Upload
jules-van-oosterom
View
219
Download
0
Embed Size (px)
Citation preview
7/28/2019 Ends of the Matrix
1/41
The Ends of the MatrixSetting & Background
By Frank Trollman
7/28/2019 Ends of the Matrix
2/41
Table of ContentsForeword 1
What This Is and Why It Was Done ..................................... 1
Four Questions 3
Why Datajacks? ................................................................... 3
Essence: Just Do It ........................................................... 4
Minds On Sleeves: Nanoware Replacing Cyberware ....... 4
Getting the Most of your Datajack.................................. 5
Why Crime? ......................................................................... 5
A Revolution in Data Collection, a Crisis of Storage ........ 6
A Cacophony of Echoes ................................................... 7
Why Hackers? ...................................................................... 7
The Meat in the Machine: Power for Precision ............... 8
Modern Data Management: The I and the Storm ........... 8
Why Money? ....................................................................... 9
Electronic Nuyen: The Ledger in the Sky.......................... 9
Other Currencies: , $, ................................................ 10
Debits and Credits: Debt Slavery and the Credit
Spiral ............................................................................. 10
Perceiving the Matrix: Seeing It Before It Sees You 12
Reality Filters: Wheat and Chaff ........................................ 12
Augmented Reality: Information Superimposed on Life ... 12
Virtual Reality: Sense Data Replaced ................................. 13
BTL: Directly Stimulating the Brain .................................... 13
The RAS Override: Not Always Your Friend ....................... 14
The Look and Feel of Operating Systems........................... 15
Blocking out the Matrix: Full Circle .................................... 16
Hacking in a World of Perfect Encryption 17
Vaguely Decent Protection: Asymmetric Encryption ........ 17
Passing Notes: Encryption, Reception, and
Retransmission .................................................................. 18
Breaking Encryption: If You Can't Win, Cheat ................... 18
Protecting Unencrypted Data: Using Your Inside Voice .... 19
Hacking Hardware: Meat and Machine 20
Hacking A Lone Device Or Empty Network ........................ 20
Hacking An Orphan Brain .................................................. 21
Hacking An Occupied Network .......................................... 21
Intrusion Countermeasures: Don't Go In There 22
IC Can't Team Up ............................................................... 22
IC Can't Come After You .................................................... 23
Hurtful IC: Black and Gray ................................................. 23
Pseudo-IC: Halberstam's Babies ........................................ 23
The Infrastructure and Topology of the Matrix 25
High Density Signal and Low Density Signal ...................... 25
Cables and Satellites: The Spine of the World................... 25
LEO and Up ................................................................... 26
Connections ....................................................................... 26
Servers .......................................................................... 26
Wireless Communication: The Web Between ................... 27
Personal Area Networks ............................................... 27
Wireless Terrain ............................................................ 27
Growing Up Wireless: Culture and the Matrix 29
Move Your Body: Traveling in the Flesh ............................ 29
Matrix Dialects: 133+ and lol ........................................ 29
Consumer Culture: You Are What You Buy ....................... 30
Life With RFID: It's Almost Like Trust ............................ 31
Enforcing the Matrix: I Fought the Law(s) ......................... 31
A GOD from the Machine: The Grid Overwatch
Division.......................................................................... 32
WRIA: The World Recording Industry Army .................. 32
Technomancers 33
Fantasy and Science Fiction: Technomancers and
Theme................................................................................ 33
The Song and the Silence: Resonance and Dissonance ..... 34
Streams ......................................................................... 34
Networks ....................................................................... 35
Technomantic Networks and You ..................................... 36
Technomantic VR: Ride the Lightning ........................... 36
Weird Places: Resonance Nodes and Realms................ 37
7/28/2019 Ends of the Matrix
3/41
Sprites ................................................................................ 37
Artificial Intelligences and Free Sprites ...................... 38
Paragons ....................................................................... 38
7/28/2019 Ends of the Matrix
4/41
Foreword"Let's go talk to our Matrix expert and get him to do whatever it is that he does."
What This Is and Why It Was Done
The Ends of the Matrix v4.01 is a set of full replacement rules for the Matrix of Shadowrun, 4th edition. That means that these rules
are intended to be used instead of the Wireless World (SR4, pgs. 206 240) and instead of Unwired (all pages). It is not a full
replacement of Shadowrun world story, so books like Emergence and System Failure stand on their own. This piece is admittedly
quite long, but when you factor the number of pages of material that it replaces, it's not that bad.
This work is different in tone from other Shadowrun books, because the flavor text is not written in character. This book is written
with a voice directed at the players of the game, and with good reason. The matrix is an integral part of the lives of every character
in the game world from birth, and it really isn't reasonable to expect to find material that the characters would consent to read that
wouldn't make assumptions about basic levels of matrix familiarity that the players doubtlessly do not have (not living in that world)
While astral space is something that a majority of characters in 2071 have never experienced, matrix interaction really isn't. In
addition, this is a set of optional replacement rules, so the author has chosen to break the 4th wall constantly in an effort to show
the reader both how the system works and why it works that way instead of some other way. After all, the Matrix subsystem has
undergone an almost complete overwrite upwards of 9 times already (SR1, Virtual Realities, SR2, VR 2.0, SR3, Matrix 3, Target:
Matrix, SR4, Unwired), so it seems clear that the number of ways that the Matrix can be conceived of and modeled in-game is
tremendously large justifying the model here is probably necessary.
The question is raised however of why do this at all? And the answer is because I honestly am not happy with the Matrix rules as
they stand, and do not believe that they hold up to careful observation. The first insult thrown at anyone who complains about rules
(or any intellectual property) is along the lines of If you don't like it, why don't you make something better? Well, hopefully I have.
And while I lack access to a playtesting crew or editor, I don't think there are presently any giant holes in this rule set. If there are,
then that will be a shame, and I will humbly accept my plate of delicious crow.
So what precisely is wrong with the Matrix rules in SR4 such that they need to be completely rewritten from the ground up (again,for the 10th time)? Simply: the Matrix rules in SR4 do not hold up when people attempt to push them or exploit them. Even authors
of Unwired have described it as Six parts Hollywood hackers, six parts modern tech, zero parts playtesting by a powermunchkin.
And that's a shame. Fundamentally, I believe that the matrix rules need to be more solid than do the rules of other subsystems.
Unlike magic or car driving or whatever, the Matrix is predicated on the idea of the acting characters actually knowing the rules and
deliberately attempting to exploit holes in them. Hacking is about finding power exploits, so if power exploits exist in the rules it is
actually counter immersive for characters in the world to not use them.
So the basic SR4 rules contain the exploits of:
Script Kiddy (where you can wave your credstick around instead of actually having any skill to hack effectively), Hackastack (where you can benefit from having multiple iterations of hardware to bypass structural limits of personal identity), Drop-Out (where you can choose to segregate yourself from the matrix and still hack effectively despite being unhackable in
return), and
AgentSmith (where you can gain extra actual actions from your pocket book). The net result is that characters with no technicaskills at all can throw some money on the table and hack as if they were dozens or hundreds of hackers at no actual risk to
themselves or anything they care about.
That's bad, because the entire concept of a hacker entails the fact that if they could do that then they would. It is the hope that
these presented rules will not have problems like that, or that if they do that at the very least they will not produce a such perfect
storm which relegates the concept of the Matrix Specialist to the dustbin of history.
7/28/2019 Ends of the Matrix
5/41
Throughout the four editions of Shadowrun, no rule-set has been changed more dramatically nor inspired more complete house-
rules than the Matrix section. And this is unsurprising, because the Matrix touches upon something which is somewhat real
computers while at the same time living entirely in the realm of deeply speculative fiction.
But more so than that, the Matrix has always had a tremendously difficult problem with abstraction of action. That is, it is entirely
possible for the game to model every single pull of the trigger on a gun, every invocation of a spell, every turn of a car but it is not
possible to model every machine language command that flashes by a hacker. Every time you blink your eyes, a quadrillion
processes crank through to completion in the Matrix. Equations are solved, numbers added and lost, and even listing all of them that
had passed during a heart's beat would be longer than every book ever written. So actions in the Matrix have to be abstracted. Andyet, no past or current edition has had a consistent degree of approximation, which leads to painful and exploitable wrinkles in the
game system.
