Outstanding Rules Questions

Tema en '[Archived]: N3 Rules' iniciado por Sabin76, 23 Nov 2017.

  1. C0MR4DE

    C0MR4DE Malfunctioning Unidron

    Registrado:
    24 Nov 2017
    Mensajes:
    116
    Me Gusta recibidos:
    75
    Because after successful hit on the main target we talk about area of effect.
     
  2. C0MR4DE

    C0MR4DE Malfunctioning Unidron

    Registrado:
    24 Nov 2017
    Mensajes:
    116
    Me Gusta recibidos:
    75
    REPEATER AUTOMATIC EQUIPMENT
    Comms Equipment, Obligatory, Zone of Control.
    REQUIREMENTS
    EFFECTS

     
    A Icchan le gusta esto.
  3. ijw

    ijw Ian Wood aka the Wargaming Trader. Rules & Wiki
    Infinity Rules Staff Warcor

    Registrado:
    25 Abr 2017
    Mensajes:
    7.350
    Me Gusta recibidos:
    14.838
    The area of effect of a Template Weapon is worked out when you place the template, so when the BS Attack is declared.
     
    A Icchan, Belgrim y C0MR4DE les gusta esto.
  4. Hecaton

    Hecaton EI Anger Translator

    Registrado:
    23 Nov 2017
    Mensajes:
    7.241
    Me Gusta recibidos:
    6.557
    Yeah his argument is that this last bullet point does not state it expands the hacker's hacking area, so it doesn't. He says you can still use hacking programs in this situation, but cannot make AROs against enemy hackers that move without LoF.

    Logically inconsistent, yes, but it definitely changes the game and the wording *is* awkward. A clarification from someone at CB would be nice.
     
  5. Hecaton

    Hecaton EI Anger Translator

    Registrado:
    23 Nov 2017
    Mensajes:
    7.241
    Me Gusta recibidos:
    6.557
    Look, I know how it's supposed to be played. The rule just needs a small clarification to make things clear for the people who look at it and see that it doesn't state it expands the hacking area in that way.
     
  6. C0MR4DE

    C0MR4DE Malfunctioning Unidron

    Registrado:
    24 Nov 2017
    Mensajes:
    116
    Me Gusta recibidos:
    75
    *and also against any enemy Hacker*
    If he does not understand this, it is possible that he doesnt want to understand or has a huge problem with his comprehension.
     
    A Icchan le gusta esto.
  7. xagroth

    xagroth Mournful Echo

    Registrado:
    23 Nov 2017
    Mensajes:
    6.601
    Me Gusta recibidos:
    5.602
    Sorry if it sounded like the "RTM" was for you, that was not my intention, it was "for the other guy" so to speak. As for the clarification of any small detail, crash, bug, exploit... I'm afraid it's not going to happen, since CB doesn't have the people to do so, specially with Paradiso N3 in the oven (which will create more, so...).
     
  8. Hecaton

    Hecaton EI Anger Translator

    Registrado:
    23 Nov 2017
    Mensajes:
    7.241
    Me Gusta recibidos:
    6.557
    Again, the issue is that it doesn't say it expands your hacking area in that case.
     
  9. Hecaton

    Hecaton EI Anger Translator

    Registrado:
    23 Nov 2017
    Mensajes:
    7.241
    Me Gusta recibidos:
    6.557
    They do have the people to do so, unfortunately a well-written ruleset is not a priority.
     
  10. Bobman

    Bobman MERC

    Registrado:
    22 Feb 2017
    Mensajes:
    760
    Me Gusta recibidos:
    556
    It is literally written in the repeater rules the ability to hack through an enemy repeater. Its been quoted.

    Hacking Area also says usable repeaters and refers to both friendly and enemy.

    This term refers to the Area of Effect of Hacking Programs when it covers not only the Hacker's Zone of Control (ZC), but also the Zones of Control of all usable Repeaters.

    Using friendly Repeaters carries no penalty, but using Repeaters deployed by the enemy is only possible within their Zone of Controland carries some negative MODs (see Repeater).

    Not much more can be said.
     
    #30 Bobman, 26 Nov 2017
    Última edición: 26 Nov 2017
  11. C0MR4DE

    C0MR4DE Malfunctioning Unidron

    Registrado:
    24 Nov 2017
    Mensajes:
    116
    Me Gusta recibidos:
    75
    .
     
    #31 C0MR4DE, 26 Nov 2017
    Última edición: 26 Nov 2017
  12. ijw

    ijw Ian Wood aka the Wargaming Trader. Rules & Wiki
    Infinity Rules Staff Warcor

    Registrado:
    25 Abr 2017
    Mensajes:
    7.350
    Me Gusta recibidos:
    14.838
    Locked is not a Null state, so there's nothing to stop the Avatar holding anything.

