Since there´s an upcoming new Matrix Sourcebook somewhere in the pipeline, I think it´s a good time to open up a thread for some well-mannered (with one notable exemption…) feedback on the current state of the Matrix content. I´m coming mostly from a GM´s perspective here, but I´m also interested in feedback from the players, be they Deckers, Technomancers, AI, Riggers or other characters who interact with the Matrix in any Form. Also, if you or your table prefer to omitt the Matrix content, feel free to tell us (and, hopefully, the freelancers) why you choose to do so and what could make you change your mind.
From my perspective as a GM, I can say the following: I love the idea of the Matrix as an additional playfield and to have Deckers/Technomancers as actual player archetypes at my table. Also, while fighters, stealthers, faces and mages are more accessible to players accustomed to more traditional RPG settings, there are alyways at least some players at my tables who are more interested in the Matrix Archetypes, because these feel really unique to the setting. However, there are some general problems for me as a GM and for the players interested in the Matrix, and I want to adress them and add a few suggestions on how they can be fixed.
General Rules - Coverage and Consistency: There´s no way to get this perfect from scratch, but at some point – and hopefully, this point will be the new supplement – the numerous calls for rule clarifications need to be addressed. To list a
few examples:
- What kind of Actions (free, simple, complex, extended) are used by whom when slaving a device to another device?
- So I can share spotted Icons with other Matrix users? What Action do I need for this?
- What kind of legal methods of user authentification (Passwords, Biometrics etc.) can be employed by kommlinks, decks, devices, hosts – and can I possibly thwart them withouth actual hacking? (See Social Hacking below)
- When I pick up someone else´s commlink, deck or RCC, can I hack it to hijack their persona? If not, why?
- Can I employ multiple personas at the same time (f.i. one from an RCC and one from a Deck)? If no, why? If yes, are there any penalties?
- If I´m hacking a throwback device, do I really have to be visible in the wireless Matrix, and am I risking OS with my actions? If yes, why?
- If I have spotted the icon of a device in close proximity (100 Meters), do I also know where the device is located?
- Considering the rule that I can only find one random device with Matrix Perception at a time when looking for hidden devices: Is the „100 RFID-Chips in silent mode“-trick legit or not? Are there ways to apply a kind of filter to the perception test?
- Sooo, GOD hackers and other Security Hackers are exempt of accumulating OS. But how does the Matrix detect who is a whitehat? Can I thwart that in some way?
- The age-old question: Is a strong Jammer or other Source of Noise able to disable a commlink, deck, RCC, living persona? If (hopefully) yes, what if there´s a link-lock? (Or, god-forbidd, if the user is on a deep dive?)
These are situations and questions I
frequently encounter when GMing, and the books offer no help here. And yes, it may very well be that some of these questions are actually answered somewhere deep down in the depths of colourfull matrix fluff – but in this case, please ask yourself why I couldn´t find these crucial informations right away. Long story short: Please fix the holes in the Matrix first, and if you need to ramp up the page count for the supplement, consider a detailed FAQ. There are enough spectacular forum wars in real life
More Technomancy: This is the notable exeption to „well-mannered“ mentioned above. With all due respect: TMs are absolute garbage right now and anyone thinking otherwise deserves to be pelted with Black Ice. Preferrently frozen blackcurrant juice, but food coloring is acceptable, too. Honestly, there´s no excuse for screwing this up, either: There´s a 3-years-old, 35 pages long thread dating back to the first anouncement of the TM splatbook filled with detailed feedback and ideas (and loads of absolutely justified salt) and there´s 4th Editions
Unwired with 30+ pages of purest crunch that somehow didn´t make it into Data Trails. And if you think that some new mechanics might turn out too "broken "or that the Fading values are too low, remember that TMs currently have the same priority as an archetype with the ability to summon level 12 firedemons and making people shoot themselfes in the head just by thinking about it *Readjusts Tie*
To end the TM tirade with something positive: The balancing adjustments in Patrick Goodman´s Errata are a huge step in the right direction.
More PC Options: With all the complaints about TMs, it is often overlooked that the general Matrix crunch doesn´t offer much room for variation of playstyles as well. A few ideas that go beyond „just add some programs and call it a day“:
- More Cyberdeck Modification: Suppose a Hacker always chooses VR over AR or vice versa: Why not give him the opportunity to trade the unused functionality for, lets say, an additional Module Slot? Other candidates would include hacking via direct connections (or even hacking without direct connection!), running silently (Hell yeah! Rambo Mode!) or slaving devices.
- More Rigger Stuff: I liked Rigger 5, but I was surprised that there was so little content on the Matrix End: No new RCCs and RCC Upgrades and, most notably, no way of aiding Drones when running silently? Saving up for the new Supplement?
