GlassJaw said:
Have you had a chance to actually see the Matrix/Hacker rules in play? That's the main thing I'm wondering about. How long does it take to resolve Matrix actions? How complicated are the rules? Is playing a hacker viable?
I think it is viable.
The new system has a nice, rational process. Simplified it is:
1. Break into system with privileges (user/security/administrator aka root)
2. Issue commands;
2a commands appropriate for privilege levels do not cause problems
2b Inappropriate commands (crash server) evoke security
Matrix actions are generally Extended tests (meaning you keep trying until you hit the required # of successes) where you can make tests each initiative pass as a Complex action. The threshold (# of successes) is typically the opposing system's Firewall or System+Firewall. If the action is questionable (looping security cameras, opening doors w/o a passkey, etc), the server rolls System + Analyze with a threshold of the decker's Stealth program rating.
Since a decker will have several initative passes in VR mode, he can typically break into a system in one round. Assume a round or so to search for specific data, maybe more for vaguely identified stuff, the matrix run is done in a few rounds. Erasing security tapes and the like are where the risk shows up since it's guaranteed to make the server suspicious.
Since everyone has godawful firewalls to the internet, the best way to break into a server is to break into the office and take advantage of the wireless network's reduced security.
Matrix combat is a lot like melee combat with the attacker making an attack roll, the defender dodging and net successes indicating the damage dealt.