Complete List of Mesh Actions

All actions are complex actions unless accompanied by a [Q] for quick actions and [T] for task actions. If you do not have access privileges that allow the action, it requires a Hacking Test.

Universal Actions

Actions usually available to all users.

  • Access Another System: Authenticate and log on. Creates account shell.
  • Apply Tag: Mark a physical person, place, or thing with an AR e-tag.
  • Communicate: Email, text, voice, or video chat others online.
  • Encrypt/Decrypt: Encrypt or decrypt files (Encryption).
  • Filter AR Mist: Remove obtrusive AR “mist” (AR Mist and Filters).
  • Identify Attacker: You can attempt to identify someone attacking you in mesh combat (Attack Awareness).
  • Issue Command [Q]: Single command to a puppeted device, ALI, or teleoperated bot (or group).
  • Log Off: Exit a system.
  • Modify Files: View, change, upload, download, and delete files.
  • Operate Device: Control a device. May require a skill test.
  • Program Script [T]: Compose a batch of instructions (Scripting).
  • Run Script: Launch a pre-programmed script (Scripting).
  • Scan Stealthed Signals: Find hidden wireless devices and their mesh IDs within range (Stealthed Signals).
  • Scan Wireless Signals [Q]: Look up wireless devices and their mesh IDs within range.
  • Search [T]: You may search a system you are accessing or the mesh at large (Online Research).
  • Shield Software: Actively protect software in mesh combat.
  • Stealth Wireless Signals: Hide your wireless activity (Stealthed Signals).
  • Switch Home Device: Move your infomorph virtual mind-state to another system.
  • Terminate Software: Kill minor software process.
  • Toggle AR Skin [Q]: Change the AR environment skin (Skinning).
  • Toggle Privacy Mode [Q]: Set public profile to private or public (Privacy Mode)
  • Toggle Simulspace: Enter/exit simulspace (Virtual Reality).
  • Use Apps: Use various apps. May require an Interface Test.
  • Use Service: Use cloud-based apps. May require a subscription.
  • View Apps [Q]: See what apps are available and/or currently running.
  • View Profile: View someone’s public social network profile and rep scores within range.
  • View Sensor Feeds: Stream sensor input to your AR. May require Perceive or Know Test.
  • View System Status: Determine system health, ongoing processes, security alerts, etc.

Security Actions

Actions reserved for accounts with security or admin privileges.

  • Acquire Mesh ID: Acquire the mesh ID of anyone accessing the system.
  • Activate Countermeasure: Initiate active countermeasures against a spotted intruder (Active Countermeasures).
  • Attack: Attempt to crash an account shell, app, firewall, infomorph, operating system, or service (Mesh Combat).
  • Bypass Jamming: Overcome jamming by winning an Opposed Interface Test for 1 action turn, +1 per superior success.
  • Locate Intruder: Attempt to find a suspected intruder (Locate Intruder).
  • Lockout: Block a specified mesh ID from accessing the system.
  • Monitor Activity: Spy on an app’s activity or another specific user’s actions in real-time.
  • Scan Infomorph: Analyze an infomorph with a successful Interface Test.
  • Trace: Track a user to their physical location (or at least the system they originate from); see Physical Tracking.
  • Trigger Alert: Put the system on passive or active alert.
  • View Logs: Access the system’s logs.
  • View Users: See what other users are currently accessing the system, what apps they are using, and their mesh IDs.

Admin Actions

Only admin accounts are allowed to take these actions.

  • Disable Sensors or Device Functions: Turn off sensors or other physical functions.
  • Modify Accounts: Add new accounts and remove old ones.
  • Modify Privileges: Add or remove specific privileges.
  • Modify Software: Install, remove, and update apps on the system.
  • Wipe System [T]: Erase all data from the system, taking 1 minute for motes, 3 minutes for hosts, and 10 for servers.

Hacking Actions

These actions usually require a Hacking Test. Most are detailed under System Subversion.

  • Break Encryption [T]: Decrypt an encrypted file (Codebreaking).
  • Brute-Force Intrusion: Barrage your target with a library of exploits (Brute-Force Attacks).
  • Control Ware: Manipulate a target’s ware.
  • Disable Safety Mechanisms: Override safety controls and alarms.
  • Edit AR Feed: Block or change AR input.
  • Eliminate Traces: Edit logs and remove traces of your hacks.
  • Force Re-authentication: When sniffing, break a link to capture login credentials (Sniffing).
  • Hide File or Process: Conceal a file/process from others (opposed with Research Test at −30).
  • Impair Senses: Distract with AR overload. Interface Test, −10 modifier.
  • Inject AR/Illusion: Insert fake AR data into feed.
  • Install Backdoor: Create a secret way back in to the system.
  • Install Blocker: Pre-emptively block other users from specified actions.
  • Jam Signals: Jam specific or all wireless frequencies.
  • Loop Sensor Feed: Replace a live sensor feed with looped recordings.
  • Modify TacNet: Edit tacnet data, mark foes as friends.
  • Sniff Traffic: Sniff traffic between wireless devices (Sniffing).
  • Subtle Intrusion [T]: Quietly probe a target for vulnerabilities (Subtle Intrusion).
  • Suppress Alarm: Switch active alert to passive, or turn a passive alert off.
  • Suppress Process: Prevent a specified process from restarting.
  • Tap AR: Monitor target’s AR feeds.
  • Tap Senses: Tap target’s sensorium.

