作者 主题: 【暗影狂奔4E Unwired】 雇佣黑客、盗版、虚拟专用网络、值钱数据、伪造者的艺术 P.93-96  (阅读 4627 次)

副标题: 擦掉痕迹,藏好自己

离线 Cobalt 1号机

  • 版主
  • *
  • 帖子数: 421
  • 苹果币: 2
游戏信息

黑客手册 为玩家角色在游戏中使用矩阵提供了更多的选择,为黑客和非黑客角色通过矩阵进行互动提供了更多的机会。本章中的规则和材料可以增加战役的深度,让暗影狂奔对机智的玩家和GM来说更具挑战性和奖励性。

劇透 -   :
GAME INFORMATION

The Hacker’s Handbook is designed to give player characters more options for using the Matrix with their games, expanding the opportunities for both hackers and non-hackers to interact through the Matrix. The rules and material presented in this chapter can add depth to a campaign, making shadowruns more challenging and rewarding for clever players and gamemasters.

离线 Cobalt 1号机

  • 版主
  • *
  • 帖子数: 421
  • 苹果币: 2
雇一个更好的黑客

不是每个角色都适合做黑客,也不是每个黑客都有时间和业力在矩阵的每个可能角落都做到最好。付钱给另一个黑客去做你不能做的事情,或者如果你有时间和设备你也可以做的事情,这没什么好羞愧的(好吧,也许有一点)。下面是一份常见的雇佣黑客服务清单,以及他们通常的街头花费和可获得性。如果玩家的黑客角色想要在狂奔的间歇时间做一些自由职业,也可以自己寻找其中的一些工作。

劇透 -   :
BUYING A BETTER HACKER

Not every character is cut out to be a hacker, and not every hacker has the time and Karma to be the best in every possible corner of the Matrix. There’s no shame (well, okay, maybe a little) in paying another hacker to do what you can’t do, or what you could do if you had the time and equipment. What follows below is a list of common services hackers are hired to perform and the usual street costs and availability for them. A hacker player character looking to do a little freelancing in the downtime between runs might look for some of these jobs herself.

匿名化

在2070年,当有人想给朋友打电话时,他只需拨打朋友的通讯码。然后,通讯链连接到签发通讯码的MSP,并检索接收方的访问ID。使用该访问ID,它同收讯通讯链建立起数据请求连接。在这个过程中,收讯通讯链可以获取到发讯通讯链的访问ID(参见数据交换,第53页)。

匿名化服务可以作为通讯链通信或任何其他数据请求的两个参与者之间的中介。数据包由匿名节点接收,然后使用匿名者的访问ID作为发送ID转发给接收方(参见代理服务器,第104页)。追踪不能显示最初发送方的访问ID,而是中介的访问ID。要检索真实的访问ID就必须骇入代理服务器节点。如果使用了多个代理服务器,则每个服务器都必须被骇入。

劇透 -   :
ANONYMIZATION

When somebody in 2070 wants to call a friend, he simply dials his friend’s commcode. The commlink then connects to the MSP that issued the commcode and retrieves the access ID of the receiver. Using that access ID, it establishes the data request connection to the commlink receiving the call. In this process, the receiving commlink is aware of the access ID of the sending commlink (see Data Exchange, p. 53).

Anonymization services work as mediators between the two participants of a commcall or any other data request. The data package is received by the anonymizing node and then forwarded to the receiver using the anonymizer’s access ID as sending ID (see Proxy Servers, p. 104). A trace will not reveal the access ID of the original sender, but rather the access ID of the mediator. To retrieve the real access ID, one must hack the proxy server node. If multiple proxy servers are used, each must be hacked.

一次性通讯码

一些暗影MSP提供一次性通讯码,即预先出售的,一旦激活,只能使用一次(用于一条消息或一次通话)的通讯码。一旦通话/消息结束,所有的通讯码记录和它使用的访问ID将被安全删除。任何追踪它的尝试都将指向MSP的节点(许多未公开且经常更改的节点之一),但即使该节点被骇入,也无法找到最初调用者的数据踪迹。

劇透 -   :
ONE-TIME COMMCODES

Some shadow MSPs offer one-time disposable commcodes—commcodes sold in advance that, once activated, can be used only once (for a single message or call). As soon as the call/message ends, all record of the commcode and the access ID that used it are securely deleted. Any attempt to track it will lead to the MSP’s node (one of many that are unadvertised and changed often), but even if this node is hacked no data trail to the original caller can be found.

