same power to detect you as screwing with file data.

*-I just noticed that point I is already true, but it really needs to be spelled out in the rules better IMO.

By-the-by, I reiterate my support for the idea of using Evasion (or the IC's Rating) as the TN for cybercombat tests, and the makeup of the IC's Attack program for its damage, rather than the table on page 224. Any time a book table has to be referred to in the middle of combat is a serious design problem IMO and should be remedied immediately.
Kagetenshi
Analyze Icon should only be relatively noninterceptable if you assume that the icons are making some sort of direct connection—that you're directly scanning the other person, rather than going through the host to do so. I don't believe that to be the case.

~J
Eyeless Blond
QUOTE (Kagetenshi @ Mar 29 2007, 05:50 PM)
Analyze Icon should only be relatively noninterceptable if you assume that the icons are making some sort of direct connection—that you're directly scanning the other person, rather than going through the host to do so. I don't believe that to be the case.

Well, that's the problem with SR3 decking: none of it at all corresponds in any way to the concepts we are familiar with when it comes to computer use. Most things that are completely and totally impossible, not just merely counterintuitive, in the real world are allowed in SR3, simply for the sake of balance and fun. Most of what happens and what's reasonable in real-world computing and cracking have no place in SR3, and thus should have no place in SR3R unless we plan on fundamentally altering the entire system from the ground up.

There are four priorities here, as I see it. The decking rules should be: 1) Fun and intuitive, 2) Balanced, 3) True to SR3's original flavor and 4) Streamlined as much as is practical. Note that none of these have anything to do with being amenable to RL logic and ideas about computing; most of that goes right out the window when we're talking about stuff that responds to the first three goals, and even the fourth--SR3's own flavor text--is mostly directly contradicts what is sensible in the real world.

As such, flavor arguments should simply hold no water here. The flavor will eventually come to reflect the mechanics, within the SR3 frame of mind, rather than the other way around. I mean, it's not like anyone expects magic to follow RL preconceptions, why should decking when, in all likelihood, computing will be fundamentally different in the next few decades. Hell, quantum computers are already starting to find their way into the commercial sector, though the technology is as clunky as vacuum tubes were back in the day. This means essentially we're one transistor-sized revolution away from quantum computers that can sit on our desk--or, more pointedly, in a small box the size of a keyboard with a port for a datajack.

So let's not get hung up on our late 20th-early 21st century concepts of what a computer is and can do. By 2030-2040 all that's gonna be long gone anyway. The fact that Q-computing will make RSA Encryption obsolete, for example, will simply be the most obvious of our concerns.


Let me give you a bit of counter-flavor, in case you can't possibly conceive of a way Analyze could be different from Manipulate Data:

The term "icon" in SR3 is essentially a small memory address space/processing space that the host has ceded control of to a foreign program, or even computer in the case of user-generated icons. Analyze Icon works by analyzing the allocated memory/processing space of the target icon, a process which isn't protected by the host machine because scanning foreign icons is the primary way in which icons interact. Higher-rating Sensor packages go further than the normal scan, following links into other memory spaces the target icon has linked to, which may be attempts to Mask itself.

Totally contrary to modern-day computing "common sense"? Sure. Plausible in an insane future world where all NP-complete problems can be solved in a flash? Sure, why not?
nezumi
In regards to letting the deckers more easily sit and wait, I'd recommend the following changes:

1) The Null Operation test is unusual (once per hour or somesuch)
2) Global tally naturally goes up and down on its own (since tally is no longer connected with a decker, we're only worried about global tally) - if something happens in second 1, then again in second 3, but then stops for ten or twenty minutes, the system figures the decker has most likely moved on, or it was just a bug, and the tally goes down a few notches.
3) The "random background tally" naturally rises and falls as random stuff goes on. So the decker might log in while the background tally is 13, but as the crisis passes thirty minutes later, the background tally drops to 2.

The second one especially I think is critical. The tally MUST go down after periods of inactivity, or systems would just keep accruing tallies until they rebooted and started again from scratch. How long it takes for the tally to drop again should depend on the nature of the system and what our security sheafs finally look like.
Platinum
I really don't like the global tally having such a really strong effect on the decker.

I think once a minute there should be a roll of 2d6, on a 2 it goes down by 1 point ... on 12 it goes up by 1 point, but a decker's tally still needs to be tracked, and that is the major mechanic here.

The global tally is a modifier... Hey ... what about a -modifier... there are times that the system is just at peace.... there are no threats, and so it can actually start as a negative.
nezumi
I agree, the global tally should never account for more than 10 points under normal operations (plot-wise, there are reasons it should go up, for instance, during a crash, and the "global" tally will also go up when the decker is close to another troublesome decker or program, whether aware of it or not.)
Moon-Hawk
If the tally is going to decay (and I agree with this) then it should be set at a rate such that if an "average" hacker is simply performing null operations (at whatever interval you decide you like) the tally should break even and not go anywhere.
Thus, a below-average hacker doing nothing or an average hacker doing stuff will tend to increase their tally, but an above average hacker performing nothing but null operations will have their tally slowly decrease.

It just seems natural to me that that's the level of paranoia average systems would be tuned to. There's going to be all kinds of modifiers, but IMO that's where you should set your "break-even" point when everything involved is typical.
nezumi
I can agree to that, as long as the hard-core hackers can let it decrease.
Kagetenshi
Hackers/crackers can't accrue any tally, as they're at least 20 years in the past (assuming an earliest game date of 2049).

That said, if we're going to do something like that, it'd probably be best to pick either host colour or host difficulty, tie them to a decker skill level, and then work the numbers so that that skill level has their tally stay pretty constant while performing nullops on that host, lower skill levels have it rise, and higher skill levels have it lower slowly.

