You are on page 1of 20

1.

1
HACKING

1
Hacking E rrata
Hacking
The basic principle of this hacking system is to of every computer in the human system. Unthinkable
provide fun mechanics, enabling players to create complexity. Lines of light ranged in the non-space of
Hacking E rrata

characters who hack computer systems. the mind, clusters and constellations of data. Like city
lights, receding…” William Gibson
Summary
The basic system of hacking uses the Dark Stars In Dark Stars, a virtual interface has been
standard d100 skill check, the player chooses created and re-created countless time by hackers,
a hacking skill, a program and rolls their d100 programmers and AIs to segment, distil and
for each degree of success the player adds 1 to dissect the total gamut of human knowledge and
the strength of the program. The hacking skills experience. Lost in the vastness of connected
are computer science, computer engineering computers are islands created by individuals
and profession hacking. Computer operation is who hold dominion over their territory through
a useful skill that all children are taught but it passcodes and ancient cyphers, hardware neural
does not give enough background information imprint or DNA-scanning firewalls. Information
to hold a career in cyber security operations, so can be locked away and stored. Travel through
computer operation does not add to the Strength the Net is fast - really fast - because any point is
of a program when multiple degrees are achieved connected to another. You simply step outside
instead it will enable the user to receive some your castle and you are at the door of your
other benefit like shorter time on a task, more enemies. Travelling through the data fortress is
information retrieved, better understanding of the dependent on the obstacles you encounter.
results of the computer task. If the person doesn’t have any Intrusion
Computer programs have a strength, this Countermeasures (ICE) then you blast through
determines how much “damage” is required to or knock on their “door” and you get into their
unload them from the hackers cyberdeck or system, and their head, where you can rummage
computer, the general effectiveness of the program around, looking for vital intel. Depending on
and the amount of memory space it takes up. Each the complexity of the system being broken into,
program has one or more ability, and this is used you may or may not need to have a physical grid
to determine what it can do. Sample programs layout of the place. This layout can be anything
are provided in this erratum to enable GMs and the designer imagines. Travel between unoccupied
Players to better understand how to create them. squares is instant.
The previous rules are re-printed here so it can act
as a handy addendum to any group using hacking
systems.

The Net
“Cyberspace. A consensual hallucination experienced
daily by billions of legitimate operators, in every nation,
by children being taught mathematical concepts… A
graphic representation of data abstracted from banks

2
Hacking Rules PS of programs they run or to a specific skill like
pilot drones or sensor operation.
Hacking uses programs, computers and operators.
Hacking in Dark Stars takes place in the normal Program Stats

Hacking E rrata
combat sequence.
Programs have the following stats.
PUs and Computers
The CPUs are the primary component of Program Strength
computers. Strength is the program’s primary stat, used for
damaging and destroying the program. When
PS attacking the program Strength is similar to hit
Each strength point of the CPU allows one points. When a program deals damage or has an
program strength, PS, to be run. Reducing the PS effect, the result is typically based on its Strength.
of a CPU to zero allows the hacker to take control
of that CPU. The typical PS for silicon CPUs is 1, Ability
while the typical PS for neural systems is 6. You An ability the program performs, for instance,
can transfer data at a rate of 1 MU (Memory Unit) using a camera, shooting a weapon, providing a
per strength of the CPU. bonus, or damaging a program.

WS Using programs and computers


Wall Strength is the amount of fire wall /code wall
protection the CPU has. It’s essentially a firewall. Each program that a character has typically uses
WS must be reduced to zero before the PS of the an ability. To run that program, the character
CPU can be attacked. Typical Wall Strength is uses their Basic Computer Operation, Computer
between 1 and 20, depending on the expense of the Hacking, Computer Science or Computer
in-built firewalls. Engineering skill if it’s considered a stressful scene.
If it’s not a stressful scene, there is no roll required
MU to run a program.
Memory Units measure how large the data
is. Programs take up 1 MU per 10 points of Once the program is run, the program takes up
Program Strength. Typical memory units in small its strength from the CPU’s strength. It may take
computers are between 2 and 10. multiple actions to run, if it’s a very large program.
A program may not run on a CPU that doesn’t
SI have enough Strength to contain it. The one
A computer system must have a Starting Initiative, exception to this is the Operating System. When
SI, bonus of 1 or more. The SI bonus for silicon a character wishes to use a program in combat
based CPUs is the number of CPUs divided by they follow the normal initiative sequence. In
4 rounded up, and for neural CPUs the number their actions, they may launch programs. The
of CPUs divided by 2 rounded up. This Starting more actions they have, the more programs they
Initiative bonus is used by daemons for their SI. can launch per round. Only one program may be
For operators or AI this acts as a bonus to their launched per action regardless of the power of the
Starting Initiative for hacking actions. CPU.