At the beginning, a computer system that an NPC used was modeled as a separate "room" for each arbitrary part of the computer
(I/O, Storage Memory, Graphics Card, whatever), while the computer that the PC used was modeled as a series of attributes which
modified the "Decker's" matrix icon (Where I/O was a location in NPC computers, it was an attribute in PC computers). In 4th
edition, all processor power is abstracted and programs run arbitrarily somewhere in networks. Except that you can also choose to
count specific hardware as unique networks running their own copies of programs, and then each of the networks gets to take
individual actions in the Matrix based on how many completely arbitrary divisions you've decided to have in your arbitrary computer
network.
What is presented here is not the only method to realize the Matrix. Indeed, there are literally an infinite number of ways you could
imagine it. Like Astral space, the Matrix does not exist; but unlike Shadowrun's magic, the Matrix isn't even loosely based upon
folklore. What is here is hopefully a manner of realizing the Matrix which is consistent, playable, and fun. After all, if the rules are
playable and they agree with the presented fluff to the extent that unplanned events can be extrapolated from the rules then we
can get back to what's really important: playing the game.
But before we can get some answers, we are going to need to formulate our questions.
7/28/2019 Ends of the Matrix
6/41
Four Questions Why is it that on all other nights we drink a full bodied Merlot and on this night we drink this sweet nasty stuff?
Within the game of Shadowrun the player characters drill holes into their heads in order to create a good mind/machine interface so
that they can better hack into secure computer systems while running around cyber ninja style so that they can complete espionage
missions and go back to the seedy dives that they live in and take the electronic currency that they are paid in and spend what they
don't squander on food and rent and buy black market gadgets that let them be even better at espionage and/or shooting people in
the face for money so that they can be a bigger noise in freelance crime and eventually retire to a tropical island with a Mercedes
full of cheerleaders. A lofty profession and a noble life goal to be sure, and it makes for some very nice storytelling and some
entertaining characters.
But while one can make a very good story out of just that information, it's insufficient for the needs of a role playing game. Because
while when you or I are sitting down to write a novel we can have the characters do any part of that simply by typing a sentence that
says that they do, in a cooperative storytelling game it is nowhere near that easy. A cooperative story has a world and rules and
characters have to justify their actions in reference to them. A story that I write myself could have the main character do anything at
all at whim, I can seriously write Jack-O sprouted wings and flew as easily as I could write that he bought a new commlink or hid
from a security drone. In a role playing game that shit does not fly.
Which brings us to the central four questions we have to answer about the world before we can create a rule set that could
generate that world: we have to ask ourselves why people get those data jacks. We have to ask ourselves why people can break into
supposedly secure computer systems with them. We have to ask ourselves why people who commit crimes over and over again
against the most powerful entities on the planet for a living exist at all. And finally we have to ask ourselves why someone who
breaks into and alters computers belonging to secure and powerful installations as his actual job gives an entire rat's ass about being
paid in electronic currency and still lives in a leaky apartment next to some dwarven prostitutes. Once we can answer these
questions, we can make a rule set that allows and reinforces our answers and we'll have a game that logically plays out the kinds of
stories that we intend to tell.
Why Datajacks?"It's going to be like getting a hole drilled into your head. Probably because they are going to drill a hole into your head."
What exactly a datajack is capable of has changed dramatically over the years. In 1st edition a datajack would by itself allow a
character to send and receive their entire sense data worth of information through a cable on a continuous feed. But then of course
it also cost half an Essence point to get a cellular phone in your head. Nowadays a datajack is much more limited in scope and any
device you happen to have can probably double as a cell phone if you really care. We can pretend that this all works together in
some sort of continuous march of technology from 2050 to 2070 but the truth is that the Matrix's rule system has changed
unrecognizably about 7 times between 1989 and the present day and the understanding of technology in general has likewise
changed. In 1989, the prospect of having a really small phone was supposed to be a big deal. And yeah, in today's world they already
make phones that are so small that they are hard to use and the novelty has really worn off. Making a phone feel "high tech" meanscombining it with other things, and thus the "phone" became an afterthought ability of a variety of devices in the 4th edition rules.
Nevertheless, people in Shadowrun live in a world where getting cybernetic enhancements is something with a real and measurable
cost. You lose Essence. This is a real problem, which could potentially even cause you to die. Also, computers can and do interact
directly with the brains of people who don't have any cybernetic enhancement at all in the world of 2071 so what exactly the
purpose of the datajack is somewhat... open for interpretation. We've made some interpretations for the purposes of this
document, but remember that this marks a core point of divergence with other Matrix writeups. For the purposes of this document,
the biggest advantage of a datajack is relative signal privacy and reliability. You can put nanopaste on your head or even your
fingertips and get the same Direct Neural Interface (DNI), you can even get the same benefits from just pointing some trodes at your
7/28/2019 Ends of the Matrix
7/41
brain. But any external devices can have the signals they send and receive to and from your brain interrupted or even intercepted by
shady types. For this reason, people who handle data that is in any way important are highly encouraged to get a data jack.
Or at least they were. In Shadowrun's current 2070s run, a lot of people have upgraded to internal commlinks. That's fine, the
mind/machine interfaces are still internal and relatively safe from shadiness. But a lot of the older stuff and the equipment designed
to interface with older people (like research scientists for example) will have inputs designed for people with datajacks. So if you
want to do espionage for a living, you probably want a datajack as well.
Essence: Just Do It"It isn't wiz at all. It's kind of shitty actually. But it is essence friendly."
Essence doesn't make any sense at all. There, I've said it. And I stand by this assessment. The datajack is and has been so
unbelievably powerful in every edition that it's really hard to justify an Essence cost for much of anything. Why would anyone get
cyberarms when they could chop their arms off (losing no Essence) and then just wear some robot arms and run them through their
datajacks? If Essence actually existed, and yet the Datajack seriously allowed you to send out any output you wanted, you're damn
skippy that people would do that sort of thing. And yet, in Shadowrun they don't. They don't for no reason. That's important.
Essence is a game balance concern, not a rational one.
Equipment Spotlight: Bone Lacing
Bone Lacing is the classic example of a piece of cyberware that costs essence for no reason. And that's fine. In the case of BoneLacing, it would be entirely "realistic" for it to cost nothing at all. Not only does it not interact with your nervous system in any
way, it doesn't even replace a single cell. Your Calcium Phosphate matrix isn't "alive" in any meaningful fashion, it's just a dead
mineral scaffold that your body happens to hang on like a fleshy coat. Even more damning, Bone Lacing actually costs more
essence when it's made out of something that is more awesome. That's absurd but it's also good game balance. You should pay
more Essence when you get a better bonus, the fact that you're replacing the same amount of stuff that isn't even your living
tissue in either case is beside the point.
And that's the point.
Minds On Sleeves: Nanoware Replacing Cyberware
"What if I just painted a picture of setting my spiritual wellbeing on fire? Isn't that enough?"
Not only do people in the Shadowrun future apparently have the ability to replace almost all DNI in their body with their datajacks,
they can potentially replace their datajacks with external devices which take advantage of their brain power with phreaking and
induction. This allows people to put on trode nets and stand inside of data stalls and connect their brains directly to the computer
without ever once getting a hole drilled into their head, without spilling even a single monad of precious bodily fluids. And yet
people still get those datajacks in 2070 for some reason.
From a world-design standpoint, people are willing to spend Essence on Datajacks essentially because whatever it is that they get
from a Datajack is better than slapping an Essence-free trode net on. If it wasn't better, it wouldn't cost Essence. That's the behind-
the-scenes metagame reasoning, which unfortunately is the real reasoning. But that doesn't make a good a story, so it is imperative
that there be an in-game justification for this. Granted, the in-game reasoning is in reality backformed from the game balance
concerns, but that doesn't mean that the characters have to know that.
We could come up with a number of reasons why this is the case, but the ones that are going to be assumed here are security and
mobility. A cybernetic interface is in fixed spatial relationship with your brain; you can turn upside down and get shaken and your
datajack will stay in. A similar treatment to a trode net is quite likely to scramble the signal for a moment even if it's taped down
pretty well. Heck, with its very low signal rating it'll be likely permanently on the fritz the first time someone throws up a jamming
field a problem which a fiberoptic cable running from your datajack to a high-signal commlink won't have. But perhaps more
importantly, anything going into your brain is going to have to be in Brain Text and in the world of 2071 that's essentially
unencrypted because anyone who matters can decode signals sent to or from a metahuman brain.