~J
Eyeless Blond
Hm. Okay, how about this rule for Null Ops then. Note this should probably be in a separate section from other System operations (and thus referred to directly in the Table of Contents), rather than in-lined with the rest of 'em as seen in the SR3 book, to emphasize its separateness and importance:

(Edit: due to comments)
Null Operation: When a decker is illegally logged in to a host, he is constantly vying with the host's security system to avoid detection, even when he is not doing anything especially important. If the period of time is sufficiently long, say ten minutes or more, the GM may call for a "null operation" test to reflect this. Treat this as a modified System Operation, with the decker making a test against the Control subsystem and using his Masking persona chip as a utility. The decker receives an extra 2 dice on this test for every extra initiative die he has beyond the first, and the system receives an extra 2 dice for every rank it Security Code is above Blue (+2 dice for Green, +4 dice for Orange, +6 dice for Red). If the decker wins, he reduces the host's Security Tally by 1d6/2 for every two net successes he earns; if the host wins, it increases its Tally by 1d6/2 for every two net successes (note that the host does not simply add each success to the decker's tally; that particular rule is suspended for this Operation). The Rule of Six does not apply on the security tally dice.

Of course, the decker himself is not the only thing generating (or eliminating) Security Tally. Each time the GM calls for a Null Operation, he also rolls 2d6-7. This number, whether positive or negative, is added to the Tally, to reflect the random factors affecting tally over which the decker has no control.

If the Security Test raises the decker's security tally and triggers a response from the host, the gamemaster should activate the response as he sees fit. perhaps after a percentage interval of the decker's period of inactivity.

Note that the period of time represented by a Null Operation is kept deliberately vague; a single test should suffice for any period between ten minutes and an hour. If the decker is going to remain in a system for extremely long periods of time, the GM may choose to call for multiple Null Operation tests, possibly one for every hour or few hours the decker spends connected to a host. In this case each net success by the decker or system affect the tally by 1d6/2, and the GM rolls 3d6-11 for the random tally generation.


How's that? I'm mainly trying to keep the whole idea simple, while factoring in both the decker's contribution to the Tally as well as the random. Of course all this needs massive playtesting, but what do you think of the idea, and the numbers?
Link
On Null operations, the standard rules use 1 test and adjust it based on the time spent idle rather than 10 minute intervals. You dislike tables in play, I prefer less dice rolls too wink.gif Could you incorporate this into your revision? Also, what's the dice bonus due to initiative bonus about - just interested in the reasoning?

Also here's the Null ops rule if anyone wants a look.
[ Spoiler ]
Eyeless Blond
Yes, on page 218. Okay, I went ahead and edited the entry to make the time units more flexible. What I intended was to completely remove all Null Ops tests if the wait time was less than ~10 minutes, to help cut down on dice rolls. But you're right; the period between 10 minutes and an hour would've had too many die rolls. So, fixed.

As to init boosters providing bonuses, well mechanically it was to balance the bonus based on the host's security level. Intuitively, it was meant to toss a bone to people who have init boosters, as they should be able to react faster to what the host is doing. Flavor-wise, if you can cover your tracks twice as quickly then the host should have less reason to suspect something it going on.
Eyeless Blond
I'm not even sure where we are here. There's been a lot of ideas in the past few pages, and very little reaction to those ideas. Anyone care to respond?
nezumi
I've been overall supportive of most of the ideas posted (and I've given long posts as to why). That said, astral space and decking are the two threads I haven't been taking notes on as of late as I catch up on everything else.
Eyeless Blond
Wow, has it really been over two weeks since we've had a meaningful post here? We're making a lot of progress; let's keep up the pace!

QUOTE (Platinum)
I really don't like the global tally having such a really strong effect on the decker.

QUOTE (nezumi)
I agree, the global tally should never account for more than 10 points under normal operations (plot-wise, there are reasons it should go up, for instance, during a crash, and the "global" tally will also go up when the decker is close to another troublesome decker or program, whether aware of it or not.)

Personally I don't have a problem with the decker himself being a little (but significant) fish in what sometimes can be a very big pond. We're talking about servers here with hundreds, thousands, even in RTG cases millions of simultaneous users, potentially billions of processes and transactions going on in a second. It's in this nebulous anonymity that security tally, tiny anomalous blips in the overwhelming crush of calculation float to the surface where the system just happens to catch them.

Sure, sometimes there's a decker or virus trying to compromise the system, but if we want the idea of security tally as it currently stands to make even a shred of sense, most of the time tally should be a false alarm. If the only time you ever see a tally above a certain number X, then common sense would dictate that number X be the number that the system auto-destructs at. See where I'm getting at with this? It's for this reason that, far from lowering the random tally table idea, I'm even considering that maybe the dice should have exploding 6s. I have no problem with the decker popping into a system, seeing it's currently having a fit because of a random unrelated glitch, and have to either bug out because the system's too hot or have to power through because he's either unlucky or overconfident, and decides to take it on anyway.

That said, how does that above proposed rule for Null Ops sound?
Link
A quick question regarding Null Operation (either version). Is it for situations where the decker is constantly vying with the host to remain anonymous or where the decker has their attention elsewhere such as communicating with team-mates? Or both/neither?
Eyeless Blond
I think both/either. The relevant text from the original rule is:

"The gamemaster may require a decker to perform one or
more Null Operations whenever the decker is waiting for some-
thing to happen, whether it is an event on the Matrix, the end of
an ongoing operation, or something else that Involves hanging
around in cyberspace without making System Tests. The
gamemaster may also call for a Null Operation if a decker is
doing anything that requires actions but not System Tests, such
as maintaining an Edit Slave."
nezumi
Alright, I've got a character joining my game as a decker, so I have good reason to push this along. Here is my updated list of quandries. I'm running out of space here, so we need to start shelving some issues!! Please tell me which issues we are definitely NOT including, or what has been solved and what the solution is.

