Menu
News
All News
Dungeons & Dragons
Level Up: Advanced 5th Edition
Pathfinder
Starfinder
Warhammer
2d20 System
Year Zero Engine
Industry News
Reviews
Dragon Reflections
White Dwarf Reflections
Columns
Weekly Digests
Weekly News Digest
Freebies, Sales & Bundles
RPG Print News
RPG Crowdfunding News
Game Content
ENterplanetary DimENsions
Mythological Figures
Opinion
Worlds of Design
Peregrine's Nest
RPG Evolution
Other Columns
From the Freelancing Frontline
Monster ENcyclopedia
WotC/TSR Alumni Look Back
4 Hours w/RSD (Ryan Dancey)
The Road to 3E (Jonathan Tweet)
Greenwood's Realms (Ed Greenwood)
Drawmij's TSR (Jim Ward)
Community
Forums & Topics
Forum List
Latest Posts
Forum list
*Dungeons & Dragons
Level Up: Advanced 5th Edition
D&D Older Editions, OSR, & D&D Variants
*TTRPGs General
*Pathfinder & Starfinder
EN Publishing
*Geek Talk & Media
Search forums
Chat/Discord
Resources
Wiki
Pages
Latest activity
Media
New media
New comments
Search media
Downloads
Latest reviews
Search resources
EN Publishing
Store
EN5ider
Adventures in ZEITGEIST
Awfully Cheerful Engine
What's OLD is NEW
Judge Dredd & The Worlds Of 2000AD
War of the Burning Sky
Level Up: Advanced 5E
Events & Releases
Upcoming Events
Private Events
Featured Events
Socials!
EN Publishing
Twitter
BlueSky
Facebook
Instagram
EN World
BlueSky
YouTube
Facebook
Twitter
Twitch
Podcast
Features
Top 5 RPGs Compiled Charts 2004-Present
Adventure Game Industry Market Research Summary (RPGs) V1.0
Ryan Dancey: Acquiring TSR
Q&A With Gary Gygax
D&D Rules FAQs
TSR, WotC, & Paizo: A Comparative History
D&D Pronunciation Guide
Million Dollar TTRPG Kickstarters
Tabletop RPG Podcast Hall of Fame
Eric Noah's Unofficial D&D 3rd Edition News
D&D in the Mainstream
D&D & RPG History
About Morrus
Log in
Register
What's new
Search
Search
Search titles only
By:
Forums & Topics
Forum List
Latest Posts
Forum list
*Dungeons & Dragons
Level Up: Advanced 5th Edition
D&D Older Editions, OSR, & D&D Variants
*TTRPGs General
*Pathfinder & Starfinder
EN Publishing
*Geek Talk & Media
Search forums
Chat/Discord
Menu
Log in
Register
Install the app
Install
NOW LIVE! Today's the day you meet your new best friend. You don’t have to leave Wolfy behind... In 'Pets & Sidekicks' your companions level up with you!
Community
Playing the Game
Talking the Talk
Shadowrun: For Us It Was a Tuesday [OOC]
JavaScript is disabled. For a better experience, please enable JavaScript in your browser before proceeding.
You are using an out of date browser. It may not display this or other websites correctly.
You should upgrade or use an
alternative browser
.
