Shadowrun
Shadowrun Play => Rules and such => Topic started by: CigarSmoker on <09-27-19/0827:13>
-
A Group consisting of a Spellcaster , StreetSam, Rigger and a Hacker are setting up a secure PAN:
- Spellcaster has a Commlink DR 2, Goggles with ImageLink and a MicroTransceiver (2 Devices)
- StreetSam has a Commlink DR 4, Goggles with ImageLink and Smartlink, a Weapon with Smartgun, MicroTransceiver and several offline Grenades (3 Devices +1 Empty Slot)
- Rigger has a RCC DR 4, 6 Drones, Goggles with ImageLink and a Micro Transceiver (RCC can support DRx3 Drones, so its like 4 Devices)
- Hacker has a Deck DR 1 and a Commlink DR 6, Goggles with ImageLink and a MicroTransceiver
So when they are Setting up their PAN could it look like this:
|-> Spellcaster Goggles
-> Spellcaster Commlink DR 2|-> Spellcaster Micro Transceiver
|
| |-> StreetSam Goggles
|-> StreetSam Commlink DR4 ->StreetSam Smartgun
| |-> Street Sam Micro Transceiver
Deck DR1 -> Commlink DR 6 -> |
| |-> 6 Drones
|->Rigger RCC DR4|-> Rigger Goggles
| | -> Rigger MicroTransceiver
|
|-> Hacker Goggles
|-> Hacker MicroTransceiver
Now when the Hacker uses "Run Silent" with his Deck's Sleaze + his Willpower, are they all turned "invisible" until detected by a Matrix Perception test ?
They are all protected by the Hackers defensive Stats.
Is this PAN about right ?
Edit: Data Processing limits the number of slaved devices, not Device Rating. Had that mixed up.
-
If you want to go with RAI, it's effectively Cyberdeck -->Everything Else. Once someone has Access to the Cyberdeck (Brute force or Probe) they've got Access to everything.
RAW, doesn't specify if daisy chaining PANs is a thing. RAW doesn't say it's not a thing though. So, RAW you look fine to me.
Personally I recommend the simple "Everything is protected by the Cyberdeck" instead of diagramming it all out.
Running Silent I'd need to check the wording to be sure. I think the PANs protected by the Cyberdeck should benefit from the Cyberdecks Sleaze and the Decker's Logic, just like the PANs are protected by the Decker's Firewall/Willpower.
-
Running Silent I'd need to check the wording to be sure. I think the PANs protected by the Cyberdeck should benefit from the Cyberdecks Sleaze and the Decker's Logic, just like the PANs are protected by the Decker's Firewall/Willpower.
Thats the one thing most interesting for me ^^ makes a hacker kind of obligatory useful.
----------
And a follow up question: if you either use the Hackers Sleaze+Willpower, or your own Willpower+0 Sleaze to use "Runnning Silent". In any case an enemy Hacker could spot you with Matrix Perception vs Willpower (Minor Action as Hacker)
and then either
Actions:
1.use his Major Action to use "Spoof Command" with (allowed with "Outsider Access") to - for example - force a Smartgun enabled Weapon to eject its Ammunition.
2.Or try to brick the Weapon using "Data Spike" (Outsider Access) as well.
Consequence:
1.First case you disable the Smartgun and Insert Ammunition again with Major+Minor Action.
2. Weapon is disabled or only Smartgun disabled until Matrix Damage is repaired?
So depending what the result of bricking a Weapon software is depends if Consequence 1 or 2 is better ... or something else entirely
-
Running Silent I'd need to check the wording to be sure. I think the PANs protected by the Cyberdeck should benefit from the Cyberdecks Sleaze and the Decker's Logic, just like the PANs are protected by the Decker's Firewall/Willpower.
The user of a PAN can switch to Running Silent as per page 178, and if that PAN is protected by a decker then spotting it when running silent it would follow the rules for Matrix Perception.
Matrix Perception states that finding hidden icons is "an Electronics + Intuition test and is opposed by the Willpower + Sleaze of the target."
Since the target PAN is being protected by the decker, you should be able to use their Willpower and Sleaze.
The tradeoff here is that the "Digital Landscape" section on page 173 states that "the PAN is the primary means of displaying the persona, or the icon of the user. Programs and devices attached to the PAN appear as smaller representations of their nomal icons, carried by the persona."
Thus, if decker in your example is spotted, every single device under their persona would be seen. I think this is a fair offset for the lower risk of being seen in the first place, as a decker is far more likely to be able to adequately hide his team.
-
Since the target PAN is being protected by the decker, you should be able to use their Willpower and Sleaze.
Ok :) thank you.
-
Consequence:
1.First case you disable the Smartgun and Insert Ammunition again with Major+Minor Action.
2. Weapon is disabled or only Smartgun disabled until Matrix Damage is repaired?
So depending what the result of bricking a Weapon software is depends if Consequence 1 or 2 is better ... or something else entirely
If your weapon is wireless, it seems that RAW is the gun itself can be bricked:
Many items have a bonus applied when they’re kept attached to the Matrix. For the bulk of the population, this is just a little convenient aid in their normal life, but for runners it is often a door-die decision, because leaving your Smartgun XI linked to the Matrix could be the little edge you need, or it could be your doom as you get hacked and the fancy electronics-laden SMG becomes a paperweight.
This is further confirmed, in my opinion later on:
Wireless bonus: All modern frearms are considered to be wireless-equipped and come with a digital ammunition counter and an ARO that tells you the ammo type loaded. If equipped with DNI, you gain a bonus Minor Action any turn when you eject a clip (for weapons that have them) or change fire modes (on models that have more than one).
You could turn this functionality off and only leave the smartgun part of the weapon intact, but this would have to be a GM call.
-
Generally a device is Wireless on and vulnerable to hacking, or wireless off and not. Think of it as the Smartgun link being the way the Hacker gets into the gun and trashes it. Not that the mechanical action of a Firearm is being hacked, but the electronics that are part of the gun are doing things that damage the mechanical action.
The Smartgun Link is the USB Port, the Hacker is the Stuxnet virus, the gun is a PLC that gets wrecked, and takes out the machinery it controls.
-
Ok got that thanks you two. So that text passage about the Weapon turn into a paperweight is a bit "fluffy" for my taste. But well that's better than nothing :) and the Stuxnet example is nice @Hobbes
-
SR5 was a bit more wordy and thus more clear, yes:
That said, not all
devices are completely useless when bricked. A vibrosword
is still sharp, a roto-drone glides to the ground
on auto-gyro, a lock stays locked. The firing pin on an
assault rifle might not work, but its bayonet works just
fine for stabbing smug hackers. And you can’t exactly
brick a katana, ne?
-
Ok got that thanks you two. So that text passage about the Weapon turn into a paperweight is a bit "fluffy" for my taste. But well that's better than nothing :) and the Stuxnet example is nice @Hobbes
More rules specific is the smartgun text; it's not just a camera an electronics that lets you digitally eject a clip and change firemodes, it is integrated enough that you don't even have to pull the trigger.
This tells us that the smartgun reaches deep into the guts of the firearm, and bricking it could certainly cause enough damage to where it's now just a paperweight. At least until you repair the matrix damage.
I like that there is a risk; you either bring a Decker to protect your gear, or you disconnect your smartgun from the network. Just like the Decker brings a samurai to protect his meat; give and take.