Banshee’s Guide to the 6we Matrix
The purpose of this document is to expand upon and clarify concepts that were presented in the 6th World Edition CRB.
Disclaimer: I decided to put together a Matrix Guide. I had submitted it for approval but never got any feedback, but I wanted to make it available to the public. So just note that is NOT official but it does fall in line with what I wrote in the 6WE CRB Matrix chapter when combined with my intentions and how I run things for my personal home campaign.
There are some rule changes proposed within, I feel they fix some of the issues that have come up since release but do not have an official stamp of approval from CGL (yet?).
Matrix access and networks:
Definitions
Access is determined per network, not per device. So if you want to mess with a device you have to hack the network, UNLESS that device is running by itself and not part of a network.
Maintaining access to multiple networks (both PAN’s and Hosts) is possible but any overwatch score gained is cumulative. Dropping access to a PAN requires no test or action unless you are link locked, dropping access to a host requires the Exit Host action.
Maintaining access to a nested Host allows you to interact with that Host as well as any devices or personas in that host even if you are in a different Host, as long as you are in a Host that is in the network. This applies to all “users” but not IC, IC is native to the Host and can not leave it.
Losing access
Devices
Most relevant devices are given a device rating in their description, but if not provided then use the following table as a general guideline as to what rating to use.
Device Type | Rating | Examples |
Simple | 1 | General appliances, public terminals, entertainment systems |
Average | 2 | Personal electronics, basic cyberware, weapons, residential security devices, basic vehicles |
Smart | 3 | Security vehicles, alphaware, corporate security devices |
Advanced | 4 | High-end devices, betaware, military vehicles and security devices |
Cutting Edge | 5 | Deltaware, credsticks, black-ops vehicles and security devices |
Bleeding Edge | 6+ | Billion-nuyen experimental devices, space craft |
Hosts and Device limits - Hosts do not have a device limit
PAN’s and Device limits
Personas and Attributes
A Spider (a corporate security matrix specialist) can CHOOSE to use any combination of Mental and ASDF Attributes of their persona/device OR the Host they are currently in. This allows a corporation to hire Spiders without investing in as much gear as long as they are operating primarily in a Host. For full VR a good Spider technically only needs a DNI (trodes, datajack, or cyberjack...etc), sim module, and skills with no need for a cyberdeck.. Only when or if they leave a Host to pursue an enemy hacker do they need to rely on their own devices.
Personas can only be formed by matrix devices specifically, a matrix device is defined as a device possessing any of the ASDF attributes. A persona must have one matrix device possessing the D/F attributes, and can have the option of adding a cyberdeck to gain the A/S attributes. To gain and use any of the attributes and abilities of a matrix device it must be used as part of your persona.
NOTE: the matrix rules were written independently of the rigging rules, allowing an RCC to combine with a cyberdeck breaks the matrix rules as I designed them. I therefore suggest that you do not allow the combination, or at the very least you may allow them to form a Persona but only allow the use of one or the other at any given time. I.e. if using a deck then all of the functions of a RCC other than it’s matrix attributes are unusable, and vice versa.
Swapping matrix attributes … what does it mean that “You can rotate any non-zero attributes through your persona, even if they originated from different devices.”
What device takes the matrix damage when my Persona is attacked?
Using the Matrix
Under Grab the Dice, the skill dice pools listed for Legal and Illegal actions are only a generality and are overruled by specific dice pools as shown in the action descriptions.
Pg 178: “Once you have initiated a hack, you cannot swap the base values of your Attack or Sleaze Attributes as long as you have access to the place you hacked into.”
Suggested skill specializations and the actions they relate to.
Overwatch Score: Resetting your OS to zero requires that you take the time to log off of the matrix completely and reboot your device. Please note that will also reset any exploits you may have open (especially including Probe and Backdoor Entry). (As noted in the Reboot Device matrix action)
Direct Connection … What is it and what does it mean to a hacker?
Cyberjacks
The table on Page 177 is the correct table for Cyberjacks, not Page 284.