    However shouldn't this question be in a new thread? It's not an outstanding question from the old forum.
     
    A C0MR4DE le gusta esto.
  13. Hecaton

    Hecaton EI Anger Translator

    Registrado:
    23 Nov 2017
    Mensajes:
    7.241
    Me Gusta recibidos:
    6.557
    In the particular case of hacking an enemy hacker somewhere on the board not in the ZoC of any repeater (due to being within the ZoC of an enemy repeater) it doesn't say that the hacking area is extended to include the relevant model.

    I'm of the opinion that it must, and given that almost all programs have a range of "hacking area" if it didn't actually extend hacking area you wouldn't actually be able to hack in that situation, but, like I said, one of my local TO's disagrees. Since this thread is asking for CB clarifications on things, and not your opinion on the rules, I'm asking for said clarification.
     
  14. Bobman

    Bobman MERC

    Registrado:
    22 Feb 2017
    Mensajes:
    760
    Me Gusta recibidos:
    556
    It isn't my opinion on the rule it is the rule. As quoted. Allowing you to hack enemy hackers. As written in the actual rule book.

     
  15. C0MR4DE

    C0MR4DE Malfunctioning Unidron

    Registrado:
    24 Nov 2017
    Mensajes:
    116
    Me Gusta recibidos:
    75
    *Firewall Example
    A Hacker declares a Hacking Attack through an enemy Repeater against another Hacker equipped with a Defensive Hacking Device. Both the Repeater (which was deployed by the enemy) and the Defensive Hacking Device deploy Firewalls against the Attack, but the Firewall MODs apply only once, not once per Firewall involved. Consequently, the attacking Hacker suffers a -3 MOD to her WIP, and her target enjoys a +3 MOD to his potential BTS Roll.*
    *
    • Hackers can also attempt to hack through an enemy Repeater only if the Repeater is inside their Zone of Control. By doing this, they can perform hacking attempts against targets inside the Zone of Control of the enemy Repeater, and also against any enemy Hacker, but they suffer the Firewall MODs (a -3 MOD to their WIP Roll, while their target gets a +3 MOD to his BTS).
    *
    my last post about this.
     
    A Bobman le gusta esto.
  16. Hecaton

    Hecaton EI Anger Translator

    Registrado:
    23 Nov 2017
    Mensajes:
    7.241
    Me Gusta recibidos:
    6.557
    Yeah, you guys aren't getting it. It doesn't state that hackers in that situation are considered to be part of the other hacker's hacking area, so the argument is that no ARO is generated when they move/perform actions. I disagree, of course, but a clarification for a poorly-written rule would be appreciated.
     
  17. Bobman

    Bobman MERC

    Registrado:
    22 Feb 2017
    Mensajes:
    760
    Me Gusta recibidos:
    556
    Yeah, I get it just fine. You clearly don’t get it. The rule is written plain as day. You just wanna argue cause, I dunno whatever reason. So I can’t help you cause of whatever that reason is. Plus I don’t care anymore. Good luck with that.
     
  18. ijw

    ijw Ian Wood aka the Wargaming Trader. Rules & Wiki
    Infinity Rules Staff Warcor

    Registrado:
    25 Abr 2017
    Mensajes:
    7.350
    Me Gusta recibidos:
    14.838
  19. Hecaton

    Hecaton EI Anger Translator

    Registrado:
    23 Nov 2017
    Mensajes:
    7.241
    Me Gusta recibidos:
    6.557
    @ijw it's not so much whether hacking can happen, but whether the relevant models count as being in the others' hacking area. I.E. I have a model within the ZoC of an enemy repeater. On their turn, one of their hackers declares a short move skill. Do I get to ARO? I think the answer is yes, but because it's not really stated explicitly, there is... confusion.
     
  20. Sabin76

    Sabin76 Well-Known Member

    Registrado:
    23 Nov 2017
    Mensajes:
    1.708
    Me Gusta recibidos:
    2.086
    In addition to IJW's post above with the answer, there is also the first bullet point of the repeater equipment:

    EFFECTS

    Note how it does not specify "friendly" hackers. This is only only line needed. If they can hack you, you can hack them... even if they don't bother hacking. Only difference is that Firewall MODs are applied if the repeater is an "enemy repeater," and also that you can't "daisy chain" repeaters, but those are explained later.
     
  • About Us

    We are a company founded in 2001 in Cangas (Spain), and devoted to design and manufacture games and figures. Our main product, Infinity the Game, was born with the ambition to satisfy the most demanding audience, offering the best quality.

     

    Why are we here?

     

    Because we are, first and foremost, players.

  • Quick Navigation

    Open the Quick Navigation