Agreed upon rules:
[ Spoiler ]


Suggested rules:
A) Drop response increase in favor of mental-initiative boosting cyber (like a VCR)
1. Should be capped by deck
2. Include 'mental initiative' cyberware/stat
3. Have multiple ratings for datajacks
B) Redirect Datatrail success adds +1 to the Location cycle (making it take longer, not harder)
C) IC are just frame agents loaded with appropriate programs
1. All IC get the features of Probe IC (adding to the value of System Tests)
D) Persona attributes can be redistributed with a complex action while in the system
1. Optional rule: you can go above the MPCP limit by paying 2 MPCP pts per attribute point
E) Drop memory requirements (like SR4)
F) Agent rules are kinder, allowing a decker to have multiple agents. Drones are agents with bodies (SR4)
G) AR allows for people to do simple things without physically disengaging from the real world (SR4)
H) (this area free)
I) All electronic devices (including cyber) can be connected to the matrix and thereby hacked (SR4)
1. ACIFS of 2*rating for all areas
J) Everyone should be able to use AR and therefore the matrix, making the computer skill much more common
K) IC should have to spend time searching rather than immediately appear next to the decker after the tally has increased
L) The decker should be able to directly deceive the IC, not JUST the host
M) A legitimate user who commits an illegal operation may be dumped with no tests
N) Prices should be included for non-illegal decks in the main manual
O) Nezumi's matrix metaphor - host as a physical facility with stationary guards, searching guards, security tally based by approximate location:
1. IC reacts instantly, but it takes time to FIND the decker based on local activity and rating
2. A search is a Analyze Icon cycle on all local icons until a suspicious one is found
- IC can attack the wrong icon if it looks to be suspicious
- Evade detection puts the decker farther away and increases time for the search
3. Security tally is applied to the lowest level possible, to the user (if legitimate), region, host, system, grid in that order
- A system may decide to try and isolate a decker by disallowing traffic from a high-tally area
4. IC serve as the host's eyes. If IC has a visual lock on the decker, other IC can find him immediately and the user may be dumped
5. Stationary IC will analyze every icon that passes by and will automatically attack suspicious icons, regardless as to their tally
6. Increases in alert levels are system-wide, and possibly network wide
P) Hacking pool should have more basis on skill or attributes
1. (Int + Wil + MPCP/2)/3
2. (Int + Wil + Computer skill)/3
Q) Create a 'false positive' background count for security tally
1. 1d6-1 for >50 users, 2d6-2 50-500, 3d6-3 >500
-For ease of calculation, drop the -1/-2/-3 and just start the sheaf higher
2. Is tally based on the host, the network, the PLTG, or the most popular host connected to it?
3. Should background tally be linked to the rating of the host? Red 4d6, Orange 3d6, etc.?
4. Tally decreases by 6 for blue, 4 for green, 2 for orange, 1 for red every twenty minutes, + die roll again
R) Tunneled Connection operation - Simple Action every turn to maintain a connection through the chokepoints, which allows for your Masking, makes Encephalon useful
1. What if the deck allowed for certain 'sustained' actions?
2. In complex network diagrams, decker has to tunnel through intermediate hosts to hide his trail
3. Security tally in inhereted downwards, RTG->LTG->Host->Subhost
-RTGs don't pass tally, LTG's pass tally but don't receive tally, PLTG's share tally between all hosts
4. Tunneling doesn't take actions, but imposes initiative penalties based on the rating of the chokepoint
S) Deck construction... Too complex? Becoming unnecessary?
1. Allow decks to sustain certain actions like tunnel firewall
2. Decks bottleneck mental initiative
3. Drop memory costs
4. MPCP limits number of programs and processes running
T) Tally accumulates too fast to allow for matrix overwatch
1. Operations involving Index subsystem, Analyze utility don't accumulate tally
2. Add an operation that lowers your tally?
3. Tally decreases over time, assuming no further illegal operations (may increase more though, due to null ops and background tally)
- Tally decreases by 6 for blue, 4 for green, 2 for orange, 1 for red every twenty minutes
4. Increase space between attacks on the sheaf
- This helps matrix overwatch, but makes datasteals too easy
5. Null Ops. may DECREASE the security tally
U) Evasion or IC rating should be the TN for cybercombat tests, IC's attack program for damage


Problems:
1. Detection factor is too important, but never above 7 at chargen. It should be higher.
- Due to the exponential growth of TN difficulties, a DF of 16 is largely unbeatable. Is 7-16 a wide enough range?
2. Multiple systems for deckers, one quicker for interaction with non-decking PCs, one more expansive, both equivalent except for speed and detail
3. Determine if programming tools is too easy
nezumi
To give my opinion on what I just wrote...

A) (Response increase cyber)
I've been considering this. I think I like it. Yes, yes and eh.