The Matrix Init Bonus for cyberjacks is the extra dice you get when in VR.
Cyberjacks are able to perform all functions of both a datajack and a commlink, except voice communication because they lack any direct audio output component.
Commlinks
After seeing things in action for a while now, commlinks in general have attributes that are too low (especially if we allow devices to use DR as Firewall), I suggest changing to ….
Item | Rating | Attributes (D/F) |
Meta Link | 1 | 1/2 |
Sony Emperor | 2 | 2/2 |
Renraku Sensei | 3 | 2/3 |
Erika Elite | 4 | 3/4 |
Hermes Ikon | 5 | 3/5 |
Transys Avalon | 6 | 4/6 |
Matrix Perception
Matrix Actions
Programs
You cannot run more than one instance of a specific program.
Hosts
Hosts, Noise, and Distance
Pg 185 “The virtual space in a host is separate from the Matrix at large, and any icons on that host are not accessible unless expressly part of a public-facing side. Gaining access to a host will allow interaction with the icons and devices on the inside.” What is this and what does it mean in game play?
What sets off an alarm in a Host?
IC
IC uses the Attributes(ASDF) of its Host for all applicable uses (such as calculating Attack Rating and Damage).
Patrol IC - You can choose to have Patrol IC make perception checks more often than once per minute if you want to and/or have reason for it. Yes, Patrol IC knows you are an illegal user when they detect you.
Sprites
Diagnostics Power - effect should be +1 per net hit
Sprites and Mental Attributes/Skill: Sprites have mental attributes and skill ranks equal to their rating
Examples
Example 1; Mungo’s Point of View:
Using Matrix Perception as a form of recon to pick out someone’s gear
Mungo, sitting at a café in a busy downtown area in Seattle, automatically, without taking a regular perception test, notices the security guard that is openly patrolling the street outside. Just like regular perception Mungo does not need to take a test to notice things that are immediately obvious in the Matrix either, and since the guard is not running his Personal Area Network in silent mode (or otherwise trying to hide from him) Mungo also automatically, without taking a matrix perception test, spots it via his Augmented Reality ‘overlay’. The PAN of the guard consists of all the wireless enabled personal electronic devices he carry on his body, including what appears to be a firearm, all networked to the device the security guard is currently using to access the matrix with.
Mungo is interested in what type of device this is and spends a Matrix Perception Major action to observe the device that the security guard’s persona icon originates from more in detail. He gets 3 hits which let him know that it has a device rating of 3, that it currently runs a DF array of 2 3 and that it’s only program slot is currently running Signal Scrub. “Standard issue Renraku Sensei, this should not be any problem”, Mungo mumbles to himself.
He is also interested in what type of firearm we are dealing with. He chooses to spend another action to analyze the device icon of the firearm and finds out that it is a Colt America L36 light pistol with a Device Rating of 2. His street samurai partner, which is somewhat of a gun-nut, would instead probably have observed it in detail more directly while taking a regular perception test before coming to the same conclusion.
Data Spiking a sec guard’s gun (protected by his personal PAN)
Mungo decides to target the gun with a Data Spike.
Actions linked to attack are always obvious so to prevent being immediately spotted Mungo first switches his cyberdeck, and with that his entire PAN, to running silent. To not suffer a negative dice pool modifier of having higher Sleaze than Attack he also configures his cyberjack and cyberdeck with an ASDF array of 4 3 3 4.
Mungo does not currently have access on the security guard’s PAN, but Data Spike is an Outsider action and the gun is part of a PAN (and not behind the event horizon of a Host), so a direct connection or access on the network is not needed.
Mungo’s trusted Erika MCD-6 just has two program slots. The first slot is running Exploit, which is a hacking program that reduces the target’s Defense Rating by 2, and to fully compensate for the local noise Mungo uses the second program slot for Signal Scrubber.
Grab Some Dice
Data Spike is resolved as an opposed Cracking + Logic vs Data Processing + Firewall test. Mungo’s player grabs 10 dice while the GM grabs 5 dice, representing the network defending for the security guard’s gun.
