**Disclaimer: This is coming from a lot of different sources and I can't be bothered to paraphrase everything I read. I'm going to copy paste some stuff directly from other sources so sue me if you want.
What Is The Matrix?
The Matrix can be thought of as the internet. Specifically, the Matrix is a sculpted realm of Virtual Reality that serves to visualize the processes of computers. The Matrix and the internet are very close analogues, but differences exist in terminology and phrasing. You are probably better off not knowing anything about how computers work before you learn about the Matrix than you are going in with prior knowledge, because the little discrepancies are probably going to irritate you.
Here is a brief list of terminology:
Cyberdeck and Device Stats
Device Rating: This is the most important statistic of any electronic device. All electronic devices have a device rating that serves as a reflection of the power of the operation system running on the device. Programs on the device cannot have a rating higher than the rating of the device/2 unless the deck is overclocked.
Integration Points: Integration Points or IP are your HP in the Matrix. It is measured in multiples of 25. The amount of IP you have is equal to your Device Rating + your Defense Array * 25.
Array: The Array of an AR / VR device is more or less the accuracy rating in the Matrix. When making tests that pertain to that Array, your successes on any given roll cannot numerically exceed the Array.
Overclocking Dice: Certain decks have Overclocking Dice. This means that the decks are fine-tuned for emergencies, where you can increase both the array of a deck and your dicepool for those Matrix Actions for a number of turns equal to their device rating. This can only be done once per session.
Response: The response of a device is a measure of the speed of it's signal. Each point of Response Speed acts as one extra die for Matrix Initiative and Evasion.
Firewall: The Firewall of a device is the power of the OS's ability to ward away cybernetic threats. The Firewall of a device is equal to double it's Response +1 in most cases.
Load Speed: Simply put, the load speed is how fast the cyberdeck can load visualized Matrix movement to the active memory. The load speed of a device is your movement speed in the Matrix.
Cyberdeck Detailed Stats Table
Here it is because I suck with html
Matrix Geography
Server: A server in Shadowrun is the same as a server in real life. It is a running instance of some software that is capable of accepting input from multiple sources.
Host: The “host” is the term for the server from which all interconnected devices and nodes are managed. If you jack into the Matrix and end up on a grid, you are running through a grid that is managed by a Host, usually belonging to some corporation. There are giant Matrix networks that run through massive Hosts throughout the world, those are usually referred to as The Public Grid. The ownership of this Grid varies from place to place: Novatech in northeast America, Transys in the United Kingdom, Aztechnology in Aztlan, etc. Besides the commonly accessed public grid there are private hosts that contain restricted information.
Grid: A grid, also called a System, is a map's worth of Matrix nodes.
Node: A node can be thought of as the publicly accessible webpage of a server. Every online device creates a node in the Matrix.
Datastore: A datastore is a node which contains files. They are marked on the maps I make by triangles.
Systems Access Node: A systems access node or SAN connnects the grid to the server through which other grids are managed. If a decker locks out the SAN, no other persona not directly connected to that grid can use it. They are marked on the maps I make as a rectangle with a plug socket symbol on it.
Slave: A “slave node” is a device that has forfeited singular control to a grid. This usually manifests as cameras, lights, elevators etc. that are managed by a security grid. If a Rigger wants to use a Controller program for their drones they have to slave them to one of their devices. They are marked on the maps I make as a square.
Persona: A persona is a decker's “avatar”. They can be shaped any way the user desires as long as it is humanoid. As the visual representation of a person using virtual reality, they use simsense technology to filter information and enrich the experience. When a persona sustains digital damage that severs the gateway between their brain and the Matrix, their simsense editors go haywire and cause the decker to take Biofeedback damage.
Security Measures
IC: Intrusion Countermeasures are are Matrix constructs designed to detain and possibly kill deckers invading a computer host. IC constructs range from benign Probe constructs that simply monitor activity to Trace programs that determine the location of an intruding decker to IC that can warp or physically damage the brain through lethal biofeedback.
ESP: Executive Service Programs are special IC that are exclusive only to someone with administrative access on the Host. They act like minions for admins that can impair intruding deckers.
System Sculpting: Sculpting is the process in which a Host with a lot of processing power to spare can adjust the “graphics” for a grid to something above normal standards. Typically this is used to give things a little more color and flare, like a kid's website filled with colorful characters, but it can also be used to intimidate intruding deckers by creating a hostile and unseemly environment.
Passive Alert: A passive alert means that the computer is not sure that it has been invaded, but is going to be careful. This temporarily increases the Device Rating of IC by 1.5X and slows down processing, preventing sculpted systems from being used with most Hosts.
Active Alert: This means the computer has decided it is being attacked. It notifies the human operators, who usually take the time to send a decker in to deal with the intruder.