B) (Redirect datatrail makes traces longer, not harder) - Yes
C) (IC are frame agents) - Yes
D) (CA to redistribute persona attributes) - Eh... No, too complex without much benefit
E) (Drop memory requirements) - I don't care. They could do with simplification though.
F) (Nicer agent rules) - Yes, I like this, and I like that drones are agents. Simplicity and compatibility rule
G) (AR allows for basic matrix functions) - Yes
I) (All electronic devices (including cyber) are matrix compatible) - Not all, but most should be
J) (Everyone should have access to AR, computer skill better) - No, not at this point. It would be alright for a SOTA65 supplement, but right now it would have too much of an impact
K) (IC spends time searching) - Yes, but we need a specific rule on that, perhaps based off evasion?
L) (Decker can directly deceive IC, not just host) - Yes, this needs a mechanic
M) (Legitimate users can be dumped with tally of 1) - I think this is a requirement, really
N) (Prices for legal equipment) - Yes
O) Nezumi's matrix metaphor - Yes, of course, I'll be testing it soon, actually (although I'll drop the tally being broken to such low levels as regions for now)
P) (Hacking pool) - I like #2. Computer skill should be the important bit.
Q) (Background tally count) - Yes yes yes! The question is what mechanic. I feel like the host rating should be a critical part of that, as well as population, but that quickly gets too complex. I definitely support 4 (decrease tally and reroll)
R) (Tunneling) - Not huge on it, but I could go either way. Perhaps a good reason to make the decker enter with the group.
S) (Deck construction) - 1, 2 and maybe 4.
T) (Tally accumulation) - 1, 3. I think 5 is accounted for by 3. I don't like 4, it makes datasteals too easy.
U) (Use evasion for cybercombat) - Yes, good thinking.
Eyeless Blond
Forgot about: (EDIT: proposal "V" changed to "H", as suggested by nezumi)
H) Extending the "Tally is kept system wide, brought up to the tally of the highest individual on the host" rule, both to mesh better with the original rules and to be more sensible:
H1) Tally inheritance, Part I: Tally accumulated on an LTG is passed to all PLTGs/hosts "underneath" it. If the tally increases on the LTG, then the same amount is added to every host/PLTG that uses that LTG to hook up to the Matrix, but if a host or PLTG increase their own security tally, the LTG's tally is unaffected.
H2) Tally inheritance, Part II: RTG tally wouldn't be passed to the lower-level LTGs/PLTG/hosts, however; this is to create an actual mechanical difference between RTGs and LTGs, where now the difference is entirely symbolic. Linked RTGs also don't pass tally to each other.
H3) Tally inheritance, Part III: PLTGs share security tally. A PLTG has a single security tally, which is increased or decreased by each host in it, as if they were all one big superhost with a single value for tally.
H4) All of Q) actually goes under here. The main reason Q exists is for flavor: without "false-positive" tally then all tally would have to be the result of real intruders, and it would be insane to have systems ever remain online even after a single point of tally is accumulated.


Impressions:

Huh, and here I was under the impression that all of the following were already accepted by everyone: A, B, C/F (though we do need specific Agent/IC/drone construction rules, and I really don't think C1 is a good idea), K, N.

D) Eh, I wouldn't have a problem with this, though Nexumi is right it's mostly complexity without added benefit. Maybe if more attributes were important than just Masking.

E) Eh, in my games it never matters, as I usually end up getting more active/storage/offline storage memory than I can ever use, just to have one less number to worry about.

G/J) No AR-for-everyone, but something like a DNI-enabled pocket secretary, or anything other significantly-advanced DNI-enabled electronics should have some sort of HUD, rather like the car's virtual dashboard, which can be accessed without having to activate an RAS override. So no AR, but DNI-enabled tortise mode.

I) I like rating+4 myself. Remember that TNs increase exponentially in difficulty; adding to the TN results in multiplying the difficulty; doubling the TN actually squares the difficulty.

L) Er, this already has a mechanic. It's Evade Detection, classified as a combat maneuver, the decker rolling Evasion against the IC rating-decker's Cloak utility, the IC rolling its Rating against the decker's Evasion-IC's Lock-on(I think?) utility. If the decker wins he evades the IC for a number of turns equal to his net successes. I think this one's a keeper.

M) Auto-dump I think should apply only to users without Masking; *everyone* is trying to fake being a legitimate user; the ones with Masking just can do so without being under the host's control.

O) The Matrix being run as a pseudo-office building? *shrug* I can get behind that, though what I'd rather do is have sculpted systems be possible, but have the decker be able (and willing) to bypass the metaphors when it's not convenient to the game. More on this later; I've got a few ideas that I want to flesh out.

P-2) Absolutely agree that (Int+Wil+Comp Skill)/3 is the best.
HOWEVER, if we do this, we might want to consider making computer skill a little harder to come by. Maybe require that getting a new rank in computer skill requires 3 times as many points invested in computer-related knowledge skills, with 2 skills at equal or greater level? Something to add a little extra karma cost to upgrading computer skill, since each rank in the skill would add 1.333 dice to any decking test.

Q-2) The original idea was that all tally, including the randomly-generated stuff, was inherited, according to the rules above (see H)
Q-3) No, tally should depend on the size of the host, the number of users, etc. Essentially, the number of times that innocent transactions can be mis-identified as hostile acts. Higher security hosts already have shorter trigger steps, so the higher the security level the more IC/alerts will be pre-activated due to the same default background tally.
Q-4) No, random tally fluctuations will be handled by Null Ops when the decker is online, and a simple reroll when the decker is offline. Besides, constant decrease would mean all host tallies would go to zero over time.

R-1) Rather than the deck, this sort of thing should be the realm of cyberware. Specifically the encephalon, which according to the flavor text is supposed to supplement your thought processes; this rule would actually allow the 'ware to do that by taking over sustaining a currently active thought process.
R-4) We could actually do both, and in fact if we do the first we should do the second, simply to prevent large corps from making strings of 20 hosts to completely shut down outside incursion of their PLTGs (doing so with R 1-4 enacted would mean that noone could actually use such a daisy-chained host, making it less likely to exist.)

S) Yes, deck construction need to be rethought.

T) 5 can accomplish 2 and 3, as well as Q-4, all in one test. If things are too hot the decker tries to "lay low" for awhile and do what he can to lower the tally. See here for details. I also like T-1, though that might be a bit much.
T-4) I don't think this will be necessary. So long as K and/or O are implemented, having even several pieces of active IC wandering around won't be a big problem.

