Showing posts with label Eclipse Phase. Show all posts
Showing posts with label Eclipse Phase. Show all posts

Sunday, November 24, 2019

Hematic Weapons

hematic, adj.
relating to or affecting the blood.

Blood captures the imagination. Weapons of blood are popular in culture throughout the ages, from mythology to modern vids and vidgames. And the rise in knowledge of bloodborne diseases (such as hemorrhagic fevers like Ebola, or HIV) in the 20th century has crystallized a human paranoia of blood. The sight of blood can be shocking, even for immortals. And of course, technology can improve the "weaponization" of blood, with medichines and nanophages improving our natural defensive capabilities, or things like Defiler exhumans with their highly acidic blood. But blood and other bodily fluids are also a vector for the Exsurgent Virus. Exposure to the blood of an exsurgent biological strain can lead to contagion. Many transhumans are conceited in their security against potential hazards, but the horrors of the Fall have made people understand certain "TITAN made" super pathogens are still a hazard. In Firewalls SOP threads on the Eye, people weaponizing exsurgent blood is called "Hematic Weapons".

Most Exsurgents are not stable enough to actually think to use their blood, or other infectious matter, in a more technical and sophisticated way. If they are driven to spread the infection, they do so usually directly, such as through physical contact or other specific infection vectors. They aren't afraid to spill a little blood (if they have any at that stage), and might do so for big gains (such as tainting air, food or water), but subtleties and technical refinement tends not to be how the infected work. The contagious period will also eventually cease in the body, though if extracted the bio-nanos will remain virulent for days or weeks. They have specific forms and purposes, and AOK hacks tend to make one aim higher, but not always. Most often you see these weapons in the hands of TITAN puppets and sleepers, those who are not themselves infectious but already on the side of the TITANs, in the hands of various Singularity Seeker or Brinker cultists who have their own twisted agenda, or occasionally by criminal elements who don't know any better, such as rendering down exsurgents for parts and finding the infectious blood useful for their purposes.

The uses are many formed, but fairly obvious; since exovirus pathogens are applicable dermally, inhaled, injected or orally. The simplest is large samples of contagious blood in a sprayer, which is basically a squirtgun. This can be done with any infected blood, not even exsurgent, and some see it as a prank or a protest (and others, bioterrorism). More serious efforts will actually load the blood into capsule or splash rounds to strike a target, hopefully incapacitating them then infecting. With range and suppressors, this can even be quite subtle as to the exact nature of the shot, some may not notice the infectious component until it is too late. Some might even go a more extreme route, loading weapons with infectious bone marrow or other substances. For area effect though, aerosolized blood in a gas grenade or seeker is a good way to go spreading it to cover surfaces or be inhaled, the bloody mist being a powerful visual image. One might also spike melee weapons, such as the wasp knife, but considering the close contact this is often excessive when dealing with infectious material.

Firewall and other X-risk agencies always try to keep contagion in mind when dealing with the ex-virus. While the hematic tactic is not widespread, it is still a serious risk along with other more traditional methods, and one which could potentially be exploited by parties other than the TITANs themselves - something Firewall is always wary of. To counteract, an immunogenic coating is usually enough to forestall an infection, even an exsurgent one, especially if it has been outside of it's host for an extended period. Preventative nanoswarms can also break down the bio-nanos and render them inert, such as in the case of a spill. Other than that, simple physics works, exposure to potent acids or alkalis, or extreme heat will neutralize the effect. Always consider carrying some bleach if you think you'll encounter such things.

(Here's another Death Stranding twist. In the game, it's the players blood which is useful against the unknowable horrors, but in another context, using "special blood" as a weapon can be quite intimidating. A good way to freak out players who may already be paranoid about infectious material)

Tuesday, November 19, 2019

ZS

Sedatives can serve several purposes. Anxiolytics reduce anxiety, tranquilizers are synonymous with antipsychotics, and soporifics or hypnotics promote sleep or unconsciousness. A calming and sleeping drug might be called "hypnotic-soporific". They have a variety of uses in the transhuman future, even with basic biomods improving the sleep cycle. They can be used to treat anxiety and insomnia which can still occur, or to create a sedated state for trauma surgery (though more specialized anesthesia are usually used). They are also used as a "chemical cosh", to "club" patients with hyperactivity or other mental disorders to make them manageable. In the espionage game, sleeping pills or gas can also be a useful alternative to wetwork. While killing someone these days is akin to putting them down for a short nap, violence risks a certain amount of "noise" and mess, and some groups will be more likely to retaliate based on the cost incurred (replacing a body) - on the other hand, sleep can be just as effective as a lethal poison, and might even be passed off as natural without a tox screen. The most common application of sedatives is ZS.

ZS: A common sedative-hypnotic drug which is typically used to treat sleep disorders (such as insomnia). It is formulated to work on most earthly biology, but some xenofauna or GMOs might be resistant to it. After onset time, the target makes a SOM check. If they fail, they fall Unconscious into a sleep which will last the duration unless interrupted (with normal modifiers), and gain the benefit of a long recharge. If they pass, they are impaired (-20) until the drug gets out of their system, being fatigued and lethargic. They also take a -10 to COG checks to remember events while under the effects of ZS. ZS can be countered by applying an appropriate stimulant (like creating an antidote), but mixing medication is to be warned against. [Minor]

ZS and derivative compounds are sold in multiple forms, for multiple applications. Most common is pills which are proscribed or self-administered for the aforementioned sleep disorders. It also comes in syrup form for those who prefer it that way. When using it as a chemical control, it can be directly injected or dispersed as a gas. "Does this rag smell like ZS to you?" is a running gag in many vid series. ZS can be habit forming, and long term abuse can lead to unnatural sleep cycles and persistent fugue states, which are hazardous. Major manufacturers warn against operating vehicles or heavy machinery for several hours after taking a dose of ZS.

Drugs Type Application Duration Addiction Mod/Type Complexity
ZS Biochem Inh, Inj, O 8 hours -20/Mental Minor

(nb: caught an error with my html table, the duration should be 8 hours)

Monday, November 18, 2019

BloodFire

There are a variety of toxins and harmful chemicals out there for a "discerning" customer. Nerve agents and potent neurotoxins can kill a morph quickly, while other drugs incapacitate physically or emotionally. Flight and Twitch have their uses, but can be a bit volatile. Nanotoxins also function as "smart" poisons, a more reliable way of mechanically interacting with cells to kill or inflame them which is more reliable than biological methods, but are more expensive and regulated. Some "chemists" have a method which works more simply than these, but it less reliable because it interacts with biological system.

BloodFire: This low-strength neurotoxin is a synthetic blend of several natural creature venoms, it is designed to inflict pain and incapacitation, not serious injury. Some enforcers who don't care much for manners or laws use it as a way to usually "non-lethally" capture someone, or it can be used by them for interrogation and torture. The poison spreads from the contact with an uncomfortable burning or stinging sensation which spreads throughout the body, causing severe discomfort, possibly incapacitating. When dosed with BloodFire, suffer 1d6 DV (halve this with Medichines) and must make a WIL check. If you succeed, you are Impaired (-20) for the duration and mostly functional. If you fail, you are Incapacitated for the duration instead, and depending on the situation may take Stress from helplessness. A character with Pain Tolerance (Level 1) gets a +30 on this check, and the impairment penalty is -10. A character with Pain Tolerance (Level 2) does not need to make the check. BloodFire may cause an allergic reaction or other complications on those with certain genetic defects, which could lead to more severe harm or even death. [Minor] (R)

Because of it's natural composition and direct nature, BloodFire is cheaper and sometimes more common (especially among criminal outfits) than something more complex like Neuropath (p. 335). It's usually applied via splash or capsule rounds in a fight, but can be directly injected or ingested in another scenario. Because the incapacitation is not guaranteed, more serious outfits may skip it, but for those working fast it's a lot quicker and cheaper to acquire, if you know the right people or chemical formulae.

Toxins Type Application Duration
BloodFire Biochem D, Inj, O 1 hour

Saturday, November 16, 2019

2E Drugs Conversion

So here's another fun one, updating several of my old drugs, toxins or chemicals to 2E rules. The use of enforced behavior can make a few of these more interesting than before. First a short description (and link to original work), then a table below for all the facts. I may or may not port over some of the others, but I think these are the most interesting. Listed complexity is for 5 doses.

DCV: A relaxant which assuages feelings of guilt, and keeps the body calm and relaxed, so one can perform deception better. Useful also for acting. It won't overcome a dedicated truth-detecting method, but makes lies easier. +10 to Deceive checks and gain Reduced Behavior: Guilt (2) for the duration. Usually comes as a vapor rub. [Minor] (R)

DisInfect: An inhaled stimulant for the immune system, sold as a health supplement in many locales. It makes the body more resistant to toxins and physical pathogens (such as designer diseases and super virii), and stimulates a slight uplifting or energized feeling. +20 on SOM checks to resist toxins, chemicals, drugs and pathogens for the duration, and +10 on SOM checks to resist biological exsurgent infection. No effect on nanodrugs or nanotoxins. Comes in the form of inhalers. [Moderate]

Oxford: Study drug. Stimulates the center of the brain related to memory and learning centers. Helps people recall facts and build knowledge easier. +20 to COG check to remember things learned on Oxford, and gain Enhanced Behavior: Studious (2) for the duration. If used during a downtime week, you may spend an additional RP to improve skills that week, but it can only be on Know skills. Comes in pills or powder form. [Minor]

Rainy Day: Short term depressant, a recreational drug. Creates a brief stint of depressed mood, but clouds memories, while giving a certain amount of inspiration to the user, may even be mildly hallucinogenic. Used sometimes by artists to create a certain ephemeral genre. +5 on INT checks, but -30 to checks to remember events while under the effects. Gain Restricted Behavior: Happy (2) for the duration. Sold in the form of tablets or cigarettes. [Moderate] (R)

ShutIn: A nanodrug which directly stimulates the brain to create a sense of introversion, isolation and inner focus, used sometimes to aid in work or just to alter the mind state. It makes the user more observant, more focused and attentive, but antisocial and risk averse. +10 to Perceive checks  and COG checks for memory for the duration, but -10 to WIL checks to resist pain or fear, and gain the traits Enhanced Behavior: Introverted and Mental Disorder: Agoraphobia for the duration. [Minor]


Drugs Type Application Duration Addiction/Type Complexity
DCV Biochem D, Inh 8 hours - Minor (R)
DisInfect Biochem Inh 3 hours -10/Physical Moderate
Oxford Biochem Inh, O 1 day -10/Physical Minor
Rainy Day Biochem Inh, O 1 hour -/Physical Moderate (R)
ShutIn Nano Inj, O 1 hour +10/Physical Minor

Friday, November 15, 2019

Bola Gun

While "lethality" is an interesting subject with backups and resleeving, some physical bodies are not safe to destroy. One might need to capture a morph, a bot or a creature alive and relatively unharmed, so they can be detained or physically moved. And, if a kill is needed, it's much easier on an immobilized target. In the era of easy 3D modeling and assembly, engineers have developed a weapon based on a primitive concept which is useful in this futuristic setting.

