Welcome! These forums will be deactivated by the end of this year. The conversation continues in a new morph over on Discord! Please join us there for a more active conversation and the occasional opportunity to ask developers questions directly! Go to the PS+ Discord Server.

May 29 - The Mesh - Feedback Thread

12 posts / 0 new
Last post
AdamJury AdamJury's picture
May 29 - The Mesh - Feedback Thread
This is the feedback thread for the The Mesh chapter, updated on May 29th. It can be downloaded as part of the EP2 Open Playtest at: http://bit.ly/ep2playtest We are getting down to the wire for this playtest. This is likely to be the final update to the Eclipse Phase Second Edition playtest. At this point, core mechanics and major features are locked down. Things to look for: • Numbers and terms that are inconsistent or seem off-base with each other (IE: a number/rule/term was updated in one chapter but not in another, or a number in text that contradicts a table). • Unclear wording or explanations, typographical mistakes. • Rules that are easily exploitable that lead to un-fun game situations, characters mechanically hogging the spotlight, etc. • Places that should have cross-references (“p. XX” references) to other sections but do not OR vice-versa — places that seem to have excessive cross-refs. Please exercise restraint in back-and-forth posting in this thread.
CordialUltimate2 CordialUltimate2's picture
In "Simple Hacking" there is
In "Simple Hacking" there is an artifact at the end of list. "Don’t forget to use Insight pool for extra mesh actions or to modify rolls!incapacitated. If it reaches Death Rating, they are killed/destroyed."
Exurgents wanna eat your ass and you are low on ammo? Register to mobile gear catalogue at [url=http://eldrich.host]eldrich.host.mesh[/url]! ORDER NOW! FOR FREE PLASMA MINIMISSILE PACK! *explosive delivery options included
CordialUltimate2 CordialUltimate2's picture
I don't feel like Hacking
I don't feel like Hacking rules got any simpler. Still a flowchart is needed. I do not see this as big disadvantage. Mesh combat seems strange. It is suboptimal. Because it takes so many complex actions to crash something it is better to try upgrading your status to admin and then terminate the app or system defendee with privileges. Or am I wrong?
Exurgents wanna eat your ass and you are low on ammo? Register to mobile gear catalogue at [url=http://eldrich.host]eldrich.host.mesh[/url]! ORDER NOW! FOR FREE PLASMA MINIMISSILE PACK! *explosive delivery options included
ubik2 ubik2's picture
p. 4 Under Skinning "...makes
p. 4 Under Skinning "...makes it seems..." should be "...makes it seem...". Also "...making cheaply fabricated less distasteful..." seems to be missing an noun in there (or perhaps "making the cheaply fabricated less distasteful"). p. 5 Under Virtual Reality "...cut off and" seems to have been cut off. p. 6 Under Servers "may provides modifiers" should be "may provide modifiers". p. 6 Under Apps, "...that are run are your own..." should be "...that are run on your own...". p. 7 Under Mesh Terminology, the text for Operating Systems should probably be "The software that runs on a hardware device". p. 7 Under Other Links, there is an extra close quote after environments. p. 8 Under Authentication and Encryption "...and protected data..." should be "...and protect data..." (or perhaps "...and keep protected data...". p. 11 Under Scan Infomorph "it's public" should be "its public". Similarly, "it's mesh ID" should be "its mesh ID". p. 12 Under ALIs "...listed om p. XX" should be "...listed on p. XX". p. 14 Under Home Device "...but you reside on your home vice" should be "...but you reside on your home device". p. 14 Under Home Device, it sounds like you can't run an infomorph on a mote, but in the next section on Inadequate Devices, it sounds like you can (after deleting the resident ALI). p. 14 Under Distributed Infomorphs "Mesh networks makes this easy" should be "Mesh networks make this easy". p. 14 Under Distributed Infomorphs "You also acquire a degree of vulnerability..." doesn't really match the rest of the sentence. Perhaps it was intended to be "invulnerability"? p. 15 Under Meshware, the complexity for App-Lock, Auto-Erase, Copylock are all [Mod] here, but [Min] in the Gear chapter. E-Veil is [Mod/R] here and [Min/R] in the Gear chapter. p. 15 Under E-Veil it may be worth clarifying what happens with this opposed test (perhaps expanding the description on p. 11). I would assume that if the Infosec test succeeds, and the Program test succeeds by more, the scanner detects the rest of the data, but not the protected apps. If the Infosec test fails, the scanner doesn't get any data. If the Infosec test succeeds by more (possibly because Program test failed), the hidden apps are discovered. p. 18 Under Tracking by Biometrics "...Perceive If eyeballing)" should be "...Perceive (if eyeballing)". p. 18 Under Researching Public Mesh Presence "These can provide extent data" should probably be "These can provide extensive data" (possibly "extant", but awkward) p. 18 Under Tracking Ongoing Mesh Activity "...to aquiring a far..." should be "...to aquire a far...". p. 19 Under Burner Mesh Ids "...then erased, switched out..." should probably be "...then erased or switched out..." (possibly "then erased and switched out"). p. 20 Under Hacking "eponymous" isn't the right word. Perhaps "Software is a classic example of a..."