Nocturne V.2
A World of Darkness Sim
COMPUTER HACKING
There is no -simple- hacking task. The hacking system has been designed to simulate the process of hacking as much as possible. It's easy to access a device as a user remotely, its a little harder to have -more- access than the user. Hacking is no -simple- feat, so deserves its own special page. On this page you will learn all you need to hack a characters personal devices.
HACKING is NOT a quick process, it is usually used to deep dive files, communications and the like. It's information the Hacker wants. Not mundane security control. Any cat burglar can overcome these obstacles, a hacker can, but generally they aren't going to be busting open vaults quicker than a Larceny expert. (See intrusion feat to see if maybe there's an easier way to over come a security measure)
​
SUPER COMPUTER /TRINARY COMPUTER/FETISH COMPUTER.
-
ALL Shrek.net Nosferatu have access to Super computers.
-
ALL Second Inquisition (and by extension hunter conspiracies funded by them) Have access to Super computers.
-
ALL Virtual Adepts have access to Trinary Computers (no V.A would leave home without one)
-
ALL Glass Walkers have access to Fetish Computers (Generally a Weaver Spirit Inhabits it)
-
These devices do not have -statistics- other than the advantages they provide with hacking (or defending from hacking) attempts made on them.
-
The devices can not be reproduced/traded/given away. They are faction perks and only work for those they are intended for.
​
Demonic devices are immune from hacking as there is simply no actual computer system in use. Just a series of lores, rituals or demonic entities . Fortunately Demonic devices cannot hack computers either, even if they do -communicate- with them. This however is not to say computers are safe from users of demonic devices, a device with the lore of portals can bypass an electronic lock by simply opening the door regardless of how hack proof the computer controlling the door is. Any communication with demonic devices is -not- registered by the device itself. It's almost if communication is relayed to the user of a device rather than the device itself....... The trick with demonic devices disguised as a computer is not to think of it as computer at all, but rather a magical box filled with a series of lores. Many of these devices may appear to possess electronics and diodes, that's just for disguise, those electronics seldom have any meaning at all.
TLDR:
Hacking is a complex process, and it is roleplayed as such.
​
DIRECT & REMOTE HACKING
-
Direct Hacking: involves gaining access to the actual device itself in person. (You break into the office and attempt to hack the physical machine in person) Super Computers/ Fetish Computers/ Trinary computers are biometrically locked for "Direct" Hacking, you literally need the eyeball or thumb print of the owner to log on.
-
Remote hacking: involves hacking a computer via remote connection with your own device. Super/Fetish/Trinary can be hacked remotely, but only by those with computers of equivalent power.
DIRECT HACKING
​
​
​
​
​
​
​
​
​
​
​
​
​
​
​
​
​
​
​
​
​
​
​
​
REMOTE HACKING CONNECTING
​
​
​
​
​
​
​
​
​
​
​
​
​
​
​
​
​
​
​
​
​
​
​
​
​
​
REMOTE HACKING CONNECTION ESTABLISHED
​
​
​
​
​
​
​
​
​
​
​
​
​
​
​
​
​
​
​
​
​
​
​
​
​
​
​
​
​
​
​
​
​
​
​
​
​
​
​
​
​
​
​
​
​
​
​
​
​
​
​
​
​
​
​
​
​
​
​
​
​
​
​
​
​
​
​
​
​
​
​
​
​
​
​
​
​
​
​
​
​
​
​
_________________________________________________________________________________________________________________________________
​
​
DIGITAL WEB RULES
​
Actions on the Digital Web can be harder depending on your immersion type. Standard jumping feats for example will be easier for a Holistically immersed avatar (Literally they have put their meatbag in cyberspace) than someone using sensory means such as a phone.
​
​
​
​
ICON HACK (Computing)
ROLL: INTELLIGENCE + TECHNOLOGY (Computer)
One can hack icons on the digital web but one must be present on the digital web.
​
​
​
​
​
​
​
​
​
​
​
​
​
FEAT Successes Required
Inflict lag: Target suffers +1 difficulty per success rolled. 1
Boot from session: The target is booted from session. 2
MORE INFORMATION ON THE DIGITAL WEB CAN BE FOUND HERE
_________________________________________________________________________________________________________________________________
​
SECURITY SOFTWARE
Software creation is another crafting system. it is something that costs the recipient XP at the end of the day, but thankfully as its a very niche market having some Anti / Pro hack software isn't as expensive as say an Assault Rifle. Ultimately the aim of software assist is to reduce the time and difficulty of rolls defending/attacking other systems.
A word about some of those powerful computers.
If you are NOT on of those listed as having the computer type, then you don't have one, nor could you use one if you stole it or was given it.
​
-
SUPERCOMPUTERS Exist in the world of darkness and are owned by Second Inquisition or other governmental antagonistic nasties.
-
TRINARY COMPUTERS All Virtual Adepts have Trinary computers as standard piece of kit. Iteration X npc's do too.
-
QUANTUMN COMPUTERS Are immensely powerful machines created by Iteration X and Void Engineers. It is NPC only. V.A's cannot replicate.
-
FETISH COMPUTERS All Glass walkers have Fetish computers as standard piece of kit.
​
​
ACTION: EXTENDED ROLL: (Roll until you have accrued the amount of successes you desire)
ROLL: INTELLIGENCE + TECHNOLOGY (Computer)
DIFFICULTY: This depends on the device you are creating software FOR and the device you are creating the software ON.
SUCCESSES: Spend successes as indicated on the FUNCTION chart.
BOTCH: Each botch rolled during the process negates 1 success previously earned or the next success earned. Keep on going!
​
XP COST: Is for software you have permanently running on your device.
-
If you are selling your software services the "Customer" Pays the XP cost as if they were buying the buff from the site.
-
If it's a one off piece for a specific hack then when used it is gone. (no XP cost)
-
When building software for other peoples devices make sure they are able to even RUN your software. There's a lot of N/A entries on the difficulty chart which simply means the device won't be compatible with your code.
-
While a Quantum computer -could- read smart phone code, its not going to improve or hamper the quantum computer in a -meaningful- way.
-
Also note: If you plan to put backdoors on someone else's device YOU pay the cost of that function, they pay the cost of the functions that -benefit- them.
​
​
​
​
​
​
​
​
​
​
​
​
​
​
​
​
​
​
​
​
​
​
​
​
​
​
​
​
​
​
​