编号信用账户

想要保密自己的金融交易的角色可以利用众多灰市和黑市矩阵银行提供的编号信用账户。这些机构承诺完全匿名和保密;所有的帐户交易都是通过帐户号码、帐户代号和高度加密处理的。尽管这些银行由于为洗钱和逃税提供便利而经常受到政府和超企的压力,它们在妨碍执法方面通常是可靠的。

劇透 -   :
NUMBERED CREDIT ACCOUNTS

Characters who are looking to keep their financial transactions confidential may take advantage of a numbered credit account offered by numerous grey and black-market Matrix banks. These institutions promise complete anonymity and confidentiality; all account transactions are handled via account number, an account code name, and heavy encryption. Though often pressured by governments and megacorps for facilitating money laundering and tax evasion, these banks are usually reliable at deflecting law enforcement.

一次性信用账户

像编号信用账户一样,一次性账户被设置为仅限一次存款和一次取款,完全保密,并会立即删除所有交易记录。

劇透 -   :
ONE-TIME CREDIT ACCOUNTS

Like numbered credit accounts, one-time accounts are arranged as a single deposit and single withdrawal, completely confidential and with all records of the transaction immediately erased.

第三方托管账户

暗影矩阵银行也提供第三方托管服务,在狂奔者队伍和约翰逊先生这互不信任的双方之间充当可靠的中间人。托管服务持有一方的信用额度(有时是货物),直到另一方完成其部分的交易,使前者满意,然后将持有的钱/货物发送给后者。如果任何一方未能履行他们的协议,第三方保管服务将保留这笔钱/货物,最终在交易失败时将它们返还。

劇透 -   :
ESCROW ACCOUNTS

Escrow services, also offered by shadow Matrix banks, act as a secure middle-man between two parties who don’t trust each other—such as a runner team and Mr. Johnson. The escrow service holds on to one party’s credit (or sometimes, goods) until the other party completes its part of the deal to the first party’s satisfaction, then sends the held money/goods on to the second party. If either party fails to follow through on their end of the bargain, the escrow service holds on to the money/goods, eventually returning them if the deal falls through.

引用
黑客服务可获得性花费
破解密码12R骇入技能 x 500¥
建立隐藏账户16F骇入技能 x 1000¥
复制经认证的信用棒24F一半金额(真实新元)
欺骗生活方式16F一个月生活方式花费的一半
劫持载具或无人机8R骇入技能 x 200¥
对个人DOS攻击(1小时)8F骇入技能 x 200¥
追踪数据踪迹6R骇入技能 x 100¥
租用僵尸网络10F僵尸机数量 x 机器成本 x 0.5¥ 每小时
购买僵尸网络15F僵尸机数量 x 机器成本 x 5¥
匿名代理服务4重定向次数 x 10¥ 每天
匿名通讯码(短信/通话)4重定向次数 x 5¥ 每天
一次性即弃通讯码410¥
编号信用账户4R100¥ / 月
一次性即弃信用账户6R存款金额的10%
第三方托管账户8R存款金额的10%

劇透 -   :
Hacker ServicesAvailabilityCost
Hacking a passcode12RHacking skill x 500¥
Setting up a hidden account16FHacking skill x 1000¥
Copying a certified credstick24FHalf the amount (in real nuyen)
Spoofing a lifestyle (1 month)16FHalf cost of lifestyle for 1 month
Jacking a vehicle or drone8RHacking skill x 200¥
DOS attack on an individual (1 hour)8FHacking skill x 200¥
Tracing a datatrail6RHacking skill x 100¥
Renting a botnet10FNumber of bots x Cost of bots x 0.5¥ an hour
Buying a botnet15FNumber of bots x Cost of bots x 5¥
Anonymizing proxy service4Number of reroutes x 10¥ per day
Anonymized commcode (calls/messaging)4Number of reroutes x 5¥ per day
One-time disposable commcode410¥
Numbered credit account4R100¥/month
One-time disposable credit account6R10% of the deposited amount
Escrow service8R10% of the deposited amount

