Shadowrun Play > Rules and such

SR6 CRB 3rd print: Cyberdecks and RCCs

<< < (2/4) > >>

Xenon:

--- Quote from: Stainless Steel Devil Rat on ---If the Rigger's PAN is subordinated to the Hacker's PAN, then the rigger's persona and drones are protected by the hacker's ...
--- End quote ---
This edition talk about four basic roles.

Arcane Specialist (magicians, shamans, conjurers, sorcerers etc), Face (griefers, social skills and charisma, social infiltrators, leaders, con-artists etc), Street Samurai (muscle, augmented warriors, physical adepts, etc) and Technology Specialist (hackers, drone operators, transporters, mechanics, engineers, etc).

A lot of teams will probably only have one of each.



--- Quote from: Stainless Steel Devil Rat on ---...riggers have the option to run their drones wireless-off while under autopilot control, or while connected via data cable tether.  That automatically trumps any remote hacking/detection without needing a sleaze attribute...
--- End quote ---
Is that something that the rigger supplement will expand upon? Because nothing of this is really mentioned at all in the core book...
   


--- Quote from: Stainless Steel Devil Rat on ---There's a new mechanic for riggers to do some rigger-appropriate hacking without needing A/S stats.  Flipping traffic lights, stealing control of drones, that kind of stuff.  But it still won't let them steal a hacker's thunder and hack a host.
--- End quote ---
Nice!



--- Quote from: Stainless Steel Devil Rat on ---Mechanically, that's pretty much how it is now.  Nothing's stopping you from owning both an RCC and a cyberdeck.  You just can't use them both at the same time in the same persona.  Rigging? Run your RCC.  Time to hack? Reboot, come back online with cyberdeck+some other D/F device.
--- End quote ---
That is how we currently run it as well :)

Stainless Steel Devil Rat:

--- Quote from: Xenon on ---
--- Quote from: Stainless Steel Devil Rat on ---If the Rigger's PAN is subordinated to the Hacker's PAN, then the rigger's persona and drones are protected by the hacker's ...
--- End quote ---
This edition talk about four basic roles.

Arcane Specialist (magicians, shamans, conjurers, sorcerers etc), Face (griefers, social skills and charisma, social infiltrators, leaders, con-artists etc), Street Samurai (muscle, augmented warriors, physical adepts, etc) and Technology Specialist (hackers, drone operators, transporters, mechanics, engineers, etc).

A lot of teams will probably only have one of each.
--- End quote ---

The aforementioned mechanic also has a consideration for allowing a rigger to run silent as if they had a good sleaze attribute, which would allow a hacker-less team to still let the (prepared) rigger stand in as a poor-man's hacker when it comes to protecting the team's PAN.

Finstersang:

--- Quote from: Stainless Steel Devil Rat on ---
--- Quote from: Finstersang on ---Itīs certainly a good thing to put the kibosh on RCC/Cyberdeck networks. Else, RCCs would be mechanically superiour sources for DF Attributes, program slots and general utility (although Cyberjacks also got a nice boost by officially granting Initiative DICE now).
--- End quote ---

Yeah, the bonus dice for VR init ought to really cause cyberjacks to look more attractive.

--- End quote ---

Hell yeah! They can even be an attractive choice for wheelman/dronejockey Riggers that prefer the thrill of jumping in and doing shit themselves. Instead of buying multiple Drones, an RCC and Autosofts, you put your nuyen into a Cyberjack, a better Control Rigg and just 1-2 fully decked out Drones or Vehicles.

And probably a good Doc Wagon Contract, because you will get nosebleed a lot  ::)         


--- Quote from: Stainless Steel Devil Rat on ---   

--- Quote from: Xenon on ---Perhaps we will get some electronic warfare and hacking-esc actions in the rigger supplement. It already seem to be intended that you can spoof commands to enemy drones from your RCC (its not an action that is linked to sleaze or attack so you perhaps technically don't need a cyberdeck here) at least as long as you also have the cracking skill (as you can't default to cracking). Maybe we will get more of that.

--- End quote ---

Indeed you will.  There's a new mechanic for riggers to do some rigger-appropriate hacking without needing A/S stats.  Flipping traffic lights, stealing control of drones, that kind of stuff.  But it still won't let them steal a hacker's thunder and hack a host.

--- End quote ---

Looking forward to it. An alternative/expanded version of Trace Icon would be appreciated. IMO the thematically fitting Anti-Hacker measure for a Rigger would be to trace the Hackerīs location and send a few fast-flying drones over. Right now, you need to hack any target first to make a Trace possible.

Stainless Steel Devil Rat:

--- Quote from: Finstersang on ---Looking forward to it. An alternative/expanded version of Trace Icon would be appreciated. IMO the thematically fitting Anti-Hacker measure for a Rigger would be to trace the Hackerīs location and send a few fast-flying drones over. Right now, you need to hack any target first to make a Trace possible.

--- End quote ---

Well, there is a "pinpoint signal" action which does the same thing as trace, without having to spot/gain access.  However, it's only used to locate the source of an ECM/Jamming field.  But if someone's jamming your drones, knowing where to send a good blast is still useful...

But if a hacker is messing with you without jamming you, yeah dealing with them in their home turf (the matrix) is an uphill battle.  Supposed to be that way, if you're not also a hacker yourself!

Finstersang:
Yeah, I know. Likewise in 5th Edition, you needed 2 Marks on a target for a proper trace - 1 Mark short of the one you get from a failed sleaze action. Itīs one of these "Scissor beats Scissor" things, just like mages being the best/only countermeasure against magic.

Not much of a fan of this philosophy, at least not to such degrees. Maybe Iīll adapt that new "pinpoint signal" action to be also usable shortly after a (failed/noticed) hacking attempt. Iīd argue that counter-tracing a hacker isnīt really so much about beating them on their turf (i.e. the matrix) and more about getting the chance to pull them back into yours (i.e. the real world with real bullets).

Navigation

[0] Message Index

[#] Next page

[*] Previous page

Go to full version