Bola Gun: A favorite among (Ego) Hunters, the bola gun is based on the ancient hunting weapon of South America. Using an almost slingshot or catapult style design, the bola gun fires a pair of weighted balls connected by a smart material chord which extend to their full length counterweighted, and when they hit a target they then wrap them up, binding their limbs tightly. The weights are magnetized or have grip material in them, so they bind to each other or other surfaces to further the snare. Each bola has an RFID tag so it can be located, and has an option to Shock a target who is bound, similar to a Cuffband. If it is not destroyed, a bola can be recovered and shot again.  The bolas are particularly hard to remove, they give a flat -20 to the SOM check to escape them, or must be cut by dealing 20 DV to the line. The primary weakness of the weapon is it's low rate of fire, and the fact that the bola cannot deploy at extremely close range. Bola Gun uses the Guns skill. Entangling, Knockdown, No Point-Blank, Two-Handed.
2d6 DV SS Ammo 1 Range 35 [Minor]

(You should all play Death Stranding, it's a great game and actually has some interesting themes which can carry over to EP)

Thursday, November 14, 2019

Mesh Combat Software v2

I had a lot of fun with the last one, and so I have a few more ideas to trot out on this subject. A lot of these concepts can be used simply as plothooks, but can also be interesting mechanical tools to aid or challenge players.

D2NA: One of the most basic malware out there, D2NA (Digital DNA) is a basic program which has one instruction, self-replicate. When activated, it generates copies of itself as rapidly as possible, filling up free storage on the device and taking up processing cycles. The name comes from both its self-replicating nature, and the tendency to use incredibly complex data, such as DNA sequences, complex mathematical formulas or large number sequences to eat up data. If not caught, it will fill up spare storage on a device in a matter of days or hours, making it overloaded. Most trained system defenders or firewall tools will catch a spread of D2NA, especially during a security audit, but a skilled hacker can covertly install it or conceal its nature until it's done it's job. Because servers have so much storage space that it takes too long to fill up, D2NA attacks are usually used to gum up sensor motes, bots and the gear of specific computer users rather than large systems. [Minor] (R)

Fog of War: Also called "Static Wall", "Blue Screen" or "Blizzard" this software tool is adapted from actual forms of e-war defense used in the Fall. It is typically run to protect certain devices which have active administrators who are directly in control of a system, and takes the form of a new countermeasure when activated. The simplest is that Fog of War degrades the quality of connection and access for normal users. It throttles connections, spams additional UI features, AR mist or other sensory distractions and in general makes things harder to navigate. Admin accounts or other select system occupants (often certain Infomorphs or ALIs using the server) are protected from this, and can work as normal. This will slow down intruders and make it harder for them to accomplish their goals, but is also a real hassle for normal users so tends to be reserved for personal use or on highly secured servers. For normal users, they act as if they are on an overloaded device, taking a -10 penalty to all meshed actions on the device (and possibly higher if the Fog of War is particularly good) - and if this device includes an AR overlay they take the Distraction penalty as well. However, the Firewall, admin accounts and other select users suffer no penalty, able to function as normal while the enemy is bogged down. [Moderate]

Grond: Grond and its many knock offs and clones are a down-and-dirty software designed to break into systems quick. It uses optimizing algorithms to smartly pick the proper exploits for a system, rather than running straight down the list, and can even multi-task to try multiple attack angles where possible. It's "siege algorithms" continue to work even after the initial intrusion, constantly trying to preempt countermeasures and predict standard software protocols. However, Grond is anything but subtle, and thus many hackers eschew the tool. It grants a +10 on Brute-Force Hacking (taking it to a -20 penalty) and on InfoSec checks while there is an active alert (removing the penalty). [Moderate] (R)

Honey Trap: Honey Traps and their many variants are common on corporate servers to discourage or counteract espionage. Most professional hackers use proxy services and stealthed signals, and so even if one is aware of them tracking them is difficult. To do this, the Honey Trap is made - it looks like an attractive piece of data, such as crypto, blueprints, personal data, etc. However, when downloaded or opened by a hacker, it reveals itself to be a trap - if still on it's home device it will usually automatically trigger an active alert, and if it has been copied elsewhere, it has a protocol to immediately "phone home" via the Mesh with the Mesh ID of device it is currently on and positioning data unless the hacker acts fast. Nastier versions of this are known as "data mines" or "wasp nests" and instead of tracking they will "detonate" when opened, revealing malware, corrupt data or overwhelming signal traffic, dealing 2d10 DV to the offending Infomorph, ALI or Account Shell. A skilled Hacker can detect if a program is trapped with InfoSec, but only if they care to look. [Minor+] (R)

Icewall: Normal firewall software uses a neural net filter to smartly detect potential intrusions or unusual activity, a constant crucible which puts pressure on any hacker who is operating through it. The Icewall takes a different tactic, it is a single, rigid defense. A hardened structure constantly patching itself against exploits, usually with stricter than normal authentication methods. Icewalls are very firm against Brute-Force hacks, as they have very few vulnerabilities and tend to rapidly patch them, applying a further -10 (total -40 modifier). They are also hard to attack directly, having 10 AV in Mesh Combat. However, because of their front-loaded defense, they are vulnerable to spoofing, and their passive threat detection once an intruder is inside may be weaker than normal. [Minor]

KeyChain: This software comes by many names (Skeleton Key, Key Ring, MasterKey, Pick Lock, etc), and is a fairly common hacking tool, though often not a reliable one. Normally, to Spoof, one must first sniff data transmissions, or forge an authentication by copying the original somehow. KeyChain is a type of software which skips that step, instead it brute-forces a spoofed authentication by studying the authentication, then rapidly making attempts to enter it via a brute-force attack. This functions as a normal spoof attack, but doesn't require sniffing, and imposes a -30 penalty on the hacking test, as it is highly likely the attempt will be flagged by the Firewall as suspicious. KeyChain cannot defeat some forms of authentication, and systems with particularly complex authentication (like very long passcodes) might take more time than a complex action. [Minor] (R)

Logic Gate: Logic Gates are an unusual form of authentication which resembles a passkey, but requires one not just know (or have stored) their passcode, or possess a specific key, biometric, Ego or device, but to actively solve a puzzle. These can come in the form of Captcha, or riddles, visual puzzles or even complex subjective ethics questions which an administrator will assess. Because of this, spoofing a Logic Gate is not possible, and most of them have a complex library of questions to ask, so simply listening in to a correct answer won't work either. You either can solve it, or not. Clearing a Logic Gate requires a COG test, which might be opposed if it is an assessment test. Failure causes a passive alert as normal. Because there is no "convenient" way to pass them, Logic Gates are incredibly unpopular for systems which are heavily trafficked, but are often used by personal eccentries, or to guard specific devices, storage spaces and tiers in networks by limiting who can access. Guanxi operators often us a Logic Gate variance which offers "tests of loyalty" to check a user's bona fides, and some servers who wish to prevent ALI access will use them. They can also be used as an active form of authentication, giving a specific user a test and kicking them out if they fail. [Minor]

Plumber: Networking has sometimes been referred to as a series of pipes or tubes. And who better to check on your pipes than a plumber? Plumber is a form of software used by both hackers and system defenders - originally intended as a simple script to check network health, a few iterations and it is a sophisticated tracking system. A Firewall can normally re-authenticate or terminate connections if threatened, and a security account can trace specific users, but sometimes you want to do a lot of tracing all at once, and not let anybody know you're doing it. Fire up Plumber and let it run. In the normal timeframe of a re-authentication, it will instead actively run a trace on all accounts on the system, attempting to ping their connection and trace them to a Mesh ID or other tag, and note and report all discrepancies to the system defender (such as proxy services, user accounts in privacy mode, duplicate accounts and other unusual transmissions). This is useful for an admin to trace all suspicious connections and flag them to lock them out or otherwise catch them, though obviously it rarely beats efforts to prevent tracing a hacker. Intruders on the other hand, will often use Plumber to trace all users on a network for further traffic analysis, or figure out where the next device or node in a network or tier is. [Minor]

