20.04.2013 Views

comStar Firewall alert - PhaseThrough

comStar Firewall alert - PhaseThrough

comStar Firewall alert - PhaseThrough

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

paYdata<br />

General rules for fencing paydata<br />

are found on p. 303 of SR4.<br />

Additional modifiers that apply to<br />

paydata can be found on the Paydata<br />

Street Costs table.<br />

proprietary file format<br />

Megacorporations and<br />

some national military and research<br />

institutions make use of<br />

proprietary file formats (PFF)<br />

to safeguard data not meant<br />

for release to the general<br />

public. The programs and<br />

files in PFF are for internal<br />

release only and typically<br />

are only compatible<br />

with that megacorporation’s<br />

specific software<br />

or operating systems,<br />

meaning a character can<br />

only open PFF files or<br />

run PFF programs from<br />

the same corporation that<br />

made their OS. Specialist<br />

emulator programs (or<br />

cobbled-together hacker<br />

variants of the same) can be<br />

used to open or run PFF files<br />

or programs on other<br />

OSs, with minimal<br />

data loss. Treat this<br />

program as a patch<br />

in terms of cost or difficulty<br />

of acquisition.<br />

While a company-specific OS is<br />

enough to read a PFF file, hackers need<br />

to activate the correct software modules<br />

in the OS to create or edit a PFF file. If the<br />

character has a valid corporate SIN that matches the maker of the OS,<br />

this requires a successful Logic + Software Test; a character without a<br />

valid corporate SIN requires a successful Hacking + Edit (3) Test.<br />

Pistons has downloaded a PFF datafile from a<br />

Renraku system. Unfortunately, Pistons is running<br />

Novatech Navi as her OS and can’t read the file directly.<br />

Normally she would have to find and download<br />

a Renraku PFF reader program, or else write her own.<br />

Thankfully, Pistons still has an older commlink running<br />

Renraku Ichi—she can just send the file over to that commlink<br />

and read it from there. Of course, if she wants to<br />

edit a few details and save it, she’ll have to activate the<br />

software modules first.<br />

certified data<br />

Matrix users can choose to certify any file by burning<br />

it to a certified datachip; all other copies of the file<br />

Unwired<br />

on the user’s system are deleted automatically during this process.<br />

Certified datachips include an integral log of when a file is created,<br />

accessed, copied, and edited. This log is carried over to any copy of<br />

the data made from the certified datachip. Attempting to edit the<br />

log typically corrupts the data irreparably.<br />

The log on a certified datachip can be wiped without corrupting<br />

the data with a successful Hacking + Edit (4) Test.<br />

tHe forger’S art<br />

Since nuyen in circulation are constantly being tracked and<br />

monitored, the only way to counterfeit nuyen is to copy an existing<br />

certified credstick. This requires a certified credstick with a positive<br />

balance, an empty certified credstick (called a blank) of the same<br />

type in which to place the illicit cred and an Extended Forgery +<br />

Edit Test (see the Forgery Table for Interval and Threshold). For<br />

every 5,000 nuyen or part thereof the character is attempting to<br />

counterfeit, apply a 1 die penalty to the Forging Test.<br />

Kat o’ Nine Tales has a certified credstick for 6,000¥<br />

and decides to copy it. A visit to her local and above-board<br />

bank gets her a blank, and she connects the two credsticks<br />

to her commlink and gets to work. Kat has Forgery 3<br />

(Credstick Forgery +2) and a Rating 4 Edit program, and<br />

she receives a 2 dice penalty for the amount of nuyen on the<br />

credstick, so she rolls seven dice. She decides that the rating<br />

of her forgery will be 2, making the threshold 48. In twenty<br />

days, Kat manages to accumulate the hits she needs and now<br />

has two certified credsticks: one with 6,000¥ in real nuyen,<br />

and a Rating 2 forgery with 6,000¥ in fake nuyen.<br />

When the character attempts to transfer the counterfeit<br />

nuyen (either to an online bank account or when making a<br />

purchase), make an Opposed Test between the rating of the counterfeit<br />

nuyen and the rating of the verification system (typically<br />

1–6). If the counterfeit wins, the system accepts it as genuine; if<br />

not, it is immediately flagged as counterfeit, the transaction aborts,<br />

and local authorities are <strong>alert</strong>ed. Ties are ruled in favor of the verification<br />

system.<br />

Kat uses her fake credstick to pay her 300¥ bar tab at<br />

Aces. The rating of the forgery is 2, and Aces has a Rating 2<br />

verification system. Rolling for her character, Kat’s player<br />

scores a 3 and a 6; the gamemaster rolls a 2 and 4 for<br />

the verification system. Looks like Kat’s faux cred passes<br />

… this time.<br />

forgerY taBLe<br />

forgery threshold interval<br />

Fake Corpscrip (Rating x 20) 1 day<br />

Fake Game Credits (Rating x 16) 1 hour<br />

Fake License (Rating x 16) 1 hour<br />

Fake National Currency (Rating x 18) 1 day<br />

Fake Nuyen (Rating x 24) 1 day<br />

Fake SIN (Rating x 32) 1 week<br />

Simon Wentworth (order #1132857) 9<br />

95<br />

hacker’s handbook . . . . . . . . . . . . . . . . . . . . . . . . . .

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!