离线 Cobalt 1号机

  • 版主
  • *
  • 帖子数: 421
  • 苹果币: 2
盗版

对合法购买的软件的拷贝保护破解涵盖在SR4的第228页(参见破解拷贝保护表的建议阈值)。然而,非法软件,无论是自行编码的骇入工具还是破解程序的复制版本,都有其自身的问题。第六纪的程序不断变化以跟上前沿技术,定期打补丁和更新是常态,而不是例外情况。不幸的是,这些补丁和更新只适用于程序的合法购买者和许可者——或者对于黑客软件可能根本不存在合法许可——没有它们,程序就会慢慢地走向被淘汰。黑客可以通过自己修补代码、找到补丁或在矩阵的其他地方进行更新,或是简单地下载同一个程序的更新版本,来延缓这种退化。(参见正规软件与盗版软件,第108页)

劇透 -   :
PIRACY

Cracking copy protection on legally purchased software is covered on p. 228 of SR4 (see the Cracking Copy Protection table for suggested thresholds). Illegal software, however, be it home-coded hacking utilities or a copy of a cracked program, has difficulties all its own. Programs in the Sixth World are constantly changing to keep up with the cutting edge of technology, and periodic patches and updates are the norm rather than the exception. Unfortunately, these patches and updates are only for legal purchasers and licensers of the program—or in the case of hacker software, may not exist at all—and without them a program slowly slides into obsolescence. A hacker can stall this degeneration either by fixing the code herself, finding the patch or update somewhere else on the Matrix, or by simply downloading a newer, updated version of the same program. (See Legal vs. Pirated Software, p. 108.)

引用
破解拷贝保护表
程序种类阈值(时间间隔 1h)
通用程序9+等级
骇入程序13+等级
代理/IC/自驾程序13+等级
系统软件10+等级
防火墙软件13+等级
自动软件12+等级

劇透 -   :
CRACKING COPY PROTECTION
Program TypeThresold(interval 1 hour)
Common9+rating
Hacking13+rating
Agents/IC/Pilots13+rating
System10+rating
Firewall13+rating
Autosoft12+rating

发现盗版网络

在开放矩阵上的常规数据搜索永远不会揭示黑客在哪里可以免费下载一个高等级程序或它的更新补丁,狂奔者在哪里可以找到最新天才科技玩具的详细AR蓝图,或者在哪里可以找到用于赛博殖装的驱动程序。这些信息发布后的几分钟内,执法黑客就会出现在这个节点上,调查所有这些发讯者,追踪并逮捕任何发出讯息或提出要求的人。然而,只要做一点工作,黑客就可以访问地下破解者的P2P文件共享网络(见下面的虚拟专用网络),在那里她可以找到并下载程序,并且只需要象征性的费用。

查找并访问合适的网络需要一个数据搜索+浏览(8,1天)延续检定。一旦连接到这样的网络,角色就不需要再去找另一个网络,除非网络关闭了,或者没有她要找的程序(这两种情况都取决于GM)。

劇透 -   :
FINDING PIRATE NETWORKS

A regular Data Search on the open Matrix never reveals where a hacker can download a rated program or its updates patch for free, where a runner might find the detailed AR schematics for the latest wiz tech toy, or where the drivers for that used piece of cyberware are. Within minutes of such information being posted, law enforcement hackers appear in the node to investigate all such claims and trace and arrest whoever is making the claims or offers. However, with a little work a hacker can gain access to the peer-to-peer file sharing networks of the Cracker Underground (see Virtual Private Networks, below), where she can find and download programs for a nominal fee.

Finding and getting access to an appropriate network requires an Extended Data Search + Browse (8, 1 day) Test. Once connected to such a network, the character doesn’t need to find another one unless the network gets shut down, or if it doesn’t have the program she’s looking for (both at the gamemaster’s discretion).