7/28/2019 Ends of the Matrix
8/41
Equipment Spotlight: Nanotrode Paste
Nanopaste trodes are a set of nanomachines that can be painted on to your body which uses the powers of induction to transfer
information into and out of your head. In many ways, it's l ike having a datajack that you never had to spend any essence for,
using very short distances and very weak signals to approximate the privacy of an internal link. However, it does also have
limitations which make true hackers openly dubious about the stuff. First of all, it's a paste on the outside of your body, which
means that the connection becomes sketchy if you're doing vigorous or stressful things. That's not a huge problem in a club scene
if extreme moshing causes your AR feed to fritz for a second or even six then you won't actually have time to get to edge the of
the pit to complain before the visuals come back. But of course when you're running through an Aztechnology compound trying
to spoof cameras in real time a few seconds of static is unacceptable. And of course, the signals involved are very weak, that's
the point, and that makes it inherently susceptible to being jammed out by magnetic fields and strong language.
But more importantly still, nanopaste is still an external system even if it is very close to the brain it is not directly connected. Any
data flying in and out is still going to be in plain brain text. Anyone with a sufficient receiver can see what your trode link is
sending you. Anyone with a sufficient transmitter can send mental commands the same as had they come from your own mind.
Getting the Most of your Datajack
"I'm tired of just radiopathically sending text messages."
The 4th edition Datajack sends and receives computer gibberish to and from your brain. And that's it. It does not allow you to
"interact" with that information in any way other than that allowed by the information itself (in stark contrast to the Datajack
descriptions in 2053, but whatever). So you can send out any text or computer commands you want, but by itself the datajack does
not allow you to receive any meaningful feedback on how your actions went over.
Having computer gibberish inserted into your brain is not always completely useless. Indeed, if that computer gibberish has already
been specifically formatted to interact properly with your brain's informational retrieval system (as is the case with a Know Soft),
then you can in fact proceed as if you had gained useful information from the impulses coming up your datajack. But that sort of
formatting is apparently so difficult that chips with Linguasofts and Knowsofts cost thousands of nuyen and people are OK with that.
Systems exist that allow whatever computer data you are interacting with to be transformed into sensory stimuli that you can
interact with in a more traditional fashion. After all, the primary visual cortex can be stimulated directly as easily as any other part of
the brain. However, this is very specifically not the preferred method of getting things done in any version of Shadowrun.Information sent in brain text is essentially unencrypted, and people with receivers can pick that up. Projecting sensory
information directly into the brain is therefore a security risk. Other people can watch what you see.Equipment Spotlight: The Display Link
People who want to really use anything other than a Know-Soft with their Datajacks are advised to get a Display Link. The display
link converts computer impulses into visual stimuli, which is plenty for most people to get their jobs done. Sure, a "real" hacker is
going to want to cut the crap and get an implanted simrig, but for the average user the ability to send brain impulses out and
literally "see" the computer returns is more than plenty.
But the thing that people are really excited about is the external display link. A person without a cybernetic DNI can still get
information sent to them with relative secrecy by skipping the entire part where the information is broadcast in brain text at thei
head and is instead encrypted right up until the point that it is displayed on the insides of the person's glasses. The person canjust plain read it, and there's no signal to intercept.
Why Crime?
"Why yes, Big Brother is watching. However Big Brother has ADHD, so I'm going to sit here drinking my soykaf like any of a billion
wage slaves are doing right now. And then Big Brother will get bored. And distracted. And then I'm going to do anything I
want."
7/28/2019 Ends of the Matrix
9/41
One of the core conceits of the Shadowrun game is that crime is possible, and that crime pays. Given the wealth of potential satellite
oversight (just look at Google Earth in 2007 imagine the law enforcement version in 2070), and the incredibly daunting task that is
cracking through somewhat decent encryption, it is entirely reasonable to project a future where getting away with any crime at all
requires some sort of elaborate social engineering to pull inside jobs that play off of secret limits of the anti-crime system. But this
isn't Minority Report or any other Phildickian setup, this is Shadowrun. And in Shadowrun: bad people shoot other people right in
the face for money and get away with it to do it again.
So here are some quasi-plausible justifications for that:
A Revolution in Data Collection, a Crisis of Storage
"I'm sorry, I seem to have misplaced my 'give-a-damn'."Throughout human history the creation of data has exceeded the capacity to store it. It starts in infancy where a babe simply doesn't
remember every single thing she sees, and it continues on through the Age of Bronze where not every conversation or every play
gets written down, and it continues today. It could very plausibly continue in the Shadowrun future and for the sake of playability
we're assuming that it does. The cameras in the world exceed the number of people who could watch them, and they collectively
generate more video footage every day than can be stored on all the world's storage media.
And that is amongst the things that makes crime possible. When you go to the bathroom, a computer is measuring the mass of your
deposit. When you flee a crime scene you're being watched by every store front you pass. But likely as not, none of that informationwill actually be saved anywhere. Some of it may be, but it quite likely isn't organized enough to actually identify you as the
perpetrator (of the crime or the leavings). More importantly, information getting deleted isn't really news. If 18 minutes are
missing or overwritten by elven pornography, that's not weird.
Furthermore remember that in the world of 2071, it is entirely possible that a "legitimate" information request from investigating
authorities will simply be refused. There's nothing in it for a Wuxing or Aztechnology subsidiary to share their security footage with
Evo security to assist in the investigation of a crime against Evo or one of its subsidiaries. Corporations, especially major corporations
are in competition, but beyond that they actually are regularly committing crimes against one another. Even showing what footage
Aztechnology has of an event would be tipping its hand to Evo and it isn't going to compromise itself that way under normal
circumstances. Further, it is in the interests of Aztechnology to make investigation and enforcement as expensive a proposition as
possible for Evo as this reduces the company's ability to compete with them in other areas. So even when data is successfully stored,there's no reason to believe that investigating authorities will ever be allowed to actually see that data which when you think
about it is a lot like that data being lost or simply not recorded in the first place.Equipment Spotlight: The Security Camera
No single device in a modern or science fiction setting causes as much paranoia (both justified and not) as the security camera.
And this should come as no surprise, for regardless of what kind of force ratios your team can bring to the party at an instant of
your choosing, the fact is that the amount of force that any particular society can bring against an individual is practically infinite
in any modern or futuristic setting (as opposed to medieval settings with barest nods to science fiction window dressing
like Warhammer 40K). So any object which promises the heavy hand of eventual retribution by the whole of society against
transgressors should be a scary thing, and indeed in Shadowrun it is.
There are three main camera setups that one must concern yourself with in the day to day criminal operations of Shadowrun: thesolitary camera; the networked camera; and the low resolution camera.
1. The solitary camera is exactly what it sounds like: it's a trid recorder that is completely self contained. It's fairly trivial tosmash it with a baseball bat or hack it into oblivion and since it's entirely self contained that's the end of any data the
recorder had on you.
2. The network camera is attached to a network, which means that destroying the device itself won't do anything at all to thetrid already recorded. It'll have to be hacked if you want to get rid of the data already stored (but good news: hacking any
part of the network will allow you to edit any of the data from any of the recorders on the system).
7/28/2019 Ends of the Matrix
10/41
3. And finally the low resolution camera takes basic video and sends it one way by low density signal to some storage systemthat may be very far away. You can do anything you want to the recorder itself and it won't do a thing to any video already
recorded and sent unless you get direct access to the storage systems (wherever they are). Fortunately for the criminally
inclined, this last type takes the kind of crappy security camera footage that we get in 2008 so the security forces who go
back and review it will have such wonderful information as two orks and a human committed this crime.
A Cacophony of Echoes
"OK. Everyone who agrees that I'm Jennifer Woodyard, raise their hand."