Special Bonuses
Some CPUs are designed to give a special bonus to
3
Using a program per ability to purchase from either commercial
sources or a hacker.
Add the program Strength to the character’s skill
and make a normal task roll. For each degree of Multiple People
Hacking E rrata

success, the program will have an effect based on By working together, multiple people can easily
its ability. create a program. For every two programmers
added, the time gets reduced by half.
System Tunneling
Operating Systems
When using computers to hack a target system The Operating System (OS) is often a very large
it is possible to use multiple linked computers to and powerful program used to interface between
provide extra protection against counter-intrusion. programs and the hardware that houses them.
The drawback to this extra protection is that the Operating systems have been very optimised,
hacker’s signal is slowed down by having to route only taking up 1 MU per 100 Strength of the
through another set of CPUs. For each computer OS. It is possible to simply attack the Operating
in front of the computer you are using to hack the System before the hardware, and thus control the
target you get a penalty of -1 SI. In order to attack hardware itself. This is why commercial Operating
Systems are so strong. Operating Systems do not
the system you are using, the counter-intrusion add their Strength to the programs that run on
attempts must first defeat the fire walls of each them.
computer system you are tunnelling through.
Costs of Programs
Acquiring Programs
The costs of programs are determined by their
A starting character who has a cyber deck can Strength. For smaller programs, the cost is quite
acquire programs of Strength 1 (one) for 50 credits cheap. A cumulative accrual system is used to
per program. These programs are not source code determine the cost of a program; simply add all the
but pre-created programs. A character doesn’t lower Strength values together.
need to be a hacker to run these programs. Use the
equipment list to purchase other programs. For example, to calculate the cost of Kill 12:

COST PROGRAM STRENGTH


Creating Programs from Scratch
CR2,000 FOR KILL 5
If a program has a Strength lower than three it
takes one day to create per point of strength.
CR10,000 FOR KILL 10
Programs with 3–5 points of Strength take a week CR20,000 FOR KILL 12
per point of Strength to create. Programs with TOTAL CR32,000
6–11 Strength take a month per point to create.
Programs with 12 or more Strength can take a year
per point to create.

Creating Programs from Source Code


Creating programs from source code will reduce
the creation time by half. Source code is typically
program code and allows the programmer to
modify the program. Source code is usually
purchased at a Strength of 1 (one), and costs 1000
4
Program Cost per point of Strength detection program and alerts outside system
operators or the resident AI if an intrusion is
PROGRAM STRENGTH COST detected.
2-5 CR500
Archive

Hacking E rrata
6-10 CR2,000
11-20 CR10,000 This is a simple program to compress data and
21-30 CR50,000 programs. Programs take up one quarter of the
space and one tenth of data.
31-40 CR200,000
41-50 CR1,000,000 Repair
51-60 CR5,000,000 This program restores 1d6 of PS to another
61-100 CR20,000,000 program.

Program Abilities Stealth


This program makes it harder to detect the user
A program can have one or many abilities. Below or program. Subtract the program Strength of the
is a list of abilities that a program may have, stealth program from any systems or programs
though you can add more. trying to detect the stealthed program or operator.
Detect For each degree of success add 5 to the Stealth of
the stealth program.
This program can perform a detection routine
against stealthy opponents. Hacking Synergy
Shield This program boosts the effectiveness of hardware,
providing a +10% boost to the next action
This program provides an ablative shield against
performed with the hardware. For example, give
damage. It can provide this shield for a person,
another character or the hacking character a bonus
a system or another program. The shield adds 5
with their next smart gun attack.
Wall Strength per degree of success.
Hacking Interference
Kill
This program lowers the effectiveness of
This program does damage to other programs,
hardware, providing a -10% penalty to the next
systems or persons. 1d6+1d6 per degree of success
action that a person performs with the hardware.
to CW/FW or PS.
For example, interfering with an enemies cyber
Daemon optics.
This program can launch other programs. It can Hardware Interface
carry its total Strength in programs. It uses the
This simple program translates machine code
skills of the owner of the program and has a SI
to some other form of code that the hardware
equal to SI bonus of the system it is running on.
understands. It could be a camera that can be
Copy controlled or to drive a car remotely. The stronger
the program, the more functions of the hardware
This is a simple program to copy files.
it can control. It has 1 function per Strength point.
Alarm
Skill
This simple program is usually linked to a
This program can provide a skill equal to a
5
percentage of its Strength. Only AIs can use skill
programs. For every point of Strength, the AI
gains 1% in the relevant skill.
Hacking E rrata