Mindware Hacking

  • Trap Ego: Prohibit the ego/infomorph from moving/evacuating.
  • Control Ware: As above.
  • Copy Ego: Make an alpha fork (Forking).
  • Delete Ego: Erase the mind.
  • Freeze Morph (Cyberbrain): Paralyze the morph.
  • Mindhack: Practice psychosurgery on the ego (Psychosurgery).
  • Modify Meshware (Cyberbrain): Add, remove, or alter meshware.
  • Modify Sensory Input (Cyberbrain): Block, edit, or inject sensory input.
  • Puppeteer (Cyberbrain): Remotely operate the morph (Remote Operations).
  • Scorch Ego: Attack the ego with a scorcher app.
  • Shutdown: Deactivate the mind.
  • Tap Senses: As above.
  • Terminate Cortical Stack Feed: Cut off the ongoing backup.

Simulspace User Actions

Standard user options within a simulspace boil down to a few simple actions:

  • Access Simulspace Functions: Do anything a normal user can do. May require an Interface Test.
  • Activate Cheat Code: Activate a cheat code and acquire its benefit.
  • View Domain Rules: Analyze the simulation’s parameters, rules, and controls.

Simulspace Admin/Cheat Actions

Admins and users with cheat codes have more options.

  • Add/Remove Cheat Codes: Either install a new cheat code or edit/remove an existing one.
  • Alter Domain Rules: Tweak the system settings within certain parameters; may require a Program Test.
  • Control NPCs: Dictate what responses NPCs give to certain actions or direct them outright.
  • Eavesdrop: Virtually surveil other users.
  • Generate Items: Create virtual items regardless of rarity.
  • Modify Simulmorph: Modify a simulmorph’s stats within specified parameters; may require a Program Test.
  • Privacy: Prevent your face-to-face communications from being eavesdropped upon.
  • Start/Stop Simulspace: Launch a new simulspace or close down an existing one.
  • Teleport: Instantaneously travel anywhere within the simulspace.
  • Terminate Session: Forcibly end a user’s session.
  • Toggle God Mode: Make your simulmorph invulnerable to damage.
  • Toggle Invisibility: Make yourself imperceptible to standard users.
  • Toggle Lockbox Controls: Prevent specified users from toggling in or out of simulspace.

Simple Hacking

If these rules at first seem intimidating, keep in mind that the core hacking rules are fairly straightforward. The following guidelines should get you through most situations:

  • Almost all hacking-involved tests pit the hacker’s Infosec vs. the target system’s Firewall.
  • To hack into a system, you have a choice of fast (immediate, −30 modifier, triggers an alert) or slow (no modifier, takes an hour, no alert).
  • By default, you get in with standard user privileges. Superior successes get you better privileges.
  • Once in, you can take any action that your privileges allow without making a test.
  • If your privileges don’t allow it, make a Hacking Test (Infosec vs. Firewall) to pull it off.
  • Use your imagination! If you want to do something — loop sensors, jam weapons, steal files, open a door, crash an opposing AI — your GM will tell if you need to make a test.
  • Don’t forget to use Insight pool for extra mesh actions or to modify rolls!

Consolidated Hacking

Sometimes a PC may want to hack a system that is less consequential to the story. Rather than running each hack step-by-step, the GM can consolidate such a hack into a single task action Infosec Test. First, the hacker should compile a brief list of objectives after hacking in (e.g., locate a file, unlock a door, loop a sensor feed, eliminate traces). Set a timeframe of 1 hour plus 10 minutes per objective. If brute forcing, the timeframe is 2 action turns per objective. Apply the following modifiers: −30 if brute forcing, +10 if hacking a mote, −10 if hacking a server, and −10 if hacking multiple systems.

Infosec Test ResultHacking Result
Critical FailureHack fails, hacker traced.
Superior FailureHack fails.
FailureHacker achieves first objective only.
SuccessHacker achieves all objectives.
Superior SuccessHacker achieves all objectives in 25% less time per superior success.
Critical SuccessHacker achieves all objectives, backdoors system.