Your SIN, your driver's license, your home owner's insurance, your medical records, and really every other thing about you are
stored electronically in the Matrix. It's like your credit report today. And like your credit report (or wikipedia), pretty much anyone
can put stuff into the data stream at any time. You can challenge the data in court and maybe get it changed, but by and large stuff
just accumulates in the data stream. Because of the fact that things aren't always correct and some people are total tools, the
system is equipped with failsafes to try to weed out incorrect data. Data which is repeated many times in many places (or in
important or "trustworthy" places) is considered to have a high veracity. Data which shows up only a few times or in very sketchy
places is treated as having a lower veracity. If data conflicts, the system automatically chooses to believe higher veracity information
at the expense of lower veracity information.
An example of this in action might be someone getting your name wrong on a delivery of NERPS. Your name is something like Chris
McGee, but on the invoice it says Chris Maggie. Now off in the Matrix somewhere there's a little piece of data that your name is in
fact Chris Maggie. But fortunately for you, your UCAS driving license and your AzTech Tech diploma are both in your real name. So in
the future when machines check your name, the right name will have a higher veracity and displace the wrong name. The Chris
Maggie typographical error will only show up again after low intensity searches which stop after the first couple of hits. So the "Chris
Maggie" spelling may continue to haunt you for the rest of your life, getting picked up by cheap companies that purchase sales
information from NERPS distribution; gradually gaining veracity as it is passed from company to company and appearing in more and
more places in the Matrix but it probably won't.
This can be used by criminals (that's you). Because of the complete lack of a central authority of Truth, you can actually create
truths that happen to suit you. If you treat something as true long and loudly enough, everyone else will treat it the same way. While
archaic considerations like "statute of limitations" are out the window, the fact is that if you can fool the world into believing that
you've always lived in Nag Kampuchea for a while, the world will continue to believe it pretty much indefinitely. The world of 2071
has an extremely short attention span and you actually can reinvent yourself with sufficient effort.
Why Hackers?
"There are people who can sling a spell or swing a sword and I'm sure that on some level what they do is fine. But in my world, I'm
the best you'll ever see."
A core conceit of Shadowrun has always been that a savvy matrix expert is an essential member of a Shadowrunner team. That
means that the Hacker character's skills and attributes have to be important; it means that the Hacker's contribution to the team has
to matter; it means that the Hacker is not easily replaced with a contact or a device that says TraceBuster on the side. And it also
means that Hackers have to be able to be able to do their job (breaking into a secure computer system) in a reasonably short periodof time so that they don't end up making the story grind to a halt. In short, hacking has to work absolutely nothing like it works right
now in 2008. There are of course a tremendously large number of ways that hacking could work in 2071, but almost all of them are
inconsistent with the story demands we have put on the system: hackers must be resource starved hooligans living in seedy dives
who hack things on the fly during ninja assaults. Any of the many realistically plausible models that involve the be all and end all of
the hacking race being very large sums of money, or of hacking taking very long times, or of hacking being done from a basement in
Formosa are all incompatible with the stories we want to tell, and are thus not going to be incorporated into the speculative fiction.
In short: possible mechanics and topologies that lead to that are wrong irrespective of considerations of actual physics and
computational theory.
7/28/2019 Ends of the Matrix
11/41
The Meat in the Machine: Power for Precision
"Can I run some of these programs on your sister? She's like a little porcelain doll."
How powerful are the computers in Shadowrun? Very powerful. But exactly how powerful has never really been explained. And
honestly, it shouldn't be. Computing is very fast, very accurate, and very awesome. But for whatever reason, human brains are still
employed as an important adjunct. This is itself not particularly surprising. The human brain is in total capable of over 100 trillion
computer instructions every second. That's an amount which is, quite frankly, ridiculous. It's a very, very large amount of processor
power, and although a tremendous amount of it is being "wasted" in subconscious thought about whether you'd enjoy a Blue
Donut or whatever, it still has more total processing power than any device in Shadowrun. Computers aren't really ever more
powerful than a human brain, they are more dedicated and more precise. A computer can get the same answer to a question over
and over again without ever being wrong (or creative) and that right there is its strength and its weakness.
In Shadowrun history the Cyberterminal was created in 2029 and it is established that no existing computer system could possibly
stand against someone using one. This isn't because the cyberterminal was a revolutionarily faster and more powerful computer
capable of crushing other computers with its virtual biceps (though it was), it's because the cyberterminal was cybernetic it literally
plugged into the brain of the user. And it crushed other computers not because thinking instructions is so much faster than typing
them (though it is), but because a cyberterminal actually uses part of the human's brain in its computer operations. That alone gives
it a processing reserve that is well over one hundred thousand times what a super computer was capable of when Shadowrun was
first written.
Shadowrun progressed through the existence of the cyberterminal to the cyberdeck: a portable computer which was nonetheless
able to utilize the powers of the human brain. It was the standard in 2050 and for the next 15 years it remained on the cutting edge
for Hackers. And that's where the history gets confusing. Because it's entirely possible that at some point the people in Shadowrun
managed to create something portable that was in fact more powerful than a human brain. And at that point, the human
really is just a vestigial appendage whose purpose is to press the Go button. But while that's admirably dystopic and fits into the
overall cyberpunk genre fairly well, the game still centers on the player characters who are still "just" individual humans. The
moment they become obsolete, the game is over. Not just your particular campaign, but indeed the entire game of Shadowrun. So
we're constrained to believe that in fact the human element is still vital to the operation of high end computing. That's fine, there
can be many revolutions in computing power without actually pushing the one hundred trillion computer instructions per second
threshold.
So when we get to the Commlink, the one thing we know didn't happen is that the Commlink did not replace the need for it to be
connected to a serious metahuman brain in order to orchestrate enough processing power together to do real cybercombat. We
know this did not happen because we are still playing the game.
Equipment Spotlight: The Math Subprocessor
Many people have asked why one would bother with a math subprocessor as a cybernetic enhancement. After all, a handheld
calculator has a stupidly fast and accurate look-up table for approximating trigonometric functions and you can jolly well just
hook such a function up to your datajack and get the answers to any reasonable "math" question in less time than it takes to ask
it.
The answer is that a Math Subprocessor is not a calculator that feeds you answers. It's more like a nerve staple that forces part of
your brain to perform mathematical analysis on demand. That's why it applies to things like signal jamming, it literally turns partof your brain into an incredibly powerful bio-computer slaved to the tasks you designate for it. In some ways it actually makes
you less intelligent: you are seriously using less of your brain on a moment to moment basis. But when the chips are down and
you need to extrapolate a wave function or predict the results of a three-body problem, the Math Subprocessor is your friend.
Modern Data Management: The I and the Storm
"The falling cherry blossoms symbolize both the beauty and the transience of life. The blossoms fall as men fall and remind us of
our mortality. Also every one of them is a music player I've harnessed together into a giant parallel processing computing gestalt
for the singular purpose of calculating how to make your life a little bit more transient."
7/28/2019 Ends of the Matrix
12/41
The Wireless Matrix heralds a new paradigm of computer use. Not necessarily in computer power, but in utility. In the real world of
2007 parallel processing is a difficult problem; but by 2070 it is the norm.
With so much computing power all over everything it is a wonder that anything gets done. Indeed, quite often things don't get done
simply because the instructions to do so are buried so deeply in lists of things to do that they just never get looked at.Equipment Spotlight: the Toaster
Computing in Shadowrun has reached a level of abstraction that is truly epic. The toaster on the shelf not only has a computer in
it, but it has processor cycles to spare after calculating the proper toasting methods based on the thickness and consistency of
your bread compared with your stated preferences regarding toast. Not just that it could be utilized as a calculator or day planner
while not heating bagels but that even while in use it could potentially be added to a network and contribute helpfully to the
entire operation of a network. The implications of this are far reaching: most importantly it means that the actual amount
of total processing power available to your network is both large and unknowable.
Seriously, it's unknowable. This is a boon to both the Player of the Hacker (as it means that he doesn't have to keep track of
exactly how much memory he has to play with), and to the Hacker himself (as it means that there's an unknowably large number
of ways to sneak data and access into the networks that he is infiltrating).
Why Money?
Why rob a bank? That's where the money is.Perhaps the most extraordinary claim of all in the annals of hackerdom is the idea that these people get paid in electronic currency
to break the laws of society and change electronic records. The extremity of this claim is quite apparent: people are breaking the
rules of society to change data records in exchange for being gifted with data records that according to the rules of society entitle
them to goods and services. Why not eliminate the middle man and just hack the money records directly? The fact that people in the
Shadowrun universe don't is highly indicative that they can't. And the reason for this is primarily because the monetary records
themselves are very far away.
