Consumable items for Slicing

By KungFuFerret, in Star Wars: Age of Rebellion RPG

So, I just had an idea, and I'm not sure how it would work in the FFG system.

Basically, if you are at all familiar with cyberpunk genre, you are familiar with the idea of some pre-fabricated software programs that people would use, to quickly hack into a system. The idea being it's some software they spent hours coding before hand, and then when the time is right, and they are at a system they want to infiltrate, they plug the stuff into the system, and let it do it's havoc. And that kind of sounds like a consumable item, similar to a grenade, or a stimpack, etc in FFG.

So how would you work that? I haven't read the slicing rules in that supplemental book that expands on them, so I don't know if this is already covered. But if not, how would you handle it? Perhaps using something similar to the crafting rules for gear, and maybe loading it onto a data spike of some kind for later use?

If it's already covered, let me know and I'll go reference that data at another time, but if not, how would one go about doing it? Thoughts on how to make it a balanced thing?

Just a random thought I had, seemed interesting and wanted to soundboard it.

Sounds like the dataspike from page 50 of Special Modifications. Once per round, a dataspike may be expended to attempt to disable a security program as a maneuver rather than an action. Reduce the difficulty of the subsequent check to disable the program by 2. After one use, the dataspike burns out and becomes useless.

Dang!

When you said, "Consumable items for Slicing," I was thinking, deli cheese, ham, roast beast, bread . . . .

So o o o, Never mind?

Actually I can contribute intelligently to this thread.

As a guy who actually used to be a pretty good coder at a much younger age, the command "copy" comes in REALLY handy and is really easy to use.

Actually, I still use the copy command weekly, (at least).

So, software isn't really "consumable." Especially if you really know what you're doing.

Sim cards and flash drives can get lost if you're clumsy.

And the cable jacks might wear out if you . . . um. Store them wrong?

And if you sit on your datapad, you'll need to get a new one. Or get a warranty replacement!

Okay, honestly as a player who ACTUALLY does slice computers in our campaign there are no consumables when it comes to slicing. Grab the gear as a one time purchase and hook up to the computers and get at it!

There is no need to over-complicate your game.

Isn't there a consumable Data Spike or something in Special Modifications?

Ugh. Somehow, i didn't read the very first response and there's no delete.

Edited by Wedge1126

So, software isn't really "consumable." Especially if you really know what you're doing.

Sure it is. Stuxnet burned at least three zerodays when it was released, and once those vulnerabilities get fixed then those zerodays have been “consumed”. At least, for that target.

Okay, honestly as a player who ACTUALLY does slice computers in our campaign there are no consumables when it comes to slicing. Grab the gear as a one time purchase and hook up to the computers and get at it!

There is no need to over-complicate your game.

As a person who has been playing with computers since the mid-80s, and has been a professional Unix system administrator since 1989, I think the concept for these types of “spikes” is different from most software that we see in the current modern world.

As there are advances in AI, and “regular” software starts being polymorphic on its own, I think we will probably see more of these types of “spikes” being created in the real world.

In the meanwhile, we’ve always got the model of weaponized Advanced Persistent Threats — like Stuxnet.

Sounds like the dataspike from page 50 of Special Modifications. Once per round, a dataspike may be expended to attempt to disable a security program as a maneuver rather than an action. Reduce the difficulty of the subsequent check to disable the program by 2. After one use, the dataspike burns out and becomes useless.

Cool, that sounds like what I was thinking of. Thanks, I'll dig through those rules then.