Editing Savage Shadowrun AE Conversion
Warning: You are not logged in. Your IP address will be publicly visible if you make any edits. If you log in or create an account, your edits will be attributed to your username, along with other benefits.
The edit can be undone.
Please check the comparison below to verify that this is what you want to do, and then save the changes below to finish undoing the edit.
Latest revision | Your text | ||
Line 713: | Line 713: | ||
As wireless information can be stolen with enough skill, effort and technology, a great deal of sensitive information may not be available via the Matrix but instead is hosted in isolated or Closed Network within an on-sight Network. It’s for this reason that a Decker must often accompany a team to the physical location to get access to the really good info. | As wireless information can be stolen with enough skill, effort and technology, a great deal of sensitive information may not be available via the Matrix but instead is hosted in isolated or Closed Network within an on-sight Network. It’s for this reason that a Decker must often accompany a team to the physical location to get access to the really good info. | ||
====The Dark Matrix==== | ====The Dark Matrix==== | ||
− | In the 2060's the Matrix has a number of illegal 'dark networks' | + | In the 2060's the Matrix has a number of illegal 'dark networks' where deckers and hackers (and a few technomanchers) hang out and exhange information. |
− | If one has the right contacts ( | + | If one has the right contacts (especially via the Connected Edge) you might also access the various information available on the 'Dark Web' (called Shadow Hosts in Shadowrun), Depending on the Shadow Host (how secrative and illegal are they) it can take a Matrix Search skill check at -1 to -4 (or Research skill check but with an additional -1 to -2) and 1d6 minutes (for low end illgal hosts) to 1d6 days (for the most illegal and well connected hosts) to find one of these sites. |
− | + | ||
− | |||
Line 733: | Line 732: | ||
First step is to seek out the data files. This requires a Browse or Search skill check (minus the Tier's Firewall) and 1d6 Actions times the Tier Firewall. I.e. a Orange Tier Host that is not on alert would imposse a -3 penalty to the Decker's Matrix skill or program and would take 3d6 rounds to located it (if the decker knows what he is looking for. Just random data search double the time required). | First step is to seek out the data files. This requires a Browse or Search skill check (minus the Tier's Firewall) and 1d6 Actions times the Tier Firewall. I.e. a Orange Tier Host that is not on alert would imposse a -3 penalty to the Decker's Matrix skill or program and would take 3d6 rounds to located it (if the decker knows what he is looking for. Just random data search double the time required). | ||
+ | |||
+ | As wireless information can be stolen with enough skill, effort and technology a great deal of sensitive information may not be available via the Matrix but instead is hosted in isolated or Closed Network within an on-sight Network. It’s for this reason that a Decker must often accompany a team to the physical location to get access to the really good info. | ||
=== Device and Network base Security === | === Device and Network base Security === |