Distribute Edge
Mungo’s Attack Rating is equal to his Attack + Sleaze = 7. The Defense Rating of the target is Data Processing + Firewall = 5, which is reduced to 3 due to the Exploit hacking program running in Mungo’s cyberdeck. Since Mungo’s AR is 4 or more than the target’s DR he gains a point of Edge for that.
Roll Dice and Spend Edge
Mungo uses the Edge he just gained on the Matrix Edge Action Emergency Boost to increase his Attack by 1 while the guard decides to not spend any Edge at this point.
Mungo’s player rolls his 10 dice and gains 3 successes. GM opposes the test with 5 dice and gets 2 hits. Mungo’s Data Spike lands with a total of 1 net hit. GM notes that Mungo’s overwatch score increased by 2 from the defense and by another point because of the hacking program that was used.
Determine effect.
With a Device Rating of 2 the gun has a Matrix Condition Monitor of 2/2+8=9 boxes. With an Attack of 4, increased to 5 due to the Emergency Boost action, Data Spike in this case has a base Damage Value of 5/2 which is rounded up to 3. It is then increased to 4 from the net hit.
Matrix damage is opposed by Firewall. GM roll 3 dice and get 1 hit. The gun takes 3 boxes of matrix damage. Anyone taking a shot with it will now get a negative dice pool modifier of 1 dice. Mungo makes a mental note that he should probably invest into a more powerful cyberdeck if he ever wishes to engage in more cybercombat in the future.
A bit of smoke and small sparks emerge from the firearm. The guard goes into panic mode as he takes cover behind a dumpster. Mungo automatically notices that the device icon of the firearm disappears from the matrix as the security guard spends a Minor action to successfully turn off the wireless capability of the pistol (which was resolved as an unopposed Electronics + Logic test where you need at least 1 hit). The security guard also spends his Major action on Full Matrix Defense, adding Firewall to his defense roll in case another Data Spike, or other damaging matrix attack, is coming his way.
Brute forcing access to a PAN
Mungo chuckles as he takes a sip from his soykaf and wonders if the security guard will call this in or not. Monitoring communications, however, require Admin access. To probe the network in order to get access to the PAN via a backdoor would take too long so instead he decides to brute force access on the network directly.
Brute Force is normally resolved as an opposed Cracking + Logic vs Willpower + Firewall test, but since Mungo is going for Admin directly the Firewall gains a positive dice pool modifier of 2 dice. Note that since Brute Force is linked to Attack, by the optional rule, Firewall could be added to the defender a second time as part of the Full Matrix Defense action even though Brute Force technically doesn't deal Matrix Damage on its own.
Typically AR and DR during Matrix encounters would evaluate the same as the first time and Mungo would get a point of Edge just like during the data spike action before, but when going for Admin access directly with a brute force attempt the DR of the target is increased by 4 which means neither side gains any Edge on this specific action.
Mungo’s player lucks out with 4 hits while the opposing side gets 3 hits. GM notes that Mungo’s overwatch score increased to 7, three from the opposing defense and again another point due to the hacking program being used.
The Brute Force attempt was successful and Mungo now has Admin access on the security guard’s PAN. Just like Data Spike, Brute Force is an action linked to Attack which means the action is immediately obvious and the security guard is now fully aware of the fact that a hacker is present inside his Personal Area Network.
Eavesdropping on an outgoing call (Snoop)
With being considered an Admin on the security guard’s PAN, Mungo can now attempt to snoop all incoming and outgoing communications.
Mungo’s AR is 4 higher than the security guard’s DR and he gets a point of edge (it evaluates in the same way as the previous Data Spike).
Snoop is resolved as an opposed Cracking + Logic vs Logic + Firewall test. Mungo’s player gets 3 hits while the opposing side gets 1 hit. GM notes that Mungo’s overwatch score increased to 9.
