|
|
|
#141 |
|
Join Date: Jul 2010
|
Also, as a side question to all this decking talk going around - I'd like to see an example of how to handle a cyberdeck with GURPS; the TL9 computers that are portable surely don't fit the bill and they don't change all that much by TL as they advance so out of curiosity and possible game utility I'd like to see some prospective game stats on one and an example of how you put it together to make it work (so I can retroengineer the process and build different models and things).
|
|
|
|
|
|
#142 | |
|
Join Date: Oct 2008
Location: Shangri-La
|
Quote:
The "can't suspend disbelief on technology that very nearly exists now" argument just doesn't hold water for me. |
|
|
|
|
|
|
#143 | |
|
Join Date: Oct 2008
Location: Shangri-La
|
Quote:
|
|
|
|
|
|
|
#144 |
|
Wielder of Smart Pants
Join Date: Aug 2004
Location: Ventura CA
|
The original trope doesn't require wireless hackers in the assault team with real-time combat effects. Case was a former military cowboy, even, and he didn't need to do any of this kind of stuff.
|
|
|
|
|
|
#145 | |
|
Join Date: Jul 2010
|
Quote:
|
|
|
|
|
|
|
#146 | |
|
Join Date: Oct 2008
Location: Shangri-La
|
Quote:
And IIRC, Case was a punk-ass street kid who was good at hacking; he wasn't former military. Even the Dixie Flatline wasn't former military. Corso (Armitage) was, but he didn't do much hacking in the book. Plus, Gibson had virtually no understanding of actual computing technology when he wrote Neuromancer, and even his flawed understanding was based on circa 1980 tech. |
|
|
|
|
|
|
#147 |
|
Join Date: Oct 2008
Location: Shangri-La
|
See above re: Van Eck Phreaking. Also, look into the well-known effects of EMP on electronics. Now, give those technologies several decades (and maybe a few cyber-wars) to develop....
|
|
|
|
|
|
#148 |
|
Join Date: Jul 2008
|
That doesn't mean that induction-based computer intrusion nearly exists now. It means that you can wildly extrapolate it from something that exists now, without actually worrying about such minor details as whether it's actually possible.
__________________
I don't know any 3e, so there is no chance that I am talking about 3e rules by accident. |
|
|
|
|
|
#149 |
|
Join Date: Jul 2010
|
Van Eck proved you can interpret the data of a viewscreen as a tv image, I find it hard to believe you'd be able to interact with the terminal via a similar methodology. Related technology yes, actually able to change settings etc, no.
|
|
|
|
|
|
#150 | |
|
Join Date: Sep 2006
Location: Luxembourg
|
Quote:
Physically, i would say it is about the size of a modern keyboard. perhaps a bit more heavier. DR1 for basic model, hardened model exist. A basic one allow computer hacking roll without equipment penalties. Fine or very fine ones add +1 or +2 to the roll. Compact, fast, high capacity TL9 personal Computer It run a C6 decryption program, a c6 Virtual reality program, and a suit of c5 software tool for hacking. A very fine one have the genius option instead of fast, and run a c7 decryption and a set of c6 hacking program. 100TB storage included Does this help ? (The decryption program should be a few complexity level higher, to handle real-time hacking ... perhaps consider that the encryption program run on a dedicated quantum chipset.) Celjabba Last edited by Celjabba; 09-29-2010 at 04:27 PM. |
|
|
|
|
![]() |
| Tags |
| cyberpunk, gurps, shadowrun, tl9? |
|
|