Poison Pill: Another one of the classic malware tricks, a poison pill looks like good software, but it is actually bad. It can be seen as kind of a reverse honey trap. Firewalls actively monitor for unusual activity, so a hacker can try and cloak their work by making it seem like normal data. Most poison pills will fail against a dedicated scan of their code (an InfoSec test), but for purposes of passive defenses, can be safely uploaded or copies to most devices. Depending on what exactly is in the poison pill, it can do multiple things. Most when opened will dry and directly crash the OS (including possibly the Cyberbrain of a morph) of the system it is stored on with viral or corrupt data, but can also be used to damage infomoprhs or account shells which handle the data. When opened it deals 2d10 DV to the appropriate software. [Minor] (R)

Remora: Sometimes, you don't want to crash software, delete data, or even read secret files - you want to see where that data goes. Enter Remora, a common style of spyware script which attaches itself to a file and then is designed to log where that file goes. Installed with a Program test as a complex action, Remora embeds itself in the data and then covertly logs whenever that file is accessed, modified, copied or moved. If a the data is duplicated, the Remora is duplicated with it. What it does with the log depends on how the specific Remora is configured, some will simply "phone home", using an encrypted communication to upload the log to the hacker or a secure cloud storage they can access later - but this is risky if intercepted. More commonly, after a period of time, Remora will disconnect itself and through normal network processes "swim" home, connecting through public networks to find it's home device. This means that if a file with Remora attached ever makes it to an air-gapped network, however, it's useless unless the hacker can hook back up with it. [Minor] (R)

Tuesday, November 12, 2019

Mesh Combat Programs

(On page 264 it describes mesh combat as an abstraction with "no dueling avatars, no digital maneuvering, no deadly programs", but sadly that's not very fun. Below are a list of some specific software and other special features which can offer some customization and flavor to Mesh Combat, but with the understanding that using these types of things will add layers of complexity to the game and may further slow play, but they can still be entertaining. Use them just as flavor or apply the mechanical concepts as you see fit)

Aegis: A standard software package utilized by governments and security contractors, Aegis is designed to protect software from crashing. Utilizing a filtering system, it's constantly updating database can identify common malware and exploits and automatically block or remove them, as well as intercepting bad data packets. It also has real time crash protection which can check for most obvious software errors and compensate. Aegis adds 5 AV in Mesh Combat to all software on the same device as it. [Minor]

Attack Barrier: Also sometimes called a "lava wall", this form of advanced Firewall has counter-intrusion protocols. Increase the Firewall rating (p. 260) by 10, and if any intruder or attacker fails an opposed test with the Attack Barrier, their relevant software (Account Shell, Infomorph, etc) takes 2d10 DV. If they are physically connected to the system running the Attack Barrier, the device takes 1d6+Shock DV as it overloads them with an electrical surge. [Moderate] (R)

Daemon: Daemons are a sub-ALI script or process which system administrators use to delegate tasks, usually when they have a large system to run. Because they are not intelligent, they are relatively compact files, effectively spare account shells for the device or OS itself. When installed by an administrator, they decide their privilege level. Daemons can undertake certain account actions in place of their masters, either by preprogrammed signals, or by receiving an order from an authorized security/admin user as a Quick Action. They aren't very sophisticated, so anything requiring a roll they perform at a 30, but they can be helpful to pull useful information, trigger alerts or perform additional attacks in large systems while still allowing the active defender to focus on their own tasks. Even if they don't act, a Daemon adds +10 to any tests an active defender of a system makes for teamwork, as they are designed to help. [Minor]

Labyrinth: Labyrinth or a number of related softwares are known as "barrier mazes". These are complex systems which evolve over time, and thus are not allowed in many polities. In addition to normal Firewall functions which block conventional access to those without authorization, they build in deliberate traps and weak-points which an intruder might think are safe to enter, but lead to dead ends. Some versions of Labyrinths can even alter or mask the internal file registries and databases, literally shifting information to confuse and delay attackers so they can be locked in or traced. Using a Labyrinth increases the timeframe of Hacking task actions by 50%, and gives system defenders a +10 on tests to zero-in, trace and crash/lockout an intruder. [Major] (R)

Mad World: Developed by criminal and anarchist hackers, Mad World is a software somewhat akin to a Scorcher designed to crash a wide variety of software at once ("Mad" standing for Mutually Assured Destruction). Once installed and opened, Mad World will try and crash the operating software, and any apps, accounts or informorphs using the device by creating junk files, sending bad data and making an overwhelming number of connections and input options. This will seriously degrade the user experience and eventually crash a system if not disabled or deleted. It deals 1d10 DV to all software per Action Turn, other than itself (this includes the hacker who placed it). In some cases, Mad World or it's variants can even overload hardware, taking up so much processing power and stressing the system, causing physical damage to the hardware device it is hosted on. [Minor] (R)

Muramasa: Named after a legendary Japanese swordsmith, Muramasa (and many copies and variants) is one of the most basic tools a hacker has to disrupt and crash software. Instead of overloading programs with bad data or too many signals, Muramasa "cuts" into software and deletes small snippets of their code, increasing the likelihood of errors, glitches and crashes. Add +1d6 DV to damage you inflict in Mesh Combat. [Minor] (R)

Oculus: One of the scariest software a hacker can meet, but luckily very expensive and restricted. Firewalls already have threat modelling algorithms which learn normal user activity, and will flag suspicious actions and work to locate intruders. Oculus takes this one step further, it not only learns to spot likely signs of an intruder, it learns about specific intruders. Through heuristic programming, Oculus will gather data about the actions of a spotted intruder, or potential intruders and identify their patterns. It gathers passive flags and data cues, even if no official record is made of a hack, and can always apply these later by cross referencing it's database. For every time you complete a hack against a system with an Oculus active, the Firewall and active defender(s) gain a +10 bonus on all opposed tests with you specifically (maximum +60). This persists even if the hacker is anonymized, as it learns based on activity, not IDs, but it can be confused by group hacking or making an effort to alter your normal activity patterns. This bonus is lost if the Oculus is crashed or deleted. [Major] (R)

Partition: Also sometimes called a "great wall", software partitions are used to block out access to certain software by an attacker. This can be either an app which controls access, or be fundamentally built into an operating system. While a Partition is active, one cannot make Mesh Combat attacks (local or remote) on any software which is protected by the Partition. At the GM's discretion, it may also prevent otherwise normal user functions (like using apps or terminating software processes) without Security/Admin access. Operating systems, Cyberbrains and Account shells cannot be protected by a partition. ALI and Informorphs can, but in doing so they are limited by the restrictions of the Partition to software which is not contained within it. Partitions can be circumvented by crashing or disabling them via Hacking, or by faking authentication. [Minor]

Red Dress: Hacking is not all about brute-forcing, cracking, trash & crash or nuking. Many professional hackers prefer to be subtle and not alert the system at all. To this end, some of them use programs like Red Dress - a sub-ALI script which is designed very simply, as a distraction. Activating Red Dress takes a Complex Action, when it is active the app creates a distraction. What this looks like depends on the system being hacked and it's current conditions. Red Dress may attempt to physically distract a sysadmin with a personal message, or a standard request for help, but this doesn't work on a small private system. In most cases, it creates a new fake account which lacks proper authentication, a "fake" intruder which a system or operator will spot and remove, after which security functions are usually reset. This can be used to "take the heat" if a hacker thinks they're about to get spotted or dumped by giving the admins something to catch - but it doesn't always work as the Red Dress' dummy account does nothing to fight back or escape. [Minor] (R)

Shield Wall: An upgraded version of Aegis, this system not only blocks common malware attacks, but actively hunts for them in a system. It can be used to spot corrupted files, viral data and more, and will flag or delete them as necessary. Running Shield Wall in public systems or high traffic is uncommon, but more paranoid users like the additional layer of protection besides their default firewall. Shield Wall assists in Security Audits, scheduling and running them with regularity, and offering a +10 on the Infosec check to perform them as well as halving the timeframe. If there is no system defender to run it, the Shield Wall has an Infosec of 40 (counting it's own +10) to do so. In addition to patching exploits and backdoors, the Shield Wall will locate any lingering corrupt data, malware, spyware and other bad-actor software lingering in the system after an intrusion, so long as it's not too well concealed and fits its filters. Shield Wall also still provides 5 AV to all software on the same device as it. [Major]

Time Bomb: Sometimes, you just want to fire-and-forget. Time Bomb is a form of malware akin to a scorcher which does just that, it produces a single burst of viral data, bad packets or network noise to destabilize a program, then is gone. A hacker (or just an angry user) uploads or copies the software onto the system, then "points" it at a particular piece of software. When it is commanded to run (which can be set to timers, remote triggers and more) it automatically inflicts 3d10+5 DV to that software. Having "fired",  Time Bomb is then effectively deleted from the device. A defender aware of a use of Time Bomb can roll a simple success Infosec test to intercept it. Most professional networks know to find lingering Time Bombs in file uploads or delete them in regular security audits, but not always. Computer Forensics can sometimes trace the origin of a Time Bomb. [Minor] (R)

Wrench Wench: Normally, apps cannot repair damage inflicted in Mesh Combat - one has to close and reboot the app to restore normal processes. Wrench Wench helps with this, it uses active system recovery functions to scan all running apps and data files, and attempt to correct glitches, troubleshoot errors and even patch in bad code. Wrench Wench repairs any apps 1d10 DV every minute, just like OS, Infomorphs, accounts and cyberbrains. Additionally, all software on the same device as Wrench Wench ignore the penalties from 1 wound, as it's functions compensate for damage by finding work-arounds. [Moderate]

Sunday, November 10, 2019

The World of Tomorrow

The World of Tomorrow
Station Type: O'Neill Cylinder
Allegiance: Independant (Morningstar Constellation)
Primary Language: English, French, Japanese

