Restriction Class & Access

System access is controlled by automated restriction gates, that must be bypassed to run unauthorized programs on a system.
Where a system is accessed, and the permissions associated with that method, determine the degree of system response and the time for a program to take effect.
Access Point
Description
Resistance - Stealthed
Resistance - Hostile
Upload & Run Speed
Control point
Programs triggered through the control point for the system
/3
x3
x3
Central direct
Programs triggered through a device connected directly to the control point
/2
x2
x2
Subsystem direct
Programs triggered through a device directly connected to a subsystem
Base
Base
Base
Wireless onsite
Programs triggered through a device connected through a wireless field
x2
x2
/2
Offsite
Programs triggered by a device outside the the system
x3
x3
/3
Example Exoware & Rig Programs
Programs that affect devices that do not directly interface with metahuman bodies
Common uses: maintenance, security, drone management
Program
Actions to Upload
Actions til Effect
Duration
Category
Fortune Cost
Description
Crash
2
1
Binary state
2
Force-power off the device
Shutdown
2
4
Binary state
1
Trigger a shutdown process for the device
Overclock
3
1
3 rounds
BIOS
3
Temporarily boost processing speed
Slow
3
1
3 rounds
BIOS
4
Overwhelm the processor to delay actions
Trigger
2
3
Software - simple
2
Upon learning this program, pick 1: Alarm, door, sensor, etc.
Trigger the devices predefined action (such as an alarm)
Error out
3
1
5 rounds
Software -simple
3
Upon learning this program, pick 1: Alarm, door, sensor, comm, etc.
Prevent the device from running any predefined actions (such as an alarm)
Enhance capability
2
4
3 rounds
Software - simple
2
Upon learning this program, pick 1: Aim, speed, firewall, stealth, etc.
Improve the devices thresholds by 2, or dice pools by 3 for these actions
Hinder
2
4
3 rounds
Software - simple
3
Upon learning this program, pick 1: Aim, speed, firewall, stealth, etc.
Decrease the devices thresholds by 2, or dice pools by 3 for these actions
Alter runbook
3
5
3 minutes
Automations
2
Upon learning this program, pick 1: Sensor, drone movements, etc.
Adjust the actions or timing of an automated process (such as a drone's loop)
Summon sprite
1
3
Automations
1
Send ping to all inhabitants in the system
Example Bioware Programs
Programs that manipulate bioware devices.
Common uses: medicine, extreme sports, security
Any unauthorized program run on another's bioware is Banned restriction by default. Unless you have access to the control point, bioware resists at 1 further resistance level.

Dependency hardware

Many bioware programs affect specific hardware performance. These programs can be uploaded to any device, but will fail to trigger on devices that do not have the required hardware.

Multi-target programs

By default, the base program cost and effects apply to the program when cast on a single target. Additional single targets can be affected with additional successes.
Programs can be instead cast on a system, affecting all applicable targets within the sub-system. Area of effect programs cost an extra success for local system, double successes for subsystems, and quadruple successes for the full system.
Program
Time to Upload
Time to Effect
Duration
Category
Fortune Cost
Description
Crash
2
1
Hardware -Binary state
2
Force-power off the device
Shutdown
2
4
Hardware -Binary state
1
Trigger a shutdown process for the device
Overclock
3
1
3 rounds
BIOS
3
Temporarily boost processing speed
Slow
3
1
3 rounds
BIOS
4
Overwhelm the processor to delay actions
Trigger
2
3
Software - simple
2
Upon learning this program, pick 1: shoot, jump, hit, etc.
Trigger the devices predefined action (such as a weapon shooting)
Error out
3
1
5 rounds
Software -simple
3
Upon learning this program, pick 1: shoot, jump, hit, etc.
Trigger the devices predefined action (such as a weapon shooting)
Enhance capability
2
4
3 rounds
Software -simple
3
Upon learning this program, pick 1: Aim, speed, firewall, stealth, etc.
Improve the devices thresholds by 2, or dice pools by 3 for these actions
Hinder
2
4
3 rounds
Software -simple
4
Upon learning this program, pick 1: Aim, speed, firewall, stealth, etc.
Decrease the devices thresholds by 2, or dice pools by 3 for these actions
Ambidexterity
2
1
5 rounds
Software - simple
2
The target gains proficiency in actions on their off-side
Biofeedback
2
2
Sensor?
4
Sensor
Example Data and Systems Programs
Programs that affect data and automated systems within the digital space.
Common uses: Security, records, business
Data that has been changed will leave minute traces and can be identified by a perception check.
Program
Time to Upload
Time to Effect
Duration
Category
Fortune Cost
Description
Spoof camera
2
3
1 minute
Recording -Interrupt
2
Loop camera view through prerecorded content
Redirect
2
3
1 minute
Recording -Interrupt
2
Transfer stream location to secondary device
Translate
2
1
1 minute
Recording -Edit
2
Auto-translate written script to recognized language
Veil
3
1
3 rounds
Recording -Edit
4
Conceal object from appearing on sensor streams or recordings
Illusion
3
3
3 rounds
Recording -Edit
4
Add artifact to stream or recorded data
Duplicate
1
1
Data - simple
3
Upon learning this program, pick 1: Alarm, door, sensor, etc.
Prevent the device from running any predefined actions (such as an alarm)
Seek
1
6
Data - simple
2
Every time this program completes, check 1 box in data retrieval countdown
Share memory
3
6
Data - complex
3
Replicate all recorded senses of 1 minute
Seer
3
12
Data - complex
4
Analyze data for hidden or edited artifacts (use sound to predict movement, etc)
Passive Programs / Resistance
Passive programs will run actively in the background during hacking attempts. Target systems will degrade passive programs over time.
Defense programs cost 1 F
Infiltration programs cost 2 F
Program Type
Name
Effect
Stealth
Firewall
Resist being accessed
Blunt
Resist damage
Anchor
Resist being booted
Infiltration
Sneak
Hide your presence
Mask
Spoof permissions
Proxy
Hide your access point
Artifacting
Extend
Each success adds another charge of an existing program in the item
Primed
Spend 2 success to delay’s the program’s effect until a specific trigger occurs
Stabilize item
Spend 3 successes to embed a program into a technological item