NEWS

I want to run an all matrix adventure ...share your tips and ideas

  • 2 Replies
  • 2433 Views

Seras

  • *
  • Chummer
  • **
  • Posts: 107
« on: <04-03-20/1539:26> »
Hi guys,

the title says it all. I will be using 5ed rules because I have them. The one thing I will houserule is that I will not use noise. They will all meet in a van or Hotel rum and then go online. The entire thing will take place in the matrix. I not sure about marks. Should I houserule that one mark is enough ?

All characters will be either deckers or technomancers ( I told my players that, and they can disign their avatar and programms however they like).

For starters I am thinking about a classic simple datasteal. Meet the Johnson, gather info, break in and then leave.

For those who have used the matrix....any tips or recommendations.

Cheers Seras

I apologise for my posts beeing weird to read, I am fluent in english, but almost never write in english anymore :-(

Stainless Steel Devil Rat

  • *
  • Errata Coordinator
  • Prime Runner
  • *****
  • Posts: 4572
« Reply #1 on: <04-04-20/1239:20> »
Well, it's an ambitious undertaking.  However, it sounds like a very neat idea.

A potential problem is the hacking rules are designed to be fairly abstracted because usually that's a sideshow, rather than the focus of gameplay.  But it's better to start small and work up, so I wouldn't suggest any custom rules to make things more complex for the sake of engagement's sake.  Not out of the gate, at any rate.

Some key things:

Certain hosts happily issue marks to anyone who wants to enter.  The kinds of places that conduct e-commerce, for example, WANT public traffic traipsing around in their hosts. (See the example of the Seattle Public Library on pg 220, SR5).

Of course, marks only flow upstream, not downstream.  So once your runners have a mark on the host (either because it's welcoming them inside, or because they illegally hacked entrance) that does not mean they also have a mark on everything IN the host (this is a major difference from 6we, btw).  Every icon, be it a camera, maglock, or datafile, has to be individually marked (by EACH runner who intends to mess with it!)  Also note that any important/restricted/classified files should be protected by encryption (see Crack File, SR5 pg. 238) and possibly even Data Bombs. Even the Seattle Public Library is going to protect files that the mouth-breathing public isn't welcome to just download willy-nilly.

Again, the hacking rules are written in such a way that a solo hacker can reasonably get the job done.  If the whole team is going to be hacking, you might want to engineer some challenges that require teamwork.  Such as, require various hackers to each penetrate separate (but related) hosts to satisfy what are in effect two-person integrity safeguards.  For example: a system might be set up so that only "authorized" users, one each in hosts A and B, authenticate a command simultaneously in order for a data vault in Host C to grant access to a third user.

RPG mechanics exist to give structure and consistency to the game world, true, but at the end of the day, you’re fighting dragons with algebra and random number generators.

Michael Chandra

  • *
  • Catalyst Demo Team
  • Prime Runner
  • ***
  • Posts: 9929
  • Question-slicing ninja
« Reply #2 on: <04-04-20/1317:09> »
Holy crap that simultaneous button idea I can envision as a totally-badass moment.
How am I not part of the forum?? O_O I am both active and angry!