NEWS

Spider/Rigger in Host and other

  • 2 Replies
  • 1379 Views

hulka

  • *
  • Newb
  • *
  • Posts: 54
« on: <11-19-19/1004:02> »
There are a couple questions about Matrix, so I also have some questions.
Uses Spider attributes of Host or Deck/cyberjack? Example. Host (4) ASDF 4567 in any order. Spider has Shiawase Cyber-6 A/S 8/7, and Cyberjack Rating5 D/F 8/7, his ASDF 8787 changed freely.
His stats are much better than Host attributes.
Or, Transportation company Host (4) ASDF 4567 and rigger working in it. He has RCC Aztechnology Tlaloc D/F 8/7. Again, his attributes are better.
But both have his devices as part of Host (They are representative of systems that interconnect many other systems behind them.CRB p185).

Next.
My Persona is from all my devices connected to PAN. All these devices are represented by the corresponding icon. I choose Satyr, my gun is horn of plenty, shooting fruits.
Now, my teammate connect and I create network with him. How it shows in Matrix? AmI like Satyr with two heads and 4 arms? Or he has his own Persona? Because we are one network and its is new one persona.
When we are each separately, the PAN protect my teammate, he can use my Firewall stat for defense. What if i am on other side of Sprawl? How it affects noise? Can he still be a member of my network?

Next. Back to other treads. Question about  Control Device.
It's still not understandable to me.
When i am owner of device, i can command my devices as I want.  I have Admin (owner) access.
When Hacker Probe+Backdoor my device and have admin access to my PAN. So, he can command my device freely, no roll dice. Or have to roll Electronic+Logic vs Willpower+Firewall even if it has administrator access.
When He has admin access, the system thinks He is authorized to give commands. Like switch off or correction aiming by 20 cm in my smartlink.
« Last Edit: <11-19-19/1008:26> by hulka »

Banshee

  • *
  • Catalyst Demo Team
  • Ace Runner
  • ***
  • Posts: 1095
« Reply #1 on: <11-19-19/1018:39> »
A spider or rigger who is a legitimate user can choose to use the host or their own gear ... choice should probably be made when they log in and most of the time unless they are operating on the cheap will be their own gear.

They would still appear as their own icon because they share a network not a persona. If noise is high enough to prevent connection then no they can't be in your network.

No ... hacked access will never give you free reign in a system, you are still an illegal user trying to do things you are not supposed to be doing. Having admin access just means you have a chance to convince the system that you're allowed to do it.
Robert "Banshee" Volbrecht
Freelancer & FAQ Committee member
Former RPG Lead Agent
Catalyst Demo Team

Xenon

  • *
  • Prime Runner
  • *****
  • Posts: 6471
« Reply #2 on: <11-19-19/1530:31> »
Or have to roll Electronic+Logic vs Willpower+Firewall even if it has administrator access.
If the hacker have access to your network that one of your drones are connected to then he could use his own Piloting + Intuition when performing stunts (where the environment and difficulty of the stunt will set the threshold) and his own Engineering + Logic vs Reaction + Intuition when shooting at your teammates. If a smartgun is connected to the network he could take an opposed Electronics + Logic vs Firewall + Willpower test to remotely eject the clip.