New Hacking Program her new colony world. She has a portable sensor
array to work with. A portable sensor array with
Overcharge a sensor rating of 4 cannot detect incoming ships
until they are right on top of it, 5km meters away.
This program changes the current flow in
If it had a sensor rating of 5, it could detect them
hardware. Overcharge can simply cause
at one range band out, 25km meters, 6 it could
capacitors to store power and explode, causing
detect them at 150km, 7 it could detect them at
damage to the hardware’s SP. Overcharge can
500km out. The hacker decides to overcharge the
be used to increase the power output of sensors,
sensor array which has a total SP of 50 because of
motors, engines, weapons, or other whole vehicle
its rugged construction. She overcharges it from
system. The Strength of the Overcharge program
4 to 7 because she has a program that is Strength
determines the damage done to the component
3. This increases the Sensors by 60%, 2.4 which is
or vehicle and the effect on the system. For
rounded up to 3, or for a total of 7. The systems
each point of Program Strength 1 point of SP is
when over charged takes 3 points of Damage
inflicted to the SP of a component or vehicle, and
every 10 days.
for each 4 points 1d6 is inflicted on the SP of the
component or vehicle either every round, hour, Example Gravitic Drive Over Charge
day, 10 days, or month depending on the GMs Ronald’s space taxy has a high paying fair
discretion. For each 1 point of Program Strength tomorrow, he needs to meet the ship at Saturn
the systems effectiveness is increased by 20%, with his fair on time for a big payoff. He calls
round up. If extra damage is dealt to a component his hacker friend Mitch and asks for his gravitic
or cybernetic component the remaining damage engines to be overcharged. Mitch works his
is dealt to the next component in the location magic overcharging the engines using his
or the location in general. When weapons are Speeder-Special build of the Overcharge code
overcharged both their damage and penetration which has a program Strength of 10. This will
is increased but doing so deals double damage increase the speed of the engine by 200%. The
and each use of the weapon will cause it to take engine has a speed of 2AU per 10 days, so its
this damage. increased by 4AU per 10 days, for total of 6AU
Example Sensor Over Charge per 10 days. Saturn is 8 AU from mars, still not
quick enough. He needs to make his Program
Hacker Judy wants to detect incoming ships to
Strength 20, he happened to be working on that
6
version, compiles it and runs it. 16AU in 5 days. damage enough to shut it down.
The ships engines will take 5d6 per day. The
Engines have 100 SP each, so he may blow up the Sample Programs
engines, but each one will take individual damage,
The following list of sample programs should

Hacking E rrata
on average he deals 20 damage per engine, he may
get there but that taxi is going to be wrecked. show GMs and players how to construct new
programs from the abilities list.
Example Overcharge Cybernetics to destroy them
Like all items, programs should be recorded on
Hacker Bob has had it with his neighbor. He
the character sheet.
decides to wreck his eyes. He runs overcharge
2, dealing 2 SP to each cyber eye. After breaking From the Dark Stars rule book, this is two of the
through the firewalls, he can overcharge each eye. computers and some programs.
Each eye takes 2 damage from the overcharge.
2 Damage is carried over to the head of his
neighbor.
Example Overcharge Weapon
Trud has a power armour suit, that has a rail
gun a weapon using large amounts of electronics
and energy to fire. She overcharges her rail gun
using overcharge 4 increasing its damage by 80%.
The gun normally deals 6d6+12. When damage is
rolled increase it by 80%, she rolls 37, that is 29.6
(round 30), 30+37 is 67. Penetration is normally
90, so that is increased by 80% too. That totals
162. She shoots at a tank for tank for 67 damage
with 180 penetration tearing through the armour
and damaging its locomotion by shooting out the
grav engine. The gun takes 2d6 damage, it has 40,
after rolling for damage it has 30 left, maybe 6
shots if she is lucky.