On Augmented Reality and Virtual Reality
There is no difference between what you can do with AR / VR. However, there are bonuses and penalties, see below:
|
Augmented Reality |
Virtual Reality |
Dicepools |
-6d6 to physical actions (except with Multi-Tasking adept power), -2d6 to Matrix actions |
Cannot move physical body |
Matrix Initiative/Time Span |
As Reaction Class/2 Turns per Real World Turn |
As Response Rating + Reaction Class/4 Turns per Real World Turn |
Damage Taken |
If IP damage taken exceeds Response/Firewall Rating, takes that damage/25 in biofeedback stun |
If IP damage taken exceeds 25, takes that damage/25 in biofeedback damage |
Matrix Actions
There are four broad types of Matrix actions. They are as follows:
An Offensive Matrix Action involves an assault on some sort of aspect of the Matrix. These tests are measured by Intelligence + Cybercombat. Only a Cyberdeck can perform these actions.
A Defensive Matrix Action involves defense of the above. These tests are measured by Cybercombat + Response Rating or Firewall.
A Sleaze Action is used for any kind of stealthy or subtle action. These tests are measured by Intelligence + Decking, and is weighed against the Device Rating. Only a Cyberdeck can perform these actions.
A Data Processing Action is used to perform software tasks that are non-trivial. These tests are measured by Intelligence + Programs. It is weighed against the Device Rating, or Intelligence + Decking if a sentient target.
There are also two special actions that are used in special occasions:
The Evasion action is used to dodge attacks in the Matrix. It is measured by Reaction Class + Response Rating.
Jacking-Out Reflexively should be done when a decker is certain that the dumpshock damage they will endure would be worse than what would happen if they stayed in the grid. It is performed by Willpower + Reaction Class versus the sum total of the combined Willpower of the attackers + your damage taken that turn/5.
Dealing Damage
The default method of dealing damage to a persona involves shooting out a little bolt from one persona to another. Like all other forms of damage this requires line of sight. Damage in the Matrix is measured in IP damage, which comes in multiples of 25 and compromises the integrity of a device rating, which is your HP inside the Matrix. Your base attack damage in the Matrix is equal to your Device Rating * 12.5 or your Attack Program, whichever is higher.
Dumpshock occurs when you jack out reflexively or lose all of your IP. When you reach 0 IP, you are dumped from the Matrix in an instant so jarring that it does biofeedback and biofeedback stun damage equal to the number of real world turns + (the sum total of the IP damage they've taken/25). There is a minimum dumpshock damage of 0 biofeedback damage and 3 biofeedback stun.
Shut-Down occurs when a single action renders an AR / VR device non-functional. This is always an opposed roll and requires that the attacker get 4 net hits to succeed. This specifically applies to forcing a device to shutdown, it does not apply to attempts to kill or bomb a user of the Matrix.
A Databomb is a specific type of Sleaze Action that requires a full real world turn to set up. A databomb does an extremely high amount of biofeedback damage; equal to the sum total of the result of the dice, which are equal to the device rating of the bomb. (For example, Device Rating 4 Bomb: Rolled 4, 5, 2, 1: 12 biofeedback damage total) This destroys the grid under the bomb if connected to a Host with a device rating equal to or lower than the databomb. The explosion of a databomb always sets related grids under the same Host to Active Alert for a number of hours related to the severity of the explosion.
Trace/Overwatch Score
The systemic defense of a grid by the IC is governed by how likely the IC think it is that a decker is intruding. Deckers enter a host with an initial overwatch score of 0, and the more actions that decker takes to announce their presence, the higher it gets. Once the Overwatch score reaches it's highest possible value, an active alert is declared. Overwatch security levels usually increase for every 4 trace and go as high as 25 trace before active alert and as low as 15 trace before active alert. The most common method of tracing a decker is through the use of patrolling IC, specifically White Probe IC and Trace IC which have high matrix perception rolls. Besides that, the following actions increase your trace state:
Using the default Attack program will increase your Trace state by 1 for every different node you use it on.
Performing an Attack Action that is NOT the default Attack program will increase your Trace state by 5.
A failed Sleaze Action will increase your Trace state by the net successes the foiler of the action obtained. If the Sleaze Action was a critical failure then the grid goes into Passive or Active alert, whichever is higher than what is currently happening.
As soon as a host obtains maximum trace on you, the Host is aware of:
Your commcode
The last Matrix action you performed, and when
The grid you are using
Your device rating
The programs you have on that device
Matrix Actions and Host Damage
Some Matrix Actions put such a strain on the grid that it actually causing the Host to consider dropping and rebooting that grid to conserve energy. The degree of Host damage is measured in five stages:
None: The server-to-server connection is functioning at an ideal state.
Low: There are some issues with the memory of the grid but overall everything can be used as normal.
Considerable: There is a noticeable strain on the server. The Host enters passive alert status if it is not already in that state.
Serious: The computer believes that there is an attempt underway to flood the Host. The Host enters active alert status if it is not already in that state.
Critical: The Host can no longer sustain the damage it has taken. The grid shuts down at the end of that turn, dumping all personas inside and causing them to take 10 – their defense Array biofeedback damage and suffer normal dumpshock damage after that. The Host reboots that grid in 2d6 minutes.
