comStar Firewall alert - PhaseThrough
comStar Firewall alert - PhaseThrough
comStar Firewall alert - PhaseThrough
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
paYdata<br />
General rules for fencing paydata<br />
are found on p. 303 of SR4.<br />
Additional modifiers that apply to<br />
paydata can be found on the Paydata<br />
Street Costs table.<br />
proprietary file format<br />
Megacorporations and<br />
some national military and research<br />
institutions make use of<br />
proprietary file formats (PFF)<br />
to safeguard data not meant<br />
for release to the general<br />
public. The programs and<br />
files in PFF are for internal<br />
release only and typically<br />
are only compatible<br />
with that megacorporation’s<br />
specific software<br />
or operating systems,<br />
meaning a character can<br />
only open PFF files or<br />
run PFF programs from<br />
the same corporation that<br />
made their OS. Specialist<br />
emulator programs (or<br />
cobbled-together hacker<br />
variants of the same) can be<br />
used to open or run PFF files<br />
or programs on other<br />
OSs, with minimal<br />
data loss. Treat this<br />
program as a patch<br />
in terms of cost or difficulty<br />
of acquisition.<br />
While a company-specific OS is<br />
enough to read a PFF file, hackers need<br />
to activate the correct software modules<br />
in the OS to create or edit a PFF file. If the<br />
character has a valid corporate SIN that matches the maker of the OS,<br />
this requires a successful Logic + Software Test; a character without a<br />
valid corporate SIN requires a successful Hacking + Edit (3) Test.<br />
Pistons has downloaded a PFF datafile from a<br />
Renraku system. Unfortunately, Pistons is running<br />
Novatech Navi as her OS and can’t read the file directly.<br />
Normally she would have to find and download<br />
a Renraku PFF reader program, or else write her own.<br />
Thankfully, Pistons still has an older commlink running<br />
Renraku Ichi—she can just send the file over to that commlink<br />
and read it from there. Of course, if she wants to<br />
edit a few details and save it, she’ll have to activate the<br />
software modules first.<br />
certified data<br />
Matrix users can choose to certify any file by burning<br />
it to a certified datachip; all other copies of the file<br />
Unwired<br />
on the user’s system are deleted automatically during this process.<br />
Certified datachips include an integral log of when a file is created,<br />
accessed, copied, and edited. This log is carried over to any copy of<br />
the data made from the certified datachip. Attempting to edit the<br />
log typically corrupts the data irreparably.<br />
The log on a certified datachip can be wiped without corrupting<br />
the data with a successful Hacking + Edit (4) Test.<br />
tHe forger’S art<br />
Since nuyen in circulation are constantly being tracked and<br />
monitored, the only way to counterfeit nuyen is to copy an existing<br />
certified credstick. This requires a certified credstick with a positive<br />
balance, an empty certified credstick (called a blank) of the same<br />
type in which to place the illicit cred and an Extended Forgery +<br />
Edit Test (see the Forgery Table for Interval and Threshold). For<br />
every 5,000 nuyen or part thereof the character is attempting to<br />
counterfeit, apply a 1 die penalty to the Forging Test.<br />
Kat o’ Nine Tales has a certified credstick for 6,000¥<br />
and decides to copy it. A visit to her local and above-board<br />
bank gets her a blank, and she connects the two credsticks<br />
to her commlink and gets to work. Kat has Forgery 3<br />
(Credstick Forgery +2) and a Rating 4 Edit program, and<br />
she receives a 2 dice penalty for the amount of nuyen on the<br />
credstick, so she rolls seven dice. She decides that the rating<br />
of her forgery will be 2, making the threshold 48. In twenty<br />
days, Kat manages to accumulate the hits she needs and now<br />
has two certified credsticks: one with 6,000¥ in real nuyen,<br />
and a Rating 2 forgery with 6,000¥ in fake nuyen.<br />
When the character attempts to transfer the counterfeit<br />
nuyen (either to an online bank account or when making a<br />
purchase), make an Opposed Test between the rating of the counterfeit<br />
nuyen and the rating of the verification system (typically<br />
1–6). If the counterfeit wins, the system accepts it as genuine; if<br />
not, it is immediately flagged as counterfeit, the transaction aborts,<br />
and local authorities are <strong>alert</strong>ed. Ties are ruled in favor of the verification<br />
system.<br />
Kat uses her fake credstick to pay her 300¥ bar tab at<br />
Aces. The rating of the forgery is 2, and Aces has a Rating 2<br />
verification system. Rolling for her character, Kat’s player<br />
scores a 3 and a 6; the gamemaster rolls a 2 and 4 for<br />
the verification system. Looks like Kat’s faux cred passes<br />
… this time.<br />
forgerY taBLe<br />
forgery threshold interval<br />
Fake Corpscrip (Rating x 20) 1 day<br />
Fake Game Credits (Rating x 16) 1 hour<br />
Fake License (Rating x 16) 1 hour<br />
Fake National Currency (Rating x 18) 1 day<br />
Fake Nuyen (Rating x 24) 1 day<br />
Fake SIN (Rating x 32) 1 week<br />
Simon Wentworth (order #1132857) 9<br />
95<br />
hacker’s handbook . . . . . . . . . . . . . . . . . . . . . . . . . .