So, here's what I've put down on paper. Some of this was inspired and/or lifted from previous discussions I've had with people. SO if you see some of your stuff here, please feel free to claim it. None of this is play tested and some of it is still pretty high level but I'd love to get some feedback. Sorry up front for the wall o' text.
Not sure where this goes as it's not directly related to hacking but I thought it might be good to see the outline of the world I'm brewing. The following are the campaign qualities that will be in place: Deadly Combat
, Fragile Heroes
*, Hewn Limbs
, and Rampant Corruption
Fragile heroes also lends itself to tweaking the NPC system. Vitality for specials would be "2 x Health x TL" in stead of "5 x Health x TL."
* I'm considering a ludo-variant called Extremely Fragile Heroes
that would be 1/3 of normal vitality. (2/3/4)
So, on to the Hacking bits.
Most Hacking actions are just Hacking + INT mod v. DC. Electronics have a device rating (I to X) that gives an indication of the difficulty they are to hack. There are two ways to use the device rating. 1) The GM can group the ratings to provide a sliding DC (I and II are Easy, III and IV are Average, etc.) or 2) the GM can look up the appropriate modifier as if the device were an NPC*. Here is a list some device ratings.
|III||Public net terminals, Public library catalogs|
|IV||Personal electronics, Home net terminals|
|V||Vehicles, Drones, Business net terminals|
|VI||Basic cyberware, Research net terminals|
|VII||Type 2 cyberware, Security drones, Security vehicles|
|VIII||Type 3 cyberware, High end electronics, Security net terminals|
|IX||Type 4 cyberware, Military drones, Military vehicles|
|X||Electronic wallets (sometimes called credsticks)|
*When using the persona in VR, the GM should use NPC method.
Most hacking is done through specially designed commlinks which are treated as kits for the purpose of FC rules. This type of hacking is done in Augmented Reality (AR). AR can interfere with the ability to notice and respond to the physical environment around the hacker. This is represented by <PENALTY to be determined later.>
Virtual Reality (VR) is the complete immersion of the mind into the digital world of the net. Some systems require it as they are shielded from the normally pervasive nature of wireless access. Other systems just don't have a coherent way to display the terabytes upon terabytes of data accept as a visual metaphor. Whatever the reason, some data will require immersion into the digital world to get at it. Doing so requires specialized and much larger hardware than most can lug around with them. (Treat as a workshop for FC purposes.)
Just keep in mind that the physical body is inert for the duration of the VR session.
| ||There are rumors of a new type of comm, called a board, that lets you surf the net in sweet, sweet VR without needing a home setup.|
| ||I'll believe it when I can surf it. Sounds more like corporate cheese to cause us mice to stick our heads into the trap.|
There are two types of VR: cold and hot. Cold VR is what was originally designed. It's relatively safe; as long as you consider a hardwired connection to your brain safe. Hot VR is the dream child of some desperate hacker who lived to share the design. Through a series of hardware and software "fixes" along with a serious disregard for safety protocols designed, this unnamed hacker was able to eke out a touch more performance from her (or his, no one's sure) equipment and brain. The downside? The net's own background static can be fatal. In fact, some corporations have opted to create intrusion counter-measures that temporarily spike the background static to lethal levels. The upside? The hacker is faster. (Gain the effects of Haste while operating in hot VR.)
While in VR, the metaphor can look like anything. The hacker may perceive that they are hiding from a monster but in reality they are executing a stealth program to avoid detection from the expert systems that patrol the digital landscape. The persona is created using the NPC rules as follows:
Physical attributes are 10
Mental attributes are the same as the Hacker.
The CPU used determines speed (CPU rating is Initiative.)
The Firewall helps defend the persona (Firewall rating is Defense.)
The Operating System (aka OS or System) is both Resilience and Health.
Competency is System -2. (Yes, this means low end devices don't have any default programs. Go cheap on your OS, pay for it elsewhere.)
If the hacker is running either an Armor (Resilience) or Medic (Health) program higher than the System rating, she may use those values.
Attack programs do what's on the tin. Without a Weapon program, a successful attack does 1d3 damage.
Weapon programs have Grades (I to V) and are treated as the Claw attack of a Medium creature regardless of the size of the persona in the net.
All other programs mirror the skills found in Chapter 2 with the exception of Hacking which is always at the hacker's skill level.
Hardware can't run an OS with a rating higher than the CPU.
An OS can may have any number of programs loaded but may only actively use
System x 2 programs.