Typical Matrix Actions
All Matrix Actions are Full Turn Actions unless noted.
Attack:
Break Through Firewall: Attempt to stop a firewall from working completely. Deals Low Host damage.
Break Through Encryption: Force your way through encryption. Deals Low Host damage.
Crash Program: Crash a device or program used in the current grid. Deals Low Host damage.
Jam Signals: Stops signals coming from the grid. Must have administrative permissions.
Data Spike: Deal Biofeedback damage to one target equal to the Attack Array of your deck plus successes. Deals Serious Host damage.
Sleaze:
Tab Device: Keep a mark on a device for future references.
Hack in Combat: A special preliminary action for when you need to hack when you're tied down. Simple Action.
Hide: Disguise your actions and prevent them from leaving a trail for the IC to notice.
Databomb: Plant a Databomb which has a Device Rating equal to the successes of the Sleaze roll. You may take a full turn action to remotely detonate the bomb once the bomb is planted. If the detonation occurs, deals Serious to Critical Host damage.
Intercept Matrix Traffic: Find information within the current grid that is being changed or accessed.
Spoof Command: Fake administrative permissions for one action.
Data Processing:
Change Basic Data: Change something as obvious as a file name or desktop icon.
Rig Device: Rig into a device you have marked.
Matrix Perception/Matrix Search: Search the grid or use a search engine to find information, including hidden icons.
Utilize Device: Use limited control over a device to change something.
All Data Processing actions leave behind a data trail and increase your Trace by 1 unless hidden with the Hide action.
Defense:
Disarm Databomb: Attempt to disarm a databomb.
Matrix Defenses: -10 Initiative cost, must have administrative powers. Add your Intelligence to your dicepool for any evasion or defense actions in the Matrix.
IC Types
White IC are the least complex type of IC, used to monitor and impede without doing any damage.
Trace IC are designed for passive alerts or for particularly paranoid corporations that want to guarantee they know when and where attacks occur. They are a more powerful probe IC designed to obtain information on intruders.
Gray IC are IC that exist to disable or shutdown all offensive processes of enemy deckers, prioritizing damage to their cyberdeck over damage to the people using them.
Blaster IC are the legal replacement for Black IC for entities without legal capability to kill deckers. They do very high, indiscriminate amounts of IP damage. A higher class of Blaster IC used only by corps who legally use Black IC are Destroyer IC, which attempt to destroy linked devices after dumping an intruding decker.
Black IC are only legally used by military actors or corporations that are at least AA class. They are intended to kill deckers, and do straight biofeedback damage on top of IP damage.
Examples of Matrix Play
“I want to disable this guy's cybereyes.”
->Locate their cybereyes on the public grid.
->Perform a Crash Device (attack action) action. The default firewall of cyberware is 2, and you must roll 4 successes over him to crash it that turn. Otherwise, it takes 4-net successes turns to disable his eyes.
->Keep in mind that someone with their cybereyes on wireless can switch their signal to silent by rebooting their eyes, which only takes three free actions (one turn). They will probably end up doing this if they're in combat with someone they know is a hacker.
“I want to search this grid for paydata.”
->Perform a Matrix Search (data processing action) action against the device rating of the Host. If the data is not protected, this requires no roll.
“I want to loop the surveillance cameras.”
->Locate the cameras on the proper grid.
->Perform a Data Processing Action against the device rating of the Host. The number of net successes is the quality of the job, for every success, an observer must roll that number of successes on perception to notice something wrong with the footage.
“I want to play the CEO's voicemail on the PA system.”
->Perform a Tab Device (sleaze action) action against the Firewall of the CEO's voicemail device. Standard commlink, pretty easy—commlink slaved to a secure Host, not so much. You may need to directly alter the voicemail system...
->Which you can do by going to the proper grid and using Matrix Search (data processing) against the device rating of the Host to find the device, and then
->Perform a Data Processing Action against the device rating of the Host to either copy (Sleaze action) or tab the device for future reference (Sleaze action). If you do the former, you risk being traced, but if you use either the Cloak program or Matrix Hide (Sleaze action) against the Host's device rating you can hide the data trail.
“I want to defeat this decker in combat without killing them.”
->In the majority of cases where your deck outclasses your opponent you can simply use the Black Hammer Program to deal a large amount of biostun to them and probably dump them from the Matrix. In situations where you are facing a powerful deck or a talented decker, things get a little trickier, and your actions will vary depending on the programs each of you are using.
“I want to fucking kill this decker.”
->The best way to kill a decker over Virtual Reality is to use the Data Spike (attack) action to deal raw biofeedback damage to someone and potentially end up killing them with the dumpshock. Keep in mind that the Data Spike action does Serious host damage and you could potentially end up destroying the grid.
->A more “stylish” way to do things might be to use a Trace program or ESP to find their commcode, which, assuming it is not a burner comm, would give you their address. You could then use your commlink to call up the police and deceive them into arresting the enemy decker mid-dive, or if you had a useful contact, hire a hitman to kill them while they're in VR.