下载软件

一旦一个角色与地下破解者取得联系,他就可以开始寻找一些东西下载了。要在文件共享网络中找到一个特定的程序,需要进行数据搜索+浏览(可获得性+期望的程序等级,1个战斗轮)延续检定。将程序下载到通讯链或终端的费用是该程序市价的10%(参见程序成本和可获得性,第228页,SR4)。搜索检定的失误表明该程序不在网络上,黑客必须找到另一个网络并再次尝试;一个严重失误表明该角色下载了一个感染了一种或多种病毒的虚假程序。

程序更新和补丁也可以在秘密文件共享网络上使用,并且可以用同样的方式定位。程序补丁和更新(将降级程序恢复到完整级别)的成本是程序当前(降级)级别与其完整级别之间街头成本差的10%。所有来自秘密文件共享网络的程序、更新等都被破解了,如果他们一开始有的话。

劇透 -   :
DOWNLOADING PROGRAMS

Once a character has made contact with the Cracker Underground, he can start looking for something to download. To find a specific program on the file sharing network, make an Extended Data Search + Browse (Availability + Desired rating, 1 Combat Turn) Test. Downloading the program to your commlink or terminal costs 10 percent of the street price of the program (see Program Costs and Availability, p. 228, SR4). A glitch on the Search Test indicates the program is not on the network, and the hacker must find another network and try again; a critical glitch indicates the character has downloaded a bogus program infected with one or more viruses.

Program updates and patches are also available on underground file sharing networks and may be located in the same way. The cost for program patches and updates (which restore the degraded program to its full rating) is 10 percent of the difference in street cost between the program’s current (degraded) rating and its full rating. All programs, updates, etc. from an underground file-sharing network have their copy protection cracked, if they ever had any to begin with.

离线 Cobalt 1号机

  • 版主
  • *
  • 帖子数: 421
  • 苹果币: 2
虚拟专用网络

虚拟专用网络(VPN)是一个无等级的P2P程序, 允许用户在缺少拟感信息的层面进行交流并共享文件与信息,通常使用不超过一个AR或VR的窗口,并因此在订阅列表方面不被计算为到节点的连接,除非它们经过加密。这类网络存在的目的有很多,从旨在让社交群体成员保持联系的简单移动社交软件(MoSoSo),到交易破解软件和自由数据的盗版网络。

VPN的安全性能差别很大,一端是隐匿、密码保护和经过加密的网络,另一端则是完全开放的网络。一般来说,VPN对匿名性的依赖程度不亚于任何其他保护措施,因为它们最脆弱的地方是登录它们的用户。发现一个黑客使用VPN需要一个简单动作仔细观察(参见仔细观察,第136页,SR4)和一个成功的对抗检定,投计算机+分析对抗目标的防火墙+隐匿。如果你确定目标连接到VPN,你可以尝试拦截流量(参见拦截流量,p. 224, SR4)。安全和隐秘的VPN大部分都是加密通信。

罕见的是,虚拟专用网络可能会使用一个节点来进行实时的面对面交流,或者作为一个共同的匿名投递箱来转储文件,以便其他用户以后可以访问、下载或注解。这些节点通常位于矩阵中的偏僻角落,而且几乎都是隐藏的,需要用户的VPN密码才能访问。这种节点会使得VPN非常脆弱,因为它通常包含网络中所有成员的通讯码和密码,因此使用它们的网络经常定期更换节点。

劇透 -   :
VIRTUAL PRIVATE NETWORKS

A virtual private network (VPN) is an unrated peer-to-peer program that allows users to communicate and share files and information on a less-than-simsense level, typically no more than just another window in AR or VR, and as such not counting as a connection to a node in terms of subscription lists unless they are encrypted. Networks of this kind exist for many purposes, from simple mobile social software (MoSoSo) designed to keep members of a social group in touch to pirate networks trading cracked software and liberated data.

Security for VPNs varies considerably, from secretive, passcode-protected, and encrypted networks on the one end to completely open networks on the other. Generally, VPNs depend on anonymity as much as anything else to protect them, as their most vulnerable points are the users logged on to them. Spotting a hacker using a VPN requires a Simple Action to Observe in Detail (see Observe in Detail, p. 136, SR4) and a successful Opposed Test, rolling Computer + Analyze against the target’s Firewall + Stealth. If you determine the target is connected to a VPN, you can attempt to Intercept Traffic (see Intercept Traffic, p. 224, SR4). Secure and secretive VPNs are almost always encrypted communications.

Rarely, a virtual private network may make use of a node to facilitate real-time face-to-face communications, or as a common dropbox to dump files that other users may access and download or annotate later. Such nodes are usually in out-of-the-way corners of the Matrix and almost always hidden, requiring the user’s VPN passcode to access. A node makes a VPN very vulnerable as it often contains the commcode and passcodes of all members of the network, and networks that make use of them often change nodes on a regular basis.

