Outstanding Rules Questions

Discussion in '[Archived]: N3 Rules' started by Sabin76, Nov 23, 2017.

  1. C0MR4DE

    C0MR4DE Malfunctioning Unidron

    Joined:
    Nov 24, 2017
    Messages:
    116
    Likes Received:
    75
    Because after successful hit on the main target we talk about area of effect.
     
  2. C0MR4DE

    C0MR4DE Malfunctioning Unidron

    Joined:
    Nov 24, 2017
    Messages:
    116
    Likes Received:
    75
    REPEATER AUTOMATIC EQUIPMENT
    Comms Equipment, Obligatory, Zone of Control.
    REQUIREMENTS
    EFFECTS

     
    Icchan likes this.
  3. ijw

    ijw Ian Wood aka the Wargaming Trader. Rules & Wiki
    Infinity Rules Staff Warcor

    Joined:
    Apr 25, 2017
    Messages:
    7,350
    Likes Received:
    14,838
    The area of effect of a Template Weapon is worked out when you place the template, so when the BS Attack is declared.
     
    Icchan, Belgrim and C0MR4DE like this.
  4. Hecaton

    Hecaton EI Anger Translator

    Joined:
    Nov 23, 2017
    Messages:
    7,241
    Likes Received:
    6,557
    Yeah his argument is that this last bullet point does not state it expands the hacker's hacking area, so it doesn't. He says you can still use hacking programs in this situation, but cannot make AROs against enemy hackers that move without LoF.

    Logically inconsistent, yes, but it definitely changes the game and the wording *is* awkward. A clarification from someone at CB would be nice.
     
  5. Hecaton

    Hecaton EI Anger Translator

    Joined:
    Nov 23, 2017
    Messages:
    7,241
    Likes Received:
    6,557
    Look, I know how it's supposed to be played. The rule just needs a small clarification to make things clear for the people who look at it and see that it doesn't state it expands the hacking area in that way.
     
  6. C0MR4DE

    C0MR4DE Malfunctioning Unidron

    Joined:
    Nov 24, 2017
    Messages:
    116
    Likes Received:
    75
    *and also against any enemy Hacker*
    If he does not understand this, it is possible that he doesnt want to understand or has a huge problem with his comprehension.
     
    Icchan likes this.
  7. xagroth

    xagroth Mournful Echo

    Joined:
    Nov 23, 2017
    Messages:
    6,601
    Likes Received:
    5,602
    Sorry if it sounded like the "RTM" was for you, that was not my intention, it was "for the other guy" so to speak. As for the clarification of any small detail, crash, bug, exploit... I'm afraid it's not going to happen, since CB doesn't have the people to do so, specially with Paradiso N3 in the oven (which will create more, so...).
     
  8. Hecaton

    Hecaton EI Anger Translator

    Joined:
    Nov 23, 2017
    Messages:
    7,241
    Likes Received:
    6,557
    Again, the issue is that it doesn't say it expands your hacking area in that case.
     
  9. Hecaton

    Hecaton EI Anger Translator

    Joined:
    Nov 23, 2017
    Messages:
    7,241
    Likes Received:
    6,557
    They do have the people to do so, unfortunately a well-written ruleset is not a priority.
     
  10. Bobman

    Bobman MERC

    Joined:
    Feb 22, 2017
    Messages:
    760
    Likes Received:
    556
    It is literally written in the repeater rules the ability to hack through an enemy repeater. Its been quoted.

    Hacking Area also says usable repeaters and refers to both friendly and enemy.

    This term refers to the Area of Effect of Hacking Programs when it covers not only the Hacker's Zone of Control (ZC), but also the Zones of Control of all usable Repeaters.

    Using friendly Repeaters carries no penalty, but using Repeaters deployed by the enemy is only possible within their Zone of Controland carries some negative MODs (see Repeater).

    Not much more can be said.
     
    #30 Bobman, Nov 26, 2017
    Last edited: Nov 26, 2017
  11. C0MR4DE

    C0MR4DE Malfunctioning Unidron

    Joined:
    Nov 24, 2017
    Messages:
    116
    Likes Received:
    75
    .
     
    #31 C0MR4DE, Nov 26, 2017
    Last edited: Nov 26, 2017
  12. ijw

    ijw Ian Wood aka the Wargaming Trader. Rules & Wiki
    Infinity Rules Staff Warcor

    Joined:
    Apr 25, 2017
    Messages:
    7,350
    Likes Received:
    14,838
    Locked is not a Null state, so there's nothing to stop the Avatar holding anything.