? p. 21 Under Hidden (from the previous page) The phrase "ghost in the machine" does not mean hidden. It refers to the mind in mind-body dualism. In EP, this "ghost" is called the ego, while the "machine" is the morph. p. 21 Under Hidden (from the previous page) "...efforts to subvert the system" could use a reference to System Subversion on p. 26 p. 21 Under Spotted "Spotted automatically trigger..." should be "Spotted automatically triggers...". p. 23 Under Security Design "Muses typically acts..." should be "Muses typically act..." (or "A muse typically acts..."). p. 23 Under Simple Hacking "If your privileges, don't allow it..." should not have the first comma. p. 23 Under Simple Hacking, there's some problem with the last bullet point "...modify rolls!incapacitated..." (already mentioned by CordialUltimate2) p. 27 Under Sniff Traffic "...wireless tracking" should be "...wireless traffic". p. 28 Under Mesh Damage and Armor "Critical successes mean armor is ignored" - Both Actions and Combat and Game Mechanics have critical successes on an attack doing double damage. It seems like it would better to make the Mesh mechanic consistent with those. p. 28 Under Mesh Damage and Armor, there's some references to armor here, but I'm not aware of any listed source for mesh armor. p. 29 Under Damage and Infomorph Riders "i.e., falling into..." should be "e.g., falling into...". p. 30 Under Mindhack Ego "...psychosurgery takes times..." should be "...psychosurgery takes time...". p. 33 Under Admin/Cheat Actions "pre-occupied" should just be "preoccupied". p. 34 Under Ripping Sensors, the Ripper isn't included in Gear or Actions and Combat documents. The EM grenade should be called an EMP grenade to match the entry on p. 12 of Actions and Combat. p. 34 Under Clearing Sensors "Nanoswarms must be cleared with disassembler swarms". I assume this is a Spy Swarm, but based on the Gear chapter, I would expect these to be cleared by either the Guardian Swarm, or by an EMP attack. p. 35 Under Caught in the Act "bottom-run reputation" should probably be "bottom-rung reputation". Wound thresholds have an strange interaction with Distributed Infomorphs. If you take a DUR 50 morph (WT 10) and spread it across 5 devices, each of them now has a DUR of 10, and a WT of 2. At this point, you can hit each of them with 8 points of damage, leaving the morph with 20 wounds. If spread acrosss 10 devices, that's DUR 5 and WT of 1 on each. If each takes 4 damage, that's 40 wounds. Perhaps in the case of a distributed infomorph, the WT should continue to be based on the total DUR to avoid such silliness. This is mentioned on p. 14 and p. 28. Hacking tests are opposed tests, which don't generally have hard rules for what happens when both parties tie or fail. It's reasonable to assume a deadlock any time there's a tie (though it's unclear when this should trigger an alert). In the case of a double failure, should we be treating it as a deadlock or let the higher roll win? My personal preference is one of the following:
  • Nothing happens - no alert, and the action has no effect
  • The action fails, and an alert is triggered if the defender's roll was higher than the attacker's.
There's a minor issue of when the Trying Again rule takes effect. Obviously, I don't expect this to take effect in combat (if you shoot and miss, your next shot doesn't take a penalty). Perhaps it's intended to apply in the case of hacking, though. There's some merit to repeated attempts having less chance of success in that context. If that's the case, ideally the deadlock or no effect results wouldn't trigger the Trying Again rule.
DivineWrath DivineWrath's picture
ALIs and specializations. I
ALIs and specializations. I don't think specializations got enough coverage in the ALIs section. Specializations seem to be able to bypass the limits that skills have. In practice, many of the ALIs in the gear section have skills of 40 (50 with specialization) and 60 (70 with specialization). I haven't seen specialization for know skills for ALIs, but I have little reason to think they can't exist.
CordialUltimate2 CordialUltimate2's picture
Maybe some info on how to
Maybe some info on how to create ALIs? I would love to know if I can upgrade my muse with security package.
