NEWS

[SR5] Rules Clarifications and FAQ

  • 1699 Replies
  • 778219 Views

All4BigGuns

  • *
  • Prime Runner
  • *****
  • Posts: 7531
« Reply #990 on: <02-12-14/0150:11> »
Which makes sense...

No. No it doesn't in any way. How does it make sense for security software to be designed with such an obvious loophole intrinsic to it?

...and it helps make things more about the characters and less about the gear.

And this...geez, there was absolutely no reason for things to be taken down this ludicrous road. The character with the better gear should be better 9 times out of 10 than the one that doesn't have it. Peoples using iron in ages past supplanted peoples using bronze because of better equipment. Those same peoples were supplanted by those using steel later on for the same reason, and once firearms came into being, the peoples who developed those first were more successful than those without. Better gear is just better. Period.
(SR5) Homebrew Archetypes

Tangled Currents (Persistent): 33 Karma, 60,000 nuyen

Insaniac99

  • *
  • Omae
  • ***
  • Posts: 450
« Reply #991 on: <02-12-14/0239:02> »
Which makes sense...

No. No it doesn't in any way. How does it make sense for security software to be designed with such an obvious loophole intrinsic to it?

...and it helps make things more about the characters and less about the gear.

And this...geez, there was absolutely no reason for things to be taken down this ludicrous road. The character with the better gear should be better 9 times out of 10 than the one that doesn't have it. Peoples using iron in ages past supplanted peoples using bronze because of better equipment. Those same peoples were supplanted by those using steel later on for the same reason, and once firearms came into being, the peoples who developed those first were more successful than those without. Better gear is just better. Period.

I'm a software engineer in real life and have done a lot of IT work; the Users are always the weakest link.  They leave passwords laying around, they rotate the same X passwords, they use mathematically simple passwords that the stupid password filters think is strong, they leave accounts logged in, they find holes in security then make them worse for their convenience, they don't update software unless forced, they use passwords that anyone and their brother can guess ( look at this for example. ), they tell secrets to people who charm them, and they download BS junk that creates more security holes.

So yeah, I'm okay with the last user ruining the careful work that the IT guy set up because sadly it is all too true.
Check out my all purpose Shadowrun Die roller and Probability generator: http://forums.shadowruntabletop.com/index.php?topic=13241.0

RHat

  • *
  • Prime Runner
  • *****
  • Posts: 6317
« Reply #992 on: <02-12-14/0311:26> »
No. No it doesn't in any way. How does it make sense for security software to be designed with such an obvious loophole intrinsic to it?

Because it's impossible for it not to be.  No matter how good and how well designed the security software, user action can and very often will compromise security.
"Speech"
Thoughts
Matrix <<Text>> "Speech"
Spirits and Sprites

Mara

  • *
  • Ace Runner
  • ****
  • Posts: 1134
« Reply #993 on: <02-12-14/0513:01> »
No. No it doesn't in any way. How does it make sense for security software to be designed with such an obvious loophole intrinsic to it?

Because it's impossible for it not to be.  No matter how good and how well designed the security software, user action can and very often will compromise security.

Actually, it is possible. However, it is impossible if the computer is intended to be accessed by people outside of very strict controls.
Punchcard computers were more secure then anything we can do today.

Insaniac99

  • *
  • Omae
  • ***
  • Posts: 450
« Reply #994 on: <02-12-14/0541:19> »
No. No it doesn't in any way. How does it make sense for security software to be designed with such an obvious loophole intrinsic to it?

Because it's impossible for it not to be.  No matter how good and how well designed the security software, user action can and very often will compromise security.

Actually, it is possible. However, it is impossible if the computer is intended to be accessed by people outside of very strict controls.
Punchcard computers were more secure then anything we can do today.

