I ran my first game last night and it went pretty well I think.

I ran my first game last night and it went pretty well I think.

I ran my first game last night and it went pretty well I think. One thing that came up was my Hacker wanted to find the location of another player by tracing a text message they had sent. This absolutely seems to me to be something the Hacker could do. But I was at a loss for how it would work. Does it fall under the category of “there isn’t a move you just do it?” Do they need to do some limited matrix run in a telecommunications system? Should I just make a custom move for it? Thoughts?

2 thoughts on “I ran my first game last night and it went pretty well I think.”

  1. Whats the story? Was it a text intentionally made anonymously? If so, it’s going to take some work – hacking into a telco data server for account information for instance in a world where all communications is tracked by some sort of account, or hacking into a Prism-like server that tracks traffic flow, because a message has to originate somewhere – may not tell him exactly who it was, just where they were when the message was sent. UNLESS it was another hacker who was covering his tracks…

Comments are closed.