离线 Cobalt 1号机

  • 版主
  • *
  • 帖子数: 421
  • 苹果币: 2
值钱数据

转手值钱数据的一般规则见SR4第303页。可以在值钱数据街头成本表中找到适用于值钱数据的其他修正。

劇透 -   :
PAYDATA

General rules for fencing paydata are found on p. 303 of SR4. Additional modifiers that apply to paydata can be found on the Paydata Street Costs table.

引用
值钱数据街头成本
状况成本调整
数据损坏了,但大部分可以挽救–20%到–50%
数据只能在过时的介质上读取–20%
数据是公开的,但却模糊不清–10%
数据采用了专有文件格式+10%
经过认证的数据+50%
数据的唯一残留副本+100%
独有法术公式+200%
纳米原理图+400%
精魂公式+400%

劇透 -   :
PAYDATA STREET COSTS
SituationCost Adjustment
Data is damaged, but mostly salvageable–20% to –50%
Data is only available on an obsolete medium–20%
Data is publicly available but obscure–10%
Data is in a Proprietary File Format+10%
Certified data+50%
Sole remaining copy of data+100%
Unique enchantment formula+200%
Nanoschematics+400%
Spirit formula+400%

专有文件格式

超企和一些国家的军事和研究机构利用专有文件格式(PFF)来保护不向公众发布的数据。PFF格式的程序和文件仅供内部发布,通常只与该大公司的特定软件或操作系统兼容,这意味着角色只能使用同一公司制作的操作系统来打开PFF文件或运行PFF程序。专业的仿真程序(或胡乱拼凑的黑客变种)可以用来在其他操作系统上以最小的数据损失打开PFF文件或运行PFF程序。此程序的成本或获取难度视为与一个补丁相同。虽然特定公司的操作系统足以读取PFF文件,但黑客需要激活操作系统中的正确软件模块来创建或编辑PFF文件。如果角色拥有与操作系统制造商相匹配的合法的企业SIN,这需要一个成功的逻辑+软件检定;没有有效的合法SIN的角色需要成功的骇入+编辑(3)检定。

Pistons从联络系统下载了一个PFF数据文件。不幸的是,Pistons的操作系统是新星科技·导航,不能直接读取这份文件。通常情况下,她必须找到并下载一个联络PFF阅读程序,或者自己编写一个。值得庆幸的是,Pistons仍然有一个运行着联络·第一的旧通讯链,她可以把文件发送到那个通讯链,然后从那里读取。当然,如果她想编辑一些细节并保存下来,她必须先激活软件模块。

劇透 -   :
PROPRIETARY FILE FORMAT

Megacorporations and some national military and research institutions make use of proprietary file formats (PFF) to safeguard data not meant for release to the general public. The programs and files in PFF are for internal release only and typically are only compatible with that megacorporation’s specific software or operating systems, meaning a character can only open PFF files or run PFF programs from the same corporation that made their OS. Specialist emulator programs (or cobbled-together hacker variants of the same) can be used to open or run PFF files or programs on other OSs, with minimal data loss. Treat this program as a patch in terms of cost or difficulty of acquisition. While a company-specific OS is enough to read a PFF file, hackers need to activate the correct software modules in the OS to create or edit a PFF file. If the character has a valid corporate SIN that matches the maker of the OS, this requires a successful Logic + Software Test; a character without a valid corporate SIN requires a successful Hacking + Edit (3) Test.

Pistons has downloaded a PFF datafile from a Renraku system. Unfortunately, Pistons is running Novatech Navi as her OS and can’t read the file directly. Normally she would have to find and download a Renraku PFF reader program, or else write her own. Thankfully, Pistons still has an older commlink running Renraku Ichi—she can just send the file over to that commlink and read it from there. Of course, if she wants to edit a few details and save it, she’ll have to activate the software modules first.

认证数据

矩阵用户可以选择通过将任何文件烧录到经过认证的数据芯片中来进行认证;在此过程中,用户系统中该文件的所有其他副本都会自动删除。经过认证的数据芯片包括文件创建、访问、复制和编辑的完整日志。此日志会被传送到从经过认证的数据芯片生成的数据的任何副本。试图编辑日志通常会损坏数据,无法修复。

通过成功的骇入+编辑(4)检定,认证数据芯片上的日志可以被清除,而不会破坏数据。

劇透 -   :
CERTIFIED DATA

Matrix users can choose to certify any file by burning it to a certified datachip; all other copies of the file on the user’s system are deleted automatically during this process. Certified datachips include an integral log of when a file is created, accessed, copied, and edited. This log is carried over to any copy of the data made from the certified datachip. Attempting to edit the log typically corrupts the data irreparably.

