NEWS

Yet another overwatch thread

  • 21 Replies
  • 9609 Views

ve4grm

  • *
  • Omae
  • ***
  • Posts: 315
« Reply #15 on: <07-11-14/1615:07> »
Do you think the OS thing is due to game balance between the TM and Deckers? i.e. the Deckers are better hackers so the OS is there to give the TMs a leg-up, so to speak?

While it serves that purpose, no, that wasn't the reason. A big part of the 5e matrix design was trying to make deckers an active part of the team. OS ensures that the decker can't just set everything up weeks in advance, and thus do nothing while the rest of the party acts (and the rest do nothing while he sets things up). Because of OS, the decker needs to be there, performing their role with the rest of the team.

Similarly, noise ensures that the decker can't just sit at home while everyone else is out doing the job. The matrix redesign focused on this a lot.

I completely agree 100%, but then why did they make it so that TM's can completely bypass all those rules? you see the dilemma? =P It's mainly an issue with consistency.

They don't get to completely bypass the rules. They do have other ways of dealing with them, but that's not the same thing. Cleaner removes only a small amount of OS (it still accrues with time afterwards) and costs fading. Static Veil prevents OS accrual due to time, but when you have it sustained you take a -2 on all your other actions. This makes technomancers better for minor, but long-term, jobs. But Deckers are generally better for short hard jobs, anyways, so that seems fair to me.
Thought || Speech || Matrix/com || Astral

voydangel

  • *
  • Omae
  • ***
  • Posts: 537
  • SR GM since 1990. Damn I'm old.
« Reply #16 on: <07-11-14/1655:46> »
Deckers can establish a physical direct connection with a device to bypass host ratings.
...
This let him get a new Mark on a Host after jacking out as long as he got physical proximity to a slaved device.

Thanks Xenon, your post was quite helpful in clearing up some of the ideas behind this stuff. I also re-read the entire matrix section of core5e last night, so that has helped to refresh my brain a little too. However, since you seem to be fairly adept at this whole matrix thing, if you wouldn't mind, based on the quote above, can you explain to me how this would work mechanically (in actions/rolls) as well as what those mechanical actions and rolls translate to in game? the way i see it is this, (please correct me where I'm off):

DeckerMan™ and his team are sitting at a locked security door and need to open it. There is a Maglock/keypad there, but they don't have a card or code for it.
DeckerMan™ pulls out his cable and connects to the Universal Data Connector (UDC) on the keypad in order to make a "direct connection".
• Why would anyone put a UDC on a keypad? Don't people realize hackers can do this and then just stop putting UDCs on anything/everything?
DeckerMan™ uses a "Brute Force" or "Hack on the Fly" Action to get a Mark on the device (maglock/keypad), he can do this due to having a direct connection (DC).
The Device only gets to resist the attempt using it's own device rating, and gets no firewall (unless it's a commlink or some other device with a native firewall rating, but it's not in this example) nor host bonuses due to the direct connect. And all hits on the defense roll are added to the DeckerMan™ OS tally.
• Is this correct? This is one of the places I'm fuzzy about - is it this, or does he get a free mark for having a DC?
DeckerMan™ now also has an automatic free Mark on the host that the device is connected to, in this case the security host.
• Is this correct? If so, wouldn't this reinforce the idea of not putting UDCs on anything at all ever?
Then we do either:
A) DeckerMan™ then uses a Complex "Spoof Command" action to trick the device into thinking that a 'open the door' command was entered by the security host.
• He can do this due to getting the free hit on the Security host, and it is fairly reasonable to assume that the security host has the ability to open the door at will.
OR
B) DeckerMan™ then uses a Free "Control Device" action to open the door 'manually'. He rolls Electronic Warfare + Intuition [Sleaze] v. Device Rating.
Finally, assuming all rolls were successful, etc., The door opens. -Fin-

Am I missing anything?
What would a TM have to do to accomplish the same thing in the same situation?
« Last Edit: <07-11-14/1717:33> by voydangel »
My tips for new GM's
Unless it is coming from an official source, RAI = "Rules As Imagined."
SR1+SR2+SR3++SR4++SR5+++h+b+++B+D382UBIE-RN---DSF-W+m+(o++)gm+MP

