Basic Slicing
The rules according to the core books.
Difficulty
Is determined by defenses present and sophistication of systems.
Computers Skull Uses
- Open locked doors, control elevator, and bypass security system.
- Search through files, bypass encryption, and overcome security.
- Identifying digital tampering.
- Alter a droid's programming or accessing memory.
- Recover data from damaged drives.
- Defend computer systems from attacks.
Symbol Use
- Triumphs
- Conceal any sign of your actions on a system.
- Add Challenge die to any attempts to discover your actions on a system.
- Successes
- Decrease time in activity.
- Advantage
- Find more information
- Discover systems to attack
- Detect defenses
- Despair
- +1 Boost die to an opposing slicer for all future slices against your system.
- Threats
- Boost dice to opposing slicer attempting to locate or learn about you.
Intermediate Slicing
A few additions based on the Cyphers and Masks book and my own additions.
Computers Skill Uses
These all have a default difficulty of
Average, but may be modified by circumstances.
Create passkey.
- For system that you have bypassed that requires a key.
- Requires 50 credits worth of material.
Design a training game
- You design a program that teaches a skill to be shared with others.
- Anyone who plays this for at least an hour may use a maneuver once before the end of the session to gain a Boost die for one skill check.
- Homebrew: You must select which skill the program gives a boost to when the program is created.
Encrypt data
- Your own unique encryption method to secure data.
- Each Success adds a Setback die enemy checks in this session to decrypt the data.
Improve usability
- You provide tutorials or an overlay to help others perform a computer task.
- Before the end of the session, one character can perform a Computers check as if they had 1 Rank in Computers.
Set spyware
- You may add a recording program to a system.
- Each Success can reveal the activity of one user. You must make an Average Computers check to determine what systems and files these user(s) accessed since you set the spyware up to 24 hours.
Study the programmer
- You study the programming and comments of a defeated system.
- Your next social check against the programmer of the defeated system gains +1 Boost die.
Implant malicious code
- You insert a program in a system designed to infect other connected systems.
- 1 Triumph or 2 Successes may be used to damage any devices that connect or receive data from the infected system by one level.
Spending Dice Symbols
1 Advantage
- Elegant Coding: +1 Boost to the next Computers or relevant Knowledge skill check you make during this encounter.
- Lucky Find: Nature of the data is up to the GM. Additional advantages or triumphs may be spent to indicate a particularly critical find.
2 Advantages
- Exceptional Performance: +1 Boost or -1 Setback to relevant check sometime during this session.
- Quick access: +1 Advantage to all future checks on this same system during this session.
3 Advantages
- Covering My Tracks: +2 Setbacks to any check to detect your actions.
- Familiar Code: Remove any number of success on current check and add them to a single Computers or relevant Knowledge skill check later in the same encounter.
- I Don't Recall Over Owning a Droid: When reprogramming a droid you reboots it and erase all it's memories. It now views you as it's master. You gain +1 Success to Leadership checks to command this droid.
1 Triumph
- Any of the Advantage results above.
- I Own This System: Downgrade the next check made with this system in this session.
- Pre-Wipe Memories: You find a fragment of a droid's memories that were wiped, it provides mission relevant information.
- High-Speed Connection: Reduce time to retrieve and download data by 50%.
1 Threat
- Incomplete Data: +1 Setback to one check the GM chooses related to the information you gain later in the session.
- That's Not Right: The droid you attempt to reprogram can only move in a small circle or spin in place for the rest of the encounter.
2 Threats
- Critical Error: +1 Threat to all checks to operate this computer or direct this droid.
- Overload: Electrical feedback causes the droid you are working on to suffer 1 Strain, if you are a droid you also suffer 2 Strain.
3 Threats
- Cascade Failure: The computer crashes and ceases to function for the rest of the encounter or scene. Additional threats or despairs means the failure is far more serious and affects connected systems.
- Lost Skill: The droid you are working on loses a rank in one skill. (Cannot be used on PC or NPC droids unless 2 Despairs are spent)
- Total Wipe: +1 Threat to gain information from this computer system until it is repaired, it is considered Moderately Damaged.
1 Despair
- Any of the Threat results above.
- (Successful check) Got It! (I think...): The rest of the encounter you suffer 1 Strain each time you fail a check involving this computer and each time the GM uses Threats to give you strain you suffer double.
- (Successful check) Tripped Security: +2 Boosts to checks to detect the PCs and +2 Setbacks to Stealth checks the PCs make to stay hidden in the facility.
- (Failed check) Angry Droid: The droid activates and attacks with destructive ferocity.
- (Failed check) Hard Crash: A computer you or an ally owns crashes and burns. It is considered Majorly Damaged and the repair difficulty is increased for each Despair spent.