Tucked into the Venus/Sun L4 point, The World of Tomorrow is an unusual habitat. Earth Nostalgia is a huge factor in the post-Fall era, whether people admit it or not. The World of Tomorrow is a send-up of those dreams of the futurepast, a habitat modeled on humanity's vision of the future in the 20th century. This is the world our ancestors thought would be the future, which never came. A world of art deco and streamlined chrome, powered by THE ATOM and more. Sprawling skyscrapers of an early style dot its interior skyline, combined with exotic flying or suspended structures as there is a lot of emphasis on the air, and influence of Venusian culture. The cylinder is designed to mimic earthlike gravity and atmosphere.
World of Tomorrow is effectively a tourist destination, though there is some more serious work for some residents. Established by some Venusian hypercorps, it is run by the "Science Council" who built the hab and maintain it's specific atmosphere. People dress in retro sleek clothing, go about their daily commute using personal thruster packs or flying cars, and servitor bots wearing aprons and frilly headdresses scoot around doing menial work. AR skins can complete the transformation, turning any piece of decor or tech into a deliberate retro-ism. Some even can render the world in black and white. The aesthetics constantly reference early atomic and rocket science, and unnecessary blinking lights abound. Visitors will find quaint little throwbacks like "food pills", typewriters and public telephones. Permanent residents form a blend of actors, otaku and actual scientists doing some work.
For visitors, there are a variety of packages and levels of experience. "Day trippers" just out for a quick sleeve and go often simply just tour the hab, seeing the specific detail of life here and taking in some of the sights. One can hit up the range to play with some exotic beam weapons, visit the best recreation of a milkshake parlor in the solar system, or visit a variety of museums which explore the early history of spaceflight, atomic energy, computers and robotics. Several of the hypercorps which are invested into World of Tomorrow also operate "show labs" here, they do little in the way of actual research but are able to run demonstrations and presentations to advertise their companies and technology. There's even several drive in film theaters. For those who wish to recapture their child-like wonder, World of Tomorrow has a large stock of neotenic morphs to sleeve in to. For those paying for an extended stay, or especially who arrive physically, there are more amenities. World of Tomorrow has several comprehensive resort hotels which model several cultures and periods of Earth history, offer gourmet dining, robot butlers, the works. The various districts of World of Tomorrow are crammed with various unusual shops and services - specialists in retro tech. World of Tomorrow is one of the foremost places to either copy or produce retro storage media, like vinyl discs, wax cylinders and magnetic tapes. Art boutiques are masters of reproducing the hab's look and feel to any modern technology as well, selling various custom-made souvenirs to visitors, using one-time blueprints for those who did not travel there physically. And in some corners, one can find very expensive and elite stores selling actual Old Earth antiques and artifacts. The best of these have Reclaimer connections and occasionally sell objects recovered from the post-Fall Earth. If the simple art and culture aren't enough, there are many themed packages, which use actors, ALI and AR effects to create all kinds of neat scenarios you can interact with. You can fight (or be) a mad scientist, experience a kaiju attack or repel an alien invasion (Grey morphs are also popular sight on the hab), be part of a viral outbreak movie, be a giant robot pilot or space captain, and more. Depending on how much you're willing to spend, you can do group scenarios, generic ones, or even custom tailored things right to you. Those without an excess of funds will have to settle for XP.
For the residents of World of Tomorrow, things are slightly different. Corporate employees from sponsors are basically on permanent work visas - they're responsible to their employers, but still bound by the charter of the hab (based on Venusian common law), and still perform all their normal functions. While a lot of them handle PR, some real scientists and researchers are employed to do actual work, or just provide accurate technical descriptions of their work. Working at World of Tomorrow is usually considered a relaxed and positive posting, though some more serious workers find it a bit grating. Next are the "actors", or just the personnel hired directly by the Science Council. They are employed, and live a life many in a corporate owned hab would find familiar, though with the "softness" the Morningstar Constellation is known for. Many of them are indeed "actors", or at least roleplaying - they perform normal jobs such as repairing or directing bots, policing the streets, customer service and more, but must do so "in character". Indentures are rare in the World of Tomorrow as a result, few applicants have the personality and social skills for the work - instead a lot of glitterati types often end up here, trying to get a "break". For those who can't or need a rest from constantly dealing with tourists, like most Cylinders World of Tomorrow has large sections of green space which are used both for environments and to grow food - many earth classics. There are even some stock of cattle herds for that authentic "beef burger" experience (so yes, there are space cowboys. And girls, and neuters, and herms). While not an extensive shipyard, World of Tomorrow does have some facilities to build and repair spacecraft, often adding their retro flare. Other menial tasks are usually handled by ALI. Then there are the hobbyists. They come from all strains. Some are permanent tourists, some are former infugees looking to recapture the past, others wish to take a break from the "real" world of Luna and Earth Orbit. Even some are born from wandering Scum Swarms or emigrate from the Outer System to experience a world they never saw, having been born far from earth. While all of these are enthusiasts, their flavor can vary. A very few are actual experts, historians, anthropologists and documentarians who are consultants for the Science Council, or just want to get as close as possible to their subject matter. Many are artists, who are trying to recreate the style of "raygun gothic", producing vids, games, VR and more based on the aesthetics of the hab. Some may blend with the next group, the gearheads, who are the masters of the old mediums, understanding various outdated and retro tech - and even producing media on it. World of Tomorrow has one of the few functioning facilities to produce actual "film" vids in the solar system. And then there are those who are here just because they want to escape the modern solar system, and engage in a little nostalgia full-time. These all make their way as one does in the hypercapitalist economy, acting as freelancers or flexible employees to sell their wares or services.
Unfortunately, World of Tomorrow is heavily reliant on tourism and outside sponsorship. The system of Venus orbit is fairly open, requiring all materials to be recycled or imported, which can be expensive. The place generates positive PR and rep for most involved, so for now it is fairly stable, but if Earth Nostalgia ever becomes passe, the habitat could be in trouble sustaining itself. It is also a bit of hotbed for Reclaimer activities in the Venusian area. While the most hardcore are stationed around Earth, there is plenty of agitation, especially from the wing of Morningstar opposed to complete Venus terraforming. Those with these opinions tend to keep quiet in public, however, as the Planetary Consortium officially pushes that earth is dead and gone, despite being a large source of the tourism.

Saturday, November 9, 2019

Melee Weapon Mods 2E

(This was much requested by my home group players to bring over this original article to 2E. So without further ado, here are some weapon modifications and accessories which can be added to melee weapons.)

Ballistic Grip: Melee weapons always have a range disadvantage. To combat this, some weapons embed a single shot of kinetic ammunition in a hidden grip, with a barrel concealed with a small cutout (or disposable protector) which can be released with a hidden latch or trigger. This has all the stats of a Holdout Pistol, but is only SS. The hidden round cannot be sensed except by X-rays or other penetrating scans. [Minor] (R)

Custom Grip: Specially crafted grip made of shape-changing memory materials, and special density alterations to contour perfectly to the hand of the wielder and adhere to them. Configures in 3 Action Turns, the user it is set to gains a +10 on Melee tests, but all other wielders take a -10 to Melee until they reconfigure it. [Minor]

Folding Weapon: Weapon is made to be collapsible. The business end is made of extending or telescoping materials and shape-adjusting smart materials, and the handle is rebuild to collapse the weapon inside of it. In short order the weapon can be extended or retracted to just the handle. While collapsed, the weapon is much more innocuous. The weapon collapses to Very Small size (and thus is Concealable). [Minor] (R)

Ghost Sword: Weapon is remade with metamaterials along the "business" end, which render it invisible to the naked eye and several types of scanners. this also makes it hard to wield, as it must be done by feel. -20 on attack rolls with the weapon, but -20 on Fray to dodge or parry a successful hit. This penalty also applies to certain sensor rolls to find the weapon (but it is not necessarily easier to hide). [Minor] (R)

HF Blade: The weapon is armed with an oscillating module which causes the weapon to vibrate at ultra-high frequencies, like a Vibroblade. This effect is not very pronounced in most cases, but does allow it to slip through or grind down armor more easily. When careful action, such as a sawing motion, is applied, add +1d10 DV. The weapon is Armor Piercing. [Minor] (R)

Masterwork Blade: Most weapons are produced by fabricators, using standard metallurgy. Rarely, a skilled smith who has experience will craft the weapon, using fine quality metals, though this requires additional resources. The weapon with this mod deals +1d6 DV. [Minor]

Oversized Weapon: Some morphs are bigger and stronger than others, so they need bigger weapons. This mod can only be applied to a weapon which is not already Two-Handed. The weapon becomes two-handed, and gains Reach, but loses Concealable if it had it. If it already had reach, it gets the next level of reach (+20). [Minor]

Quick-Draw Sheath: While it can be fairly easy to draw many melee weapons, with a combination of some skill and tech this can be done very rapidly to allow surprise strikes on an enemy. This can be a spring-loaded or tactical sheath, a perfectly angled scabbard or a set of electromagnetic locks which can switch from holding to repelling a weapon in a flash. Allows one to draw and attack with a Melee weapon with a single Complex action. [Minor]

Shock Capacitor: Weapon has an embedded battery, capacitor and conductive lead, which causes it to generate an electric shock on contact which discharges the capacitor - flooding the target with incapacitating electric current. The weapon gains the Shock quality, which can be used in touch-only attacks. [Minor]

Thermic Weapon: Similar to the shock capacitor, this weapon is embedded with a nuclear battery, but also a heat conducting element that when activated superheats the blade. Thermic weapons are incredibly dangerous, but will boil straight through armor and even deck plate. The weapon gains Armor-Piercing and now affects Energy armor. If the attacker scores a superior success, the target is set On Fire, taking 2d10 DV per turn until extinguished. [Minor] (R)

Viper Capsule: The handle of the weapon is rebuilt to hold several doses of drugs, toxins or nanotoxins. Then, in a pinch, they can be released with slight pressure to flood the blade, delivering their payload to a target on a strike. The target must be damaged by the attack to deliver the payload. Holds up to 5 doses, bladed weapons only. [Minor] (R)

Friday, November 8, 2019

Revolvers

Revolvers or "Wheel Guns" have been a common style of handgun for several centuries, originally holding more rounds than traditional single-shot guns, after the rise of automatics they became prefered as an emergency weapon as their mechanisms are much less likely to jam, and because they could load different ammunition or even allow customization of ammo load. After the Fall, Revolvers of several types are still used for these purposes, by those who want slightly more stopping power, control over ammunition loads, or who don't trust modern kinetic designs. Modern revolvers are made with advanced polymer frames to reduce weight and speed production, and can load the same style of caseless ammunition as other kinetics. They are all double-action or have a recoil based action, and are designed to be used with speedloaders or have disposable cylinders. Antique revolvers may require additional Complex actions to reload. In addition to having Smartlink and Safety Systems, all modern revolvers are equipped with mesh-controlled "smart cylinders" which allow you to load specific chambers with ammunition and freely switch to them quickly (i/e have the Smart Magazine effect). Because of their design, Revolvers cannot be equipped with Extended Magazines or Sound Suppressors, but can be Railguns.

