Shadowrun
Shadowrun Play => Rules and such => Topic started by: Banshee on <04-18-20/1021:23>
-
I've seen this pop up a few times here and there in various discussions but don't quite understand.
It appears as people thing is some point where a Host provides immunity to all matrix actions.
Con someone please ...
1. Confirm what exactly is the event horizon, as perceived?
2. What and where in the book is the text that supports this?
Reason.. because there is no intention of any kind of immunity and I want to clear it up either by errata or official FAQ, but need to know what to target.
-
6we is admittedly less specific on the topic, but 5e established that you can't perceive an icon inside a host unless you're also inside that same host. And vice versa.
So you're not technically immune to hacking actions across what I call the "event horizon", but if you're not a perceivable target then you can't be targeted and it ends up being in effect immunity to many/most actions.
-
6we is admittedly less specific on the topic, but 5e established that you can't perceive an icon inside a host unless you're also inside that same host. And vice versa.
So you're not technically immune to hacking actions across what I call the "event horizon", but if you're not a perceivable target then you can't be targeted and it ends up being in effect immunity to many/most actions.
So ... it's a perception based on how 5e was? Not some misinterpretation of what is written in 6we?
That would mean it just clarification not errata.
EDIT: Xenon - I know you're fairly active and involved in 6we matrix discussions over on Reddit. Can you confirm this?
-
Well there IS the following line in 6we:
The virtual space in a host is separate from the
Matrix at large, and any icons on that host are not
accessible unless expressly part of a public-facing
side.
That's implicitly saying "icons inside the host can't be hacked by personas outside the host... UNLESS those icons are in an explicit 'can still be hacked' zone of that host"...
Granted it's pure assumption that the relationship would be reciprocal. However it'd be terrible game balance though if the spider inside a host could A) see and B) hack the matrix icons of people penetrating a site but are not inside that same host while being untouchable by those same runners.
-
Well there IS the following line in 6we:
The virtual space in a host is separate from the
Matrix at large, and any icons on that host are not
accessible unless expressly part of a public-facing
side.
That's implicitly saying "icons inside the host can't be hacked by personas outside the host... UNLESS those icons are in an explicit 'can still be hacked' zone of that host"...
Granted it's pure assumption that the relationship would be reciprocal. However it'd be terrible game balance though if the spider inside a host could A) see and B) hack the matrix icons of people penetrating a site but are not inside that same host.
See that's what I thought might be the source and I was just being prejudice based on knowing what I was thinking.
My intention is not any sort of immunity in any fashion but more of a hidden behind the Host "event horizon". Which requires actually spending time and actions either making matrix perception checks to see what's on the other side or gaining access.
-
See that's what I thought might be the source and I was just being prejudice based on knowing what I was thinking.
My intention is not any sort of immunity in any fashion but more of a hidden behind the Host "event horizon". Which requires actually spending time and actions either making matrix perception checks to see what's on the other side or gaining access.
And now its time for another round of .... FAQ!... OR!....ERRAAATAAA!!!! ;D
Anyway, yeah. Otherwise all my runners are logged into the public library. Heck with you mr. spider.
I'm not sure if "accessible" can be FAQ'd into mechanically equal Running Silent with the Host's Sleaze Rating. Houseruled. RAI. Expressly intended. Again, I'm pretty sure the Matrix FAQ is going to be a bunch of links to Banshee's posts. Thanks for the clarifications, they are immensely helpful. We appreciate the willingness to contribute to the open community discussions.
-
So ... it's a perception based on how 5e was? Not some misinterpretation of what is written in 6we?
A little bit of both I'd say.
There are basically only two sentences talking about how the Host and its Devices interact in this edition:
SR6 p. 185 Hosts
The virtual space in a host is separate from the Matrix at large, and any icons on that host are not accessible unless expressly part of a public-facing side....
This could be read as if icons (such as devices?) on a host are not accessible ('immune'?) because the virtual space in a host is separate from the Matrix at large.
Followed by this:
SR6 p. 185 Hosts
...Gaining access to a host will allow interaction with the icons and devices on the inside.
This could, wrongly, be read as if in order to allow interaction with icons and devices on the 'inside' you:
- Need to hack (brute force / probe+backdoor entry) the Host
- Then you need to take the Enter Host action to get to the 'insides' of the Host, the virtual space which is separate from the Matrix at large.