U) I came up with this, so obviously I like it.
Eyeless Blond
Oh, I just had a quick brainstorm:

W) "Backdoor" utility metaphor, to eliminate all that silly system sculpting when it's not useful--namely during Overwatch missions.
W1) The "normal" metaphors that scripted hosts have work fine for the vast majority of users, and most of the time for deckers as well.
W2) For security deckers, however, a more utilitarian approach is needed. Security deckers need to be watching the security feeds of the actual building, not ordering a hamburger or dancing with a brunette icon or whatever the sculpted equivalents are.
W2.1) So, such deckers have access to a special "utility metaphor," The utility metaphor almost invariably looks like a wireframe digital representation of the building the decker is patrolling, and gives them easier access to slaved systems and other security operations.
W2.2) Intruding deckers can gain access to this metaphor as well. All they need to do is find a "backdoor" into the metaphor with a Locate Resource operation, and can be accessed with an "Logon to utility metaphor" operation (essentially the same thing as the "Logon" operation). It can be exited just as simply with a "Graceful Logoff" operation. Intruding deckers use this mode for overwatch missions usually.
W2.3) Mechanically the utility metaphor just changes around a few of the ACIFS ratings, like so:
Access- Unchanged.
Control- Null Operations: -1TN; the metaphor is built specifically for security deckers and other long-term inactive occupants, and so such occumpants are not observed as closely. Otherwise unchanged.
Index- To Locate any Slave system: -1TN To Locate anything else: +2TN. Note that this does make the decker somewhat more vulnerable to being attacked by IC, as he's less likely to notice them around. I feel this is a good thing, as there may even be cases where a decker in a real pinch would have to log back into the "real" sculpted metaphor to locate and destroy/hide from a bunch of IC.
Files- +4 to all TNs. This metaphor is not meant for storing or manipulating file information
Slave- -2 to all TNs. The primary purpose of this metaphor is for security deckers to be able to monitor several slaved security systems at once.
W2.4) (Maybe) In anticipation of deckers swapping between metaphors as needed, maybe Index, Files and Slave systems should all be raised a point by default?


Okay I've looked over O) again, and I like it a lot more, especially the stuff about IC.

O-1,2) Yes, absolutely, though change the word "reacts" to "activates": "Patrolling IC activates instantly when a specific security tally value it reached, but it takes time to FIND the decker based on local activity and rating."
O-3) Counter-proposal: V1-4. Note that "Region" is exceptionally vague in a place where geography is entirely subjective btw; note how some metaphors put an entire host inside a single dance hall, while others include whole buildings.
O-4) Absolutely, though I vote that a user should only be automatically dumped if he doesn't have Masking.
O-5) Hm, I'm not sure about "passing by"; that's especially vague in a world with subjective distance/geography/iconography. How about this instead:
"Guard IC, unlike patrolling IC, are always active, and due to the resource drain they cause are fairly rare. They actively guard one or a number of specific resources (specific files, slaved systems, etc) and scan each icon that passes by and will automatically activate when noticing suspicious icons, regardless as to their tally." This is where things like Scramble IC come in, as they are clearly not the patrolling-IC type.
O-6) No, I kinda think that alert levels should stay on the originating host.


Wow, three posts to the same thread in one evening. I wonder if anyone will actually read all that? nyahnyah.gif
nezumi
Because we're running out of letters, I'm moving V under H (but otherwise keeping it more or less the same), although Q. is still independent. I think it's separate enough to be approached as its own issue.

A I thought was still under discussion, especially since we hadn't gotten the details down. I do agree that the general idea seems to have been well received though.

B I can agree as being settled and I'll put it where it belongs.

C I can agree as being settled, since no one disagreed. I'll drop suggestion 1.

K and N haven't really been discussed and they need specific rules. K especially. How long does it take for IC to find its target? Rating + Analyze vs. TN of the decker's Evasion?

I've rearranged some letters on my file (you won't see the changes until I post it again though, so don't worry about it).

L - You evade them for only a short period of time, and that's evading, not deceiving. I have players who want to show a "fake ID" to the IC and let their detection factor get to work again, which sort of makes sense, given the metaphor.

P - If we try to make computer skill more expensive, it might be better to break it into multiple skills. So Hacking pool is based off cybercombat, a new skill that you use for well, cybercombat. Computer still applies to all other non-combat tests. Debatably, hacking pool no longer applies to non-combat tests, in which case the average ACIFS ratings should be decreased. But that might be making things far too complicated.

Your editing changes I've made, since they're good. The exception is the 'stationary IC' one which I've shortened slightly. Keep in mind, I generally don't bother keeping the entire justification for something, only a line, maybe two, since that would quickly get too long to comfortably navigate.


Eyeless Blond
QUOTE (nezumi)
Because we're running out of letters, I'm moving V under H (but otherwise keeping it more or less the same), although Q. is still independent.  I think it's separate enough to be approached as its own issue.
Heh, all right. Change made to my post to reflect this.

QUOTE
K and N haven't really been discussed and they need specific rules.  K especially.  How long does it take for IC to find its target?  Rating + Analyze vs. TN of the decker's Evasion?

L - You evade them for only a short period of time, and that's evading, not deceiving.  I have players who want to show a "fake ID" to the IC and let their detection factor get to work again, which sort of makes sense, given the metaphor.
Good point. "Rating + Analyze" is SR4 rules, remember; in SR3 utilities decrease TNs rather than adding to the test. There's already a Locate Decker operation in SR3, p.217, but the rules are kinda odd (hey, look, I found another Open Test!). In fact this kinda brings to the surface another problem with the decking rules:


X) Take the Combine System Operations idea further. Eliminate as many corner cases and special rules for each different system operation as possible, especially the weird ones, like how Locate Slave has a pseudo-Threshold of 3 while Locate Files is 4, or how Analyze Icon lowers the TN by Sensor and the Analyze utility, rather than just a utility. This could take awhile, but will be worth it in play.