Snubnose Revolver: Ultra-compact revolver, designed to be pocketed easily. These typically fire from the bottom cylinder instead of the top in order to better manage recoil. They are used as an emergency weapon by some military and law enforcement, or a self-defense weapon. Concealable. [Minor] (R)
1d10+1d6+2 DV SA Ammo 6 Range 30

Revolver: Standard size revolver. Uses slightly heavier ammunition than normal pistols, with a decent barrel length giving it increased power and range over conventional automatics, which helps mitigate the small ammo capacity. [Minor] (R)
2d10+1d6 DV SA Ammo 7 Range 50

Hunting Revolver: A veritable "hand cannon", these revolvers have very long barrels and high caliber ammo (more akin to a rifle than a pistol round), and were originally used for sport shooting. Some are still used this way, but they may also be used as a showy equalizer. Modern morphs can fire them one-handed, but two hands is recommended for stability. Knockdown, Long. [Minor] (R)
2d10+1d6+2 DV SA Ammo 5 Range 100

Polygun Revolver: Shape-adjusting version of the revolver. Using this technology, it can manipulate barrel size and shape and the cylinder to accept a variety of ammunition and alter it's profile. Can switch between Snubnose, Revolver and Hunting Revolver in 3 Action Turns, using the original weapon's profile, but each accepts different ammunition. [Moderate] (R)

Monday, August 5, 2019

Gacha

(Hey, been a while, huh guys? The simple version is basically that I pivoted a lot of my work to my YouTube channel and growing and refining that, which combined with kind of the stagnation I felt while the 2E was being developed and tested meant I didn't feel like firing in on some EP ideas for a while. But since 2E is out and about and I've been reading it and getting a bit back into EP, I've been thinking about occasionally scratching a few ol' ideas off my list, and maybe some new ones. If you want to hear my thoughts on the new edition, check out the most recent episode of our podcast What's Up? w/ Omega & Lucky where me and the co-host get into it. Also considering subbing us for future Actual Plays and other discussions. Otherwise, here's a bit of a look at what has been consuming a lot of my time for the past couple years...)

"Gacha" is a term for a type of randomized mechanic from the Japanese "gashapon" the term for capsule machines. The western way of referring to this mechanic was popularized as "loot boxes". They are commonly a form of monetization, where one redeems in-game items or currency for a randomized reward, and the currency can be purchased with real-world money. It draws its origins from real life capsule toy machines, where one feeds in physical currency to get a randomly distributed toy (often with specific items having specific rarity), or from the "booster pack" model of many trading card games. Over the years, various concerns and definitions have been raised over the system, theorizing it is anti-consumer, exploits addictive tendencies, or is tantamount to gambling - but also it's incredibly lucrative. This means that obviously even in AF 10, the profitability of these models and familiarity means they are still used in certain types of entertainment.

Randomized trading and collectible card games are still popular, though to conserve resources they are often now purely digital and played via AR. The general outlines for a lot of these games are the same, they involve building up resources to play various personalities or entities, who appear in the AR skin and do battle with your opponent - who can be another person or an ALI. There is a wealth of these games, and often amateur game designers will cut their teeth producing such games, with only a few taking off. Some are licensed products in a franchise, others are their own original creation involving specific art styles and "lore" (For instance, Monsters' Duel has an artstyle based on traditional Japanese pop culture, while Spells: Archived has a western look somewhere between fantasy novel cover and a metal album cover. Both are owned and operated by the same hypercorp). There are even sports based games which involve trading of current and historical players, and often integrate into Fantasy Sports teams who compete against other fantasy teams and clubs. While some of these games offer fixed distribution, most are randomized. Players can either pay real money outright, or grind for in-game points which can be converted into boosters. If players can actually trade their libraries, there is also often a secondary market for specific cards of high rarity.

In the AR or vid-game space, there are also many traditional "gacha games", which rely entirely on this randomized mechanic. One's available "units" or other game pieces are entirely random, and one must spend an in-game currency (often premium) to receive new units. Units often have special increases in rarity (rate ups) or are time limited to drive sales, and some games are not well balanced, meaning new units are often required to keep advancing in play. Many of these games use characters from media franchises, or contain original stories set in fictional universe in order to get engagement from players and build a roster. Still others use public domain characters from history and folklore in their own art style, such as Destiny & Chaos which uses characters from many traditional mythologies, or Tactics Crest, which has famous military commanders. Or the even more esoteric collab between Direct Action and Go-nin, Foxhole Girls, which personifies military hardware with an asian pop-artist style. These rely more heavily on gameplay and appealing to classic questions like, "Who was a better commander, Caesar or George Washington" or "What would happen if Hercules and Cu Chulainn fought?". Some do use entirely original rosters, though often with very archetypal setup for why one must collect all these characters - these models often have to try very hard to get noticed in the market.

Other games, especially VR games, may utilize this form of monetization as an extra revenue source. While many allow custom adaptations by the community, quite a few also randomly distribute cosmetic in-game items randomly, adding new "skins" to the simulmorph or various aspects of the game universe. Some of these are quite rare, and often highly valued in the secondary market either just for the prestige, or because they're often designed by the professional art team. Some of these items may be available in non-randomized form, but often require large expenses of in-game, even premium, currency, incentivising the "gambling" aspect. Some games take this a step further, pushing closer to the "gacha" model to randomize actual game elements such as in-game equipment, abilities, characters, etc in the rewards system. If these are mechanically superior, this is often seen as a warning sign for consumers, as those with lots of free time and money can often gain an edge over players with shallow pockets or who lack time to grind.

How these games are handled depends very highly on the "market place". While quite a few polities don't necessarily feel any moral compunctions against gambling, some may not like the monetization angle, others are money driven but note the stigma. The LLA is a more socially conservative locale, who carefully regulates many of these models - requiring rarities to be posted, availability to be clearly stated and leaving exploitive tricks (such as making a unit appear for a limited time, then reappear later permanently without noting) open to litigation. Morningstar operates similarly, trying to enact a more "concerned" hypercapitalism, and avoid the appearance of praying on addicts. Such games are somewhat rare in the Jovian republic, especially as they tend to be less focused on some of the technologies - but may still be made available with some of the same regulations. In addition, if a game deals with sensitive subjects (such as nanotechnology, AGI, Uplifts, Anarchism, etc) it may be censored by the government, in addition to removing blatant sacreligious elements. The Planetary Consortium and allies polities, on the other hand, fully embrace the free market. Little restriction is put on these games other than the default protections one might assume (such as outright scams or frauds), and let the consumers take care of the rest. This tends to mean the most exploitative or profit driven games have smaller player bases or build slowly over time, while more "approachable" games are more acceptable, liked by their players for not being a "blatant" cash-grab or having more respectable mechanics for free or small-budget players which keep them interested.

Extropians have an interesting approach - as obviously they see nothing philosophically wrong with any model where the customer voluntarily pays in, fully knowing the terms of the payment. Extropians may often play the same games as the PC. However, their open source and remixing culture puts them at odds sometimes as well, leading to many "hacked" servers, homebrews, or "custom" games where underlying codes and elements are altered, units and items added, currencies and probabilities changed, etc. Players of these versions of the games are often barred from the "normal" versions, but some of these offshoots get popular on their own. The New Economy also has interesting thoughts on the model. Autonomy isn't restricted, so there's nothing wrong with people playing these games or the gambling aspect, but exploitative monetization is frowned upon also. Like the Extropians, Anarchists and Titanians often have to host their own versions of these games (or are distributed a different version) with the monetization elements removed, and in-game points only used. Some have even integrated this with the rep system, players in good rep standing generate steady amounts of in-game currency to trade in for the randomized materials. Players with bad habits or who have a low rep will find themselves struggling to earn new items, cards or units.

Tuesday, February 20, 2018

So, You've Just Been Resleeved

[EDITOR'S NOTE: Variations of this Article have been circulated by the Planetary Consortium since shortly after the Fall. All too often Sentinels forget about their basic procedures in a rush to get back in to the action, so it's good to refresh yourself on the basics. I've edited a lot of their political BS out of this version, and kept it to just the stuff you actually need to keep in mind, with some additional comments. -Yumiko Akiyama, Veteran Sentinel]

1. Remain calm and take it slow when you resleeve. Physical side-effects can include dizziness and lightheadedness, shakes or shivers, temporary loss of balance, exhaustion and poor fine control, which persist for a statistically average 24-48 hours. This acclimation period is perfectly normal, so remember to plan your sleeves accordingly. This effect is noted to be less if one uses a familiar Morph type, or a clone of a previous morph.

