20.04.2013 Views

comStar Firewall alert - PhaseThrough

comStar Firewall alert - PhaseThrough

comStar Firewall alert - PhaseThrough

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

software . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .<br />

110<br />

optionaL rULe:<br />

Freeware and Open Source Programs<br />

open Source programs<br />

Though the megacorporations are actively waging a Matrix war<br />

against the open source movement, knocking it down to a fringe<br />

phenomenon, open source programs do exist. Open source software<br />

is basically computer software whose source code is readily<br />

available under a certain license that permits users to use, change,<br />

and improve the software, and to redistribute it in modified or<br />

unmodified form. It is often developed in a public, collaborative<br />

manner, though programs originating from open source are less<br />

commonly known than their corporate counterparts that are massmarketed<br />

and heavily advertised. With the Corporate Court Matrix<br />

Authority refusing to share certain code elements of the Matrix<br />

infrastructure (hiding behind megacorporate patents for decades)<br />

with which programs are supposed to interact, corporations have<br />

effectively reduced the frequency of open source programs.<br />

In game terms, open source programs are considered legal software<br />

that can be cheaply bought with a 50% reduction in price and<br />

which have neither the Copy Protection nor the Registration program<br />

options. Open source software degrades in the same manner as pirated<br />

software, as it tends to be updated on an irregular basis.<br />

Alternatively, open source programs produced by warez groups<br />

might be traded for free or patched up more regularly, as long as the<br />

hacker character maintains a warez contact and contributes to the<br />

group. For each piece he contributes, the hacker may download a<br />

number of programs equal to the contact’s Loyalty rating.<br />

Gamemasters may further limit open source programs by ruling<br />

that certain program options are not available for these programs,<br />

by capping the maximum limits of these programs at a rating<br />

of 4, or by making the rating dependent on the warez contact’s<br />

Connection rating.<br />

freeware<br />

Freeware is copyrighted computer software that is made available<br />

for use free of charge for an unlimited time, though creators often<br />

retain control of the program’s source code for future development.<br />

In game terms, freeware programs carry the Copy Protection<br />

program option but not the Registration option and they can be<br />

acquired by player characters at no cost. Since freeware is coded<br />

on a non-profit basis, and the resources of single programmers<br />

or small programming groups are limited, freeware programs are<br />

limited to a maximum rating of 4. Freeware also degrades like<br />

pirated software.<br />

Similar to open source programs, gamemasters may further<br />

limit these programs by disallowing certain program options.<br />

aUtonoMoUS prograMS<br />

Unlike other software, agents have the unique ability<br />

to operate independently of their controlling persona in the<br />

Matrix. This sort of autonomous operation raises several issues<br />

which are addressed here. Though we refer to agents in most<br />

cases, unless otherwise noted these rules also apply to other<br />

autonomous entities such as sprites, AIs (p. 165), and e-ghosts<br />

(p. 170).<br />

Unwired<br />

node Movement and accounts<br />

For an agent to operate independently of its<br />

controlling persona, it must be loaded into a node<br />

the persona has access to. The agent logs into an account<br />

like any Matrix user (either using passcodes or<br />

exploits) and has whatever privileges that account<br />

applies. The agent’s software is actually running on<br />

this node (not on the persona’s node any more), and<br />

so counts towards the node’s processor limit (p. 48).<br />

Likewise, any other programs the agent is carrying<br />

in its payload must also be running, and so also<br />

count towards the processor limit.<br />

Like any Matrix user, the agent can access multiple<br />

nodes at once. Other nodes must be accessed with passcodes<br />

or hacked, per normal rules. The agent remains<br />

loaded on only one node, however—though it interacts<br />

with other nodes, it does not need to be copied and<br />

loaded on them. (In fact, legal unmodified agents are<br />

incapable of copying themselves in this manner.<br />

The agent may move to another node, which<br />

constitutes loading itself onto the new node and<br />

unloading itself and logging off from the old one.<br />

Rather than moving, an agent with the Replicate<br />

autosoft and without copy protection may copy itself<br />

onto another node it has accessed, spawning a new<br />

version of the agent (note that sprites, AIs, and eghosts,<br />

as “living” digital entities, are incapable of<br />

copying themselves this way). Legal and unmodified<br />

agents are not capable of copying themselves due to<br />

copy protection (moving to another node does not<br />

count as copying because the agent is erased from the<br />

previous node as part of the moving procedure).<br />

access id<br />

Unlike Matrix users, agents and other autonomous<br />

programs do not access the Matrix via a device,<br />

and so they are not assigned an access ID. Instead, each<br />

autonomous program has a built-in access ID, sort of<br />

a software serial number. This ID is used when logging<br />

into nodes and interacting with other programs, and<br />

so it may be used to track the agent’s activity through<br />

the Matrix, just like a hacker’s datatrail.<br />

An agent’s access ID may be spoofed (see Spoofing<br />

the Datatrail, p. 224, SR4), but only when it is being<br />

loaded onto a node. Once running, the access ID may<br />

not be switched, not even if the agent moves and loads<br />

onto another node (as the agent must already have accessed<br />

the new node, using its access ID in the process).<br />

copied agents and ids<br />

Note that when an agent program is copied, the access ID<br />

built into the agent is copied as well. This means that any copies<br />

of the agent will have the same access ID. This is not a problem<br />

when a hacker is running such copies simultaneously from his<br />

persona (as his access ID is used in that case), or if the copies are<br />

operating autonomously in independent nodes. If a copy tries<br />

to access a node on which an agent with the same access ID is<br />

already running, however, the node will automatically refuse ac-<br />

Simon Wentworth (order #1132857) 9

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!