Tackle
The effect of this program is to stop a program or
operator or hacker from moving in Cyberspace.
The tackle latches on and stops them using their
ability to move. Only by destroying the tackle can
the hacker move again freely.
Example
Hacker Judy is spotted by a modified Doberman,
it latches on using its tackle ability and Judy
cannot move. Its tackle only has strength one,
but the daemon has a total Strength of 5 so Judy
launches a kill 2 at the Doberman dealing 5
7
CPU Table
The CPU Table is used to determine attributes of
existing Dark Stars computers in the equipment
Hacking E rrata

section and off the rack book. This table should be


used as a reference if no attributes are known for
items.

COMPUTER STATS TABLE STRENGTH SPEED FIREWALL MEMORY OPTIONS


TYPICAL CYBERNETICS OR EQUIPMENT * 1 1 15 1 -
SECURE ITEM, OR HARDENED CYBERNETICS * 3 1 20 1 -
IPOD2300 1 1 2 1 1
COMM * 1 1 15 1 -
SECURE COMM * 4 1 30 1 -
WORKSTATION CPUS 6 2 10 12 2
LAPTOP CPUS 4 1 15 2 1
POWER PC CPUS 10 4 15 5 4
AI PC 18 5 50 5 3
PCM 2 1 5 2 1
C & W POWER PCM 4 1 20 3 1
ROBOT BRAIN (PER BRAIN) 10 2 30 5 2
COLLECTIVE ROBOT BRAIN (PER BRAIN) 10 2 55 5 2
MICROCOMPUTER & SENSORS 4 1 20 3 2
CIVILIAN COMPUTER 20 3 45 15 12
MILITARY COMPUTER 40 6 55 15 12
COLLECTIVE MICROCOMPUTER & SENSORS 8 2 30 3 2
COLLECTIVE CIVILIAN COMPUTER 30 6 55 20 12
COLLECTIVE MILITARY COMPUTER 40 6 100 25 12
C & W LAPTOP 4 1 20 2 2
C & W BRIEFCASES 6 6 20 8 2
C & W PORTABLE POWER PC 10 5 30 16 6
C & W PORTABLE POWER AI PC 24 6 30 20 3
CW007B COVER ASSULT DECK 6 3 20 4 1
CW007A ASSULT DECK 6 3 50 4 1
W007N SIEGE DECK 12 3 50 8 1

8
9
Hacking E rrata
ITEM BULK SP RUNNING TIME HOURS COST CR
WORKSTATION COMPUTER 50 45 2 1,000
POWER PC 100 60 4 6,000
AI PC 40 30 1 160,000
Hacking E rrata

PCM 0.5 5 186 820

IPOD2300 0.3 5 500 300

MEMORY UPGRADE 0.1 1 NA 200


KEYBOARD 0.1 1 NA 40
TOUCH PAD OR MOUSE 0.1 1 NA 40
SCREEN 0.1 1 NA 40
AUDIO SYSTEM 0.1 1 NA 40
PORT HUB 0.1 1 NA 60
DAEMON 0.1 1 NA 500

EXTRA CPU 0.1 1 NA 1,000

CYBER UPGRADE SLOT 0.1 1 NA 200

CUTOFF SWITCH 0.1 1 NA 100

SHIELDED DATA PORT 0.1 1 NA 1,000

ALARM PROGRAM PS 1 0 0 0 50
DETECT PS 1 0 0 0 50
SHIELD PS 1 0 0 0 50
KILL PS 1 0 0 0 50
DAEMON PS 1 0 0 0 50
COPY PS 1 0 0 0 50
ARCHIVE PS 1 0 0 0 50
OVERCHARGE 1 0 0 0 50
TACKLE 1 0 0 0 50
REPAIR PS 1 0 0 0 50
STEALTH PS 1 0 0 0 50
HACKING SYNERGY PS 1 0 0 0 50
HACKING INTERFERENCE PS 1 0 0 0 50
SKILL PROGRAM PS 1 0 0 0 50
10 HARDWARE INTERFACE PS 1 0 0 0 50
USE
A large computer with three CPUs giving it 3 PS CPUs, 10 WS fi rewall, 4 MU storage.
A large computer with ten CPUs giving it 10 PS CPUs, 10 WS firewall, 5 MU.
A large computer with three Neural Processors 18 PS CPU, 50 WS fi rewall, 10 MU and lots of

