Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revision |
trix_traps [2022/04/13 10:58] – jack | trix_traps [2024/03/20 18:24] (current) – Crosslinking as suggested in Discord. bloodninja |
---|
This will be a dump of various bits and pieces of undocumented decking knowledge. | This will be a dump of various bits and pieces of miscellaneous decking knowledge. |
| |
1. Canonically the Matrix requires a subscription to use. Because you're a fly-by-night shadowrunner who refuses to pay the corps their nuyen, not that you have a SIN to pay with, *any* intrusion into the Matrix is considered a hostile one. This means as soon as you step foot into it the tally (alert) level begins to climb. | Alternative representation and additional information is also available at the [[houserules#decking|houserules]] article. |
| |
2. Analyze host is not the only analyze action you can perform. As it turns out there are subsystems and built-in IC to hosts. You have to analyze the sybsystems to get it. Analyze files analyzes the files subsystem, and analyze slave detects for slaved programs and hosts. Hosts can have their own File subsytems and Slave subsystems, which can not only protect and encrypt host data, but also dump you into different locations if triggered. Decrypt file(s?)/decrypt slave is how you untangle that mess. It also shows trapdoors this way and you can find them/take them manually, and there are possibly hidden nodes around that require this. | 1. Canonically the Matrix requires a subscription to use. Because you're a fly-by-night shadowrunner who refuses to pay the corps their nuyen, not that you have a SIN to pay with, *any* intrusion into the Matrix is considered a hostile one. This means as soon as you step foot into it the tally (security/alert) level begins to climb. |
| |
3. Exits themselves (SANs) can be encrypted and there are several bugs on how it is documented. | 2. Exits themselves (SANs) can be encrypted and there are several bugs on how it is documented. |
* locate host blah | * locate host blah |
* -> Your search returns the address blah. | * -> Your search returns the address blah. |