Hey everyone!

Hey everyone!

Hey everyone!

I was just doing the legwork phase of a solo game I’ve been playing, and ran into a question I thought you all might be able to answer.

How does The Sprawl, or you as a GM, handle logging in to the Matrix?

Specifically, does a hacker character need to be inside the complex’s server room, for example, to be able to access the Matrix? Or, is it more like finding a transfer station like complex and hack over a network? Or hacking from home?

I’m sure it could be all the above, but I’m just curious as to how others think of this.

8 thoughts on “Hey everyone!”

  1. Not sure how you want to do it in a solo game but typically I will have corporate locations have some sort of closed network, requiring physical access to hack into. This opens up a lot of narrative possibilities that are fun. During legwork I am way more willing to do a hack from home situation so that the pace doesn’t get too bogged down

  2. Yeah, my corps sometimes have cloud backups and data transmission, but the good stuff often operates on the SneakerNet principle (about which more here at the link). The short version is that these massive files are beyond the capacity of networks to transmit or share on a network with any stability and reliability, and so are often stored and accessible only locally.

    So, essentially a console cowboy needs to be physically connected to the secure system in order to enter its localized matrix to make any changes or do any damage.

    what-if.xkcd.com – FedEx Bandwidth

  3. My group includes computer security type folks, who helped me build a framework:

    Public: This is content that anyone can get access to. Either it’s totally public / anonymous or they log in with an Echo account (the cyberpunk version of a google/facebook) which can be fake or anonymous. The real world analog is a public place, like McDonalds or the courthouse. You’ll be watched, but nothing is really hidden. You can Research if the database is appropriate to the subject.

    Insecure: Insecure systems are behind a Log In gate, but not much more. It’s like a small business’ shared server, or someone’s email. You have to get their login and then you’re in. The real world analog is breaking into someone’s house or a small business. The info you can get in an Insecure system is useful Legwork stuff. If there’s IC, it’s Blue, with maybe one Red IC program at most.

    Secure: This is where people store stuff they want to keep private, but also need to get access to easily. Secure systems might or might not be connected to the Matrix. If they’re not, they’re a secure company’s internal working files, like a police department or a research firm. You can do real damage here, or get data that’s harmful in the wrong hands. Getting at this data is like getting into a billionaire’s mansion, a high end jewelry store, or a police station. It’s hard. It’s your standard “Matrix Dungeon” with multiple nodes, IC wandering around, etc. There’s probably some hidden Black IC, and DEFINITELY lots of Red IC.

    Air Gapped: While Secure systems are always in physically secure areas, air gapped systems have a physical security barrier specifically designed to protect the air gapped system from intrusion. You have to break into a secure building, then bypass the computer room’s guards, then hack the system. You COULD always send the infiltrator in to plant a remote data tap in the system, then hack it from outside, but that adds more variables. What if someone detects the remote signal? The real world equivalent is an Oceans Eleven style vault heist.

  4. As Jon says, security depends largely on how much effort the target wants to spend securing the data… which is of course a function of how important the data is.

    So if it’s not all that confidential, it might be easily accessed from anywhere… you might need to steal some credentials, but once you’ve got them, you can run your attack from the local Starbucks. By contrast, the ultra-secret research systems might be air-gapped, completely inaccessible without physical access, and requiring much more sophisticated credentials (biometrics like brain scans or implanted access chips)

  5. In ptba style RPG Like The Sprawl is there aren’t correct answers to similar questions. Playing is unfolding the world while beiing in it. Usually the MC would ask the Hacker playbook player to answers about hacking and matrix

  6. Giuseppe Grimaudo Yes, though, because I’m making a solo run out of the game, I have come here for thoughts and ideas in place of players! =)

    Thank you everyone, great insight!

Comments are closed.