The Snoop attempt was successful, but unlike the previous Data Spike and Brute Force, this action is not linked to Attack and since the attempt was successful the security guard is unaware that his communications are currently being monitored. Mungo gets to immediately listen in on (and record if he so wishes) an on-going voice conversation the security guard has with an unknown recipient. Apparently it seems as if he is calling some sort of matrix specialist.
Example 2; Tattoo’s Point of View
3km away, Tattoo receives a distress call from an old friend that she has not talked to in ages. “Calm down Bob, what is happening”, she says. After a few seconds she understands that Bob was patrolling the local mall when some punk started to throw data spikes at his equipment and, from what Bob is describing, perhaps also successfully invaded his PAN.
Her body goes limp on the couch, the room around her quickly fades away and everything slows down as her mind speeds up and she slips into hot-sim VR.
Using Matrix Perception to find a silent running hacker, Trying Again.
Tattoo tries to “spot the hacker that is currently attacking Bob’s network”. Normally it is a Major action to spot a silent running network, but since Tattoo is a Technomancer using a Living Persona it is only a Minor action (it is also a Minor action for characters that use a cyberdeck and/or a cyberjack). Matrix Perception is resolved as an opposed Electronics + Intuition vs Willpower + Sleaze test. The test suffers a negative dice pool modifier of 3 dice because of noise due to distance.
Tattoo gets only 2 hits, while the eluding hacker gets 5 hits; and the attempt fails.
“Perhaps he already jacked out?”, she thinks to herself as she decides to double check by spending another Minor action to Try Again, just to be sure. Retrying a test when circumstances have not changed imposes a negative dice pool modifier of 2 dice - yet she manages to get 6 hits, while Mungo gets 4 hits. Just by being successful Tattoo now locates the hostile network and with the net hits Tattoo also discovers that it has a Device Rating of 1 and that it is running Signal Scrub and Exploit. “Heh, so… you little punk… you are just running an Erika MCD-6 are you“, Tattoo thinks as her body is lifeless on the couch at home. “Now… where are you hiding you little bastard”.
Gaining illegal access to a PAN via Probe...
Tracing the physical location requires Admin access. Determined to not spook the hacker until it's too late, Tattoo decides to silently probe the network for weaknesses.
Unlike a decker, a technomancer's ASDF array is derived from their mental attributes. With Charisma 4, Intuition 5, Logic 5 and Willpower 6 she ends up with a base ASDF array of 4 5 5 6. On top of this, with a Reconfigure Matrix Attribute minor action, she distributes her Resonance attribute of 5 with 2 points on Attack and 3 points on Sleaze for a total ASDF array of 6 8 5 6.
This gives her an AR of 6+8=14. As she initiates the hack this is compared to Mungo’s DR of 3+4=7 and she gets a point of Edge because of the difference.
As most illegal matrix actions, Probe is resolved with Cracking + Logic. Probe is a bit special in that it is opposed by either Willpower + Firewall or Firewall + Firewall. That the test has two listed defence tests means that for example a Host that is not monitored by a Spider is allowed to defend with Firewall + Firewall (instead of just 0 + Firewall). The test also suffers a negative dice pool modifier of 3 dice because of noise due to distance. Probe is also linked to Sleaze, but since her Sleaze attribute is equal or higher than her Attack attribute she does not get a negative dice pool modifier because of this.
Tattoo and Mungo both get 3 hits. Ties typically go to the aggressor so the test was a success and Tattoo finds a glitch that might be possible to exploit in order to get inside the network, but since it did not generate any net hits there will not be any bonus dice to the following Backdoor Entry attempt later.
She now has the option to extend the test and roll one less die than the previous attempt (while the target does not reduce theirs) in hopes to generate some net hits, but in the process she would also risk losing the backdoor she already secured. She thinks for a second, but even though a failed attempt would typically not cause any alarms she decides she rather not spend more time probing the network and instead take her chances to take the Backdoor Entry action without any extra net hits.
...followed by Backdoor Entry
Tattoo takes a deep breath before she goes for the exploit she just found. Failure here means that she needs to start over, probing the network again.