    However shouldn't this question be in a new thread? It's not an outstanding question from the old forum.
     
    C0MR4DE likes this.
  13. Hecaton

    Hecaton EI Anger Translator

    Joined:
    Nov 23, 2017
    Messages:
    7,241
    Likes Received:
    6,557
    In the particular case of hacking an enemy hacker somewhere on the board not in the ZoC of any repeater (due to being within the ZoC of an enemy repeater) it doesn't say that the hacking area is extended to include the relevant model.

    I'm of the opinion that it must, and given that almost all programs have a range of "hacking area" if it didn't actually extend hacking area you wouldn't actually be able to hack in that situation, but, like I said, one of my local TO's disagrees. Since this thread is asking for CB clarifications on things, and not your opinion on the rules, I'm asking for said clarification.
     
  14. Bobman

    Bobman MERC

    Joined:
    Feb 22, 2017
    Messages:
    760
    Likes Received:
    556
    It isn't my opinion on the rule it is the rule. As quoted. Allowing you to hack enemy hackers. As written in the actual rule book.

     
  15. C0MR4DE

    C0MR4DE Malfunctioning Unidron

    Joined:
    Nov 24, 2017
    Messages:
    116
    Likes Received:
    75
    *Firewall Example
    A Hacker declares a Hacking Attack through an enemy Repeater against another Hacker equipped with a Defensive Hacking Device. Both the Repeater (which was deployed by the enemy) and the Defensive Hacking Device deploy Firewalls against the Attack, but the Firewall MODs apply only once, not once per Firewall involved. Consequently, the attacking Hacker suffers a -3 MOD to her WIP, and her target enjoys a +3 MOD to his potential BTS Roll.*
    *
    • Hackers can also attempt to hack through an enemy Repeater only if the Repeater is inside their Zone of Control. By doing this, they can perform hacking attempts against targets inside the Zone of Control of the enemy Repeater, and also against any enemy Hacker, but they suffer the Firewall MODs (a -3 MOD to their WIP Roll, while their target gets a +3 MOD to his BTS).
    *
    my last post about this.
     
    Bobman likes this.
  16. Hecaton

    Hecaton EI Anger Translator

    Joined:
    Nov 23, 2017
    Messages:
    7,241
    Likes Received:
    6,557
    Yeah, you guys aren't getting it. It doesn't state that hackers in that situation are considered to be part of the other hacker's hacking area, so the argument is that no ARO is generated when they move/perform actions. I disagree, of course, but a clarification for a poorly-written rule would be appreciated.
     
  17. Bobman

    Bobman MERC

    Joined:
    Feb 22, 2017
    Messages:
    760
    Likes Received:
    556
    Yeah, I get it just fine. You clearly don’t get it. The rule is written plain as day. You just wanna argue cause, I dunno whatever reason. So I can’t help you cause of whatever that reason is. Plus I don’t care anymore. Good luck with that.
     
  18. ijw

    ijw Ian Wood aka the Wargaming Trader. Rules & Wiki
    Infinity Rules Staff Warcor

    Joined:
    Apr 25, 2017
    Messages:
    7,350
    Likes Received:
    14,838
  19. Hecaton

    Hecaton EI Anger Translator

    Joined:
    Nov 23, 2017
    Messages:
    7,241
    Likes Received:
    6,557
    @ijw it's not so much whether hacking can happen, but whether the relevant models count as being in the others' hacking area. I.E. I have a model within the ZoC of an enemy repeater. On their turn, one of their hackers declares a short move skill. Do I get to ARO? I think the answer is yes, but because it's not really stated explicitly, there is... confusion.
     
  20. Sabin76

    Sabin76 Well-Known Member

    Joined:
    Nov 23, 2017
    Messages:
    1,708
    Likes Received:
    2,086
    In addition to IJW's post above with the answer, there is also the first bullet point of the repeater equipment:

    EFFECTS

    Note how it does not specify "friendly" hackers. This is only only line needed. If they can hack you, you can hack them... even if they don't bother hacking. Only difference is that Firewall MODs are applied if the repeater is an "enemy repeater," and also that you can't "daisy chain" repeaters, but those are explained later.
     
  • About Us

    We are a company founded in 2001 in Cangas (Spain), and devoted to design and manufacture games and figures. Our main product, Infinity the Game, was born with the ambition to satisfy the most demanding audience, offering the best quality.

     

    Why are we here?

     

    Because we are, first and foremost, players.

  • Quick Navigation

    Open the Quick Navigation