QUOTE
P - If we try to make computer skill more expensive, it might be better to break it into multiple skills.  So Hacking pool is based off cybercombat, a new skill that you use for well, cybercombat.  Computer still applies to all other non-combat tests.  Debatably, hacking pool no longer applies to non-combat tests, in which case the average ACIFS ratings should be decreased.  But that might be making things far too complicated.
Indeed. This also creates the problem that it completely changes the dynamic of deckers from being primarily cash-based to primarily skill-based, which would mean we'd be forced to lower the prices on decks or risk deckers being incompetent long into their careers. I'm not entirely against the idea, especially since SR4 managed to pull it off so well, and we're just about redesigning the decking rules from the ground up as it is, but it may be a bit too much of a fundamental divergence.


QUOTE
Your editing changes I've made, since they're good.  The exception is the 'stationary IC' one which I've shortened slightly.  Keep in mind, I generally don't bother keeping the entire justification for something, only a line, maybe two, since that would quickly get too long to comfortably navigate.

Still, it may be a good idea to specify Stationary IC as guarding specific system resources, rather than just "everyone passing by". Movement doesn't really mean anything in the Matrix, so "passing" someone doesn't either.
nezumi
QUOTE (Eyeless Blond)
Good point. "Rating + Analyze" is SR4 rules, remember; in SR3 utilities decrease TNs rather than adding to the test. There's already a Locate Decker operation in SR3, p.217, but the rules are kinda odd (hey, look, I found another Open Test!). In fact this kinda brings to the surface another problem with the decking rules:



Good catch, and especially with a rating 6 IC, that can be huge. However I don't think analyze should decrease the decker's Detection Rating, since it'll generally be in the 7-10 range, and a rating 5 analyze program would decimate that, nor does it make sense that analyze work against the Host's Index value, because that would just be sort of silly, making the host work against itself. Perhaps it would be simpler just to use the Locate Decker operation and replace it with an Analyze test vs. a TN of the Detection Factor?


Your 'X' I tucked in at C, since there's space there. Hope that isn't a problem.

QUOTE
Still, it may be a good idea to specify Stationary IC as guarding specific system resources, rather than just "everyone passing by". Movement doesn't really mean anything in the Matrix, so "passing" someone doesn't either.


I did make that specification. I know I tend to forget about the Matrix's odd sense of reality and physical layout.
Eyeless Blond
QUOTE (nezumi)
QUOTE (Eyeless Blond @ Apr 17 2007, 09:25 PM)
Good point. "Rating + Analyze" is SR4 rules, remember; in SR3 utilities decrease TNs rather than adding to the test. There's already a Locate Decker operation in SR3, p.217, but the rules are kinda odd (hey, look, I found another Open Test!). In fact this kinda brings to the surface another problem with the decking rules:

Good catch, and especially with a rating 6 IC, that can be huge. However I don't think analyze should decrease the decker's Detection Rating, since it'll generally be in the 7-10 range, and a rating 5 analyze program would decimate that, nor does it make sense that analyze work against the Host's Index value, because that would just be sort of silly, making the host work against itself. Perhaps it would be simpler just to use the Locate Decker operation and replace it with an Analyze test vs. a TN of the Detection Factor?

Hm, maybe. I don't like how Detection Factor is used for everything, however, maybe instead...

Y) Extensibility guidelines for Matrix Attributes: what's the difference between Evasion and Masking?
Y1) Evasion is your Matrix agility. It is the ability of your deck to keep out of sight of other Icons, out of Matrix combat, and other things. Evasion is the TN for targeted attacks made against you.
Y1-i) Interception Factor (IF) starts at Evasion*2 (Rating*2 for IC)
Y1-ii) Interception Factor is the TN that Trace IC uses to lock onto you.
Y1-ii) Interception Factor is the TN that other Icons use to find your Icon in the first place.
Y1-iii) Maybe Evasion isn't illegal at low levels? Defined like this Evasion sounds something like a spam filter, rather than something aggressive.

Y2) Masking is your Matrix stealth. It is the ability of your deck to keep the host from noticing what changes you make to it, and the internal functions of your Icon.
Y2-i) Detection Factor (DF) starts at Masking*2 (Rating*2 for IC)
Y2-ii) Detection Factor is the TN the host uses when resisting any changes you attempt to make to it.
Y2-iii) Detection Factor is the TN that other Icons (such as ID or security deckers) use to Analyze your icon for anomalies.

Y3) Two types of scans for other Icons: (clarifying page 209)
Y3-i) Simple Scanning is a Free Action, something your deck does almost by default. Unlike most Matrix operations, this uses your Sensor rating.
Y3-ii) Deep Scanning is a Complex Action. It uses your Computer skill, plus any Hacking Pool you choose to use.
Y3-iii) Either type of scan targets every other Icon on the host. The TN is equal to the target Icon's IF - your Scanner utility.
-1 success: You detect the Icon.
-2 successes: You get a basic idea of the Icon's type (decker, foreign Agent program, IC)
-3 successes: You learn the Icon's Rating.
-4+ successes: For each additional success you learn the type and rating of one random program in the Icon's active memory.
Y3-iv) Successes are not cumulative; each time you run a Scan, the success counter is reset from zero, meaning you can actually know less about an Icon in a subsequent Scan.
Y3-v) "Mobile" IC (see below) use Deep Scans, then Analyze each Icon it detects in random order, looking for anomalies.