Hacking E rrata
memory.
This item consists of a monocle worn over the eye and a small cassette-sized computer. 1 PS CPU, 5
WS fi rewall, 2 MU storage, Optional speakers, video boards, keyboard and mouse, power supply.
This computer can be used to view and record multimedia information. The computer is cheap and
can be used for accessing the net, network gaming (though not very graphically intensive games) and
projecting media onto walls. A computer engineer can modify the IPOD to enable it to perform any
computer functions though at a -20% penalty. 1 PS CPU, 3 WS firewall, 1 MU storage.
An option to increase the MU of a Cyberdeck or Computer by 1, takes up one option
A keyboard for providing an interface to programs.
A touchpad or mouse for connecting to the machine
An inbuilt touchscreen for using the device and viewing whats on the device.
An audio system to output sounds from the computer or options.
Connect your Screen, Keyboard and Touch Pad or other Peripherals to your deck or computer.
A special option for cyber decks and computers, provides 1 MSU/MU and 1 PS Strength CPU
specifically for running daemons, adds one to the Program Strength of the daemon
An extra CPU 5 PS Strength CPU, Speed 2 CPU, each CPU added past the first extra costs double the
last cost of CPUs, see example.
Install A cyberupgrade in your deck or computer that is Chip, Small or Medium sized. Can hold 4
Chips and either 2 Small or 1 medium Cybernetic Option
A special cutout which disconnects the net saftly from the cyberdeck and powers it down slowly
sending a signal up the link to the user to disconnect.
A special dataport which provides a second firewall with a PS of 25 in adition to the Cyberdecks
firewall.
See Hacking Section
See Hacking Section
See Hacking Section
See Hacking Section
See Hacking Section
See Hacking Section
See Hacking Section
See Hacking Section
See Hacking Section
See Hacking Section
See Hacking Section
See Hacking Section
See Hacking Section
See Hacking Section
See Hacking Section 11
New Programs
Note all of these programs except the overcharge
and tackle programs can be made from the base
Hacking E rrata