- Once 'inside' this virtual space which is separate from the Matrix at large you either hack specific icons and specific devices on the inside you want User or Admin access to - or you directly take Outsider actions on them, without first gaining User or Admin access.
That access is actually based on network could perhaps be spelled out better in the book. I currently don't feel I have any good page reference to give people when they challenge me on this :-/
My intention is not any sort of immunity in any fashion but more of a hidden behind the Host "event horizon". Which requires actually spending time and actions either making matrix perception checks to see what's on the other side or gaining access.
What are then the rules of engagement for IC in this edition?
Can we spot IC running in a Host before we even have access on the Host network?
Can we Data Spike it....? Can Killer IC running on the Host attack us back...?
-
So ... it's a perception based on how 5e was? Not some misinterpretation of what is written in 6we?
A little bit of both I'd say.
There are basically only two sentences talking about how the Host and its Devices interact in this edition:
SR6 p. 185 Hosts
The virtual space in a host is separate from the Matrix at large, and any icons on that host are not accessible unless expressly part of a public-facing side....
This could be read as if icons (such as devices?) on a host are not accessible ('immune'?) because the virtual space in a host is separate from the Matrix at large.
Followed by this:
SR6 p. 185 Hosts
...Gaining access to a host will allow interaction with the icons and devices on the inside.
This could, wrongly, be read as if in order to allow interaction with icons and devices on the 'inside' you:
- Need to hack (brute force / probe+backdoor entry) the Host
- Then you need to take the Enter Host action to get to the 'insides' of the Host, the virtual space which is separate from the Matrix at large.
- Once 'inside' this virtual space which is separate from the Matrix at large you either hack specific icons and specific devices on the inside you want User or Admin access to - or you directly take Outsider actions on them, without first gaining User or Admin access.
That access is actually based on network could perhaps be spelled out better in the book. I currently don't feel I have any good page reference to give people when they challenge me on this :-/
My intention is not any sort of immunity in any fashion but more of a hidden behind the Host "event horizon". Which requires actually spending time and actions either making matrix perception checks to see what's on the other side or gaining access.
What are then the rules of engagement for IC in this edition?
Can we spot IC running in a Host before we even have access on the Host network?
Can we Data Spike it....? Can Killer IC running on the Host attack us back...?
Thanks for your input... I need to evaluate and make sure I have some blessings before I post that but I have an idea on how to clarify
-
So ... it's a perception based on how 5e was? Not some misinterpretation of what is written in 6we?
A little bit of both I'd say.
There are basically only two sentences talking about how the Host and its Devices interact in this edition:
SR6 p. 185 Hosts
The virtual space in a host is separate from the Matrix at large, and any icons on that host are not accessible unless expressly part of a public-facing side....
This could be read as if icons (such as devices?) on a host are not accessible ('immune'?) because the virtual space in a host is separate from the Matrix at large.
Followed by this:
SR6 p. 185 Hosts
...Gaining access to a host will allow interaction with the icons and devices on the inside.
This could, wrongly, be read as if in order to allow interaction with icons and devices on the 'inside' you:
- Need to hack (brute force / probe+backdoor entry) the Host
- Then you need to take the Enter Host action to get to the 'insides' of the Host, the virtual space which is separate from the Matrix at large.
- Once 'inside' this virtual space which is separate from the Matrix at large you either hack specific icons and specific devices on the inside you want User or Admin access to - or you directly take Outsider actions on them, without first gaining User or Admin access.
That access is actually based on network could perhaps be spelled out better in the book. I currently don't feel I have any good page reference to give people when they challenge me on this :-/
My intention is not any sort of immunity in any fashion but more of a hidden behind the Host "event horizon". Which requires actually spending time and actions either making matrix perception checks to see what's on the other side or gaining access.
What are then the rules of engagement for IC in this edition?
Can we spot IC running in a Host before we even have access on the Host network?
Can we Data Spike it....? Can Killer IC running on the Host attack us back...?
Thanks for your input... I need to evaluate and make sure I have some blessings before I post that but I have an idea on how to clarify
So all of this means that I can hack devices that are inside a host, even without gaining access to that host? What would even be the purpose of hacking into a host then? Am I missing something?
Edit: Also, if Icons inside a host are not unhackable from the outside, does a Host provide any protection to the icons inside it in that scenario?
-
We are waiting for Banshee to clarify I guess.