Electronic Nuyen: The Ledger in the Sky
It is the finding of the Corporate Court that the creation of a unified currency that is itself immune to the damaging effects ofspeculation and devaluation is an essential pillar upon which the global economy must be placed.Electronic money can exist in a world where people can force the changing of electronic data from a distance by impressing it with
high density signal because it's actually really simple: it's just a number. That means all transactions of electronic money can be done
entirely with low density signal. There's nothing complicated enough going on to actually need any of the fancy processing that
Shadowrun era signaling can do, and so it lies within the capacity of those maintaining the money to block out all high density signals
and still conduct business. To hack the money supply with traditional methods would thus require one to get inside the barriers and
thus be on site. Considering that the money is kept in servers that are extremely inaccessible, this rarely happens.
The biggest reservoir of money is a series of servers maintained in Zrich Orbital, a space station which passes over the Earth at
nearly 2,000 kilometers above the seas. The money is a series of account numbers with money amounts on servers that sit inside
this well-fortified bunker floating continuously in space. These servers are connected through low density signal cable to
retransmitters attached to powerful receivers on the outside of signal shell. The externally available computers don't hold any
account information, encryption keys, or passwords, they literally just retransmit heavily encrypted (and short) data bursts into and
out of the internal server farm through a signal bottleneck. Thus ideally there is nothing whatever that an external hacker could hack
that would mean anything.
Now this doesn't mean that the enterprising hacker can't steal money, just that they have to steal it from a specific account by
getting a hold of an actual credstick or commlink and hack them to authorize the transfer of funds. However this is understandably
dangerous, because doing so still leaves a trail of money transfers on the hidden servers that the hacker is probably in no position to
7/28/2019 Ends of the Matrix
13/41
do anything about. It is for this reason, that fraud of this sort is mostly confined to spending sprees on relatively untraceable goods
and services rather than actually getting the money into one's own credit line. And thus we get back to the question of eliminating
the middle man: it is often plain easier and safer to just hack a carpet supply warehouse to think that it should deliver you some
sweet rug than it is to hack a stolen credstick to transfer money to the carpet supply warehouse and purchase the same rug with
money that may well be flagged as illegit in days, hours, or even seconds. For this reason, personal credsticks are often left to lie by
hardened criminals.
Equipment Spotlight: Cash
In addition to the purely electronic Nuyen, there are available notes and coins for use with small or informal purchases. Coins areusually issued from national mints and have a variety of imprints. They come in units of .05, .10, .20, .50, 1, and 2 nuyen. The
nuyen bills are of a variety of different colors and sizes (and in recent years, the colors have been overhauled to avoid confusion
by those metatypes who see in broader frequency ranges). They come in 1, 2, 5, 10, 20, 50, 100, 200, and 500
denominations. The bills are printed under the direction of the corporate court and generally have the portraits of free market
advocates from history. All are human men.
1 William Edwards Deming
2 Eugen von Bhm-Bawerk
5 Milton Friedman
10 Robert Mundell
20 Carl Menger
50 Keith Joseph
100 Adam Smith
200 Alan Greenspan
500 Arthur Laffer
Cash is generally avoided as a medium of exchange by corporations and wage slaves alike because it is essentially untraceable.
Very large piles of cash are viewed with suspicion even by shady people. The general feeling even amongst criminals is that
anyone who could steal themselves a very large amount of money should be able to get themselves together to get an off-shore
bank account like a respectable gangster, and that anyone who isn't a criminal should also have a bank account rather than piles
of bills that could be so easily stolen or misplaced.
Other Currencies: , $,
ZO is not the only game in town, but the others aren't super different. The Malaysian Independent Bank operates an island fortress
where they keep all the records, and while it's not actually in space it might as well be as far as most people are concerned. The
European Economic Commission operates the Euro rather than the , but its account server vault at the bottom of a mineshaft is not
especially easy to crack into either. Aztlan's secret bank is so secret that they don't even tell people what is protecting the Peso
accounts, but it's presumably pretty intense because all legends of people hacking that particular server are vague and unlikely.Debits and Credits: Debt Slavery and the Credit Spiral
Work your fingers to the bone and what do you get? Bony fingers!
An interesting thing that happens in Shadowrun is that despite the fact that the characters are getting a brand new identity several
times a month in some cases, they still feel the need to work for a living. And that's actually somewhat odd when you think about itin terms of modern finances. See in 2008 you can borrow fairly substantial sums of money at any time at merely ruinous interest
with no collateral. The threat of destroying the credit rating of your identity is considered sufficient of a stick to make these short
term loan sharking operations solvent. In 2008, identity fraud comes with a certain amount of cash money automatically. Simply by
virtue of trading the credit rating in for cash advances on loans that one has no intention of repaying, someone who is already
committing the crime of fraud on their identity can gain a steady income from sketchy banks and loan houses until one is caught for
the first offense.
And yet, in Shadowrun that manifestly doesn't happen, because the characters are perjuring their identities again and again and
they are paying money for the privilege instead of vice versa. What does this mean? It means that the credit system in Shadowrun is
7/28/2019 Ends of the Matrix
14/41
somehow set up so that taking a loan with an identity that is going to cease to exist long before the first payment comes due is not a
no brainer. In fact, it seems that taking a loan is itself so onerous that characters just are not doing it at all even though the
campaign only takes place over a short period of the character's life and thus can be looked at as being in the disposable ID situation
even if the character is a SINner. See, the campaign is likely going to end in a year of the character's life, so anything she ever has to
repay at any interest in 13 months is just flavor text in any real sense. And yet, players just don't take loans. They spend money
that they have already earned rather than drawing on the reserves of a speculative future to gain monetary advantages during the
actual game.
The primary reason for this is probably linked directly to the reason that people call corp workers wage slaves. See, when you takea loan in 2071 you don't just get a pile of money that you are expected to pay back. You actually sign up for employment and the
corp gives you an advance on your wages. Wage slaves literally are slaves. Or indentured servants. Or whatever. They work for
nothing except food and board, occasionally having the number of required work hours they are required to put in go up. And that's
why player characters don't usually take loans they would actually have to show up for work in order to get the money. Which is
really just like their current job as freelance mercenaries except less awesome.Equipment Spotlight: The Credstick
Credsticks are much less common in 2071 than they were in 2050, when literally everyone had one (or more). This is because
commlinks now do much of the work that Credsticks used to do. But one is entitled to wonder what exact it is. The answer is
that a Credstick carries a symmetric encryption key that is otherwise held only by part of a secret bank server somewhere on an
island or in space. Each credstick sends a set of encoded low density signals to the bank that authorize the bank to move a certain
amount of money from one account to another. And because no one actually knows exactly what your credstick is saying to thebank (without hacking the credstick), EUE (Effectively Unbreakable Encryption) is maintained as long as no one breaks into the
credstick itself. Lower quality credsticks simply send the signal through a stick reader and hope that it can pass through the
Matrix to the bank so that the money transfer will get authorized. Higher quality credsticks (with names like Platinum and
Ebony) are able to send the information directly to the bank themselves and are able to transfer money whether there is a stick
reader on hand or not. Most credsticks have some sort of system by which to verify that the right person is actually authorizing
transfers of funds. Passcodes, retina scans, and even blood samples are used by various credsticks.
Some credsticks send portions of the data from their activation to the bank itself as part of money transfer, while others merely
require it as a check before they send the encrypted request. A certified credstick is actually the least secure of all the stick
doesn't correspond to any specific real person, the account is just a number associated with a credstick. So anyone can hand the
certified stick to another person and that person can trade that money as if they were the original stick holder.
In modern times, people quite often make use of credit modules in their commlinks. This works pretty much the same, exceptthat the range of finding a matrix connection that is capable of reaching the (doubtless distant) secure bank servers is much
greater.
7/28/2019 Ends of the Matrix
15/41
Perceiving the Matrix: Seeing It Before It Sees
You
If I'm going to look at an ass all day, it might as well be an attractive ass.