Tattoo’s AR is still a lot higher than Mungo’s DR (it evaluates in the same way as the previous Probe attempt) and she gets another Edge because of that.
Backdoor Entry is resolved with Cracking + Logic vs Willpower + Firewall. The test suffers a negative dice pool modifier of 3 dice because of noise due to distance. Tattoo gets 6 hits and Mungo gets 2 hits. Tattoo gains Admin access on the target network without Mungo noticing anything - she is like a ghost in the machine.
Tracing physical location
Still in the same player-turn, she trades in her remaining 4 Minor Actions for a Major action and immediately starts a trace. AR and DR still evaluates the same way as the initial Probe so she gets another point of Edge, which is also the maximum number of Edge she may earn during a combat round. Trace Icon is an illegal action that is resolved with Electronics + Intuition vs Sleaze + Willpower (or Sleaze + Firewall). Due to the distance there is still a negative dice pool modifier of 3 dice. She is successful and now gets to track the hacker, in real time, for as long as she can detect him - even if she decides to drop the admin access on his network. The hacker is currently located in a café in the very mall where Bob is patrolling.
Threading of a complex form
“Let’s see how big ripples you caused in the matrix so far”, Tattoo thinks, as she starts to thread complex forms on the hacker’s network that mimics telltale signs of illegal activity. Planning to thread enough of them to eventually have GOD converge on the poor sob.
She again gets a point of Edge. Tattletale is resolved as an Electronics + Resonance test where each hit adds 1 to the OS of the target. She gets 4 hits and Mungo’s OS consequently increases by 4.
Tattletale also has a Fade value of 3, which is resisted by Willpower + Logic. She gets 3 hits which is enough to resist all of it and she takes no damage.
Being in hot-sim VR she trades her remaining 4 minor actions for a major action and attacks Mungo with another Tattletale. She gains another point of Edge as she takes the Electronics + Resonance test. This time she gets 3 hits and Mungo’s OS is increased by another 3 points.
Resisting Fade 3 wth her Willpower + Logic this time only gets 2 hits. Fade that is not fully resisted deals damage directly on the stun condition monitor of the technomancer, unless the remaining damage is higher than the resonance attribute, in which case the damage becomes physical.
At the same time as she takes the stun damage, Tattoo spends 3 of the Edge she already earned on the 3-point Edge Boost “Heal one box of stun damage”.
Complex forms are generally pretty subtle, but Mungo would automatically notice that his OS went up if he was running Baby Monitor, which Tattoo knew he wasn't. He could also find out by frequently taking the Check OS action, but until he does he has no idea at all that GOD is about to converge on him. Any second now….
Example 3; Spike’s Point of View
Hacking a standalone object (can of Dragon Piss, or such).
Spike tries to gain User access on a can of Dragon Piss, an unattended device that is not part of any network. Since it is not running silent or otherwise trying to hide he notices its device icon without taking an opposed Matrix Perception test. Brute Force is resolved with Cracking + Logic vs. Willpower + Firewall.
Since the can is unattended and have been for quite some time it will use zero dice in place for the mental attribute. It is also not part of any network which means it does not have any Firewall, instead it uses its device rating of 1 as substitution to Firewall.
Spike will probably not fail with this test (and GM will probably even let him buy hits here), but GM should still roll the opposing die to check if overwatch score is generated or not.
Hacking a random defenseless standalone object does typically not grant any Edge.
Spoof Commanding a maglock to open (protected by a Host, but on the visible side of the event horizon)
The team informs Spike that they are in front of a door that is closed shut by a magnetic locking mechanism. The maglock is part of the Host network, but it is a matrix facing device located on the visible side of the Host’s event horizon. This means Spike may spot it without an opposed Matrix Perception test.
It also means he may Spoof a simple one and done Command, for example “unlock” or “lock”, to the maglock remotely from his van without having a direct connection to the device and without having User or Admin access on the Host network. Since Spoof Command is an illegal action, opposed hits of this test will increase OS.