[Yumiko: This is actually good advice. If you're not lucky enough to be a person who has developed strong adaptability, you'll feel a little off your game for a day or two. Don't push too hard even if the case is hot, make sure your new body works first. I recommend finding a safehouse, getting the lay of the land, or making sure to reup any implants you need to kill the time until you adjust.]

2. You may experience mental or physical artifacts when resleeving. This is perfectly normal, and will pass in time. If you are unsure if your behavior is normal for you, or if you experience excessive amounts of memory, emotion or habitual artifacting, check with your Muse, or a resleeving technician for assistance and psychological analysis. Otherwise, remain calm and act as comes natural to you.

[Yumiko: Artifacts are the worst, usually. Sometimes you get an embedded skill, but almost every Sentinel has experienced a sudden bout of nicotine or caffeine addiction, or something harder. Pods are the shittiest, the underlying cyberbrain architecture can come on very strong. I've had bad experiences being all "oorah devil dog" in Security Pods, or worse in a Pleasure Pod. I recommend contacting The Eye for help first though, if you don't have a mind-doc in your team.]

3. Normally, your HUD will be turned off not to display date and time, and there are no reflective surfaces in the resleeving room, to prevent unwanted panic over continuity and identity. Take your time before examining yourself and checking the time. Your Muse is equipped with psychology software, and will let you know when you are ready to examine your new body and circumstances.

[Yumiko: Sentinels ignore this part a lot, we're busy. I kept it in mostly for contrast - don't rush back into action if you're coming off a violent resleeve, but familiarize yourself with your morph as soon as possible. Try not to be too obvious about it though, you might weird out the technicians in a public body bank or clinic - they're used to dealing with rich tourists, travelling corp-men and indentures cashing out their contracts most of the time.]

4. Take time to adjust to your new physical situation - this includes both any changes to height, weight and balance of your new morph, but also different conditions of gravity, atmospheric pressure and other environmental conditions. Proceed with caution when you get up from the ego bridge and begin moving around.

[Yumiko: I honestly think this should be higher up the list, but to the PC I guess it's more expensive and time consuming to have to fix your mental problems instead of a stubbed toe or bump on the head. Just stay relaxed like they say and get a feel for the new body and where you're operating. Understanding your physical capabilities and limitations can mean the difference between needing a new Morph]

5. If you have spent an extended period in a Virtual environment, be aware some sensations may be sharper or more defined in "real space". Please remember to consider your surroundings and local customs when refreshing yourself on "real" sensations.

[Yumiko: Not often a problem for Sentinels, even if they have been in VR or Infomorph states for a long period of time, but the last part stands all the time. As an operative, be familiar with the terrain, both physical and social, and account for it in your actions. Anything you do which is worth remarking might come up later if an opposing group tries to track you. But, if you're an AGI who hasn't tried a physical morph out before, this does apply. Keep it relaxed until you're in private]

6. Be aware, unless you have made a custom order, your Morph may have been previously used. Be cautious leaving yourself in Privacy Mode as people may see your face and think you are someone else. Depending on what your Morph was doing recently, and how long it has been in storage, you may feel the need to "catch up" on bodily functions preserved during stasis. Do not be alarmed if you feel a strong desire to sleep, eat, excrete or experience physical or emotional arousal.

[Yumiko: The face part is the most important here, especially if the organization is providing your bodies and doesn't give you full provenance. Given how we have to operate in secret, operating anonymously is not unknown. Cover your face if it's going to be a problem. Getting a quick meal or lay in right after resleeving can sometimes help you adjust, however. I edited out the lovely implication you can often pay for a new face right away in the shop - find somebody on the street who can do it cheaper.]

7. If your new body comes with additional implants, take your time to familiarize yourself with their features, to avoid accidents and make the most of your Morph.

[Yumiko: Again, damned good advice. Sentinels can go crazy ordering new 'ware for an OP, make sure you know how to use everything. As a freelancer before Firewall I knew some guys who accidentally hit themselves in the groin with an implant blade or hand laser because they forgot which muscle groups set them off. Enhanced Senses also can take some adjusting too. Again, edited out the bits where the Consortium tries to shill you on ordering new mods right away.]

8. Remember to be polite to the Resleeving technicians. They are here to help.

[Yumiko: Presented without comment.]

Sunday, January 14, 2018

Psychovore

PSYCHOVORE
A species which is found on Bromeliad, but probably not native to there. Their normal appearance is a semi-amorphous quadruped with blue-black skin about the size of a medium to small dog. They have no apparent eyes, but do have some photosensitivity in their skin, allowing them to "see", as well as sense Near IR (body heat) and their own Psi senses. The Psychovore name comes from their unusual "diet", which is to make physical contact with the brain or CNS and parasitize the neuroelectric and neurochemical energy there, killing the host. To assist in this, they are effectively boneless, with variable tension in their outer skin and internal fibers, making them fairly strong and fast moving. They can grip to surfaces and their "limbs" can sub-divide up to the nanoscale level like fractal digits - a capability beyond Transhuman biology. Their limbs can even stretch and flex, giving them some surprising reach. Other internal structures are flexible and adaptable. They self-repair quickly with healing organelles which are as efficient as medichines, and their internal composition is very variable - with "storage" organelles halfway between power plants and neurons. They are also resistant to vacuum and do not need to "breathe" for their metabolism. Combined with the fact that they reproduce asexually by fission after large meals, the complex internal structure, this all around hardiness means it is highly likely Psychovores are artificial creations - some kind of alien bioweapon. Initial studies indicate they may have been on Bromeliad for upwards of 100,000 years.
Behaviorally, Psychovores are solo or small pack hunters. Their skin is chameleonic, and they can climb fast and well, so they tend to hide out of line of sight and ambush, utilizing their Psi abilities to sense even through solid material. They can also fit through or in small spaces as needed. They have a pronounced range of senses. They tend to immediately go for wherever the brain is located with a pounce or drop, but if they don't have easy access, they can grapple or even use Psi Sleights to try and stun the target, both on contact and remotely. If threatened, they will try and provoke a fear response or "disappear from perception" of observers. Psychovores are hostile to drones and synthmorphs, destructively attacking them when spotted - possibly due to their inability to sense or attack them with Psi.
Initial examinations of their structure is that they're basically all "brain" equivalent, and digesting brains of others allows them to grow new neural tissue - which is also all their other tissues, and divide or grow in strength. While they are not actively sapient, they do have animal cunning and appear to be able to "learn" by consuming animals to know their behaviors. Given their chamelonic and adaptive abilities, this gives great concern if they should ever be able to consume a large number of Transhuman brains. What might they learn about hunting us?
Threat Level: Orange
Numbers: 1-4
COG 5 COO 20 INT 15 REF 20 SAV 5 SOM 15
WIL 20 INIT 7 SPD 2 DUR 25 WT 5 DR 38
Tendril: 1d10+1 DV, AP 0, Reach, Subdual
Fractal Stab: 1d10+4 DV, AP -8
Psychic Vampire: After making a successful Subdual attack, the Psychovore can spend a Complex Action to perform a Psychic Vampire attack, which is an opposed WILx3 test. If the Psychovore succeeds, it deals 1d10/2 DV which ignores normal armor (but not Psi Armor). It will latch on until the target is dead and they are removed and deal 1d10/2 DV this way each round. The target must have a biological brain.
Fray/Armor: 50, 2/3
Perception: 40
Move: 4/20 Walker
Skills: Climbing 40, Control 40, Infiltration 40, Sense 40, Psi Assault 40, Unarmed Combat 50
Ware: Chameleon Skin, Infrared Vision, Grip Pads, Fractal Digits, Medichines, Squishbot, Vacuum Sealing
Traits: Limber (2), Small Size, Psi (2)
Psi Sleights: Agony, Confusion, Drive Emotion, Ego Sense, Extend Range
Absorption: When the Psychovore successfully makes a Psychic Vampire attack, it heals a number of DV equal to half the DV it deals with each attack. If it kills a sentient creature it gains a +10 to COG, INT and WIL for 1d10 Hours or can divide to form 1d6/2 Psychovores.
Stress Test: 1d10/2 +3

[SIDEBAR: Psychovores Of Unusual Size]
Theoretical simulations based on examinations of their physical structure and preliminary survey reports indicate there may be larger Psychovores out there - some kind of mature stage when they fail to divide - or perhaps upon many divisions. These forms are more flexible, some may even be able to walk upright or have even more multipurpose limbs. When upgrading the Size Trait of a Psychovore increase all it's Attributes by 5 (and make sure to also increase derived stats and skills appropriately). If it is Medium Size, it has a DUR of 35, if it is Large size it has a DUR of 50. Psychovores of this larger size also begin displaying more complex behaviors as they absorb knowledge and skills from victims. They can add any skill (including Knowledge skills) they like when they kill a victim, and can also copy any of their Psi Sleights. They can mimic the form and shape of other things, akin to Skinflex/Shape Adjusting wares but do not normally gain the Disguise or Impersonate skills, so their ability to pretend to be something complex (like a Transhuman) is limited. Their physical forms can also mimic any Bio or Nanoware they consume, particularly sensory and mental augmentations. The more they consume, the smarter and more adaptable they get. At a GM's discrecion they may even being displaying Psi Epsilon abilities.