Electronic devices are perfectly capable of putting information directly into your brain. This is at least as disorienting as it sounds,
and is hardly anyone's preferred method of getting information about what is going on in the Matrix. What most people actually do
is to have that matrix information translated into normal sense data and sent to them in some sort of format in which they can take
it in as one would take in information from any other source: by seeing, touching, tasting or in some scientific way inferring the
presence and content of the relevant data.
When actually perceived, the Matrix data can appear as literally anything, and it often does. There is no special reason that a Matrix
Attack would have to look like a sword or a pie, it could just as easily be a rubber hammer or a surrealistic floating pipe smoking
head. Any correlation between form and function is entirely voluntary because the actual things that the sensory data represents
are 1s and 0s furiously overwriting one another in a bewilderingly fast paced dance. The Arrows of ancient Egyptian gods and tasty
oatmeal is just a metaphor, and an extremely loose and arbitrary metaphor at that.
Reality Filters: Wheat and Chaff
If that pagoda is going to be so useless, I'd just assume not see it at all.The Matrix uses the brains of people connected with it all the time, but only a small portion of the data is ever converted into
something that a user is consciously aware of. With trillions of calculations made, the total number of ways that the Matrix could be
presented to a user is effectively infinite. So what is done is to have systems in place which focus on the important things and
display those to the user and then leave all other Matrix activity unreported. This system is called the Reality Filter, and absolutely
every commlink has one. Many matrix devices or activities carry with them sensory notation explaining how a potential user
should perceive them, but a good reality filter can usually disregard that and display the matrix in a metaphor that makes sense to
the user. What form one's perception of the Matrix is generally in one of three categories: Augmented Reality (AR), Virtual Reality
(VR), or Better Than Life (BTL).Equipment Spotlight: Advertising Spam
For obvious reasons, corporations would like to beam perceptions of their products in a favorable light directly into the minds of
potential consumers. However with the massive weight of corporations trying to do this all the time, the experience is actually
kind of wearying to the average person in the 2070s. This perceptive junk is collectively called spam, and people don't like it
much. Reality filters are usually set to display adverts in really small boxes or not at all, but advertisers are nothing if not clever,
and it is a constant war of oneupmanship between Reality Filter and Advertising designers to try to get you to see the latest
NERPS ad or get a decent night's sleep instead.
Augmented Reality: Information Superimposed on Life
I really do think that you look better this way.
As a cartoon hippo?Perhaps the most common way of perceiving matrix information is by having sensory cues directed into the user's sensory input as
needed while the real world is continuing to have the collected sense data perceived. These matrix sensory intrusions are called
Arrows and they can get really confusing if there is a lot of matrix activity and physical activity going on at the same time.
7/28/2019 Ends of the Matrix
16/41
This setup is called Augmented Reality and it is abbreviated AR. Classically, AR is handled in the same manner as the classic
Head's Up Display of the late twentieth century, but it technically Arrows can be handled with literally any type of sensory input.
Some hackers have been known to pipe their matrix information through touch links as a web of tappings on their body or through
audio playback as elaborate music in order to continue seeing the world unimpeded. This is still distracting, but at least you no
longer have blind spots.Equipment Spotlight: the Smartlink
The smartlink is a system which makes a bunch of calculations from ballistic, proprioceptive, and topographical data and
generates a number of Arrows that represent its findings onto the user's perception. The standard Ares interface uses a red curveto indicate predicted bullet paths from the gun's barrel as currently positioned and highlights objects which it calculates will likely
be hit with a yellow iron cross that has a clockwise portion intensified based on the likelihood of impact based on current
trajectories. Additional arrows clutter the lower right hand corner of vision with icons for what weapon is being used and a
number of stats about it including how many rounds of what type are left in the magazine and the User Experience Index for the
weapon in question (hint: you should upgrade to an Ares model to maximize your weapon user experience).
Virtual Reality: Sense Data Replaced
You can be anything you want to be. In the matrix, there are no rules.
So... why am I cartoon hippo?The next stage in perceiving the matrix is to replace all sense data from the real world with matrix Arrows. At its crudest
implementation, this literally just means that Arrows are so densely packed across one's perceptions that the input from the world
around cannot be seen at all. At its ideal, it represents a whole virtual world crafted for the user in which all Arrows are incorporated
and contextualized.
This full sensory replacement is called Virtual Reality and abbreviated VR. Distractions from physical sensory input are non-
existent barring actual physical injury, but any attempts to interact with the real world must necessarily deal with the essential total
blindness and deafness that the VR experience is based upon.
Dealing with the matrix in basic VR is called cold in 133+, a reference to the fact that there is an even more extreme way of
perceiving the matrix in the form of BTL (which in turn is known as hot). Interestingly, the same language's word for AR is n00b.A character running BTL AR is thus hot n00b.Equipment Spotlight: the Simmodule
A module is a device used for weeding out sensory distractions, allowing people to experience full VR. What it literally does is edit
out real world interactions, allowing a blank slate on which to overlay Arrows of any sense desired. Most are equipped with RAS
Overrides (Reticular Activating System) as well, editing out both sensory and motor functions for those who wish to interact
exclusively with the virtual world. Obviously, a character who already has a full cybernetic sensory suite (such as a SimRig) has no
need for a Module, because crass physical sensation can be dumped or diverted to a simsense recording for later viewing at any
time.
BTL: Directly Stimulating the BrainThe rats continuously pressed the button activating their nucleus accumbens in preference to consumption of food or water.
Cause of death is thirst.Sensation passes through a number of pathways through the body to get to the brain, some myelinated and some non. These
pathways get parsed out in various parts of the brain and eventually become consciousness somewhere on the cortex (depending
upon what kind of sensation it is). This takes some non-zero amount of time and is subject to confusion. For example, the same
nerves that carry pain reception to parts of the arm also carry it from the heart; which results in referred pain during myocardial
infarctions. And so it may come as no surprise that enterprising technicians have come up with methods to bypass all that and
7/28/2019 Ends of the Matrix
17/41
simply cause the triggering of the neurons in the brain itself as if one had already gone through all that tedious business of receiving
and parsing sensory stimuli and then interpreted it correctly. This technique is called Better Than Life because it is potentially
experienced much more extremely than anything from real sensation possibly could be. Indeed, it has no particular limitations of
intensity at all.
And that turns out to be something of a problem. Not only do people frequently find themselves addicted to the intensity of stimuli
that BTL can offer, but BTL is just plain dangerous. The signals themselves can cause damage, sometimes permanently so. The BTL
user often fails to remember to take breaks to drink, because the certainty that BTL stimulation can offer is much stronger than any
previously held notions, even ones basic and critical to survival.
BTL grade signals are illegal in most jurisdictions that have contemplated the issue at all. But of course that doesn't really stop them
from being used; the BTL loops are too fun, using BTL to perceive the Matrix is just too fast, and projecting BTL grade signals into
unsuspecting fools is just too effective. Indeed, BTL signals form the core code of many anti-metahuman attack routines, even (and
especially) those used by Black IC. So the fact that corporations mostly outlaw BTL signaling doesn't mean that they
aren't doing it.
BTL can be handled either in AR or VR. The Arrows are directed directly to interpretive cortex layers, but regular sensation does not
have to be completely removed for this to happen. Many BTL addicts simply jack into some emotive tracts and attempt to get
through their days interacting with the physical world as normally as is possible when you already feel inhumanly and inhumanely
happy or angry.Equipment Spotlight: BTL Players
The cheapest BTL decks are simply a projector set to target the interpretative portions of the brain directly. To activate one, a
person merely shuts off the BTL protections of their Firewall (assuming they evenhave a Firewall), slots a BTL chip into the player,
and then starts experiencing the magic. There's no trodes or uplink of any kind on these things, so there's no choices involved for
the user. The user watches events unfold as one might watch a movie, having no say in what they see or do. Much more
expensive and complicated systems exist of course, and there are higher grade BTLs that accept input in addition to projecting
output, and as you might expect, these are very expensive even compared to the no input BTLs (which are called rails or lines,
further confusing the drug cultures of BTL and novacoke junkies).
Most interpretive systems are not set up to send BTL into the brain, and the limitation is generally speaking a hardware one.
Quite simply, a standard display link sends things to the optic nerve, not the primary visual cortex. The hardware modificationsare easy, and can be done for you in filthy alleys by tattooed guys named stuff like Twitch and Skeeze which frankly should
be a warning sign.
