Skip to main content

Mesh Actions

Your actions online are largely influenced by the particular system(s) you are accessing. The following list is not comprehensive, but should give your and your GM a basis for handling online tasks.

Keep in mind that your actions are limited by your current [[Devices#Accounts & Access Privileges|device access priviliges]]. If you wish to do something that your privileges do not allow -- access a file in a restricted directory, edit a log, manipulate a security device -- then you must hack the system to do so. Actions that specifically require hacking are detailed under [[Hacking]], and [[Hacking#System Subversion|Subversion]].

Unless otherwise noted, these actions each take a complex action but require no skill test, assuming you have access privileges.

Universal Actions

These actions apply to [[Devices#Motes|motes]], [[Devices#Hosts|hosts]], [[Devices#Servers|servers]], and most other electronics. Any user can take these actions, though high-security systems may restrict some of these to users with security or admin privileges.

Access Another System

You can authenticate and [[Devices#Acounts & Access Privileges|access]] an account on another system. This creates an account shell, representing your presence on that system.

Apply Tag

You can mark a physical person, place, or thing with an e-tag viewable in AR.

Communicate

you can email, text, and voice or video chat others online, as long as you have their mesh ID

Encrypt/Decrypt

You can protect a file from prying eyes or access it with the proper [[Devices#Authentication Methods|authorization]]

Filter AR Mist

You can attempt to remove spam and other obtrusive AR "mists"

Identify Attacker

You can try to identify someone trying to crash you in [[Mesh Combat#Mesh Actions Identify Attacker Attack Awareness|mesh combat]].

Issue Command

You can command any slaved device, ALI, or teleoperated bot with only a quick action. Each command counts separately, though you may issue the same command to multiple devices/bots at once.

Log Off

Exit a system

Modify Files

You can view, change, upload, download, and delete any files you have access privileges for. Deleted files can still be recovered with an [[Skills#Interface|Inteface Test]] for 1 week, though you can also choose to wipe (permanently delete) a file so that no recovery is possible; however, archived backups may also exist.

Operate Device

Most devices have built-in hardware and electronic functions that you can directly control. Turn on your vehicle, load an autocook blueprint, turn up the heat, turn off the sprinklers, open the door, set a timer, fire a weapon system, adjust settings, etc. At the GM's discretion some functions may require skill tests.

Run Script

Launch a pre-programmed [[#Scripting|script.]]

Scan Wireless Signals

It is a quick action to looks up wireless devices within range and their mesh IDs. It takes a complex action to locate stealthed devices.

You may search a system you are accessing or the [[Research|mesh at large]]

Shield Software

You may actively protect software that is targeted in [[Mesh Combat|mesh combat]]

Stealth Wireless Signals

You can attempt to [[Devices#Stealthed Signals|hide your wireless activity]]

Switch Home Device

If you are an infomorph, you may transfer your virtual mind-state to another system or distribute it among several systems

Terminate Software

You can kill a minor software process you have privileges for and bring it to a stop. If the software belongs to another user or has significance to the story, treat this as an attack in [[Mesh Combat|mesh combat]]

Toggle AR Skin

You can change the augmented reality that skins the world around you with a quick action.

Toggle Privacy Mode

You can set your public profile to private or public with a quick action. You can also toggle the option to allow police/security to override your privacy settings.

Toggle Simulspace

You may enter or exit a simulspace environment.

Use Apps

Most devices are loaded with apps appropriate to their purpose. These commonly include word processors, graphic design studios, video and audio workstations, and games. Dedicated systems may have apps for habitat system controls and weapon stations. Using these apps may require an [[Skills#Interface|interface]] test.

Use Services

You can use software available as a service in the cloud. This usually requires having a subscription to the service, though some are free.

View Apps

You can see both the apps available on the device as well as the ones currently running with only a quick action. Some apps may only be available to specific accounts, according to that system's privileges.

View Profile

You can view the public social network profile and rep scores of anyone within physical range (or within range of sensors you are accessing), unless they are in [[Mesh Introduction#Privacy Mode|privacy mode]].

View Sensor Feeds

Many devices include miniaturized sensors. These can be viewed or streamed directly into your augmented reality. use [[Skills#Perceive|Perceive]] Tests for most sensors; others may require [[Skills#Know|Know]] tests (for example: a chem sniffer's results are analyzed with Know: Chemistry). Sensors used for security pruposes are usually limited to accounts with security or admin privileges.

View System Status

Get a report on the system's "health" and integrity, that status of its built-in functions, the progress of ongoing processes, security alerts/intruder status, and so on.

Security Actions

Actions reserved for accounts with security or admin privileges

Acquire Mesh ID

You can acquire the mesh ID of anyone accessing the system.