abilities.
ITEM BULK SP RUNNING TIME HOURS COST CR
TRACKER PS 3 0 0 0 600
DOBERMAN PS 5 0 0 0 1,150

LINEBACKER PS 9 0 0 0 2,750

BATTLE AXE PS 6 0 0 0 4050

RAGNAAR PS 12 0 0 0 7,200

THE BUREAUCRAT PS 5 0 0 0 1,650


SECRET AGENT MAN PS 9 0 0 0 2,700

KRAKEN PS 21 0 0 0 5,350

JESSY PS 6 0 0 0 1,650

ARNOLD PS 9 0 0 0 2,700

PERIMETER PS 25 0 0 0 13,850

CAMERA MAN PS 9 0 0 0 2,700

KEYMASTER PS9 0 0 0 13,850

HOTROD PS6 0 0 0 4050

12
Hacking E rrata
USE
Alarm Strength 1, Detect Strength 2
Alarm Strength 1, Detect Strength 2, Daemon 2. Launches both alarm and Detect and can move
around the net guarding the computer system that it runs on.
Shield 1, Repair 1, Detect 2, Tackle 1, Daemon 4. A program that shields the hacker and other
programs by detecting incoming threats and using shield and repair.
A powerful Kill program with Kill 6. It has an icon of a big axe and the hacker or program using it
looks like they are chopping programs with it.
A Viking Chieftain wielding a Battle axe. Battle Axe Program (Kill 6), Daemon 3, Shield 2, Detect 1.
Detects incoming threats or can be told to deal with incoming threats from other friendly programs
using its Kill 6 battle axe. Can also be told to chop down firewalls.
Copy 3, Archive 2. A program designed to copy data and file it efficiently.
Copy 1, Archive 2, Stealth 3, Daemon 3. A program that pretends to be a normal system resource or
different administrator, it uses its stealth to hide around looking for things to copy for its master and
archives them.
Stealth 2, Shield 2, Kill 3, Tackle 5, Detect 4, Daemon 5. This monster of a program uses its detect to
find a hostile hacker or program, uses its stealth to sneak up on them and its shield to protect itself its
tackle to stop them moving and then its kill program to defend itself or kill the target.
Hacking Synergy 2, Repair 2, Daemon 2. This program runs Hacking Synergy providing a 10% bonus
to Smart Weapon attacks, if it gets destroyed it repairs itself and it and run Hacking Synergy on two
targets at once. Jessy Quotes phases from the popular commentator and Actor from the 1980s and
1990s.
Hacking Interference 2, Repair 2, Kill 2, Daemon 3. Arnold interferes with smart gun attacks while
quoting phrases from the popular 1980s and 1990s actor.
Hacking Interference 2, Hacking Synergy 6, Repair 2, Kill 2, Detect 6, Alarm 1, Daemon 6. This
program creates a perimeter around the group of charters, and defends them provides hacking Synergy,
detects incoming threats sounds the alarm, repairs itself or firewalls, interferes with 2 enemies at a time
and provides hacking synergy smart gun bonuses of 10% to up to 6 people.
Hardware Interface 2, Detect 1, Stealth 1, Daemon 3. This program stealthily seeks out cameras
connects to them then allows the hacker to control and use those cameras. It can be easily modified to
see out different hardware so there is Door Man, Light Man etc.
Stealth 6, Detect 6, Kill 2, Repair 2, Shield 2, Alarm 1, Daemon 6. Keymaster is a stealthy program that
attempts to get keys by using kill and then repairing the firewall damage after its done, by operating
using stealth its usually difficult to detect. It uses detect to determine if it is found and then hides
coming back to finish the job of getting access keys to data. Once it has the data it returns, if it is found
out and detected it raises an alarm to alert other friendly programs or the hacker.
This overcharge program needs to be loaded into a vehicle with the proper access privileges
(permission to use the vehicle). It overcharges the engines, which ever type they are and increases the
speed of the vehicle by 120% 1d6+2 SP is inflicted to the engines, per day.
13
Hacking Clarifications and Errata
When hacking is used in Dark Stars it is handled success. This extra strength never counts for the
with the standard task resolution mechanics. total strength the CPU can run at.
Hacking E rrata

Programs have a Strength which needs to be Launching a program takes an action and a new
defeated in opposed tests, programs are destroyed program can be launched every action. Using
when they sustain their Strength or more in a program that is already running also costs an
damage. If a system is damaged or compromised, action. A high strength CPU can launch multiple
then other systems connected to it without their programs per action. For every 10-program
own firewalls can be hacked. For Hackers, they strength (round up) the CPU can launch 1
use a link and then their brain, so the brain is program or use one already running program. This
connected to the link. Brains do not have firewalls means that a CPU with 11 strength could launch 2
but have EGO. If the EGO of a brain is damaged programs in a single action.
(by a kill program) and if it ever reaches zero or
less the hacker is knocked out. Any further damage Movement takes 1 action regardless of the
is carried over to their general Hit points which distance, but programs and characters cannot
will continue until they die or are disconnected move through firewalls unless they have access
from their deck. The example illustrates this. codes, which can be got by destroying the firewall
Cyberbrains have their own firewall, so that is link or gaining the key in some other way.
firewall then cyber brain firewall then to the EGO Example: a CPU 1 will be able to run 1 program
of the AI or human inhabiting it. Ais have a default with a strength of 1. A Computer with 18 Program
ego of 10 if they do not have enough Charisma, Strength CPUs can run a total of 18 Program
Empathy, Intelligence or Self Control. Strength Programs at once and launch 2 programs
Hacking can also be very quick; an alternative per action. It can run programs up to strength 18.
system is Roll 10 under program strength to
Flood Protection
succeed or run the program. This is typically good
Pentabomb has a subsidiary company called
for programs not being run by hackers, just buy a
Comm Sec which co-ordinates the regulation and
big program. Using this system as opposed is quite
monitoring of all publicly accessible networks.
simple but the more complex method is better for
From Gravinet in the Block to Jovus Moons Data
hacker characters.
Links, Pentabomb is ready to act if widescale
Hackers can increase the strength of programs hacking attempts or exploits are discovered.
by getting more degrees of success on the roll to
For this reason, basic applications and firewalls
activate the program. For each degree of success,
always have flood protection. Network routers
the hacker adds one to the program strength which
and data links will not allow for example the use
does not rely on the CPU strength. This means
of 100 kill programs against one data linked data
that a skilled hacker can have a program running
lake or computer. These are stopped by a greater
at a higher strength than the CPU strength of their
number of Pentabomb computers running counter
current deck.
software. This does lead to the internet dropping
Example out or becoming less stable or slowing down.
Hacker using an PODO1 cheap computer with These Denial-of-Service attacks are usually dealt
only 1 CPU can run a stealth program and get with quickly and effectively by Pentabomb’s AIs.
a program strength of 6 by getting 5 degrees of The Collective has a similar system except its
14
built into every C-Link, the super AI Umath will only has two options so it can have 2 more giving
neutralise threats by re-tasking a fraction of the it a Strength of 16. These extra two CPUs cost
collectives computing power to stopping this type 2,000 more credits. A Power PC has a Strength of
of attack. 10 and 12 options, but it cannot have more than