Yes, and no...  They were more susceptible to certain types of vulnerabilities, but the physical access restriction was the best thing for security.  Even now, we do have computers in locked and guarded rooms, that don't have access to the internet when we are really serious about security. 
Check out my all purpose Shadowrun Die roller and Probability generator: http://forums.shadowruntabletop.com/index.php?topic=13241.0

JackVII

  • *
  • Prime Runner
  • *****
  • Posts: 2852
  • Ah-ah... Temper, Temper
« Reply #995 on: <02-12-14/0949:51> »
I'd just like to say that I posted the original question that sparked this in hopes that CGL would consider putting it into the FAQ. If y'all want to continue the conversation elsewhere, a new thread would be a great idea.
|DTG|Place|Address in Brackets
"Dialogue"
PC/NPC Names
>>Matrix/Comm
"Astral"
<<Text/Email>>
Thoughts/Subvocal

Namikaze

  • *
  • Freelancer Ltd
  • Prime Runner
  • **
  • Posts: 4068
  • I'm a Ma'fan of Shadowrun!
« Reply #996 on: <02-12-14/1003:09> »
I would argue that if the players want to exploit the human element of my NPCs, they need to interact with the NPCs.  If someone has redundant passwords, then they need to find a weaker device and grab the password from it.  If there's a chance they can get the person to give them access via some means - well that's even better.

Even though the rules state otherwise, I think it's better for roleplaying, better for mechanics, and better for bookkeeping if the Willpower is taken out of the unmanned devices equation.
Feel free to keep any karma you earned illicitly, it's on us.

Quote from: Stephen Covey
Most people do not listen with the intent to understand; they listen with the intent to reply.

JackVII

  • *
  • Prime Runner
  • *****
  • Posts: 2852
  • Ah-ah... Temper, Temper
« Reply #997 on: <02-15-14/0830:05> »
Q: Is the +3 Drain Value penalty for Reckless Spellcasting applied as part of the Drain Value calculation (e.g F-3+3)? Due to the minimum drain value clause, there is a distinction for many spells when cast at a lower force.
|DTG|Place|Address in Brackets
"Dialogue"
PC/NPC Names
>>Matrix/Comm
"Astral"
<<Text/Email>>
Thoughts/Subvocal

Michael Chandra

  • *
  • Catalyst Demo Team
  • Prime Runner
  • ***
  • Posts: 9922
  • Question-slicing ninja
« Reply #998 on: <02-15-14/1013:57> »
((Given how it's listed as +3 DV in Step 4, then step 6 says you use the calculation and such but can't go below 2, I think the +3 applies before, not after, the minimum drain.))
How am I not part of the forum?? O_O I am both active and angry!

JackVII

  • *
  • Prime Runner
  • *****
  • Posts: 2852
  • Ah-ah... Temper, Temper
« Reply #999 on: <02-15-14/1021:19> »
Good call, thanks Michael! My brain is absolutely not working this morning.
|DTG|Place|Address in Brackets
"Dialogue"
PC/NPC Names
>>Matrix/Comm
"Astral"
<<Text/Email>>
Thoughts/Subvocal

tasti man LH

  • *
  • Chummer
  • **
  • Posts: 142
« Reply #1000 on: <02-20-14/1757:18> »
Can hackers share their illegal marks with another friendly Matrix user? Or do those marks only work for the hacker that put them there?

If they can't, then I shall be very sad that riggers can't do drone hijackings anymore...
"I prefer the Turnabout discussions more then the Roundabout variety"

Namikaze

  • *
  • Freelancer Ltd
  • Prime Runner
  • **
  • Posts: 4068
  • I'm a Ma'fan of Shadowrun!
« Reply #1001 on: <02-20-14/1819:03> »
There's nothing in the rules currently that indicates that tthe marks transfer.  This might be something that changes with Data Trails.
Feel free to keep any karma you earned illicitly, it's on us.

Quote from: Stephen Covey
Most people do not listen with the intent to understand; they listen with the intent to reply.

Michael Chandra

  • *
  • Catalyst Demo Team
  • Prime Runner
  • ***
  • Posts: 9922
  • Question-slicing ninja
« Reply #1002 on: <02-20-14/1820:09> »
Can hackers share their illegal marks with another friendly Matrix user? Or do those marks only work for the hacker that put them there?
Marks cannot be shared.
How am I not part of the forum?? O_O I am both active and angry!

tasti man LH

  • *
  • Chummer
  • **
  • Posts: 142
« Reply #1003 on: <02-20-14/1839:18> »
...ugh.

Well, unless if Data Trails or Rigger 5 changes something, say goodbye to drone hijacking for 5th, I guess!!
"I prefer the Turnabout discussions more then the Roundabout variety"

MisterNix

  • *
  • Newb
  • *
  • Posts: 45
« Reply #1004 on: <02-21-14/1615:34> »
This is where having a technomancer doing puppeteer can be handy, forcing the device to "Invite marks from Personas X, Y, and Z for the next 1 hour" is VERY handy