Exurgents wanna eat your ass and you are low on ammo? Register to mobile gear catalogue at [url=http://eldrich.host]eldrich.host.mesh[/url]! ORDER NOW! FOR FREE PLASMA MINIMISSILE PACK! *explosive delivery options included
Grim G Grim G's picture
2 things
1) There NEEDS to be a flowchart for hacking. There's just too many variables and last time my party tried hacking we had to take 10 to decipher the rules from the playtest. 2) How much time is spent spoofing and sniffing? It says it requires a "hacking test", but the only hacking tests with a time frame are the intrusions. Am I to assume that I can bruit-force spoof?
Xagroth Xagroth's picture
Grim G wrote:
Grim G wrote:
2) How much time is spent spoofing and sniffing? It says it requires a "hacking test", but the only hacking tests with a time frame are the intrusions. Am I to assume that I can bruit-force spoof?
Spoofing and sniffing are real, actual world techniques akin to "I pretend to be another" (spoofing) and "I overhear your conversation" (sniffing). So, it's not that you need to expend time to prepare those to execute, but the right moment to click the "execute" icon of a carefully pre-constructed (or bought, or stolen, or given) script. So for spoofing you need to get the "ID" you want to pretend to be (intrusion, retrieval, forgery), and then you do the "here are my papers" (execution, the target system asks for your ID and the test represents you having applied the stuff right). For sniffing, you simply roll for "straining your (digital) ears", so it's not that you need time to do so, you spend the time while sniffing (and a success means you catch something, while a success better than your target's means nobody connected to the "line" realizes somebody else is listening, and a botch identifies you or your position, for example).
Grim G Grim G's picture
Xagroth wrote:Grim G wrote:
Xagroth wrote:
Grim G wrote:
2) How much time is spent spoofing and sniffing? It says it requires a "hacking test", but the only hacking tests with a time frame are the intrusions. Am I to assume that I can bruit-force spoof?
Spoofing and sniffing are real, actual world techniques akin to "I pretend to be another" (spoofing) and "I overhear your conversation" (sniffing). So, it's not that you need to expend time to prepare those to execute, but the right moment to click the "execute" icon of a carefully pre-constructed (or bought, or stolen, or given) script. So for spoofing you need to get the "ID" you want to pretend to be (intrusion, retrieval, forgery), and then you do the "here are my papers" (execution, the target system asks for your ID and the test represents you having applied the stuff right). For sniffing, you simply roll for "straining your (digital) ears", so it's not that you need time to do so, you spend the time while sniffing (and a success means you catch something, while a success better than your target's means nobody connected to the "line" realizes somebody else is listening, and a botch identifies you or your position, for example).
What does this have to do with what I was saying? I just wanted to know what the time frames were and if the rules were implying they're treated like intrusion tests.
CordialUltimate2 CordialUltimate2's picture
I think that basically meant:
I think that basically meant: spoofing is 1 action of you have right credentials and sniffing is however much time your GM thinks it takes to intercept the signal you want.
Exurgents wanna eat your ass and you are low on ammo? Register to mobile gear catalogue at [url=http://eldrich.host]eldrich.host.mesh[/url]! ORDER NOW! FOR FREE PLASMA MINIMISSILE PACK! *explosive delivery options included
DivineWrath DivineWrath's picture
p. 5, LOCATION SERVICES
p. 5, LOCATION SERVICES/MAPPING In the first paragraph, it mentions "maker". Wasn't the name changed to "autocook"? p. 10, Operate Device It mentions that you can load a maker blueprint. Should be autocook. p. 12 ALIs can't default. Does this include basic combat skills like melee? Can ALIs use skillsofts? It was mentioned that they could in EP 1. p. 15, APP-LOCK It says that protected apps must be designated when installed. Can it be reconfigured later to add more apps under its protection? p. 22, FIREWALL Can you improve the firewall rating of your devices? Does buying the firewall app do this? p. 23, SIMPLE HACKING This doesn't sound very coherent:
Quote:
Don’t forget to use Insight pool for extra mesh actions or to modify rolls!incapacitated. If it reaches Death Rating, they are killed/destroyed.
p. 28, MESH DAMAGE AND ARMOR Mesh armor? Where are the rules for that? The rules only mention that it exists.
Xagroth Xagroth's picture
CordialUltimate2 wrote:I
CordialUltimate2 wrote:
I think that basically meant: spoofing is 1 action of you have right credentials and sniffing is however much time your GM thinks it takes to intercept the signal you want.
1 action for spoofing, yeah, but sniffing is not "intercept the signal" as much as "as long as you want to keep the sniffer running" (with 1 action for "instrusion" in the "secure connection"). So its both the GM and the player the ones who decide the timeframe of that (and I suggest to leave it to forks for simplicity's sake, or LAI's, being better to just plant a program and make it send logs to a burnable mesh address than to actively monitor a connection). Remember, sniffing demands to be inside the system in case of VPNs being used (so you need to get a VPN access or a physical connection to computers deemed "safely inside" and already connected).