The RAS Override: Not Always Your Friend
I could really go for a beer.
Really? I don't think I could.Interacting with the Virtual World is really awesome, but unfortunately it can be a bit dangerous. Especially if you are trying to
interact with the real world at the same time. And to prevent people from wandering around in the magical world of potential
coffee flavors in their minds while actually wandering around in heavy traffic, the RAS Override was developed with much rejoicing.
Essentially it's just a set of motor neuron inhibitors that prevent signals from the brain intended to influence goings on in the matrix
from causing actual motion. Like having your dopaminergic cells in your substantia nigra working overtime. Like the opposite of
having Parkinson's.
Of course, having a machine generated signal that literally prevents a person from moving or interacting with the physical world has
its own dangers. For one thing, there are times when lying inert is not the safest thing you can be doing with your body (like when
oncoming traffic is a potentially immediate threat). And for another thing, there is absolutely nothing in the world that guarantees
that the signal itself is generated legitimately. Once projected into a metahuman body, that body becomes inert regardless of
7/28/2019 Ends of the Matrix
18/41
source, and only an extreme act of will on the part of the victim can keep them from collapsing and being completely at the physical
mercy of just about anyone.
Special Note: The Reticular Activating System is in reality a primarily sensory portion of the midbrain, and it is the portion of the
brain upon which general anesthetics act. So the fact that in Shadowrun the RAS Override is the thing that prevents you from
accidentally moving while under the influence of Virtual Reality is weird. While it is posible to write in some pseudo-science about
how the RAS is a prerequisite brain function for consciousness (which it is) and that specific effects from electromagnetism projected
into that part of the brain modulate the body into a state of quasi-coma where the brain is still functional and awake while the rest
of the body is inert this is entirely a back-formation. The real reason that the RAS Override is called that is because someonethought it sounded cool and scientific back in 1988 and now we're stuck with it.Equipment Spotlight: RAS Tasers
An interesting side effect of the mere existence of the RAS Override signal creates the ability to incapacitate people at a distance
with fair reliability. The RAS Taser is simply a Sim Module that has been modified such that it merely generates a RAS Override,
and does so at a distance. This extremely simple device can be and is used in crowd control by police and prisons. Those with
strong wills and good firewalls can continue to stand and walk while under its influence, but in many cases it harmlessly
neutralizes dangerous and violent individuals, so the cops love these things. It's used by kidnappers too, and they love them as
well.
The Look and Feel of Operating Systems
The reality filters of any user are largely colored by the Operating System that they are using. It creates a perceptive metaphor by
which the user can understand what is going on and use their own actions. Many popular OSs come with default reality filters, which
create a tapestry of standardized iconography that contextualize Arrows into an AR or VR display such that they make sense to even
the most casual user. Here are a sampling of common OS that players may use:Deva A bizarre mix of hermetic and high tech imagery, the Deva operating system fills the periphery of the AR interface with a setof pull down menus in stark low res rectangles with cut-away text reminiscent of a 1980s display. Iconography stands side by side
in extremely high-res and transparent hermetic mystical symbols. These symbols can be dialed up and down out of the field of
view to present new options. The default color scheme is pale blue, pale yellow, and bright red.
Ichi Ichi is a series of floating alphanumerics in numerous languages. The actual content is unimportant as the user manipulatesthe shapes and not the content. Lines of gibberish text float down across the vision at various rates and in different columns in
order to represent various aspects of the system's connections and activities. Text boxes can be pulled out of the gibberish and
the same information is displayed by rotating and overlapping circles. Default color scheme is green. Trivia fact: most Shadowrun
material is presented in Ichi formatting.
Navi Navi is a spherical visual disturbance much like a magnifying glass. Potential AR iconography is pushed to the sides and canbe pulled towards the center where it becomes proportionally larger. Selected iconography inverts. The default color scheme is
primarily blue.
Nix Nix is a very hands off operating system. The AR display is kept generally empty save for a toolbar running along the bottom
along with an attached command line/scratch pad in the lower right hand corner. The background can be filled with pictures ifthe user desires but by default there's nothing there. The default color scheme is a shiny gray.
Orb The Orb OS is a sphere which sheds light. It can be rotated infinitely to project a beam which displays various holograms. Theintensity of the light varies as the OS is called upon to perform different actions. The Orb speaks to users in a dispassionate
monotone. The default color of the Orb is bright Red.
Xim The Xim operating system is usually characterized by a system of windows which are projected as floating around the user,each held in a three dimensional device apparently made of resin and steel. Default color schemes are purple, green, and brushed
metal. Actions are generally performed in the UI by mechanical tentacles.
7/28/2019 Ends of the Matrix
19/41
Blocking out the Matrix: Full Circle
With enough effort, equipment, and technical know how, you can block out all the adverts and flashing lights, silence all the
alarms and jingles, and live your own life.
The era when a man could roll out of bed in the morning, eat breakfast, and play with his dog all without interacting with world
events and specialty sales through the medium of electronics constantly bombarding him with sights, sounds and smells is by and
large over. But as that kind of relatively clear headspace is still desired by many, it is unsurprising that there is much effort put
into escaping the Matrix and the constant buzz that metahuman society makes in the mind.
There are basically two ways to keep Starbucks ads out of your brain: either develop some really good signal defense to cancel out
all incoming advertising before it intrudes on your person, or cut yourself off from the Matrix altogether. The latter requires you to
be out of signal range, either because you are so far away from metahumanity that high density signals don't reach, or because you
have a powerful Faraday cage surrounding you. In the 2070s a quite sizable number of people opt for one or the other, the neo-
tribal movement is very strong and even corporate wage slaves will often pay good money to rest in a matrix deprivation tank in
order to have their thoughts and dreams to themselves, if only for an hour.Equipment Spotlight: The Faraday Suit
People can, and sometimes do wrap their bodies in conductive materials, creating a Faraday Cage. As long as the mesh of
conduction is essentially unbroken in a topological sense around the entire body, the effective signal going into and out of thebody is very much reduced. This kind of behavior is acknowledged to keep out many deadly and dangerous mind altering signals
as well a providing a substantial protection against snooping in on one's thoughts. However, what this Luddite behavior
actually looks like is an empty space in the matrix chatter where a network really obviously ought to be. This means that it looks a
lot like a hacker or technomancer going all spooky hidden node on people, and that looks threatening. For this reason, most
societies prefer it if you use active Firewall based defenses (which can be quite visible to other matrix users) as opposed to
passive wall based defenses.
7/28/2019 Ends of the Matrix
20/41
Hacking in a World of Perfect EncryptionWe estimate that we can crack this faster by waiting a few years for computers to become faster and then starting the project on
the new generation of machines.Cryptography is a complex thing. But an immutable fact of it is that if you are handed a set of data that has been scrambled by a
non-repeating transformation of comparable size, that you cannot decipher it. Not it's really hard to decipher or It'll take you along time to decipher that but that in fact you simply can't do it at all. So anyone with sufficient time on their hands and dedicationto cryptographic secrecy can make a system that cannot be decrypted under any circumstances. It's called a one-time pad, and whileresource intensive it is actually unbreakable. But people generally don't really need codes that can't be broken ever, most peoplewill settle for codes that cannot be broken any time in the next hundred million years. That's the kind of time frame that even theextremely long lived are generally willing to concede that their secrets of today won't matter much once it has passed.
So while it is entirely within everyone's capacity to go out into the street, turn the microphone on super high and record randomdiscordant noise for an hour, then download that hour into their drone as an exceedingly long cypher to get an hour of unbreakablyencrypted communications between themselves and their drone the vast majority of people are willing to accept a less intensivesystem where their communications are merely unlikely to be decrypted before the sun peters out.
