I ran my first game last night and it went pretty well I think.

I ran my first game last night and it went pretty well I think.

I ran my first game last night and it went pretty well I think. One thing that came up was my Hacker wanted to find the location of another player by tracing a text message they had sent. This absolutely seems to me to be something the Hacker could do. But I was at a loss for how it would work. Does it fall under the category of “there isn’t a move you just do it?” Do they need to do some limited matrix run in a telecommunications system? Should I just make a custom move for it? Thoughts?

I feel like I read the answer to this once but I cannot for the life of me find it in the book.

I feel like I read the answer to this once but I cannot for the life of me find it in the book.

I feel like I read the answer to this once but I cannot for the life of me find it in the book. Am I corect that when a corporate clock hits midnight some serious shit goes down and then afterwards it drops back to empty?