Y4) Obscure Icon: Expend actions to increase your IF? Something like make a System test vs. TN of Index-Evasion, successes add to IF for the next X minutes? Not sure about this one.

Y5) Distract Icon: Basically the new Evade Detection; an opposed test of your skill vs TN of enemy's Sensor/Rating, countered by enemy's skill/Rating vs. TN of your Evasion/Rating. Net successes counters scanning Icon's successes, kinda like counterspelling for Scans.

Y5) Analyze Icon
Y5-i) Analyze targets a single Icon, TN of DF minus Analyze utility:
-1 success: You get a basic idea of the Icon's type (decker, foreign Agent program, IC)
-2 successes: You learn the Icon's Rating/MPCP Rating
-3 successes: You learn the Icon's Bod and Sensor ratings, as well as its MXP address.
-4+ successes: For each additional success you choose to either learn an anomaly the Icon has (if any), such as:
--whether or not the Icon has a Masking or Evasion chip, and its rating
--whether or not the Icon is responsible for any tally increase on this host.
--whether there are no anomalies.
or you learn the types and rating of 2 programs the Icon has in Active Memory.
Y5-ii) Successes are cumulative; each time you Analyze an Icon, the success counter increases, and you learn more.
Y5-iii) "Mobile" IC (see below) Analyze each Icon it detects in random order, looking for anomalies.

Y6) Deceive Icon. No idea how this would work. Something like Distract Icon? *shrug* Something along the lines of you can give the Analyzing Icon a "faked" result for one or more of the above Analyze results.


And another:

Z) As it stands, IC has effective Persona Attributes equal to its Rating, while a decker has, effectively, adjustible attributes equal to, on average, 3/4*MPCP rating. Is this okay, or should we consider revising it?

QUOTE
Your 'X' I tucked in at C, since there's space there.  Hope that isn't a problem.
C, eh? Okay then.
QUOTE
QUOTE
Still, it may be a good idea to specify Stationary IC as guarding specific system resources, rather than just "everyone passing by". Movement doesn't really mean anything in the Matrix, so "passing" someone doesn't either.

I did make that specification. I know I tend to forget about the Matrix's odd sense of reality and physical layout.

Indeed; the way "Stationary IC" were defined before could in fact be the same as your "moving" Guard IC. Distance, and therefore closeness, in the Matrix are determined by the results of Sensor tests--the better your Sensor test, the "closer" something is, and the better you can "see" it--so activated searching IC could very well be represented as a stationary bouncer, watching (Scanning) the icons "near" him.

So, to clarify, we now have two "modes" for IC operation:

-"Mobile" IC- the ones that randomly scan all icons on the host that they can locate, latching onto ones that they detect as problematic. These are the type that are activated by security tally trigger steps. Despite the name, the dominant representation for such IC is that of a stationary "guard" unit, warily scanning the vicinity with his "eyes".
-and "non-Mobile" or "Trap" IC- IC that is always active, but only "guards" a limited number of areas. Say a Trap IC unit is assigned to watch a set of security cameras. Anyone who attempts to access those cameras will be subject to an Analyze Icon by the IC, on the IC's next action, of course.

In that vein, proposed add-ons to rule O:
O-7) User databases will always have non-Mobile IC guarding them, perhaps several, and usually high-rating Grey or Black IC. This'll help solve the "Validate makes the world obsolete" problem without smaller companies having to make separate hosts for user databases.
O-cool.gif (mostly flavor issue) Hosts can have a maximum number of total IC equal to the security rating times the security level (blue=1, green=2, orange=3, red=4), but can only support one-fourth that amount of Trap IC.
nezumi
Ay! You and your huge posts! I'll read this from bottom up...

QUOTE
O-7) User databases will always have non-Mobile IC guarding them, perhaps several, and usually high-rating Grey or Black IC. This'll help solve the "Validate makes the world obsolete" problem without smaller companies having to make separate hosts for user databases.
O-cool.gif (mostly flavor issue) Hosts can have a maximum number of total IC equal to the security rating times the security level (blue=1, green=2, orange=3, red=4), but can only support one-fourth that amount of Trap IC.


7 - I think this would be determined by the host, not a set rule. It's 'best practices', but not something that is mandated and automatically installed on every host commercially produced.

8 - I'm not huge on this one. It adds complexity without clear benefits. If a GM wants to have 10 or 20 probe IC running around on a blue host, he should be able to. The limitation is processing power. Most hosts have a cap on how much IC they put on because they need the processing power for other things, but hypothetically someone could have a host that does nothing but run IC (like say a host in use by people who develop IC programs), in which case the maximum number of IC run would be different.


I think we have different ideas of movement in distance in the matrix. To a degree, I still think similar to SR2. Even if you have a senor rating of 20, you may not be able to access the User database, video cameras and Joe's water club spreadsheet all at the same time. In my mind, a host isn't just a huge pile of stuff you sort through, interacting only with what you can see, but with everything available at your fingertips if you look for it. It isn't a dump truck. A matrix host is a series of tubes. If you're using the camera system and you need to check on Joe's water club spreadsheet, you need to disassociate yourself with the camera program, search for the spreadsheet and somehow 'go to' that spreadsheet, which may involve passing through other things on the way. If you think about a modern folder hierarchy, except... less heirarchical, that's what I have in mind. I don't think my view is contrary to what is in the rules, and I suspect I"m not the only one who holds it. So the defining things like mobility is a touchy subject.


Added "Z" as "E", since that's now clear. And my answer is no, it shouldn't. The current method is nice and simple, no reason to muddy it up. A persona attribute can still be boosted through software though. An interesting note, a legitimate user, someone who does not have masking, has only three persona attributes and therefore each attribute is, by default, equal to the MPCP rating on his deck. It's only by adding the fourth attribute, masking, that we found our decks somehow 'underpowered'.