Most secure communications use Essentially Unbreakable Encryption (EUE), a system where the sender and the intended recipientboth have a cypher that is overlain on the messages and subsequently removed. The keys used in the 2070s are of variable length,but generally are thousands of bits long, and cannot be expected to be broken by any sort of mathematical attack. In order to attainsuch levels of security the cypher itself must have been shared at some earlier point between the intended sender and receiver, andit can of course be stolen either during the hand off or at any time that anyone has direct access to any of the computers whichstore the cypher itself. After all, EUE doesn't make the message completely illegible to anyone but the intended recipient; it makesthe message completely unintelligible to anyone who doesn't have the key notthe same thing once espionage comes into theequation.A Note on Cryptographic Realism
Real world cryptography and code breaking in 2008 revolves around incredibly intensive mathematical analysis and exploitations
of technical weaknesses and user error. This is a fascinating field and incredibly non-photogenic. This means that it's the kind of
thing that makes a very bad game, because it is almost impossible to describe the action in a way that is in any way
comprehensible or cool. I mean basically it would largely come down to people rolling some kind of dice to determine if the
security spiders or some non-security conscious user had made some bone headed mistake and then making more die rolls to see
if the player could find that mistake and exploit it. You seriously might as well flip coins to see if you win or not, because nothing
the player describes their actions as will make any difference to such a system.
In the interests of playability, the weaknesses of computers have been standardized. If you can project high density signal into a
computer, you can manipulate it on the hardware level. And if you have access to both the plain text (or brain text) and the
encrypted text version of a message you can break the code. Other weaknesses are assumed to not exist. This is admittedly and
specifically an abstraction, but it makes the action so much cooler looking and the game so much more accessible to non-
mathematicians that the sacrifice is well worth it.
Vaguely Decent Protection: Asymmetric EncryptionThe algorithms required to decrypt these things are illegal, so no one has them.Sending a message of any kind through EUE requires that both the sender and the receiver have a copy of the key. But what ifyou don't have a prearranged key, how can you communicate with any privacy? The answer is Asymmetric Encryption. Here's how itworks: There are a set of mathematical transformations based on one number that are really hard to undo unless you happen toknow a specific second number. So your Commcode gives out the first number to anyone who wants it, and then people can sendtransformed (and thus encrypted) data to you and since you have the magic second number you can reverse those changes veryeasily.
7/28/2019 Ends of the Matrix
21/41
You can also do this in the reverse order, transforming your message with the secret number and letting the receivers of themessage decrypt it with the publicly available number. While this is a fairly useless way to keep information secret, it makes a fairlydecent digital signature in that whoever sent the encrypted message must have known your personal secret number. This is thecore of how every Access ID in the Matrix is verified.A Note on Hacking: Spoofing an Access ID
The key weakness of Asymmetric Code is that by its very nature anyone who really wants to can have both plain text and
encrypted text of their choice. Simply take plain text of your choice and encrypt it with the public version and you can do math
to decrypt it out and have what is essentially the private key. Oh snap.
What this means is that the Access ID verification system of the Matrix at large is inherently weak. Anyone with the right hacker
algorithms who observes the asymmetric key broadcasting of any device can back form an essentially identical key for their own
use and then assign themselves the Access ID of that device.
Passing Notes: Encryption, Reception, and Retransmission
The paper doesn't know what is written on it, but the scribe and the reader do.In Shadowrun, an encryption scheme can be undone if one has both the encrypted and the unencrypted version of the message.This means that if one compromises the computer on either terminal end of a message relay, that the code itself is compromised.
However, merely listening to the encrypted transmission is essentially worthless. Indeed, any number of devices can be along thechain and be compromised without endangering the code in any way. Each computer can take the encrypted information and pass iton, still encrypted, without understanding or changing the data in any way. It is only when one gets to a computer that actuallycomposes the encrypted data or is intended to put the data into brain text or other usable format that a hardware compromisegives away the show.
Equipment Spotlight: the Retransmitter
A retransmitter is a neat little device, it takes signal in, and then it pumps the same signal out. It can take signal in or out through
wired or wireless channels depending upon how it has been set up (and thus can convert one type of signal to the other), and it
can be set up in hardware to transmit in high density or low density signal. Of primary use for those who want to draw their
signal LOS from a place that they are not literally at (possibly even a drone), but clever people have put these bad boys to all kinds
of uses. Retransmitting low density signal through a wired interface across a Faraday cage is the basis of the account protectionsof Zrich Orbital, for example.
Breaking Encryption: If You Can't Win, Cheat
Break the code? Nah, I just read the original over your shoulder.Over the probable length of time that any game of Shadowrun covers, it is unreasonable to suspect that you will ever see anyonebrute force a node's EUE. It simply will not happen, and we aren't even going to bother having rules for it. However, that in no waymeans that you can't read someone's mail just because it is encoded in EUE. The truth is that for an EUE transmission to work at all,that the sender and all intended receivers must have a copy of the cypher. This creates several weaknesses, which a hacker canexploit: The Physical Hardware: High Density Signal can cause hardware to do pretty much anything as if it had gotten the correct user
inputs to do whatever. This can include forking over the unencrypted versions of encrypted data or even giving out the codes
directly if it has that information anywhere on the system in any format.
The Initial Handoff: The EUE cypher that any two nodes wish to use to communicate has to be initially generated on one deviceand transferred to the other. And while information transfer is very secure afterthe code has been shared, there's nothing in
particular protecting the code transfer itself. This is where people do stuff like sneak around late at night in order to hand off
their precious data chips hidden away in their shoes.
7/28/2019 Ends of the Matrix
22/41
Protecting Unencrypted Data: Using Your Inside Voice
You actually are the weakest link.No matter how sweet your encryption is, everyone's brain runs on pretty much the same codes. When each data packet is sent to a
metahuman brain, that data is essentially unencrypted. Anyone who can hear that transmission can read it. Worse, if someone
hears the transmission in brain text and they also had a recording of the encrypted version, they can make a Rosetta stone to
decrypt all the rest of your data, which makes all your base belong to them. So it is of no surprise that people in the 2070s attempt
to make the actual communications between their brain and the rest of their network be as quiet as possible, which is why peopleuse Datajacks, Internal Commlinks, and Trodes. The first two have a directly wired (and shielded) connection between themselves
and the brain, while as the last option is merely at very low signal strength and very close to the intended recipient. In any case,
these methods of data transfer are very difficult to listen in to, and people generally feel relatively safe sending brain formatted
information into their own heads by these means.
Now no data transfer mechanism is truly 100% safe: unscrupulous men can get microtransceivers very close to your trode set and
rebroadcast the precious unencrypted information to their own networks. They cancompromise the physical hardware of the
datajack or the trode net. And so it is that over and above having relatively secure direct neural interfaces, the truly security
conscious will endeavor to conduct import communications from the sanctity of rooms that have been cleared of bugs and at specia
times and places that hopefully opposing spies won't know about cloak and dagger stuff that has been going on for literally
thousands of years and shows no signs of stopping at any time in the future.
7/28/2019 Ends of the Matrix
23/41
Hacking Hardware: Meat and Machine"Seriously. Now mom lets me stay out as late as I want."Computer networks in Shadowrun contain real humans in addition to the more familiar electronic devices. So it should come as no
surprise that adept hackers can hack their way into people as well as machines. How does that work? I don't know, it's based on
revolutionary technology that in the Shadowrun timeline will be invented in 2029, so I don't even feel obliged to explain it.
But regardless of the how, the what is that a hacker in 2071 can induce genuine neural impulses in your brain from across the room.
This is not something as crude as a taser (though those also exist in 2071 and can also be used from across the room). This is a
targeted generation of specific neural impulses. The energy demands are quite modest, the part which is beyond our current
technology is getting the energy to convey itself to specific portions of a brain across the room. But that is a technical hurdle which
has been crossed in 2071. And that means that the 2071 hacker spends a lot less time drinking Mountain Dew in his mother's
basement and a lot more time running around shooting mind control rays at people than his counterpart in 2008 did.
Hacking A Lone Device Or Empty Network
Whether it's a camera, a trid set, or a refrigerator, the number of times your shadowrunners will run into a device with a computer
in it is uncountably large even on a daily basis. And yet, most of these devices don't have a real metahuman being looking after them
at all. It is established canon that such devices are child's play to a hacker in the mid twenty-first century. This is a difficult pill for
people familiar with 20th century computing to swallow; but in 2071 a device which is simple is not unhackable. Quite the opposite.
In 1989 (or 2007 for that matter), a computer had to invite logins before they could occur. In 2071 this is blatantly not the case.
Instead, enterprising hackers can create connections out of nothing. A simple chip can be mapped, influenced, and co-opted from
across the room through induction. The only defenses against this sort of intrusion are jam