Nonclave 2025 - October 24-26, 2025
The modern world is the toy of the young. Those elders that have been around for centuries or millennia have no clue what can be done with a few clicks of the mouse or a well constructed phone app. A virus to them is the Black Plague, a virus to us brings down the power grid or ‘Robin Hood’s’ the Prince’s Elysium fund to the next Ralph Nader Presidential election.
----------------------------------------------------------------------------------------------------------------------------
Here is the general description of Computer Hacking from WW’s Anarch Cookbook
Computer Hacking
The player must have at least two dots in computers before purchasing this new knowledge. Hacking allows the computer user to break the rules. It is not a programming skill – that requires the computer knowledge. Hacking represents an imaginative faculty above and beyond the use of the programming codes. In the binary computer world of yes/no, hacking represents the little bit of genius that says, “Well maybe.”
When is hacking used rather than the computer knowledge? When the user is breaking into other computer systems or trying to manipulate data in “real time.” The computer ability is used for programming or other miscellaneous tasks. Hacking is used most often as a complementary ability to computers, but it can aid programming by allowing the character to work faster or to crack military codes that a normal programmer would not even be able to figure out (see below)
----------------------------------------------------------------------------------------------------------------------------
A straight conversion to the MET system would have the hacker add her Mentals plus bonuses against an unknown difficulty, with retests from either the Computer skill or Hacking skill at the STs discretion. From a basic perspective Computer Hacking is figuring out how to use systems in ways they were not intended to work.
A person is usually trying to do one of three things with a Hack:
Here are some suggested difficulties:
When a player Hacker attempts to gain access to the system they must decide if they are going to do one of the following actions:
Here are some suggested conditional modifiers a player might gain prior to the attempt:
A Supernatural modifier could be applied in either direction (Magic, Technomancer adept, Computer Spirit, etc…)
Customized Exploits/Security
Given enough time and devotion a specialist can create software that can assist them in either getting into where they are not supposed to be or preventing people from getting in. Like Computer Hacking, it is suggested that this be another skill that the player should buy. Possibly twice if the ST team thinks that the each is a separate skill and if the player wants to be able to both Hack and Secure computer systems.
A player can create the software either at game or in downtime. Downtime is a more logical time to do so as software creation is not something that is created up in a challenge or two at game much less really even a couple hours of nothing but ‘coding’ at game.
A player can only create a piece of software only as ‘powerful’ as they are an expert. Meaning that with only one level of the skill she could only create a +/-1 modifier up to +/-5 at level 5 in the skill. The process for creating the software could be as simple as ‘x’ amount of time devoted per level (hour/day/week) or more of an interaction with the ST by beginning an extended challenge with an accepted difficulty, having each success being a +/-1 modifier. Additionally the player attempting to Hack should have to create the Exploit per Hack and the Security software should have to be ‘updated’ periodically.
Here is how it all comes together
Examples of play
Here are a couple of example of how the system works. It gives the players and storytellers a way to make it as easy or as challenging as they wish to make this ‘side’ game of the larger game as they wish.
One:
SK8R@ has been publicly insulted by Prince Gerrard’s Toreador Seneschal for months now. She is tired of being hassled for just visiting Elysium, especially since the Baron and the Prince have come to an arrangement allowing for safe travel. Maybe the bitch has a thing for her. Who knows, well she is going to teach her a lesson that she will never forget.
SK8R@ knows that Seneschal’s personal passion, when not out causing problems for everyone, is her gallery so she is going to work out how to ruin her day, well night really. The Gallery has a light security system, but she does not want to get caught, so she is not using her on gear.
Ruth, the player of SK8R@, has gone out and bought laptop that will be trashed after the work is done.
Two:
David, the Nosferatu Primogen, like most Nos is known for being able get information from places that most people would not even think of trying. He knows that the Prince has been secretly working with one of the local Anarch gangs and he wants to use that knowledge as leverage to get more influence in the city from the Prince. He has been unable to get any proof, so he thinks there may be some on the Prince’s phone. So, he has worked the last few weeks on some software that he believes will take advantage of known security issues with the Prince’s brand of phone. He plans on attempting to hack the Bluetooth connection on the phone when he knows it is active, say when the Prince is at a gathering with the earpiece active.