Hacking E rrata
Consequently, hackers should not run too many 10 CPUs giving it a Strength of 60, with the new
programs against the one data lake more than CPUs but costing a large amount of money.
10 individual programs is enough to trigger a
Multiple Computers
response causing those programs to automatically
A hacker can use multiple computers at the same
cease functioning. Hackers known for using this
time if they have the Two-Fisted Perk, these can
exploit have no forms of corporate or united
be considered be running in the same action. The
nations protection and will be imprisoned for life
hacker cannot combine the CPU strength to run
in a Pentabomb work facility.
bigger programs.
CPU Speed
Multiple Computers without Two fisted
Speed of a CPU is important for each point of
A hacker can also run multiple programs on
speed the CPU can launch 1 Strength of program
different CPUs on different computers but
per action, so if a CPU with 6 strength and 1 speed
cannot combine the CPU strength to run bigger
is controlled by a hacker it can launch a program
programs.
with 6 strength in 6 actions. Speed is never
combined with more CPUs for the purpose of Multiple Ability Programs
launching programs, but each CPU can launch its
Certain programs will need to combine abilities for
own programs. For example, Line Backer takes 9
example tackle and detect, the combined Strengths
Strength a CPU with 20 Strength and 6 Speed will
makes the overall program more costly and
take 2 actions to launch Line Backer. A computer
stronger. Both abilities are active at the same time
with 2 5 Strength CPUs Speed 2 would be able
and will be combined for movement wherever
to launch 2 2 Strength programs at once or one 5
that program goes. Two or more abilities can be
Strength program over 3 actions.
combined to produce various effects and they both
Combining CPUs run at the same time but will take 1 action from
the operator to launch and direct/instruct the
If the CPUs are on the same physical computer,
program. Changing targets or directions will take
they can be combined adding their strength
1 action.
together, but not increasing the speed.

Adding CPU modules Daemon Programs


Daemon programs launch programs on their own,
The base cost is 1,000 CR for each CPU, this extra
so the hacker does not need to direct the daemon
Strength is added to the main computers Strength.
once the hacker launches it. The Daemon will
For each CPU added the cost increases because of
decide on what to do, so the hacker’s player can
extra cooling and power doubling each time. 1,000
still decide what the daemon does, or the GM can
CR becomes 2,000 CR for 2 extra CPUs, 2,000
decide. Daemons have the advantage of once they
becomes 4,000 for 3 extra CPUs.
are run, will perform these actions independently
A computer cannot have more extra CPUs than of the hacker.
its initial Strength of its original starting CPU.
Example A Workstation has a Strength of 6 and 2
options, it can have 6 additional CPUs added but it
15
Program ability Errata bonus, and you may not want it.

