Editing Savage Shadowrun AE Conversion

Jump to: navigation, search

Warning: You are not logged in. Your IP address will be publicly visible if you make any edits. If you log in or create an account, your edits will be attributed to your username, along with other benefits.

The edit can be undone. Please check the comparison below to verify that this is what you want to do, and then save the changes below to finish undoing the edit.
Latest revision Your text
Line 713: Line 713:
 
As wireless information can be stolen with enough skill, effort and technology, a great deal of sensitive information may not be available via the Matrix but instead is hosted in isolated or Closed Network within an on-sight Network. It’s for this reason that a Decker must often accompany a team to the physical location to get access to the really good info.
 
As wireless information can be stolen with enough skill, effort and technology, a great deal of sensitive information may not be available via the Matrix but instead is hosted in isolated or Closed Network within an on-sight Network. It’s for this reason that a Decker must often accompany a team to the physical location to get access to the really good info.
 
====The Dark Matrix====
 
====The Dark Matrix====
In the 2060's the Matrix has a number of illegal 'dark networks' sites where like-minded deckers and hackers (and a few technomanchers) hang out and exhange information.  
+
In the 2060's the Matrix has a number of illegal 'dark networks' where deckers and hackers (and a few technomanchers) hang out and exhange information.  
  
If one has the right contacts (Matrix Connected Edge or Contact with a Dark Matrix Decker) you might also access the various information available on the 'Dark Sites' (called Shadow Hosts in Shadowrun). Without a connections one might still find one, depending on how secreative and/or illegal the data they deal in is. This requires a Search Matrix skill check a -1 to -4 (or Research skill check but at an additional -2 skill penalty) Dramatic Task of 4 successes before 3 'rounds'. The rounds here last either 5 minutes up to one day depending again on how secrative and illegal the Shadow Host is.  
+
If one has the right contacts (especially via the Connected Edge) you might also access the various information available on the 'Dark Web' (called Shadow Hosts in Shadowrun), Depending on the Shadow Host (how secrative and illegal are they) it can take a Matrix Search skill check at -1 to -4 (or Research skill check but with an additional -1 to -2) and 1d6 minutes (for low end illgal hosts) to 1d6 days (for the most illegal and well connected hosts) to find one of these sites.  
 
+
Once you have found one the deckers then needs to 'prove their not a narc' to the other users on the Shadow Host. With contacts this is a simple Persuasion check to ask about the info available (like other Contacts). If a decker is not connected in some way then...
 
  
  
Line 733: Line 732:
  
 
First step is to seek out the data files. This requires a Browse or Search skill check (minus the Tier's Firewall) and 1d6 Actions times the Tier Firewall. I.e. a Orange Tier Host that is not on alert would imposse a -3 penalty to the Decker's Matrix skill or program and would take 3d6 rounds to located it (if the decker knows what he is looking for. Just random data search double the time required).
 
First step is to seek out the data files. This requires a Browse or Search skill check (minus the Tier's Firewall) and 1d6 Actions times the Tier Firewall. I.e. a Orange Tier Host that is not on alert would imposse a -3 penalty to the Decker's Matrix skill or program and would take 3d6 rounds to located it (if the decker knows what he is looking for. Just random data search double the time required).
 +
 +
As wireless information can be stolen with enough skill, effort and technology a great deal of sensitive information may not be available via the Matrix but instead is hosted in isolated or Closed Network within an on-sight Network. It’s for this reason that a Decker must often accompany a team to the physical location to get access to the really good info.
  
 
=== Device and Network base Security ===
 
=== Device and Network base Security ===

Please note that all contributions to RPGnet may be edited, altered, or removed by other contributors. If you do not want your writing to be edited mercilessly, then do not submit it here.
You are also promising us that you wrote this yourself, or copied it from a public domain or similar free resource (see RPGnet:Copyrights for details). Do not submit copyrighted work without permission!

Cancel Editing help (opens in new window)