The log on a certified datachip can be wiped without corrupting the data with a successful Hacking + Edit (4) Test.

离线 Cobalt 1号机

  • 版主
  • *
  • 帖子数: 421
  • 苹果币: 2
伪造者的艺术

由于流通中的新元被不断追踪和监控,伪造新元的唯一方法是复制一个现有的认证信用棒。这需要一个正余额的认证信用棒,一个用于放置非法信用的相同类型的空认证信用棒(称为空白信用棒),然后进行伪造+编辑延续检定(时间间隔和阈值见伪造阈值表)。角色每试图伪造等于或少于5000新元,对伪造检定施加1个骰子的负面修正。

Kat o’ Nine Tales有一个带有6000新元的认证信用棒,并决定复制它。她去了当地一家正规银行,得到了一个空白信用棒,然后她把这两个信用棒和她的通讯链链接起来,开始工作。Kat有伪造3 (信用棒伪造+2)和一个等级4的编辑程序,她由于信用棒上的金额获得2个骰子的罚值,所以她掷7个骰子。她决定她的伪造等级将是2,使阈值为48。在20天的时间里,Kat成功地积累了她需要的成功数,现在她有了两根认证信用棒:一根是6000新元的真货,另一根是伪造等级2的6000新元的假货。

角色试图将假币转移到线上银行账户或用于购买商品时,使用假币的等级与验证系统的等级(通常为1-6)进行对抗检定。如果赝品赢了,系统就会将其视为真品;如果赝品对抗失败,它立即被标记为伪造,交易中止,并通知地方当局。平局被裁定为利于验证系统。

Kat用她的假信用棒在Aces付了300新元的账单。伪造等级是2级,Aces有一个2级的验证系统。Kat的玩家得到3和6; GM替验证系统掷出2和4。看来Kat的假信用棒通过了这次检查...

劇透 -   :
THE FORGER’S ART

Since nuyen in circulation are constantly being tracked and monitored, the only way to counterfeit nuyen is to copy an existing certified credstick. This requires a certified credstick with a positive balance, an empty certified credstick (called a blank) of the same type in which to place the illicit cred and an Extended Forgery + Edit Test (see the Forgery Table for Interval and Threshold). For every 5,000 nuyen or part thereof the character is attempting to counterfeit, apply a 1 die penalty to the Forging Test.

Kat o’ Nine Tales has a certified credstick for 6,000¥ and decides to copy it. A visit to her local and above-board bank gets her a blank, and she connects the two credsticks to her commlink and gets to work. Kat has Forgery 3 (Credstick Forgery +2) and a Rating 4 Edit program, and she receives a 2 dice penalty for the amount of nuyen on the credstick, so she rolls seven dice. She decides that the rating of her forgery will be 2, making the threshold 48. In twenty days, Kat manages to accumulate the hits she needs and now has two certified credsticks: one with 6,000¥ in real nuyen, and a Rating 2 forgery with 6,000¥ in fake nuyen.

When the character attempts to transfer the counterfeit nuyen (either to an online bank account or when making a purchase), make an Opposed Test between the rating of the counterfeit nuyen and the rating of the verification system (typically 1–6). If the counterfeit wins, the system accepts it as genuine; if not, it is immediately flagged as counterfeit, the transaction aborts, and local authorities are alerted. Ties are ruled in favor of the verification system.

Kat uses her fake credstick to pay her 300¥ bar tab at Aces. The rating of the forgery is 2, and Aces has a Rating 2 verification system. Rolling for her character, Kat’s player scores a 3 and a 6; the gamemaster rolls a 2 and 4 for the verification system. Looks like Kat’s faux cred passes… this time.