Ugh... Your huge 'Y' thing nyahnyah.gif I shouldn't have saved this one for last, it's huge!

This is actually filed under V, since I tucked V in another empty spot. Thank goodness, now I won't have to look at two pages of notes every time I glance at decking.


I've written your stuff out, although I changed the format slightly. The bulk of it goes under V, since that's the next available letter. I thought the deep vs. shallow scanning was different enough that it fell under Y, so even if V dies, the idea of shallow vs. deep scanning can be examined by its own merits. Finally, one of the ideas (Deceive Icon) was already touched upon, so I cross referenced, since again, I think that is its own issue.

So I typed it out as such:

L) The decker should be able to directly deceive the IC, not JUST the host
1. Decker should be able to 'repaint' himself and other Icons, possibly confusing the host as to which icon is bad

U) Evasion or IC rating should be the TN for cybercombat tests, IC's attack program for damage

V) Detection factor is overused. Define difference between Evasion and Masking
1. Evasion is Matrix agility, ability to keep out of sight and out of combat.
- TN to hit your icon in matrix combat is based off Evasion
- Interception Factor (IF) starts at Evasion*2 (Rating*2 for IC)
i IF serves as TN for Trace IC to lock on
ii IF affects how other icons can find your icon
iii At low levels, IF is legal, like a spam filter
2. Masking is matrix stealth, the ability of your deck to keep the host from noticing changes made
- DF is Masking*2 (Rating*2 for IC)
- DF is the TN the host uses to RESIST any changes you attempt to make
- DF is the TN other Icons use for Analyze functions
3. Obscure Icon - Complex action, System test vs. TN of Index - Evasion, successes add to IF for X time
4. Distract Icon - opposed test of Skill vs. enemy's Sensor, enemies skill vs. your Evasion. Net successes counter enemy's scanning successes
5. Analyze Icon, like Deep scanning, except successes are cumulative
6. (See also L)

Y) Break scanning into two types
1. Simple scanning, free action, done by default, uses Sensor rating
2. Deep Scanning, complex action, uses Computer Skill + Hacking Pool
3. Both types target all icons on the host, TN equal to Targets IF - Scanner utility, level of success like normal perception test (1 - you see something, 2 - type, etc.) Successes are not cumulative
4. "Mobile" IC would use deep scans, searching icons in apparently random order.


To go over them... I still like L. I liked it when I suggested it. The ability to play tricks like that gives us a wider span of tools to use, and can result in some very cool action scenes, sending the IC off on a false trail.

U was already suggested, but it bears repeating. I still agree.

V I think is a good idea. So far Detection Factor really is the ONLY attribute that really, really matters. Otherwise you get mobbed and wiped in no time. That said, we're hitting into a bit of the issue with IF. In general, our matrix TNs fall into two categories; 4-6, when no utility is used to reduce it, and 8-14, when a utility is basically required. Host statistics are 10-14. Detection Factor is 4-6 (remember, it's an average of the two).

If IF is going to be 2*Evasion, it's in the 8-14 range, and so we need to assume that everyone countering it will be using some utility. What does Trace IC use to reduce IF from 16 to something reasonable? How do other icons ever find your icon?

"DF is the TN the host uses to RESIST any changes you attempt to make" - is this a change from normal, or are you just stating it for completeness?


V1-iii is a given. It's already legal, it should continue to be legal, at any level. Evasion is purely defensive. It's like a firewall.

V3,4 I'm considering. I'd want to see how everything else pans out. I think we're setting it up so at low levels on the tally, it's basically guaranteed you can evade any IC, but once there are multiple pieces of IC after you, you're in trouble. Could be very climactic. Could be a bad idea. Not sure yet. Since both of them allow for Hacking pool to be used though, it definitely favors the hacker, even an average hacker, and means that mid to low level IC are basically laughable except to force you to waste actions.

Please clarify V5. Reading through, they seemed identical except for the note I made.


Y... Neat idea. I think Simple Scanning should be done by default as well as a free action. In addition, I think any icon not trying to hide itself (icons can either have a masking rating, or perhaps can use some other number to hide itself from unauthorized users. No reason to let Joe Blow see your .ini files, even if he can't access them.) But we get into a problem. With your view of the matrix, scanning basically dumps EVERY icon on the host into your field of view. If there are 250 users and 50,000 slave nodes or files, your view is instantly cluttered. Even with filters, it sounds complex.

I'm starting to think that my above mentioned question of space in the matrix is a real debate. If we go with yours, all the icons are in a heap and the tough part isn't finding them, but sorting between useful and useless ones. Mobile IC scans randomly for bad stuff. In mine, the tough part isn't in sorting, but in actual finding and getting to, since you need to know the "folder" or node the thing is in, and you need to actually travel to it. Meanwhile, mobile IC isn't random, since there's actually a node or resource it can start with, and it moves out from there, with everything having some sort of logical position in relation to each other.

Checking the book, I think the problem is because there's a description of a sculpted system. There are buildings, passageways and people, with files and slaves represented by actual items that you have to walk to. Presumably there is an alternative to a sculpted system, but no description seems to exist in the book. So in my mind, when you step out of a sculpted system, you just enter a wire frame version, still with its own topology and relational distances (although not necessarily following euclidean geometry), and it just looks like how we've seen the matrix in innumerable movies. It sounds like you imagine it as a single control panel or even a command line, where everything is at your finger tips and you simply select what you want.

Thoughts? Does this need to be better defined?
This is a "lo-fi" version of our main content. To view the full version with more information, formatting and images, please click here.
Dumpshock Forums © 2001-2012