Having said that, the intent seem to be that wireless devices are reachable from the Matrix as long as we talk about actions that only require Outsider access and devices that are connected to the 'outer layer' Host. Many devices (such as elevators, lights, maglocks, vending machines etc) seem to be immediately obvious while other devices (cameras, sensors, alarms etc) might require an opposed matrix perception test to be spotted. Devices slaved to a Host use the attributes of the Host when defending.
It seem as if you normally take the Probe action while you are still considered to be on the 'outside' (where I personally like to think IC can't touch you). And it also seem as if you are on the 'outside' right up until you successfully take the 'Backdoor Entry' action. You are not required to take the 'Backdoor Entry' action right after your Probe action. You can decide to take the action later. However, after you successfully take the 'Backdoor Entry' action "to gain illicit entry into a host" it seem as if you are now considered to be on the 'inside'.
It seem as if after you successfully take the 'Backdoor Entry' action you now open up User and Admin access actions (such as searching for files located inside the Host, directly controlling devices slaved to the host etc).
I like to think that the 'Backdoor Entry' action is actually both exploiting the glitch you just discovered while probing the network and gaining the effect of the 'Enter Host' action - at the same time.
...and by extension I also like to think (again my personal thoughts on the matter) that once you successfully take the 'Backdoor Entry' action you are also potentially exposed to IC.
If that make sense to anyone (it does to me) :-)
-
The above (at least the first part) is very similar to how it worked in SR5, btw.
Wireless devices in SR5 were always located on a Grid, never actually inside a Host. Just that if you were inside a Host that a wireless device was slaved to then you would be considered directly connected to the device (even though it was still out on a Grid).
That meant that wireless devices were reachable from the Matrix as long as we talk about actions that didn't require any marks on the device (such as Spoof Command, Data Spike, Matrix Perception, Brute Force, Hack on the Fly, ...). Devices within 100 meters that was not running silent was immediately obvious. Devices that was running silent (no matter how far away) required an opposed matrix perception test to be spotted (and if slaved to a Host they would use the Sleaze rating of the Host when opposing).
-
So all of this means that I can hack devices that are inside a host, even without gaining access to that host? What would even be the purpose of hacking into a host then? Am I missing something?
Edit: Also, if Icons inside a host are not unhackable from the outside, does a Host provide any protection to the icons inside it in that scenario?
You can only go 1 Host deeper hacking-wise, so if the Host is layered, you need to get in. Furthermore, Hash Checks require User access, so for that you need to get in first. Edit File also is User/Admin, so unless you're ready to target each file individually first, I imagine you need to enter the Host to easily deal with them.
-
We are waiting for Banshee to clarify I guess.
Having said that, the intent seem to be that wireless devices are reachable from the Matrix as long as we talk about actions that only require Outsider access and devices that are connected to the 'outer layer' Host. Many devices (such as elevators, lights, maglocks, vending machines etc) seem to be immediately obvious while other devices (cameras, sensors, alarms etc) might require an opposed matrix perception test to be spotted. Devices slaved to a Host use the attributes of the Host when defending.
It seem as if you normally take the Probe action while you are still considered to be on the 'outside' (where I personally like to think IC can't touch you). And it also seem as if you are on the 'outside' right up until you successfully take the 'Backdoor Entry' action. You are not required to take the 'Backdoor Entry' action right after your Probe action. You can decide to take the action later. However, after you successfully take the 'Backdoor Entry' action "to gain illicit entry into a host" it seem as if you are now considered to be on the 'inside'.
It seem as if after you successfully take the 'Backdoor Entry' action you now open up User and Admin access actions (such as searching for files located inside the Host, directly controlling devices slaved to the host etc).
I like to think that the 'Backdoor Entry' action is actually both exploiting the glitch you just discovered while probing the network and gaining the effect of the 'Enter Host' action - at the same time.
...and by extension I also like to think (again my personal thoughts on the matter) that once you successfully take the 'Backdoor Entry' action you are also potentially exposed to IC.
If that make sense to anyone (it does to me) :-)
Yes this is the direction I want to go ... but looking at second order operations and the effects.
Then I'm going to be writing up a matrix faq to post her adxwell
-
So all of this means that I can hack devices that are inside a host, even without gaining access to that host? What would even be the purpose of hacking into a host then? Am I missing something?
Edit: Also, if Icons inside a host are not unhackable from the outside, does a Host provide any protection to the icons inside it in that scenario?
You can only go 1 Host deeper hacking-wise, so if the Host is layered, you need to get in. Furthermore, Hash Checks require User access, so for that you need to get in first. Edit File also is User/Admin, so unless you're ready to target each file individually first, I imagine you need to enter the Host to easily deal with them.