Saturday, January 13, 2018

Psyche

Harker
Type: Rocky Moon
Satellite Of: Bromeliad
Gravity: .15 g
Diameter: 3275 km
Atmospheric Pressure: N/A
Atmospheric Composition: N/A
Surface Temperature (Mean): -60 C
Day Length: N/A
Orbital Period: 36 Days
Gate Access: Martian Gate (vis Psyche Station)

Bromeliad
Type: Terrestrial (Tundral)
Primary Star: M5V (Red Dwarf)
Gravity: .8 g
Diameter: 11313 km
Atmospheric Pressure: 1 atm
Atmospheric Composition: 65% Nitrogen, 21% Oxygen, 6% CO2, 4% Hydrogen Sulfide, trace other gasses
Surface Temperature (Mean): -5 C (26 C in Volcanic Regions)
Day Length: 28.5 Hours
Orbital Period: 
Satellites: Harker
Gate Access: Martian Gate (vis Psyche Station)

The Harker/Bromeliad system is the classic example of "dirty little secret" exoplanets. It should be of intense interest to the public, and scientific data from it of utmost interest to all researchers - but it is incredibly unknown. The gate, now named "Psyche" for the station built around it, stood in the LaGrange point between Harker and Bromeliad. Harker is named after the Gatecrasher who explore the system first - and is a mostly unremarkable terrestrial moon, a rough analog for Luna. It has a decent amount of metallic and silicate elements which are drawn on for mining projects, and some water ice in frozen pockets which has been also utilized for settlers. It is not of major interest.
Bromeliad on the other hand, is quite interesting. A tundral terrestrial, slightly smaller than Earth with a slightly toxic atmosphere due to lots of volcanic activity - this geothermal heating is the only thing which keeps it remotely habitable on the far edges of its dim star's habitable zone. Most of it's surface is bare rock, or layers of water ice and other volatiles. But, large volcanic activity has cut through glacial zones in certain regions, in valleys, dormant or extinct craters, geothermal vents and hot springs and sinkholes. These regions, which give the exoplanet it's name, have a bearable (and hot even) temperature, enough humidity they have rain or mist and standing liquid water. And it is here that life has evolved on this planet.
Microbes flourish of course, both chemo and photosynthesising living in otherwise acidic or toxic pools, leeching elements from standing water or geysers, etc. While their biochemistry is slightly different, they do not lend any serious research opportunities to Transhumanity. Complex organisms do, and Bromeliad has them. Exoflora is decently diversified. Their structure and chemistry is sufficiently different from terrestrial plants most of them are indigestible to humans, but otherwise they're roughly analogous to Earth plants. Their chlorophyll analog is called "erythrophylla" because it is a majority reddish in color to our eyes, with slight tinges of orange. Many of them also process sulfur and other volcanic gas elements and secrete them to avoid toxicity, so they smell unpleasant and would be poisonous for even some of the local animals to eat. 
Initial surveys by probes launched from Harker or directly through the Gate did not indicate much interesting in the way of Exofauna. Almost all larger life on Bromeliad is semi- or fully amphibious. They exist in various pools and flows of water, or stalk overland from pool to pool, filtering microbes, eating the less toxic plants or even engaging in predatory behavior. They have a sophisticated DNA/RNA analog which makes them very resistant to diseases, parasites and carcinogens, and they have a slightly acidic biochemistry compared to Terrestrial life. Most of them are limbless or quadrupedal, or just have gripping forearms. While not considered aesthetically pleasing, they are similar enough looking to Earth animals for familiar names. Eelsnakes, Bromeliad Salamanders, Frog-monkeys, Craterskippers and Fanged Toads are examples of these identified species. Smaller life includes amphibious insect analogs, who pollinate or try and parasitize plant and animal life to survive. These can have between 4-8 limbs, and are exoskeletal, while the other macrofauna is endoskeletal - though they seem to be more like sharks with a cartilage-like substance providing most of their internal structure. 
This should make Bromeliad a prime place for colonization. With minimal mods or equipment, transhumans could visit to study the lifeforms, even see them like some kind of nature preserve or zoo. And the volcanic activity means there are valuable heavy metals in the crust to exploit, along with large volumes of water ice. And yet the Gate is mostly locked down, and there are no permanent settlements on the surface of Bromeliad. 
This is because of the other residents of Bromeliad. First discovered when a manned mission was sent to try and find a good place to set up an initial outpost by Pathfinder. Mission logs were heavily classified afterward, but if you know where to look, they can be found. The mission was wiped out to a man by an exofauna form now called "Psychovore". Pathfinder was ready to black out the address for a hostile alien life form, or possible TITAN activity, but this is where the Trinity Foundation stepped in. Officially, Trinity is a group dedicated fostering cooperation between Hypercorps in similar industries to promote the growth of the Planetary Consortium and it's Four-Point Plan. Their name is derived from their motto "Mind. Body. Soul.". But in reality, they are a shell company. Their majority stakeholders are all tied into Cognite, with the rest of their executive slots filled by people tied to corps like Ecologene, Skinaesthesia and NanoSys. 
Trinity vastly overpaid to buy exclusive rights to the Gate destination over Bromeliad, and used it to establish a largely unknown research base, Psyche Station.

Psyche
Station Type: Cluster
Allegiance: Trinity Foundation (Hypercorps) 
Primary Languages: English, Cantonese, Russian
Population: 1,200
Psyche is the variable configuration cluster habitat built by Trinity around the Gate, thus located in the LaGrange point between Harker and Bromeliad. The station's primary purpose is research and development, though it has some business elements and quarters for visitors to scope out Bromeliad, though they are rarely used. Officially, Trinity Foundation uses it as space for it's "cooperating hypercorps" to launch joint research projects based on unique conditions of the Harker/Bromeliad system. Again, the reality is that it is a black box lab, connected to major hypercorps, who can perform exotic research away from prying eyes, under conditions of total control. While the labs and their projects are frequently modified and rotated, ultimately a lot of their research is based on the data of the Psychovore species.
What Trinity has been able to determine about the Psychovore is that they are a complex, amorphous or semi-amorphous species, with usually dark coloration. Their internal structure is more advanced and complex than most other species on Bromeliad, and due to their external appearance many think it is similar to the Factors. However, their internal components and behaviors are different enough to posit they are not directly related. Additionally, Psychovores do not appear highly intelligent or sapient. They are called "Psychovores" because of their unique form of gathering metabolic energy. The flowery way to put it is they "feed on consciousness", but the most accurate way is to say that Psychovores gather metabolic energy by lethally parasitizing the nervous system. They invade and "feast" on brains and CNS systems (or analogous) and absorb neuroelectric and neurochemical energy. More complex organisms with larger brains like Transhumans have more of this energy stored and thus are more nourishing, and a more desirable prey. While feeding on less-complex organisms is enough to sustain them for extended periods, eating large entities means that they can initiate rapid cellular analog division - this allows them either to grow in size and complexity or to reproduce via fission, adding anywhere from 1-4 new forms. This reproduction is aesexual completely, and akin to the growth of a virus or bacterium - mutation and adaptation seems to occur naturally in response to environmental pressures. The worst part of the Psychovore is that appears naturally Asynchronous - that is it possesses what we call "Psi" abilities, in addition to flexible and adaptive biochemistry. Small Psychovores can create a psychosomatic "shock" in the target at a touch, and generate some kind of psychic field which provokes fear responses in large sophonts. Larger forms show more exotic abilities, able to lure targets toward them, or cause them to ignore the Psychovore from their perception. This element seems to be what peaked Cognite's interest. 
Thus, Psyche is built to contain and study these entities.
Psyche, being a large cluster, has all the normal functions you might expect from a space habitat. Given that primary access is via the Gate, there is a large central sphere built around it, which serves as a primary customs access point, with round the clock security and support shifts to move cargo and people. This area is immediately connected to central spar which provides primary support to the station's structures. Along this spar first is the Administrative modules, which handle all command and control stations, and house primary nodes for station infrastructure to be managed. They also have central security offices. It has a permanent residence of about 1200, and this number can balloon as high as 1800 for specific project rotations. This of course means quarters and support for all these people - mostly in the form of habitat modules just beyond admin, connected directly to the gate via transport tubes, some of which are lightly spun for lunar-level gravity. However, some labs have overflow or extra habitat modules attached to them so researchers don't have to go far from their projects. As expected from a group mostly backed by Cognite, the decor is surprisingly detailed and even gaudy - a Neo-Victorian stretching to Art Nouveau style.  
Beyond this point, access is all controlled, which has made it very hard for Firewall to examine the labs closer. Most of this data is based on reports and schematics back in-system, not first hand HUMINT. Access to areas beyond the public ones are handled usually by some form of two-step authentication. Station employees carry physical token IDs or have nanotat IDs which are matched to Ego ID data recorded in the central hab servers. Tokens and Mesh IDs are rigorously tracked by internal security, and logged by various sub-networks. Access points are paired with the Ego ID authentication, which means only authorized personnel with their proper entry materials can enter a given section, which is primarily done to prevent people from accessing areas off-shift or when they have been reassigned, but they cannot be accessed by just stealing the right token access cards. Infomorphs utilize Digital ID codes instead, which are checked when logging into or transferring to certain devices. Coupled with many isolated or outright air-gapped internal networks makes Mesh access also limited. 
General purpose of sections is originally related to Psychovore phenomena, but this has branched out into several covert research operations under these strict security measures. This is similar to the function of the Aten station in the Solar Corona in-system, but there is no involvement with groups like Direct Action, and minimal interference from Oversight. Instead, internal security is handled by an in-house Security division, and primary oversight comes in the form of (well paid) Pathfinder reps. 
The central spar sections are primarily infrastructural. Hooked into and extended from main habitation modules is public services modules, with medical and resleeving facilities as well as psychological care stations. Past them is mostly a network of storage modules and inventory management. From here a lot of repair and reconfiguration ops are run. Opposite side of the spar from Admin and Habitation is the primary infrastructure sections. First is Life Support, with primary water-treatment and atmospheric and environmental control modules, though sub-modules are embedded in various strands of the cluster. Past this is the Power Plant and Resource Refinement modules. Primary power output is a DPF fusion reactor, which provides power via hardened transmission lines or wi-tricity transmitters. Backup power is provided to individual modules by large nuclear batteries or supplemental solar, though solar efficiency is weak due to the dim local star. Resource refinement combines waste management with mining and harvesting operations conducted by ALIs and teleoperation on Harker. Access to these modules is limited to technicians mostly. Both ends of the spars are capped off with shuttle and drone bays, where ops can be launched to Harker and Bromeliad directly.
Out from the spar are the lab clusters. Many of them are designed to be reconfigurable and expanded or contracted as needed. They can also be jettisoned or quarantined easily in case of some emergency. While the exact labs and projects can vary at any given time, there are a few major internal departments which almost never fully close. 
  • Exobiology is the largest and oldest - they directly study the Psychovores as well as other flora and fauna on Bromeliad. They make observations both on carefully contained "live samples" and surveys of the planet. They are also attempting to deeper understand their physical structure. Notable modules within this department include Genetics and Behavioral Analysis labs. There is also the "Paleontology" module, which is more like a Xenoarchaeology section - studying the history of Bromeliad to look for clues about the appearance of the Psychovores and the common theory that they are some kind of artificial bioweapon deployed by an earlier species. 
  • Parapsychology is the next oldest and largest, but by far the darkest lab. Almost nobody knows what goes on there, other than reports back to Cognite indicate that their primary purpose is to study Psi phenomena. Originally, it seems like their purpose was to study the effects of Psi on transhumans, as well as detect and interfere with psi and asynchronous brain-waves as per the Psychovores, but has since expanded. They now appear to conduct research on Transhuman Asyncs and their capabilities, as well as run complex simulations on the limits of psi phenomena exhibited by exsurgents and xenofauna. As the only known way for transhumans to develop async abilities is to be exposed to certain strains of the Exsurgent Virus, this is deeply troubling research. 
  • Neurogenetic Hardware Labs are a small, permanent and prestigious posting - which appears to be the open face of Parapsychology. Trinity promotes their work the hardest, which is mainly on development of morphs and cyberbrains to ever expand the transhuman limits. Covertly they also appear to be working on cultivating morph lines which are resistant to Psi. They have notable sub-divisions, an AI lab, a Forking lab and Psychosurgery lab. The AI lab seems to focus on standard AGI generation from neural maps or ALI generation from pruning to suit station needs and research tasks. Forking, however, is more dangerously experimenting with exotic fork-hives and merges into Transcendant forking. Psychosurgery works closely with Human Augmentation (see below) to perform skill grafting, scanning as well as developing new techniques and hardware tools. 
  • Human Augmentation is the most volatile division. While almost always up and running, it's various departments are constantly swapping, closing and reconfiguring modules. It is probably one of the most active departments on Psyche. Their three primary wings are Implants, Pharmaceuticals and Software. The Implant group is self-explanatory, working on new ware, primarily bio and nano based on other researches. Primarily cognitive and sensory enhancements, but they also have built some mods from exotic xeno-life samples. Software is primarily focused on skillsofts, particularly exotic skills or knowledge bases. While high quality, many of these are esoteric, projects which couldn't survive normal working conditions at places like Cognite or Experia. They also work on software plugins and upgrades for infomorphs. Pharmaceuticals is probably the largest consistently, working on nootropics and supplements derived from xenosamples. They also are notable for the development of various Psi Drugs. 
  • Remaining labs come and go as projects and funding run through them. Exotic Particle labs have opened and closed several times when they weren't cost-effective. The Planetary Science lab was opened at the same time as Exobiology, but was shuttered only months after and has never been reopened, but also never reconfigured. Resources from other labs and infrastructure are occasionally repurposed to construct Robotics or Nanotech testing labs. An "uplift division" cluster of modules tends to drift from major department to department as they focus on particular projects. The Computer Science lab was subject to some kind of accident and several modules were breached, after which it was quarantined and ejected, only to be stripped down to basic modules re-attached to other labs. And various scientists and department heads have "pet" modules which cover small personal projects, such as Astronomy, Quantum Physics, Linguistics and Memetics. 

