Hacking

Hack the planet. Or at least a whole bunch of stuff in it.

Many aspects of the Carbon Pink world have been digitized, for those with the right tools this can bring a variety of advantages and tools to be used at their leisure.

Player Characters with a Hackers Kit, who know where to look are able to cause mayhem in a number of ways, below are just some of the ways to use your abilities as a hacker to both help your team and hinder enemies, and keep in mind that some of these may have unforeseen effects in your games.
DMs should keep in mind that gangs, higher-level corporate employees and other enemies on their 'home turf' would have access to these systems without the need to hack passwords, so the hacking DCs have the potential to be much lower for enemies within their bases. That said, areas like underground bunkers or lost megacities that enemies could be squatting in, would have the same need to hack through security that player characters do.

The Hackers kit allows for the interaction with any nearby software in a 30 feet radius from the user, and a character is able to use their action to interact with piece of technology to attempt to hack it to cause any number of events to their advantage. A hacker's kit requires both hands to be free to be used.

Hacking DC is set by the Following:
10 + Device Size + Access Level + Security Programs

The Player then Rolls a Hacking Check:
1d20 + Proficiency(Hacking Kit) + Tech Casting Ability / DEX if No Tech Casting Ability while in the real world/ INT if no tech casting ability while in the digital realms.

Hacking DC Modifiers

Modifier

Sizes

+0

Small

+2

Medium

+4

Large

+6

Huge

+8

Gargantuan

A Device's size matters because the larger and more complicated a device, the more separate components, each of which must be accessed and worked through until you find the portions of the device that will give you full command.

Small: A communicator, a personal computer, a game entertainment system, a hacking kit, most forms of carried or held equipment, a security camera.

Medium: A workstation, a set of powered armor, most forms of worn equipment, electric scooters, the entertainment system for your average habicube, an ATM, an AC Unit, a security door, a wall or ceiling mounted gun emplacement.

Large: A motorcycle, a vending machine, a small server hub, a shopping kiosk, a store counter (including the cash register), Digital posters, Holonet terminals, most lighting systems in public areas.

Huge: A buggy, a Sense-Tank, a fabrication kiosk, most work stations involving manual labor, a long range automatic defensive device (rockets, grenades, etc), a full security checkpoint, an elevator, digital billboards inside of a megacity tower street.

Gargantuan: A truck, a heavy loader mech, the gates allowing access between economic class zones in a megacity tower, neon billboards mounted on a tower exterior, most autonomous sensor clusters mounted on the outside of megacity towers.

Modifier

Access

+2

Public

+4

Employee

+6

Specialist

+8

Executive

Access Level is a generalized measurement of what the accessibility of the device is in general, the more public, accessible, and user friendly an item is, the less secure it is. It should be noted that this also covers the basic level of protection devices are built with depending on which level of society they are built for.

Public: Any device meant to be used with an absolute minimum of fuss, such as the smart phone of anyone unemployed, a public kiosk, or a vending machine.

Employee: Any device meant to be used only by an approved, and employed, member of society, such as the cash register at a Futas & Footlongs, an office worker's workstation, the work computer loaned to an employee rather than bought with credits.

Specialist: Any device meant to be used by higher level, specialist employees who would be labelled as 'skilled labor' today, or whose jobs are considered 'elite' in some form or another without being executive level. The computers of scientists and researchers, the devices of corpo-cops, the maintenance terminals of essential tower systems are all examples of this.

Executive: The personal and work related belongings of executives, from personal items, to the servers that contain the highest proprietary data of their corporations, security systems devoted to their protection, or even the systems of places devoted to serving them.

Modifier

Security

+2

Free

+4

Basic

+6

Corporate

+8

Executive

+10

CEO

Additional security may be applied depending on the owner and purpose of the device. DMs should be cognizant that the entertainment system of an Executive will have better security than the entertainment system meant for a public area, or someone who is unemployed (As represented by the access level modifier), but that is merely to prevent someone from hacking it to prank the Executive. Far more potent would be the security on an Executive's work computer. This is where the Security Programs modifier comes into play.

Free: A Basic Free Firewall (-20 for the firewall's owning corporation), out dated technology, a simple password.
Basic: A Paid for Firewall Program (-10 for the Firewall's owning corporation), bleeding edge technology, a strong password.
Corporate: An ICE program, a personalized security monitoring program, a genetic key based password
Executive: A Black ICE program, a viral counter attack program, an uplink to a corporate spider's security consol.
CEO: A fully sapient attack AI, a quantum-mechanical hardrive that changes it's OS code mutagenically, a metamorphic password code keyed to a specific quantum frequency.

Example Effects From Hacking

The following are all examples of the sorts of things a player might do to effect their environment by hacking devices around themselves. This is meant to be a suggestion, and the DM is encouraged to reward creative uses of the environment by their players.

Sensory Denial

Area Denial

Combat

Other

Hacking in Digital Realms

Hacking is enormously more powerful while in digital realms, as it allows you to change the rules of whatever node or server you are on to a certain extent. Such actions should be carefully considered by the DM, and creating unexpected results when you 'hack' a server while within it are encouraged. More information for this can be found in the mechanical info section of Digital Realms.

<Back to Front Page