I was going to check my book, but Michael got there first. File Icons you'll almost certainly need to get in the Host to deal with effectively. Not even Editor CF gets around it unless there is just one File Icon on the Host for you to target. Still need to Enter Host at some point and do a Hash Check, really no way around that if you need to do something to a File Icon.
-
So all of this means that I can hack devices that are inside a host, even without gaining access to that host? What would even be the purpose of hacking into a host then? Am I missing something?
Edit: Also, if Icons inside a host are not unhackable from the outside, does a Host provide any protection to the icons inside it in that scenario?
You can only go 1 Host deeper hacking-wise, so if the Host is layered, you need to get in. Furthermore, Hash Checks require User access, so for that you need to get in first. Edit File also is User/Admin, so unless you're ready to target each file individually first, I imagine you need to enter the Host to easily deal with them.
Seems like a good direction for further shaping of the (still "malleable" ;)) Matrix/Host rules. Part of the current ambiguity here comes from the phrase "getting access", which some interpret as "getting the right to enter" and some as just "entering". In the case of hosts, the latter makes more sense - and not just because there needs to be reasons to actually enter a host so the Black IC doesn´t get bored.
Just look at the rest of the terminology: The term "Outsider Access" implies that Matrix Actions like Data Spikes etc. can be done from outside the host, i.e. without entering it and exposing yourself to IC. But at the same time, "Outsider Access" also implies that the higher Access Levels actually require you to enter the host - and not just to have the "right" to do so.
And then there´s "Backdoor Entry". With a name like that, it would be super counterintuitive if that action doesn´t actually make you enter the host. To me, that sounds like the sneaky, illegal Version of "Enter host". And to that, you just have to add "Brute Force" as the noisy, illegal alternative (Yes, these two also let you access other Networks. But when it comes to hosts, they should give you the same effect as "Enter Host", just illegal).
-
Well, just to guide Banshee on writing that FAQ, I'll post some things that I am not 100% clear on here anyway.
Let's take the following scenario: We have a building, with a small security network (one single host) that controls the building's cameras, locks, etc. So, all these devices are part of the host's private space.
1) What do I see, if I just look into the Matrix, without Matrix Perception? Nothing (Can hosts run silent?)? Just the host?
2) If I roll Matrix Perception to find the Hidden Network, I would roll Electronics + Intuition vs. Hosts Willpower + Sleaze... if I succeed, do I now also see all the devices managed by the host, or just the host?
3) If I can see the icons that are part of the host, without being in the host, can I hack them while ignoring the host? And, if I can do so, do they defend with the hosts attributes or with their own?
4) If I can hack icons without entering the host, I guess the big advantage of hacking a host is to gain access to the whole network at once... instead of hacking device by device... correct?
Edit: I have to add that in my campaigns Decking comes up way more often as a means of messing with security than for actual Data Steals. That's why I want to really understand the relationship of Hosts and their Devices correctly.
-
Well, just to guide Banshee on writing that FAQ, I'll post some things that I am not 100% clear on here anyway.
Let's take the following scenario: We have a building, with a small security network (one single host) that controls the building's cameras, locks, etc. So, all these devices are part of the host's private space.
1) What do I see, if I just look into the Matrix, without Matrix Perception? Nothing (Can hosts run silent?)? Just the host?
2) If I roll Matrix Perception to find the Hidden Network, I would roll Electronics + Intuition vs. Hosts Willpower + Sleaze... if I succeed, do I now also see all the devices managed by the host, or just the host?
3) If I can see the icons that are part of the host, without being in the host, can I hack them while ignoring the host? And, if I can do so, do they defend with the hosts attributes or with their own?
4) If I can hack icons without entering the host, I guess the big advantage of hacking a host is to gain access to the whole network at once... instead of hacking device by device... correct?
Edit: I have to add that in my campaigns Decking comes up way more often as a means of messing with security than for actual Data Steals. That's why I want to really understand the relationship of Hosts and their Devices correctly.
OK so yeah at least some of this will be in the far but for now...
1.you would see the host plus whatever icons they choose to show. Yes the host can run silent but it would be the host and everything it is protecting.
2.this a bit more complicated and will get more attention later ... in general though just the host .. I want add seeing "inside" with additional successes
3.you can never ignore the host. Anything linked to the host will always defend with the host attributes. To be determined on the hack ... needs reviewed and then approved but I say you take outsider actions on anything you can detect.