Xenon

  • *
  • Prime Runner
  • *****
  • Posts: 6471
« Reply #17 on: <07-11-14/1755:45> »
DeckerMan™ and his team are sitting at a locked security door and need to open it. There is a Maglock/keypad there, but they don't have a card or code for it.
To hack Maglocks with Keypads you:
First you remove the casing with a
Locksmith + Agility [Physical] (Maglock Rating x 2, 1 Combat Turn) Extended Test.

If the maglock have anti-tamper system you also need to take a
Locksmith + Agility [Physical] (anti-tamper system rating) Test

To rewire the internal electronics you take a
Locksmith + Agility [Physical] (Maglock Rating x 2, 1 Combat Turn) Extended Test.
...or you use a Sequencer (p 448) with a
Sequencer rating vs Maglock Rating Opposed Test
(you get a positive dice pool modifier of 1 dice if wireless ON)

to re-assemble the case after the lock is picked you take a
Locksmith + Agility [Physical] (Maglock Rating x 2, 1 Combat Turn) Extended Test.



To hack Maglock with Cardreader you:
You can copy a valid key with a keycard copier (p. 447) with a
Hardware + Logic [Mental] (2) Test
(require a hardware kit and take about 10 minutes)
When you use the forged keycard you take a
Keycard copier rating x 2 vs Maglock Rating x 2 Opposed Test

Or you can use a Maglock passkey "skeleton key" (p. 448) with a
Maglock Passkey Rating vs Maglock Rating Opposed Test
(you get a positive dice pool modifier of 1 dice if wireless ON)


...Or you remove the casing with a
Locksmith + Agility [Physical] (Maglock Rating x 2, 1 Combat Turn) Extended Test.

If the maglock have anti-tamper system you also need to take a
Locksmith + Agility [Physical] (anti-tamper system rating) Test

To rewire the internal electronics you take a
Locksmith + Agility [Physical] (Maglock Rating x 2, 1 Combat Turn) Extended Test.

to re-assemble the case after the lock is picked you take a
Locksmith + Agility [Physical] (Maglock Rating x 2, 1 Combat Turn) Extended Test.



A decker or technomancer can also Hack Maglocks from the Matrix.

You can hack the lock from AR, cold-sim VR or hot-sim VR (VR = ragdoll mode).
The cyberprogram Fork (p. 245) can be used to hack two locks at the same time without splitting the pool.


First you need a mark on the lock which is either a
Hacking + Logic [Sleaze] v. Intuition + Firewall Opposed Test
(Hack on the Fly)
or a
Cybercombat + Logic [Attack] v. Willpower + Firewall Opposed Test
(Brute Force)

Then you Control the device to open with a
Electronic Warfare + Intuition [Sleaze] v. Intuition + Firewall Test
(Control Device)
You can control multiple devices at once.
- You need marks on them all and you have to split your dice pool,
but the actions you control them to take does not have to be the same.
(Fork also let you control two devices at once, but in this case you need to control them to take the exact same action).



If you already have a mark on the owner of the lock you can instead take a
Hacking + Intuition [Sleaze] v. Logic + Firewall Test
(Spoof Command; this does not require a mark on the lock)



Depending on your reading a Technomancer can instead also take a
Software + Resonance [Level] v. Willpower + Firewall Test
(Puppeteer; this does not require a mark on the lock)





DeckerMan™ pulls out his cable and connects to the Universal Data Connector (UDC) on the keypad in order to make a "direct connection".
• Why would anyone put a UDC on a keypad? Don't people realize hackers can do this and then just stop putting UDCs on anything/everything?
Most public accessible devices are probably not slaved at all (since it compromise the security of the host), but there will be exceptions (but maybe you need to do at least some basic breaking and entering before you can physically reach one). And the UDC does not have to be easy to access since most of the time you would access it wireless anyway. But all devices have a UDC (or else you can't access it at all if you ever turn wireless OFF - which for the owner is a free action... imagine the support calls you would get "i accidentally turned my maglock wireless OFF, again, and now I can't turn it on-line again...").



