NEWS

[OOC] Missions 2 - Parliament of Thieves

  • 330 Replies
  • 74251 Views

Boer_Kommando

  • *
  • Omae
  • ***
  • Posts: 435
« Reply #30 on: <01-15-11/1208:49> »
well, if she doesnt answer me it'll happen regardless, but I'm looking up composure rolls and will post my rolls.

Chrona

  • *
  • Prime Runner
  • *****
  • Posts: 3794
« Reply #31 on: <01-15-11/1209:59> »
Actually yeah whats everyone's Metatype? I'm Human but a technomancer

Boer_Kommando

  • *
  • Omae
  • ***
  • Posts: 435
« Reply #32 on: <01-15-11/1215:05> »
BBCode1d6.hits(5)=0, 1d6.hits(5)=0, 1d6.hits(5)=0, 1d6.hits(5)=0, 1d6.hits(5)=0, 1d6.hits(5)=0, 1d6.hits(5)=1, 1d6.hits(5)=1

Got two hits, but also two 1's out of 8 dice, dont believe I glitched so I guess I keep my chauvanism in check....for now

I'm Human and Japanese, so pretty much ill disposed towards metas and women

Chrona

  • *
  • Prime Runner
  • *****
  • Posts: 3794
« Reply #33 on: <01-15-11/1220:23> »
Composure tests a target 3 Boer =X
and next time you can type 8d6.hits(5)

Boer_Kommando

  • *
  • Omae
  • ***
  • Posts: 435
« Reply #34 on: <01-15-11/1224:52> »
only need 1 hit by the prejudice chart in Runners Companion page 108

and waiting on bartender'ess before I go further (but, i'm pretty sure Sent is waiting on late join to game), but i might come back to her after an intro.
« Last Edit: <01-15-11/1227:07> by Boer_Kommando »

Chrona

  • *
  • Prime Runner
  • *****
  • Posts: 3794
« Reply #35 on: <01-15-11/1227:15> »
Ah no problem then

Sentinemodo

  • *
  • Prime Runner
  • *****
  • Posts: 4498
  • Prepare for the worst - surprises will be pleasant
« Reply #36 on: <01-15-11/1323:18> »
<...>
So I'll ask for his access ID and System rating

Not on my watch Chrona :/
Quote
Au thorization and Au thentication
In order to allow you access to anything beyond a public account, the
node must be given three things. The first is your access ID, which
is automatically given when you log on. Second, the node must have
your access ID associated with an access level/account privileges (for
example, your soycaf dispenser will have your access ID on a list that
shows that you have an admin account on its node); this is called authorization.
Third, you must have some way of proving you are the
person who has the authorization in question; this is authentication

p. 225

It is the same way as in modern web. You go to a page (node) and you see what is published. You don't automaticaly gain ability to see who is logged, whats are their access id (logins), is tracing or anything if it is not publicly publishing it.
You need to authenticate as an user/security/admin.
If you authenthicate as a owner (Boer in this example), using his accessId and password you'll be granted his rights, if he is smart enough he will have other more secure account for admin access. (most people don't, two passwords are more to rememeber than one, and people are lazy)

So, until you hack yourself in as user/security or admin you matrix perception allow you to see standard cube within Pueblo Matrix area traingulated to position in denim club that happens to be commlink of certain human. and you can judge it is firewall rating 3 based on your experience, (matrix perception), default sculpture, had you critted, you might have guess with close to certainity that this kind of firewall sculpture is usually built upon NovaTech Navi OS. It could have been Iris Orb as well as they form 90% of the OSes at this rating.
Sorry for a small delay ;)

Denver Missions
concluded 01 02 03 04 05 10 09 11
running 13
runners: Caretaker Jerry

Sentinemodo

  • *
  • Prime Runner
  • *****
  • Posts: 4498
  • Prepare for the worst - surprises will be pleasant
« Reply #37 on: <01-15-11/1327:41> »
And one more thing - until they actively log into Matrix, and move their icons out of their commlink nodes, I don't think (and lets make it as rule until changed) you can perceive their access.id.
 
Sorry for a small delay ;)

Denver Missions
concluded 01 02 03 04 05 10 09 11
running 13
runners: Caretaker Jerry

Chrona

  • *
  • Prime Runner
  • *****
  • Posts: 3794
« Reply #38 on: <01-15-11/1333:57> »
Theres a problem there. You can spoof without hacking an account, just need the access Id, which it says you can get from matrix perception.
Your rules forbid spoofing.