Sunday, January 7, 2018

Installing Implants

How we go about installing the many implants known in the Solar System is not often given too much detail. In general, the upgrading process is not something most care to think about. But before Healing Vats became ubiquitous, and even now in places where they cannot be found one way or another, there were other forms of "installing" implants. This complex and messy topic is usually ignored in favor of promoting "safe" and "clean" installs and upgrades at your favorite corporate owned mod shop or open-source, public access medbay. But a Firewall Sentinel should familiarize themselves with the alternate ways implants can be handled, both so they can install in a pinch and know what potential opposition is doing. Illegal mod shops are a not-uncommon X-risk vector.

Software plug-ins for Infomorphs and Cyberbrains are the simplest. This can be done in moments with just about any software. Infomorph upgrades are most complex which require formatting to a particular Ego and require an integration suite of software to pull off. This can take days depending on the complexity of the Upgrade - so most are done in Simulspace time dilation, adding another set of equipment you'll need. Other than the software tools, however, most of this gear is pretty standard. And infomorph running on basically any server with a mesh connection can do this integration on their own or with a partner. This can make tracking such software mods a real pain.

Bioware is a different issue. Usually this sort of thing is handled entirely by a Healing Vat. The ability to permeate all tissues of the morph and provide micro-scale editing and healing can't be underestimated. Some bioware can't be installed at all without a Healing Vat, unless you start from scratch and program a new Morph with the DNA to develop it naturally. Minor bio- or neurochemistry modifications are pretty simple. Medical injectors filled with retrovirii or medical nanos can "install" such changes fairly quickly, and a few doses over time can ensure their permanence. Any idiot can follow the instructions to inject, though getting into the brain via eye socket or nose can turn a lot of stomachs. Glands and organ implants aren't too hard, it'll take about an hour for a medical maker or other form of wet-fab to clone the right part from blueprints. The messy part is the install. This will require somebody else to perform Implant Surgery, a process which can take several hours, to get everything transplanted right. Even with modern medicine, there's usually a short recovery time.

Full-body bioware, like muscle augs, chameleon skin or bioweave armor can be implanted out of a vat sometimes too. This involves a lot of treatments from head to toe, however, and is about as convenient as climbing in a tub full of nanos anyway, most people don't bother. The process to thoroughly install can take an hour or two, but expect it to take longer for the mods to actually fully manifest.

Cyberware is, in some ways, much simpler. Any piece of cyberware can be installed outside of a Healing Vat by a professional. The only downside is that it's all surgical. And a lot of cyberware is heavily neurological, meaning a lot of complex work to be done. But, it can all be done on a slab. This is why you see not just anti-genemod groups like the Jovians sporting old "chrome". A street gang might not be able to afford a jailbroken healing vat, medical-scale cloning and a proper environment to install bioware. But they can probably find a fabber and some rubbing alcohol to sterilize, so you'll see them adapting a lot of cyberware alternates to systems like enhanced hearing and vision on top of cyberlimbs and the like.

For small, non-invasive implants, basic stuff like a new set of access jacks (assuming you already have a cranial computer), ghostriders or liferecorders, you can get these placed in the body in a couple hours and get stitched up. Unfortunately, a lot of cyberware involves hooking into or going near your brain, as discussed above. This is slow, delicate work. The fastest (not necessarily the best) surgeons can get this kind of work done in 6-8 hours. A more realistic timeframe is about 12 hours, and none of this accounts for recovery time. Twelve is also a hard minimum to a serious structural mod, like a Hardened Skeleton. And expect to be down for at least twice that long on the other end.

Now, installing Nanoware is both a lot easier, but also trickier. Assuming your actual nanos are all in order and undamaged, they can be applied basically anywhere via all kinds of methods. Nanodrugs, direct injection, etc. However, because they're so tiny, they're also slow. It can take upwards of twelve hours of steady introduction for medichines to fully circulate in the body and be settled in. Same with something like Nanophages or Oracles. The upside here is that there's no surgical element a lot of the time. Once they've been introduced to your body you can get up and go - the only thing you're waiting on is for them to take full effect. This can be a little disorienting for some kinds of nanoware though, so I'd recommend sleeping on it. Nearly all these units are pre-programmed by default, but having somebody skilled with Nanomedicine around to make sure everything is working fine won't hurt.

On the other hand, some nanoware involves physical integration. Wrist-Mounted Tools are flexible sure, but they don't just assemble themselves inside your wrists - or else they could assemble themselves other places. This sort of stuff does involve implant surgery. It might be a bit quicker or cleaner than with cyber or bioware, but you'll get cut open nonetheless. A healing vat does it much easier, but a surgeon can do it in somewhere between 8-12 hours depending on what you're getting installed. Finding back-alley doctors willing to implant a nuclear thermocouple in your guts is another matter. This is what keeps jailbroken nanoware from running wild - lack of expertise. Nanomedicine is still advancing, and is fairly prestigious. Finding somebody who knows what he's doing can be hard, and while some of them are sure shady, they won't be hanging out in the same places are your regular chop-shop guy.

Robotic Enhancements are much simpler. Synthmorphs don't start bleeding out when you pop their outer shell off with an allen wrench set. They also have their own anaesthetic. Any robotics tech with a fully stocked tool kit and a fabber can install these augmentations. How long it takes depends on the aug and it's complexity. Stuff which integrates heavily into cyberbrains is much more sophisticated work than bolting a new layer of armor on. And don't get me started on the waiting time involved for Brain Boxes... The real problem is that IP protection on Synths can be a lot worse than some bios for the advanced ones, meaning shit like proprietary tools and non-standard sizes. Cheap mass-produced models can go too far the other end, cramming augs into a Case is often like trying to hot-rod your ghetto hoopty. You'll look real cool with a machine gun weapon mount right up until the servomotors in your legs blow out because the morph wasn't calibrated to handle the extra weight.

-B0n3z, Firewall Register