引用
伪造阈值表

伪造种类阈值时间间隔
伪造公司券(等级 x 20)1天
伪造游戏币(等级 x 16)1小时
伪造执照(等级 x 16)1小时
伪造国家货币(等级 x 18)1天
伪造新元(等级 x 24)1天
伪造SIN(等级 x 32)1周

劇透 -   :
FORGERY TABLE

ForgeryThresholdInterval
Fake Corpscrip(Rating x 20)1 day
Fake Game Credits(Rating x 16)1 hour
Fake License(Rating x 16)1 hour
Fake National Currency(Rating x 18)1 day
Fake Nuyen(Rating x 24)1 day
Fake SIN(Rating x 32)1 week

引用
伪造其他货币

除了新元,第六纪还有其他种类的电子货币,黑客也可以伪造它们。典型的例子包括国家货币(加美国美元)和公司券(阿兹特科技公司比索)。这些钱通常比新元更容易伪造,但更难通过验证(验证系统在对抗检定中得到+4DP修正来检测伪造品)。玩家角色还可以制作游戏币,即矩阵游戏中用于购买虚拟装备的货币(小钢珠(译注:pikucredu,柏青哥机使用的代币));游戏币可以在游戏内用新元购买,但不能在购买后再兑换成新元。

在第六纪,一些非常罕见,落后的地方仍然依靠硬币或纸币等实物交换媒介(参见使用伪造品,第124页,SR4)。

劇透 -   :
COUNTERFEITING OTHER CURRENCIES

There are other kinds of electronic money in the Sixth World besides nuyen, and hackers can counterfeit those too. Typical examples include national currencies (UCAS dollars) and corpscrip (Aztechnology corporate pesos). These monies are usually easier to counterfeit than nuyen but are much more difficult to pass as authentic (verification systems get +4 dice on Opposed Tests to detect counterfeits). Player characters can also generate game currencies such as those used in Matrix games to buy virtual equipment (pikucredu); game cred can be purchased with nuyen inside the game but cannot (legally) be exchanged for nuyen after purchase.

A very few backward places in the Sixth World even rely on physical mediums of exchange in the form of coins or bills (see Using Forgery, p.124, SR4).

可选规则:伪造SIN或ID

伪造系统识别号码(SIN)需要大量的资源,而这是大多数暗影狂奔者所没有的;伪造者必须生成确证数据并将其插入若干政府和企业的数据库,而这些数据库的名称和地址不为公众所知。从事假SIN和假ID交易的中间人与团体已经建立了在发行机构工作的渠道和联系,从而拥有多个进入必要数据库的后门。即便如此,制作高等级的假SIN也是一个冗长而昂贵的过程,而且这也是一个非常私人化的过程,涉及到根据假SIN的等级添加个人信息和生物特征数据的程度。独立的黑客和超链者可以伪造他们自己的SIN,但如果没有人脉和后门,这个过程比买一个假SIN要长得多,也更加困难。GM在允许玩家的黑客角色尝试制造SIN之前应该三思,因为这可能会导致失衡。以下规则由GM自行决定。

创建一个假SIN或假执照(参见合法性,第303页,SR4)需要接入矩阵(通过通讯链,终端,或超链者的先天能力)和伪造+编辑的延续检定(参见伪造表,第95页)。假SIN和假执照有一个从1到6的等级,这决定了它们在验证系统中的表现(参见假身份证,第260页,SR4)。一旦创建,假SIN或执照及其确证数据必须被官方数据库接受,这需要一系列的系统入侵和同节点的骇入+编辑(系统等级,1小时)的对抗检定;由GM决定目标系统的等级,他可以选择一一执行这些对抗检定,或者用骇入+编辑(假SIN等级 x 系统等级,1小时)的延续检定对它们进行快速结算。

劇透 -   :
OPTIONAL RULE: FORGING SINS AND IDS

Creating a fake system identification number (SIN) requires extensive resources that most shadowrunners just don’t have; the forger must generate and insert corroborating data into a number of government and corporate databases, the names and addresses of which are not available to the general public. The fixers and syndicates who deal in false SINs and IDs have established channels and contacts that work in the issuing institutions and have multiple backdoors into the necessary databanks. Even then it can be a tedious, expensive process to produce a high-rating false SIN, and also a very personal one involving increasing degrees of personal information and biometric data depending on the rating of the fake SIN. Solo hackers and technomancers can forge their own SINs, but without the apparatus of contacts and backdoors in place the process is much longer and more difficult than buying a fake SIN. Gamemasters should think very carefully before allowing their player character hackers to dabble in forging SINs, as it can prove unbalancing. The following rules are for use at the gamemaster’s discretion.