- More Prep Stuff: In reality, hacking is a lot of preparation. However, aside from Matrix Searches, SR5 Hackers have surprisingly few things to do in the prep phase of a run. Why not have them probe for Backdoors and other weakpoints like in 4th Edition? Alternatively, they could buy security Intel like leaked Passwords and Zero Day Exploits or hire Botnets and DOS Attacks on the black market. A good money sink for TM´s and a hard choice for Deckers who also need the Nuyen to keep their gear up to date…
More Group Interaction: From my perceptions as a GM, the biggest problem for integrating hackers into the group is not to find ways for them to help the team, but rather to find ways to keep rest of the team engaged when the hackers do their stuff instead of sitting around the table glooming at the player or playing with their smartphones (quite ironic, actually…). There should be way more opportunities – and the fitting rules – for other group members to aid the decker inside
and outside the Matrix:
- Advanced Matrix Teamwork Rules: This should be top priority IMHO. You can simply make standard teamwork rules apply here, but there would be clarification needed: Who reaps the benefit, who takes the fall when the test fails, who gets OS? Also, there should be ways for all hacker Archetypes (or at least for TMs) to aquire marks for others. Take the tech-savy street sam with you into the host to help speed up matrix searches, mark an enemy drone so your own rigger can jump into it…
- More Wiretapping fun: In Meatspace, stealthy team members already can plant Data taps to aid the hacker. However, their current use is very narrow: If the tapped device is already wireless-active, they don´t really do anything. So, how about a more advanced version of the data tap (probably requiring a hardware test to install properly) that offer additional bonuses or even the benefits of a direct connection for the team hacker? Make the dangerous act of planting physical hacking aides more rewarding!
- Social Hacking: In today´s hacking world, this is often considered to be equally, if not more effective than the codeslinging part. After all, the biggest security flaw tends to be the users. In reality, the face and the hacker would have tremendous synergy. In current SR5, not so much. For a better integration of Social Hacking, we need more detailed information on the „official“ means of matrix authentification, corporate security guidelines and probably rules/guidelines for the social tests involved. I´m pretty surprised that this wasn´t already covered in Cutting Aces…
- Deep Dives/UV hosts: These rules are obviously designed to integrate the whole group. However, I´ve yet to hear from a group to actually integrate these rules I actually like the idea, but it should be more fleshed out. What is the foundation? The subconscious of the Matrix? Why is it needed? As a backup system? Also, what kind of special Abilities can Technomancers employ in the foundation? What happens to deep divers when forcefully disconnected from the Matrix?
- Quick Hacks: Sometimes, the pacing at the table just doesn´t fit for a detailed Matrix segment. In these cases, rules for quick Hacks would be terrific. There´s already a recent thread (http://forums.shadowruntabletop.com/index.php?topic=26776.0) on this.
More GM Options: After all, GMs need some Crunch too! For me, this mostly covers Hosts and IC, since I can always adapt PC options für NPCs. Some thoughts:
- Local Hosts: If I were a corporate security counselor, I would be horrified when someone told me that the security host of the facility will be always be accessible without any noise all over the globe. That seems extremely counterintuitive to me – and also discourages hackers to go up front with the facility in question, which was a prime goal of the SR5 Matrix redesign. Local hosts with a physical location would close the gap. Just one step further would be Internal hosts that serve as pure offline data vaults. Rules would be needed for the handling of OS, foundations etc.
- Hidden Hosts: I mean, hosts have a Stealth attribute for a reason, right? Yet, no rules for Hosts running silently so far…
- Nested Hosts: To up the ante for Datastealers: Why not have Hosts inside Hosts? Rulez pls!
- Illegal Hosts: Hackers and Matrix Pirates will probably have their own Matrix hideouts by now – and they will most likely not work the same way as legal corporate hosts when in comes to GOD´s surveillance, iconography rules etc. Maybe some of them can change their address and "move" around the Matrix, f.i.
- More IC: My biggest greviance with current IC is the fact that it´s so often a big hazzle for a pretty anticlimactic outcome. When „my“ hackers gets caught up with IC, they often log out as soon as the matrix battle starts – and I am actually glad they do, because battles take time and bore out players not involved (a.k.a. the rest of the group). And if they botch the test to Mark the Host from outside, it´s just logout and retry until it finally works. Ugh. What I propose is IC that also works against attackers outside of the host and a return of passive IC. The current IC is all active IC: It has Initiative, a Condition Monitor and actively attacks players, forcing me as the GM into bookkeeping and dice battles. Also, it doesn´t do anything until after the hacker has already screwn up. Passive IC (The concept existed way back in SR3) would close this gap. Effects could include dishing out additional damage, Biofeedback, Marks and Link-Locks for screwing up tests, automated incremental GPS tracking, accelerated OS or spider traps that slow down intruders by slowing down Matrix searches...
Phew. Lot of stuff. And tbh, I´m not even finished
For some suggestions and keywords flying around my wonderfull wall of text, I already have some homebrew rules flying around. I will post them in different threads and link to them here in the near future.
Glad you stayed with me until now
What are your thoughts?
PS: It doesn´t have to be as eleborate as my initial post