Secure Data
This data is property of the specific corporation that owns the subject's citizenship (or owns the subject entirely). You may view your own secure data by purchasing timed access to the files, but viewing it without permission (or viewing the secure data of any other subject) is legally theft. Some examples of secure data:
- Corporate Profile Subject's current or past corporate employment history, if any.
- Criminal History Hardcoded If the subject ever stole a pencil, or murdered a corporate exec, it's here.
Dark Data
Technically this isn't an official data category, but any data that's been secured as much as it can be is considered "dark." Since dark data is hidden from everyone except the person who put it there, legally that's considered theft of corporate data. Which means if a corp finds it you could be in trouble.
Accessing Online Profile Data
Whether or not you can access a piece of information depends on its data class. Any access can be accomplished by looking at a target for more than a few seconds while you're in ARI, AVI, or VRI, or by looking up their handle online.
Public data is unrestricted. If you access anyone's public profile in any way, you'll see this first.
Market and secure data are restricted. Accessing either is either while in deep VR by breaching the target's personal NetStructure, or by utilizing an app that specifically reads a target's market or secure data.
Dark data is hidden. Accessing it is usually only possible by breaching a target's personal NetStructure. Some apps exist that can read a target's dark data, but they are highly restricted.
3.32 - Ripping NetStructures
Hacking may be the oldest, surest way to get through most cybersecurity, but sometimes your only option is to just rip the code apart. It's possible to rip into a system without detection, but it's not easy; most of the time the SysAd's gonna know someone was there, and if you're especially sloppy they're gonna know exactly who entered their territory without permission. Sometimes, that doesn't bother you; other times, you just don't have a choice.
Technically, anyone can rip; practically, almost no one does. All you really need to rip code is a connection to the system you wanna rip, which is easy because as long as you have a NeuroDeck and you're in the same atmosphere as your target then you've got connection. The problem is most NetStructures are packed with ICE, so unless you really know what you're doing you're gonna screw it up. At best you'll trip the alarms and leave your personal ID all over the system, at worst you'll run into one of the more hostile ICE apps running through that system and it'll physically fry your brain. But if you know what you're doing, and you've got a suite of your own ripping apps to help you get through the system, then sometimes ripping is the best route to solve your problems.
What Is A NetStructure
The short version is that a NetStructure is any combination of software, hardware, and SysAd actvity designed to (1) perform specific functions, (2) retain specific data, and (3) protect those functions and data from intruders. A NetStructure can be basically anything; the primary server in a corporate office, a vehicle, a vending machine, or someone's brain (the price we all pay for carrying neuralware). An example NetStructure can be found here.
Usually, you won't have to deal with a NetStructure; this remains true for hackers, NetNinjas, and everyone else. Most regular folk aren't likely to ever end up in a NetStructure, because it's a place you have to specifically spend effort to reach, and they wouldn't know what to do if they ended up there. By contrast, Hackers and NetNinjas usually don't bother with the hassle of breaking into a NetStructure when they can fire off a simple app that will do most things they need.
The only reason to enter a NetStructure is when you need to do more than the basics. You've got plenty of apps that might distract someone, change something they're seeing, burn out a few neurons, or any number of other things. Sometimes, though, you need to do more. Or you need to do a bunch at once, or you need to go deeper. That's when you gotta break into the target's NetStructure where you can read, edit, delete, and even add shit, provided you're able to get through security.
A NetStructure can only be accessed in deep VR. Even if you access a NetStructure while you're not in VR, by looking at something and choosing to open its NetStructure with an ICS command, doing so automatically puts you in deep VR. This means that your body falls to the ground (so most people only do this while already laying down), and you immediately gain 1 Dissonance.
The NetStructure Map
The typical NetStructure is comprised of nodes, each of which is connected to one or more other nodes via pathways. You can travel along any pathway in any direction, not matter how long or short the path may be, but entering a node costs 1 cyber action. Some pathways may cross others, but you can't jump from one to another, you have to follow it to the end of line.
Map Nodes
Each node is classed as one of five types: Access, Security, Data, Feed, or Function.
Access Nodes are where you enter the NetStructure. There is usually only one Access node in a small NetStructure, but a larger NetStructure may have more than one; an Access node is where you begin your time in the scene, and if there's more than one you can choose which you prefer, unless the Narrator specifies one for story reasons.
Security Nodes contain nothing helpful, and exist only to impede your progress. Upon entering a Security node, you must immediately make a Techie + Software + Security STK Check against the DN listed in the node. If you succeed, nothing happens. If you fail, several things happen: (1) the NetStructure is alerted to your presence, (2) all aggressive ICE apps on the NetStructure are immediately activated, and (3) you are pushed back to the node you were at before you failed your STK Check.
Data Nodes contain information, classed by the name of the specific node you entered. For example, a Secure Data Node contains all Secure Data held on the NetStructure. While in a Data Node you can view or copy anything found there; viewing anything costs 1 real action, copying anything costs 1 cyber action. You can also attempt to modify or delete any of the data found here, but doing so costs 1 cyber action and you must make an STK Check against the NetStructure's Firewall; if you fail, you become lightly injured and you are pushed back to the node you were at before you entered that Data Node.