Creating a fake SIN or fake license (see Legality, p. 303, SR4) requires Matrix access (through a commlink, terminal, or a technomancer’s innate ability) and an Extended Forgery + Edit Test (see the Forgery Table, p. 95, for Interval and Threshold). Fake SINs and licenses have a rating from 1 to 6 that determines how well they stand up to verification systems (see Fake ID, p. 260, SR4). Once created, the fake SIN or license and its corroborating data must be accepted by official databases, which requires a series of system intrusions and Hacking + Edit (System, 1 hour) Extended Tests on challenging nodes; the gamemaster decides on the target system ratings and can choose to play these out or summarize them quickly with an Extended Hacking + Edit (Rating of fake SIN x System, 1 hour) Extended Test.

烧毁或剥离SIN

当一个SIN被发现是伪造的,或者因为与之相关的犯罪而不再可用时,就被称为SIN被烧毁了。SIN包含了生物特征和识别数据,如果角色不想它们落入坏人之手,就只能剥离这些负罪数据。购买假SIN(参见转卖商品,第303页,SR4)的中间人和销赃者通常会自动剥离原SIN,但有些角色可能不想冒个人数据被记录的风险。角色可以通过一系列的系统入侵和同节点的入侵+编辑(系统,1小时)的对抗检定来剥离原SIN;由GM决定目标系统的等级,他可以选择一一执行这些对抗检定,或者用骇入+编辑(假SIN等级 x 系统等级,1小时)的延续检定对它们进行快速结算。

当一个SIN被烧毁或剥离时,角色将失去所有线上账户、执照、医疗马车合同、租赁协议、财产契约以及与该SIN相关的合法债务。

劇透 -   :
BURNT AND STRIPPED SINS

When a SIN is exposed as a fake or is no longer usable because of crimes connected to it, it is said the SIN is burnt. A SIN contains biometric and identifying data that a character doesn’t want to fall into the wrong hands, and can only be stripped of such incriminating data. Fixers and fences who buy fake SINs (see Fencing Goods, p. 303, SR4) typically strip them automatically, but some characters might not want to take the chance that their personal data is recorded first. A character can strip a SIN with a series of system intrusions and Hacking + Edit (System, 1 hour) Tests on challenging nodes; the gamemaster decides the target system ratings and can choose to play these out or summarize them quickly with an Extended Hacking + Edit (Rating of fake SIN x System, 1 hour) Test.
When a SIN is burnt or stripped, the character loses all on-line accounts, licenses, DocWagon contracts, rental agreements, deeds for property, and legal debts tied to that SIN.

可选规则:伪造密钥

一个密钥(参见密钥,第64页)包含一条加密代码,它与一个有效的密码组合在一起,允许用户访问系统。每次访问系统时,加密代码都会递增或打乱,这意味着加密代码会随着每次使用而改变。专业的角色可以制作一个密钥的伪造副本,但他至少需要密钥的原理图和它的固件副本。伪造的密钥(如果正确制作)只能使用一次,并且必须在使用真实密钥之前使用,否则加密代码将无法工作。如果有人使用伪造密钥访问帐户,原始密钥将不再正常工作,蜘蛛或管理员用户将知道帐户的最后一次激活是用伪造密钥完成的。

鉴于这些限制,大多数暗影狂奔者选择窃取或“借用”密钥;特别是更先进的纳米技术密钥和炼金密钥,这需要特殊的设施和设备来制造。

劇透 -   :
OPTIONAL RULE: FORGING PASSKEYS

A passkey (see Passkeys, p. 64) contains an encrypted code that, combined with a valid passcode, allows a user access to a system. The encrypted code is incremented or scrambled every time it accesses the system, which means the code changes with every use. A dedicated character could forge a copy of a passkey, but it would require at least a schematic of the passkey and a copy of its firmware. The forged passkey (if made correctly) would be good for one use only—and it would have to be used before the actual passkey is used, or the code won’t work. If someone uses a forged passkey to access an account, the original passkey no longer functions correctly, and spiders or admin users will know that the last time the account was activated, it was done with a forged passkey.

Given these limitations, most shadowrunners choose to steal or "borrow" passkeys; especially more advanced nanotech and alchemical passkeys, which require special facilities and equipment to manufacture.