Reply to thread
Message
<blockquote data-quote="Shayuri" data-source="post: 6583686" data-attributes="member: 4936"><p>Hm, is that a house rule? This is how I have seen the 5th Ed hacking rules work so far, but admittedly I've only played one other game...and in that game I wasn't the hacker, so I am not as up to snuff on those rules as I might otherwise be. <img src="https://cdn.jsdelivr.net/joypixels/assets/8.0/png/unicode/64/1f642.png" class="smilie smilie--emoji" loading="lazy" width="64" height="64" alt=":)" title="Smile :)" data-smilie="1"data-shortname=":)" /></p><p></p><p>Matrix Perception is opposed by icons who are running silently. Any icon not running silently has no defense. Successful checks allow the hacker to learn attributes of any icons noticed, limited by the number of successes. However, there's no risk involved in making perception checks...failing just means you don't get any information. A botch could be ruled as accidentally calling attention to oneself, I s'pose...but it seems like getting false information would be equally, if not more, appropriate.</p><p> </p><p>The system would not notice Echo automatically as she is running silently, however any icon within it that is making Matrix Perception checks (usually an IC program or a security-employed hacker) can try to find her. How often such checks are made, and how large the dice pool is depends very much on the level of Matrix security. It's possible they rely mostly on the faraday cage and physical security. It's also possible they're very vigilant and have Patrol IC sweeping the system every initiative pass. Someplace in between is most likely. <img src="https://cdn.jsdelivr.net/joypixels/assets/8.0/png/unicode/64/1f642.png" class="smilie smilie--emoji" loading="lazy" width="64" height="64" alt=":)" title="Smile :)" data-smilie="1"data-shortname=":)" /></p><p></p><p>Echo's next action will most likely be to start trying to mark the host, in an attempt to A) Map the devices in the network, and B) Progressively gain control over the network as a whole. Marking the host, if I recall right, effectively marks all the devices slaved TO the host. Without Grid Overwatch, the main risk in doing so is that the marks themselves can potentially be noticed. This doesn't necessarily mean Echo will be found...but it does mean they'd know someone was in the system without permission, and could escalate the security response.</p><p></p><p>SO...to sort of answer my own questions a little bit:</p><p></p><p>Any icon in the network that's not running silently, Echo should be able to at least 'see.' Whether or not she can learn anything more about them than their mere existence would be up to a Matrix Perception check. That check might also reveal the presence of icons that are running silently within the network. An 'icon' is any device or program that is active within the Matrix.</p><p></p><p>She wouldn't have any ability to access an icon's functions without first getting a mark on it...either by marking it directly via hacking, or through hacking the host and getting a mark on it. So she could see a camera on the network, but not THROUGH a camera, until she has it marked. She could see an IC program if it was active, but couldn't take actions against it without either a mark, or cybercombat.</p></blockquote><p></p>
[QUOTE="Shayuri, post: 6583686, member: 4936"] Hm, is that a house rule? This is how I have seen the 5th Ed hacking rules work so far, but admittedly I've only played one other game...and in that game I wasn't the hacker, so I am not as up to snuff on those rules as I might otherwise be. :) Matrix Perception is opposed by icons who are running silently. Any icon not running silently has no defense. Successful checks allow the hacker to learn attributes of any icons noticed, limited by the number of successes. However, there's no risk involved in making perception checks...failing just means you don't get any information. A botch could be ruled as accidentally calling attention to oneself, I s'pose...but it seems like getting false information would be equally, if not more, appropriate. The system would not notice Echo automatically as she is running silently, however any icon within it that is making Matrix Perception checks (usually an IC program or a security-employed hacker) can try to find her. How often such checks are made, and how large the dice pool is depends very much on the level of Matrix security. It's possible they rely mostly on the faraday cage and physical security. It's also possible they're very vigilant and have Patrol IC sweeping the system every initiative pass. Someplace in between is most likely. :) Echo's next action will most likely be to start trying to mark the host, in an attempt to A) Map the devices in the network, and B) Progressively gain control over the network as a whole. Marking the host, if I recall right, effectively marks all the devices slaved TO the host. Without Grid Overwatch, the main risk in doing so is that the marks themselves can potentially be noticed. This doesn't necessarily mean Echo will be found...but it does mean they'd know someone was in the system without permission, and could escalate the security response. SO...to sort of answer my own questions a little bit: Any icon in the network that's not running silently, Echo should be able to at least 'see.' Whether or not she can learn anything more about them than their mere existence would be up to a Matrix Perception check. That check might also reveal the presence of icons that are running silently within the network. An 'icon' is any device or program that is active within the Matrix. She wouldn't have any ability to access an icon's functions without first getting a mark on it...either by marking it directly via hacking, or through hacking the host and getting a mark on it. So she could see a camera on the network, but not THROUGH a camera, until she has it marked. She could see an IC program if it was active, but couldn't take actions against it without either a mark, or cybercombat. [/QUOTE]
Insert quotes…
Verification
Post reply
Community
Playing the Game
Talking the Talk
Shadowrun: For Us It Was a Tuesday [OOC]
Top