DeckerMan™ uses a "Brute Force" or "Hack on the Fly" Action to get a Mark on the device (maglock/keypad), he can do this due to having a direct connection (DC).
He can do this by accessing it on the grid like he would from home.

Or by accessing it directly from within the host it is slaved to.

The reason why he establish a direct connection is because he don't have a mark on the host yet and because he don't want to roll against high host ratings. If it is not slaved to a host then you don't need to fight high host ratings so there is really no reason to establish a direct connection to it (exception being if it is a throwback or for some other reason a wireless OFF device).


The Device only gets to resist the attempt using it's own device rating, and gets no firewall
sR5 p. 234 Devices
Devices have a smaller-than-person-sized icon in the Matrix. They also have three ratings: a Device Rating and two of the Matrix attributes, Data Processing and Firewall. For most devices, the Matrix attributes are the same as the Device Rating.


DeckerMan™ now also has an automatic free Mark on the host that the device is connected to, in this case the security host.
Yes.
« Last Edit: <07-11-14/1759:26> by Xenon »

firebug

  • *
  • Errata Coordinator
  • Prime Runner
  • *****
  • Posts: 2996
  • Scraping the bottom of the Resonance Barrel
« Reply #18 on: <07-11-14/1807:49> »
Not to mention that TM's get to completely erase ALL of their activity for super cheap with minor risk as a complex action, or for "free" with a CF.

What are you referring to here?  Aside from Cleaner, they don't have anything else to remove OS that deckers don't.  And Cleaner is a slow process...  Maybe one or two OS at a time if you don't want to risk Stun.  You can use it before anything happens and everyone is not really bothering with exact initiative passes, but once the action starts you can't really rely on it.  And Static Veil doesn't prevent the main source of OS--  Hits (not net hits) on opposing dice pools. 
I'm Madpath Moth on reddit (and other sites).  Feel free to PM me errata questions!
Jeeze.  It would almost sound stupid until you realize we're talking about an immortal elf clown sword fighting a dragon ghost in a mall.

Xenon

  • *
  • Prime Runner
  • *****
  • Posts: 6471
« Reply #19 on: <07-11-14/1811:11> »
Basically, there are 3 ways to get a mark on a device:


1) Hack on the Fly or Brute Force the device out on the Grid.
- You need to first spot the device icon.
- The device will defend with host ratings IF it is slaved to a host.
- You can hack any wireless device this way (slaved or not).
- You can attach a wireless data tap in the universal access port of a throwback to hack it wireless
- You can attach a wireless data tap on a cable of a wired device to hack both devices wireless

2) Attach a cable for a Direct Connection
- You need to physically find and reach the device's universal access port.
- The device will not defend with host ratings even if is slaved to a host.
- You can hack any device this way (slaved or not, wireless or wired).
- Also let you hack throwback and wired devices (that are wireless OFF)
- You can connect a wire to a data tap on a cable of a wired device to get direct connection to both devices.

3) Access a slaved device from within the Host it is slaved to
- You need to first get a Mark on the Host and Enter Host
- You will get a direct connection; device will not defend with host ratings.
- Throwback and wired devices cannot be slaved to a Host (hosts only exist on the Matrix)
- From within the Host you cannot access devices that are not slaved to the host

voydangel

  • *
  • Omae
  • ***
  • Posts: 537
  • SR GM since 1990. Damn I'm old.
« Reply #20 on: <07-11-14/1854:29> »
right on, that helps. Thanks guys.
My tips for new GM's
Unless it is coming from an official source, RAI = "Rules As Imagined."
SR1+SR2+SR3++SR4++SR5+++h+b+++B+D382UBIE-RN---DSF-W+m+(o++)gm+MP

Masons4Hillary

  • *
  • Newb
  • *
  • Posts: 1
« Reply #21 on: <09-11-16/1632:43> »
Its high noooon.... activate aimbot XD