Quote
Before you can spoof, you must have an access ID from which the
target accepts commands. This can be done by finding an authorized
user in the Matrix and making a Matrix Perception test on her icon to
get her access ID.
Anniversay page 236

If in active or passive I can see your icon. As it's your presence in AR, not a node. Nodes I need to hack, spoofing is different.

Quote
If you wish to specifically examine an ARO, users, programs, IC,
nodes, files, etc., take a Simple Action to Analyze Icon/Node (p. 229).
Make a Matrix Perception test using your Computer + Analyze program
(rather than Perception + Intuition). Your hits determine how
successful the examination is. For each hit scored, you can ask for one
piece of information about the object—this could be type, rating, alert
status, or any other pertinent information; a list of possible details you
could gather from a Matrix Perception test can be found in the Matrix
Perception Data sidebar.
Anniversary page 228

Aslong as he isn't running stealth

I posted the table before but here it is again.

Quote
This is a list of possible pieces of information you can ask about icons and
nodes when you use Matrix Perception. It is a representative list, but not an
exhaustive one.
Access ID of a user or independent agent
• Alert status of node
• Edit date of a file
• Function of a control icon
• Hidden access to another node
• Matrix damage taken by icon
• Presence of a data bomb
• Programs run by persona or agent
Rating of one Matrix attribute
• Type (file, user, agent, program type, etc.)
• Whether a file or node is encrypted
• Whether a Trace is running
Anniversary page 228

Chrona

  • *
  • Prime Runner
  • *****
  • Posts: 3794
« Reply #39 on: <01-15-11/1335:24> »
If theyre in active or passive they -are- logged on to be showing their sin etc

Chrona

  • *
  • Prime Runner
  • *****
  • Posts: 3794
« Reply #40 on: <01-15-11/1341:07> »
Okay I'm not sure anymore after reading

Quote
Spoofing
When hacking is too slow, or you only need to send a single command to a
device, then spoofing is your weapon of choice. Spoofing a node or device
sends a forged command, ostensibly from an authorized user, to the target.
The target of a spoof attempt must either have a Pilot rating or be
a peripheral device. Most often you will spoof a drone or an agent, but
you may also use spoof to do things like unlock doors, get free cab rides,
and make the McHugh’s autocooker prepare your soyburger exactly
the way you like it.

I hate Matrix rules.



I can still get the attribute info though atleast

Sentinemodo

  • *
  • Prime Runner
  • *****
  • Posts: 4498
  • Prepare for the worst - surprises will be pleasant
« Reply #41 on: <01-15-11/1349:53> »
It is the node (commlink) that is on active/passive/hidden. The icon is the user WITHIN the node. When you're outside, you see nothing.
If you can read their SIN, it is because they made the node (commlink) to broadcast it.

If they venture out form their commlink by subscribing to other node such as Denim club node, or Denver master node you can see their icons. Mainly becuase those nodes are set to publish all visiting icons to simplify interaction on both R/AR/VR level.

or at least that is how this will work this game, until I'll convince myself other way. It does not limit you really anyway. You should have no problems hacking simple commlinks.
 
Sorry for a small delay ;)

Denver Missions
concluded 01 02 03 04 05 10 09 11
running 13
runners: Caretaker Jerry

Chrona

  • *
  • Prime Runner
  • *****
  • Posts: 3794
« Reply #42 on: <01-15-11/1352:23> »
Okay I'll leave it for now., I can get theier attributes though

Sentinemodo

  • *
  • Prime Runner
  • *****
  • Posts: 4498
  • Prepare for the worst - surprises will be pleasant
« Reply #43 on: <01-15-11/1418:12> »
Just for the kicks lets try hacking one of the commlinks on user level so you could see other icons.
that would require Hacking + Exploit (3, Complex Action) ET
the Boer commlink system will roll (Firewall 3 + Analyze 5) (4 - your stealth, Complex Action) ET

it is completely OOC just to test the numbers
Sorry for a small delay ;)

Denver Missions
concluded 01 02 03 04 05 10 09 11
running 13
runners: Caretaker Jerry

Sentinemodo

  • *
  • Prime Runner
  • *****
  • Posts: 4498
  • Prepare for the worst - surprises will be pleasant
« Reply #44 on: <01-15-11/1421:30> »
i'm pretty sure Sent is waiting on late join to game.

correct, but not for long, I'm itching to get thing moving :D
Sorry for a small delay ;)

Denver Missions
concluded 01 02 03 04 05 10 09 11
running 13
runners: Caretaker Jerry