Feed Nodes contain information based on the tactile, visual, aural, olfactoral, and gustatoral input (if any) of whatever contains the NetStructure you're infiltrating. For example, if you hacked into a vending machine with a security cam, you can see what it sees; if you hacked into a person's brain you can feel, taste, hear, smell, and see everything they do. If whatever you've hacked into doesn't have a particular sensory capability, there's nothing for you to see in that category.
It's important to note that there are usually two different kinds of Feed Nodes. A Sensory Feed Node is a live current feed of the NetStructure's current sensory input; you can observe and record but you can't pause, rewind, or fast-forward. A Memory Feed Node is also a live feed, but it's built on the recording of what comes from the nearest Sensory Feed Node; you can pause, rewind, and fast-forward all you want. There are limits to a Memory Feed Node, in that you can't go forward past the current point in time, and if you go too far back most of the memory begins to degrade. Anything older than about an hour either gets stored on a Data Node or a Function Node; if it doesn't, it's gone forever.
While in a Feed Node you can view and copy what you're seeing without difficulty. You can also attempt to modify or delete any of the feeds, but doing so costs 1 cyber action and you must make an STK Check against the NetStructure's Firewall; if you fail, you become lightly injured and you are pushed back to the node you were at before you entered that Feed Node. Modifying any sensory data in a Feed Node might also require some level of programming and artistry, depending on what you're trying to do, at the Narrator's discretion. Convincing someone they saw someone they didn't means you need to make that thing believable, plus you've got to create the illusion across multiple senses.
Control Nodes organize, maintain, and operate the basic functions of the entire NetStructure they're fitted within. They're hard to reach, buried at the farthest back end of their NetStructure under deep security. They also house the NetStructure's ICE apps, either unleashing them whenever an intruder is detected, or using them as a last line of defense when an intruder reaches a Control Node.
There are two different kinds of Control Nodes. An ICS Core Function Node monitors the software of the ICS that is the NetStructure itself, think of it like the Admin functions of the entire operating system. From an ICS Function Node you can view or copy any of the NetStructure's existing ICE apps by spending 1 cyber action. You can also attempt to modify or delete any of the NetStructure's ICE apps; doing so is 1 cyber action and you must make an STK Check against the NetStructure's Firewall; if you fail, you become lightly injured and you are pushed back to the node you were at before you entered that Control Node.
A Control Function Node monitors the hardware, wetware, and software of the machine or person in which the NetStructure is installed. This means heart rate, active thought patterns, nerve functions, throttle control, soup can dispensor, or the like; if it's a physical or physiological function of the machine or person you've hacked into, this Node has access to those functions. You can view anything here without any effort. If you want to modify any of the functions, such as burning out a vehicle's engine or stopping someone's heart, you must make an STK Check against the NetStructur's Firewall; if you fail, you become lightly injured and you are pushed back to the node you were at before you entered that Function Node.
Using Apps
Given the way modern code is written, and the ways in which you interact with code in deep VR, it's technically possible to hack, rip, and do anything else without the use of apps. It's just a really bad idea, because everyone else is going to be using apps. Going into any NetStructure architecture without any apps is like going into a gunfight empty-handed.
App Storage
Players can have any number of apps loaded. Each app uses up a certain amount of space, usually measured in Exobytes (EB); if you've got enough money, you might have a storage drive measured in Zettabytes (ZB). Inactive apps are stored either on a Neural Storage Drive (NSD), Quantum Mirrored Drive (QMD), or sometimes a Solid State Drive (SSD); for the vast majority of cases, it'll probably be an NSD (QMDs are expensive as fuck, SSDs are ancient tech). Active apps remain on your storage drive, but also take up space in your Neural Random Access Memory (NRAM); usually about half the space they take on your storage drive (unless the app specifies otherwise).
Inactive and Active Apps
Inactive apps don't do anything unless they have a passive effect. An inactive app with no passive effects doesn't benefit or hinder you in any way, it just takes up space on your storage drive. An inactive app with a passive effect provides whatever benefit the passive effect is, given in the app's description.
Active apps perform whatever function they were designed for. An active app's passive effect continues (if it has one), but the app's primary function takes precedence in any instance where one might contradict the other. Every app's primary function is detailed in its description.
App Categories
Every app is categorized as aggressive, defensive, support, or utility, and its primary function exists within the confines of those descriptions. For example, a defensive app can never be used to perform aggressive actions.
There are, as well, complex apps that fall within more than one category. These apps are expensive, difficult to write, and take up a lot more storage space, but they're usually extremely sought-after. For example, one of the more famous apps ever written is called Kingslayer; an extremely powerful app that makes the user almost unstoppable in any net architecture (the term "kingslayer" has also become a coloquial term for any highly powerful app, but most NetNinjas and hackers only refer to actual Kingslayers as kingslayers).
Something Something
Write something about how apps function. Defensive apps wrap around you and ablate damage, aggressive apps seek out ICE. LYNN FINISH THIS