I was wondering if you need to roll for legal matrix actions like edit file.
Book is described from the point of view of a Hacker.
It does not explain how legal actions by legal users are resolved......
Do I as the owner of a file need to roll to read .... it?
There is never a test to Read a File Icon that is not Protected.
Do I as the owner of a file need to roll to ... edit it?
You as a willing Owner can choose to not Oppose your own actions.
If I give someone a mark on that file, do they have to roll?
You as a willing Owner can choose to not oppose their actions.
If not why do hackers with a mark on the file need to roll?
Because they are not really legal users, are they?
Are there rules to place a mark on a file? I see only rules for getting marks on a host or device.
Brute Force and Hack on the Fly can be used on File Icon. Not just Device Icons and Host Icons.
SR5 p. 236 Recognition Keys
The Matrix works the same way. If you can show a device or host or whatever that you have the right mark, you can go where you want to go. In Matrix lingo, “mark” is an acronym for Matrix authentication recognition key, which is part of the protocol that devices, personas, files, grids, hosts, and so on uses to identify legitimate users. Only personas may mark icons.File Icons inside a Host will defend with Host Ratings, otherwise they will be defended by Owner ratings;
SR5 p. Edit File
The defender against this test is either the host holding the file or the owner of the file (if it’s not on a host).What about other legal actions where somebody has the number of required marks?
Same thing.
How is it handled for normal workers on a host? How do they edit files they don't own? How can they get files out of an archive?
Not really covered by the rules. The rules reflect the point of view of a shadowrun decker (which can't just call up an archived file just like that - the hacker way would be to do a deep dive into the foundation).
What if a Technomancer used puppeteer to force a device to give them a mark.
A device cannot grant you a mark. Only owners can. You can puppeteer a device to do what it can normally do. Puppeteer a maglock to open up (even though you don't have marks on it), for example.
But if you puppeteer the Owner's Persona (or if you intimidated him in person, or blackmailed him, or used magic to force him, or used a con to trick him etc) to legally invite you to place your mark on one of his icons, then yes. But odds are he would be aware that he gave you the mark and he will probably take actions to revert, correct or report it to matrix security.
Well so a mage with mind control could force the legitimate user to access files and copy them into a data chip or online storage. Then the most difficult part of hacking would be to find a person with the correct access rights and get access to them. Or just force the person to give a legitimate mark to the Hacker.
This is a viable tactic, yes.
(but you might have to tie up some lose ends with this approach)
Well hacking could still be useful, but less.
In Shadowrun you will soon learn that there are almost always multiple ways to the same goal ;-)
I was thinking about the fileaccess. You could argue that having a mark on the host (which equals guest or user access) doesn't give you a mark on all files. Then you would have to use hacking to get a mark on the fly.
This is how it works in 5th edition
(Also, while talking about "files". The book is almost never just talking about a single "file" - it is almost always talking about a "File Icon" - and a "File Icon" is more like a whole directory or library or album... full of text files, spread sheets, video recordings etc that are all related and saved at one place, in one File Icon).
That might allow you to access the file without havizto roll for editing, but that would be a house rule.
In SR5 you also need to take a test to for actually copying (or editing) the File Icon.
One big reason for this is because you can be sneaky all the time up until you Crack the Protection of the File Icon (as long as you don't fail any tests that is). It is only after you successfully Cracked the Protection of the File Icon the Host will be aware of you and will have a small window of opportunity to act on you. If it was trivial (or automatic) to Copy the File Icon then there would not really be any risk involved. Trying (and often failing your first attempt!) to beat Host ratings in an attempt to down-load the File Icon while the Host is launching dangerous IC creates a heroic moment that you should think twice before you house rule away if you ask me....