4. Well to do anything other than an outsider action you have to enter the host
-
I think Banshee's seen my in-depth thoughts on this expressed in other channels :D
But for public-consumption's sake... I'll boil it down to saying the more like an Event Horizon the into/out of Host relationship works, the less "well, what if?"s you have to rationalize....
-
3.you can never ignore the host. Anything linked to the host will always defend with the host attributes. To be determined on the hack ... needs reviewed and then approved but I say you take outsider actions on anything you can detect.
Maybe I misunderstood an earlier statement:
My intention is not any sort of immunity in any fashion but more of a hidden behind the Host "event horizon". Which requires actually spending time and actions either making matrix perception checks to see what's on the other side or gaining access.
If I can't take any actions on them, or only Outsider Actions, that's actually what I'd call "the devices have immunity" (until the host is breached).
-
If I can't take any actions on them, or only Outsider Actions, that's actually what I'd call "the devices have immunity" (until the host is breached).
To take matrix actions that require User or Admin access you first [always] need to have User or Admin access....
-
If I can't take any actions on them, or only Outsider Actions, that's actually what I'd call "the devices have immunity" (until the host is breached).
To take matrix actions that require User or Admin access you first [always] need to have User or Admin access....
Yes, but. If I can spot the camera slaved to the host, without having access to the host, then I could run Probe + Backdoor Entry on that camera alone. Those are both Outsider Actions after all.
Edit: However, I presume that even if I could and would do that, it would still defend with the host's attributes.
-
If I can't take any actions on them, or only Outsider Actions, that's actually what I'd call "the devices have immunity" (until the host is breached).
To take matrix actions that require User or Admin access you first [always] need to have User or Admin access....
Yes, but. If I can spot the camera slaved to the host, without having access to the host, then I could run Probe + Backdoor Entry on that camera alone. Those are both Outsider Actions after all.
Edit: However, I presume that even if I could and would do that, it would still defend with the host's attributes.
You'd Probe the Host to gain access to the network, then do whatever you're going to do to the Camera Icon. Both checks are opposed by the Hosts Attributes.
Outsider actions such as Spoof or a couple of the TM's Complex Forms would let you target the Camera Icon. But only after you've spotted it (opposed by the Host's attributes) and the Camera Icon would defend with the Host's Attributes as well vs whatever Matrix action or CF you're trying.
Going after the Camera specifically is less time, but getting Access to the Host gives you a lot more options. If you need to get past multiple layers of technological security you're better off with Probe. If there are only one or two things to beat and you're in a hurry, do the Outsider only actions.
-
So that essentially means, Probe + Backdoor Entry against a device is usually only useful (if ever) if that device isn't part of a PAN or Host. As you'd usually probe on the network instead (to gain more permissions for essentially the same amount of effort).
-
I think the intention is you can't Probe a Device on a PAN or Host, you have to Probe the network its on. But yes, you've got the bottom line as I understand it.
And honestly as a GM, I wouldn't bother rolling dice on an unprotected device. It's like having the Physical Adept roll to climb a 4 foot chain link fence, or the Rigger take a corner at 30 mph, or the Face hire a joyboy/joygirl. It's a gimme.
-
I can see some use in taking the unfun out of a potential abuse/misuse of the targeting rules by having a GM say "you can't hack the maglock, because you're not in the host therefore you can't even SEE the maglock's icon". Absolutely. But, as far as I'm concerned, the language as is already covers that. Any devices that are meant to be interacted with by people who are not simultaneously logged into some host should be perceptible outside that host. It's not only common sense, it's already RAW without any changes/clarifications.
But on the flipside, certain things absolutely SHOULD be behind an event horizon. What's the reason the enter host matrix action even exists if you can go and do everything from outside the host, anyway? Nested architecture is a thing in this edition (for example, see the Matrix Host Structure diagram on pg 186). In that example, surely you can't perceive the Security or Office Hosts from the matrix, much less perceive anything inside them. You can't do away with the Event Horizon completely. It has to exist. And since it has to exist, it may as well have as few exceptions as possible for simplicity's sake.
-
Enter Host is for getting at File Icons and the Nested Hosts. Hash Check is User, not outsider, no other way to find a file Icon normally.
I'll put it to you this way, why have Nested Hosts if everything is behind a Host Event Horizon in the first place?
You know my thoughts on this one already as well ; )