Slicing Encounters
Rules from Cyphers and Masks that further define rules.
Slicing Signatures
Every slicer leaves behind a unique trail. These digital clues can be used like fingerprints to identify and counteract their actions.
You gain +1 Boost to checks to trace or any opposed checks against that slicer for each fragment of a signature.
A complete signature has 4 fragments.
A slicer can replace their equipment to gain a new signature. If they replace a part of their equipment they replace 2 fragments. If they replace all of their equipment their entire signature is changed.
System Security
- Simple: Unsecured/passcode known
- Easy: Cantina terminal, datapad
- Average: Civilian shipboard computer
- Hard: Local HoloNet hub, military base/starshipsnetwork, most government/criminal networks
- Daunting: Imperial datavault, regional HoloNet hub, crime lord's private network
- Formidable: Ancient archive, military flagship/command HQ network
- +1 Setbacks: for each rank System Administrator has of Defensive Slicing.
- +1 Difficulty Upgrade: for each rank System Administrator has of Defensive Slicing if he also has Improved Defensive Slicing.
Slicing Actions
Access System (Variable)
- If there is no security or you have authorized access this is a simple check. If it has security you must make a check against the appropriate difficulty.
Disable Security Program (Variable)
- Difficulty based on System Security type.
Activate Security Program (Average Check)
- While a Security Program is active intruders cannot perform the following Slicing Actions.
Enact Command (Variable)
- Variable difficulty check that does does something based on the computer.
Expel User (Opposed)
- Opposed Computer's checks. If you win, enemy slicer loses access to the system. If you have identified their signature, they increase the difficulty of their checks to access this computer by 2, until the end of the encounter.
Lockdown (Hard)
- Shut down system from access from all users. Physical access, average check and 1 hour is required to restart.
Trace User (Opposed)
- On a success, you learn your opponent's physical location, a portion of the the user's signature, the user's actual identity (such as military rank or assigned unit), or a full list of the cations the other user has taken on the system this encounter.
Spending Dice Symbols
1 Advantage
- Opportunity Identified: +1 Boost die to your next Computer's check in this system.
- Unexpected Find (Intruder Only): You find unrelated data that may prove useful. You may spend advantages to make that data more useful.
2 Advantages
- Temporary Bypass (Intruder Only): +2 Boost dice to one future check to slice the system.
- Cover the Tracks (Intruder Only): +1 Setback to identify your signature by other slicers.
- Signature Spotted (Defender Only): You gain a portion of an intruder's slicing signature.
3 Advantages
- Spread Decoys: +2 Setback dice to use Expel User or Trace User against you. Threats or Despairs generated in your opponent's roll can be used to generate false information.
- Permanent Backdoor (Intruder Only): You may perform a future Access System action as a maneuver and without a check as long as you have a connection.
- Telltale Sign (Defender Only): Downgrade difficulty of your next check to use the Expel User or Trace User action for each portion of the target's slicing signature you possess.
1 Triumph
- Any of the Advantage results above
2 Triumphs
- Scripted Command (Intruder Only): The next time you perform the Enact Command action this encounter, you may resolve 2 commands instead of one.
- Custom Encryption (Defender Only): Increase the difficulty of an action an intruder has already attempted by 2.
1 Threat
- Evidence of Presence: +1 Boost to checks to acquire your slicer signature.
- Authorized Access Only (Intruder Only): +1 Setback to your next computer's check in this system.
- Dummy Signature (Defender Only): Add +1 Setback to your next computer's check against an intruder.
2 Threats
- Limited Access (Intruder Only): The defender chooses one slicing action that you cannot perform next round.
- Accidental Backdoor (Defender Only): The intruder may +2 Boost dice on one future check to slice this system.
3 Threats
- Major Alert (Intruder Only): All users with full access to the system become aware of you as an intruder.
- Encryption (Defender Only): You lose all fragments of the intruder's signature.
1 Despair
- Any of the Threat results above
- (Successful check) Literal Footprints (Intruder Only): +1 Setbacks to hide your physical location.
- (Successful check) Fried Gear: One item you are using becomes damaged by one level.
- (Failed check) Closing the Door (Intruder Only): If you are using a backdoor, that access has been shutdown.
- (Failed check) Got the Full First Name: The opponent slicer gains two fragments of your slicing signature.
2 Despair
- Automatic Lockdown (Intruder Only): The whole system shuts down as if the slicer successfully performed the Lockdown action.
- Key Vulnerability (Defender Only): The intruder may immediately perform a command as if they successfully performed the Enact Command action.
Advanced Slicing
Completely new mechanics for more complex encounters.