Example of Hacking in general


Program Costs
Judy is a hacker, and she is on a job to break into
If you feel as a GM that these programs are too
Hacking E rrata

some corporation’s data lake and steal secrets.


expensive or too cheap, then feel free to calculate Judy has Stealth, Kill and Copy, the minimum for
the cost differently or add a standard amount to this job. She first encounters the Data lake locked
the costs. behind visualisation of a high-rise building. The
Daemon Programs building has many floors and levels which make it
confusing to regular net pedestrians. The building
When using Demon programs, the kill program
has a Firewall with a Strength of 40. She needs
must attack the total Strength of the program,
to deal damage to that to make an opening in the
when the daemons strength is defeated the
building. First, she runs her stealth program, the
program ceases to function and must be re-run
detection systems of the building will need to
in its entirety. Demon programs can hold other
beat that. She rolls a 30, 2 degrees of success on
programs, you may wish to allow them to also
her hacking 50 skill. Her stealth programme has
run programs that are connected to the same CPU
strength 2 normally giving her a total of 12 (good
that they reside on or receive alarms from other
roll).
programs and interact with them. It is conceivable
to have a daemon run all the programs on the The detect program of the building rolls just under
hackers cyberdeck while they sleep to continue a the operator’s skill, and has a strength of 10, but is
hack, and they could wake the hacker if they find still not enough to see her because of her good roll.
trouble. The operators can try to detect her, but they get a
-20% to do so each point of stealth gives a penalty
Kill Programs similar to the other stealth systems.
You may want to play kill in the following way, Judy then uses her kill 8 program 8d6 plus 1d6 per
Kill Deals 1d6+ 1d6 or 1 for each point of Strength degree of success she scores 2 degrees for a total of
the kill program has plus 1d6 per degree of success 10d6 to the Fire Wall. Rolling 40 she has blown
the hacker achieves. This does mean that kill will down the wall in one action. She then moves in
become more effective, but it also means that to steal the data it too is protected by another
firewalls can be defeated quickly. Rather than firewall; she attacks again dealing 30 damage. This
several actions a single action may be all that is activity alerts the system ops, they check again and
required given most firewalls are only 25 points get 2 degrees of success giving them a total 20 to
or so. We favour the 1d6 +1 for each point of spot her, her cover is blown. On her next action
strength of the kill plus 1d6 per degree of success. she smashes the wall down. The system operators
Kill 12 is then 1d6+12 plus 1d6 per degree of launch their kill program at her firewall on her
success. Kill dealing 12d6 is also possible it just cyberdeck dealing 30 points to is almost taking
speeds up the take down time for programs, it down it has 5 left. Judy then runs her copy
hackers, and firewalls. program to copy data. The system administrators
launch kill destroying the remaining firewall of her
Hacking Synergy and Hacking Interference
deck she is exposed now, able to be attacked. She
An alternate way to play this rather than just more begins coping the data and it takes two actions.
characters affected is the bonus is increased by 10% The system op launches kill at her link, which is
+1 per point of Strength e.g.: Hacking Synergy 20 connected to her spin through the firewall of her
provides 20% to smart gun attacks. This is a bigger cyberdeck. Dealing 25 to it, the link has 35 to start
16
with losing a total of 25, it has 10 left. Judy is still
coping the data. The system op launches kill again
dealing another 35 to her, he is in her link now
connected to her brain, terror fills her thoughts.

Hacking E rrata
He cannot read her thoughts, but he can hurt her
now, she has an EGO stat of 20. He launches kill
against her just as she copies the data, he deals 25
damage to her EGO she is knocked unconscious,
because her EGO is below zero and she took
5 extra general hit point damage. Her friend
mitch is watching, and unplugs her, the hacker
is disconnected the data was copied and Judy is
knocked out.

17
THANK YOU FOR PLAYING!
Epiphany Entertainment could not have got to where we are with over 15 books out and another 2 in
development without the love and support of our players.
Hacking E rrata

We really want to make sure you can use Dark Stars to do whatever you want in whatever world you
want. We have been supporting Dark Stars while we have created a new setting that deals with more
fantastic elements. All these games include new perks, skills, equipment, and your group can mix and
match these however you wish.
Here are some of our other games for you to take a look at, all the games are on Drivethru RPG, many
are also on our website. Visit Drivethru RPG
https://www.drivethrurpg.com/browse/pub/13069/Darkstars-Universe
We would love to hear what you think about our games, so message us on Facebook or send us an Email
on gnet@darkstarsuniverse.com.

18
Hacking E rrata

19
Hacking E rrata

20

You might also like