Note that since Spoof Command is not linked to Attack nor Sleaze this could also be attempted by someone only using a RCC or a commlink, just as long as they got the required Cracking skill (but since their AR would be zero the spider monitoring the host would probably gain a free Edge in that case).
Control Device-ing a security drone to turn on its handlers (protected by host, and inside the event horizon, going for Brute Force access due to the time constraint)
The team gets ambushed by three guards and an armed security drone. The shit is about to hit the fan. The drone is not only part of the Host network - it is also considered to be on the ‘inside’, behind the Host’s event horizon.
Even if the drone is on the inside of the Host, Spike may still take a Matrix Perception test to spot it if he wishes, but it would in that case be opposed by Willpower of the corporate decker monitoring the Host (if it has one) plus Sleaze of the Host.
Spoof Command could be used to trick the autopilot of the drone to accept a simple one and done instruction, for example “fire one narrow burst at one guard”, but because the drone is behind the event horizon of the Host, Spike would need to first establish a direct connection to the Drone (or hack the network to get to the inside). The drone would defend against the Spoof Command action with Firewall of the network plus the higher of either Data Processing of the network or its own Pilot rating.
As Spike is out in the van he can’t establish a direct connection and is instead forced to hack the network. Spike goes for a quick and dirty Brute Force + Enter Host hack (rather than a slow and sneaky Probe + Backdoor Entry hack). Brute Force is resolved with Cracking + Logic vs. Willpower + Firewall.
Since it is linked to Attack it will always be obvious and the Host will go on high alert. Patrol IC will start looking for the offending hacker (if Spike is not already running silent he will automatically get spotted once he decides to Enter the Host). Depending on security protocols the Host might start launching more and more dangerous IC at the end of each combat turn (but they can’t act on Spike until the Patrol IC of the Host successfully locates him). Each combat round Spike chooses to maintain User access on the network his OS will also automatically increase by 1. On the plus side, Brute Force only takes a Major action to execute.
Once being inside the network, spotting devices that are part of the network will no longer be opposed, no matter if they are on the public matrix facing side or behind the event horizon of the Host. Instead of Spoofing a Command to the autopilot of the drone, Spike takes the Control Device action to get sustained control over the drone. Control Device is resolved with Electronics + Logic vs. Willpower + Firewall. Unlike the Spoof Command action, opposing hits from the Control Device action does not generate any extra OS.
Unlike Spoof Command, Control Device also lets Spike choose to either instruct the autopilot of the drone to take more complex actions (for example “keep firing narrow bursts on the troll until it drops to the floor”) or directly remote control the drone himself, using his own skills and attributes (for example Engineering + Logic to fire its onboard weapons).
Illegally spoofing a command, legally commanding or directly remote controlling will automatically fail if the device is already under the direct control of someone else (if for example someone has already jumped into it), but luckily for Spike and his team the drone was just running on autopilot.
Altering cybereye/camera feeds to edit out images of infiltrating teammates
Spike’s exfiltrating teammates are about to cross the line of sight of a camera.
If a surveillance camera is not behind the event horizon of a host (or Spike have a direct connection to the camera), no matter if Spike have access on the network or not, he can use Spoof Command to trick the camera to accept a simple one and done instruction, for example “turn 15 degrees to the left”, in order to create a blind spot along the corridor wall under the camera that his teammates can use to slip by without getting recorded.
He could also Data Spike the camera until it is fully bricked, but this would not be very subtle and alarms would probably be raised (then again, this could perhaps be used to create a diversion of sorts).
But since Spike already has User access on the network (from the previous Brute Force+Enter Host hack) he instead chooses to directly edit out his teammates from the video feed. This is handled by taking the Edit File action once every combat round as long as his team happens to be within line of sight of the camera. Edit File is resolved as an opposed Electronics + Logic vs. Intuition + Firewall or Firewall + Sleaze test and since it is a legal action it will not generate any extra OS due to opposed hits (but maintaining illegal User access from his Brute Force hack will still increase his OS by 1 every combat round).