Activate Countermeasure

You may initiate an active [[Countermeasures]] against an intruder, such as locking them out, tracing them or initiating a reboot.

Attack

You can attempt to crash software, including account shells, apps, firewalls, infomorphs, operating systems, and services (See [[Mesh Combat]])

Bypass Jamming

You can attempt to temporarily overcome jamming by winning an Opposed [[Skills#Interface|Interface]] test with the jamming party (also see [[Hacking#System Subversion|system subversion]])

Locate Intruder

If you suspect a hacker has invaded your system, you can attempt to identify them (see [[Countermeasures#Locate Intruder|Locate Intruder]])

Lockout

You can block a specified mesh ID from accessing the system. If that mesh ID is currently accessing the system, its account shell must be crashed in mesh combat first.

Monitor Activity

You can spy on an app's activity or another specific user's actions in real-time. if the user is hacking the system, this may require winning an Opposed [[Skills#Infosec|Infosec Test]] to ascertain what they are doing. Hackers sometimes use this to monitor the firewall or system defender.

Scan Infomorph

You can analyze an infomorph with a successful [[Skills#Interface|Interface Test]]. This will tell you the type of infomorph, its public profile (if not private), its mesh ID, and whether or not it is an ALI or a fork. A more in-depth analysis takes an [[Skills#Interface|Interface Test]] and a timeframe of 10 minutes, but will reveal its [[Identity Systems|digital code]] ID and any embedded apps or meshware. If the infomorph has e-veil meshware, this is an opposed test against the veil's [[Skills#Program|Program]] 80.

Trace

You can track a user to their physical location (or at least the system they originate from); see [[Tracking|Physical Tracking]].

Trigger Alert

You can put the system on passive or active alert

View Logs

Access the system's logs. This will tell you when users accessed the system, what apps they used, what file they viewed or modified, what [[Mesh Introduction#Slaved Devices|linked]] systems they accessed, their mesh IDs, what other devices were in wireless range at what times, and similar forensic histories. Older logs (over a month) are often backed up to a cloud service and erased. Searching for specific information may require a [[Research|Research Test]].

View Users

You can see which other users are currently accessing the system, what apps they are using, and their mesh IDs. Intruders with hidden status will not be shown.

Admin Actions

Only admin accounts are allowed to take these actions.

Disable Sensors or Device Functions

You can turn off sensors or other physical functions. This may keep someone with physical access to the device from using it.

Modify Accounts

You can add new accounts and remove old ones. You cannot remove accounts that are currently being accessed -- the user must completely log off first (or have their account shell crashed in mesh combat). Every device has a root admin account that cannot be removed (short of wiping the system).

Modify Privileges

You can add or remove specific privileges, such as allowing access to certain directories, files, sensors, or apps. You can also downgrade security accounts to user privileges or elevate users to security accounts and security accounts to admins. You can remove or downgrade admin privileges from other accounts, however every device has a root admin account that cannot be modified (with ware, this usually means the person they are installed in).

Modify Software

You can install, remove, and update apps.

Wipe System

You can completely erase all data from the system: all files, apps, accounts, infomorphs, and the operating system itself. This is a lengthy process, taking 1 minute for motes, 3 minutes for hosts, and 10 minutes for servers. Infomorphs are immediately warned, so that they have time to copy themselves or move to a new home device. Forensic methods (an [[Skills#Interface|Interface Test]]) can be used to recover wiped data, at least until the system is re-installed, unless you choose to securely wipe the system (double the time).

Scripting

A script is a simple program -- a batch of instructions -- that you can embed in a system to be executed at a later scheduled time or upon a certain trigger event, without your presence. When activated, the script will undertake a series of pre-defined actions, in order. Scripts are commonly used by hackers to subvert a system while they are occupied elsewhere, but they can also be used with your own systems (though it is usually easier to tell ALIs what to do)..

Scripts can be programmed on the fly or pre-programmed. When composing the script, you must detail what actions the script will take, in what order, and at what times (or trigger events). The script cannot contain more steps/takss than your [[Skills#Program|Program Skill]] / 10. To program a script, you must success in a [[Skills#Program|Program Test]] with a timeframe of 1 hour per step. Superior successes provide 1 point of [[Pools#Insight|Insight pool]] that the script may use for making tests.

To load a script into a system, you must have the necessary access privileges or must succeed in a [[Hacking|Hacking]]. If successful, the script is loaded into the system and will run as programmed. Once the script is activated, it carries out the pre-programmed sequence of actions. The script is considered to have the same access privileges as the account that runs it. The programmer's [[Skills#Infosec|Infosec]], [[Skills#Interface|Interface]], and [[Skills#Research|Research]] skills are used for any tests called for by those actions, but only the script's own Insight pools may be used.

Scripts may also be discovered in [[Countermeasures#Security Audits|security audits]].