Tookie_Clothespin says:
OOC:
I'm very interested in this aspect of the game, I think it makes shadowrun stand out tactically from other such games. I've never used this sort of ruleset before so I'm a super noob, but I did purchase the comlink/plugins/glasses you suggested, so I think I'm capable of the basics, IC. Seems pretty straightforward, and I'm pretty good at playing along.
Figured I could expand on it here, instead of cluttering up the IC thread.
There really isn't much/anything that we need to do mechanically - no checks - to achieve this, since it's presumably all willingly opted into.
A Character would essentially just provide anyone in the group who wanted their A/V feeds with a "user level" access code to those Icons/Nodes. Allowing them to view the data essentially of that Node, which in this case that data is Audio/Visual input from the forementioned A/V devices.
Generally this is done by everyone in the group letting the Hacker "slave" their A/V devices/Nodes to the Hackers main Device/Node - as the Hacker will generally have the best Matrix setup/defenses, and the Hacker would just in turn give everyone in the group access to that one Node. Since we don't have a Hacker, it's probably not advantageous to slave everyone's devices under one, as that makes one big soft target instead of five small soft targets, but still everyone would just have to share their access with everyone else and you would achieve the same effect.
Probably clear as mud?
Last edited February 1, 2018 11:35 pm