Why would anyone steal a computer in Starfinder?


General Discussion


Pathfinder Roleplaying Game Superscriber; Pathfinder Starfinder Roleplaying Game Subscriber

Low tier computers are low value, and high tier computers are usually large and virtually unhackable.

So why then would anyone ever attempt to steal a computer in Starfinder? Does your black market contact have a guy capable of making DC 40+ computers checks to unlock the machine? I doubt it. Even if he did, it would probably cost an arm and a leg (maybe literally), thus reducing the overall value of the machine.


1 person marked this as a favorite.

Maybe a large corporation is paying you to steal it from another company, because they have the means to hack it with a bit of time. So it's easier to take the entire thing and give it to them, so they can deal with the security measures.

Or maybe you just want to screw up with the owner. His entire life is in that thing, so even just stealing it is enough.

Maybe you know it has valuable informations on it, and you sell it locked on the black market. It's not your problem to unlock it, it's the buyer that will have to deal with it.

As for low tier computers, I'd say mostly for thinkering with it and making something else out of it. They might be low value, but free is always free.


5 people marked this as a favorite.
Ravingdork wrote:

Low tier computers are too low value, and high tier computers are usually too large and virtually unhackable.

....

But the middle tier computers are just right.


Seriously, I think Lady P has some good ideas.

Stealing the computer could be the ultimate denial of service attack.

Or maybe the computer has magic upgrades that let it prophesy.

Are you looking for in-game rationale or just conducting a theoretical cost-benefit analysis?


Sufficiently poor people will steal bread. That's cheaper even than Starfinder tier 1 computers.

There's no market in stealing modern-day servers that I know of. Maybe there isn't in the Pact Worlds either?


Pathfinder Roleplaying Game Superscriber; Pathfinder Starfinder Roleplaying Game Subscriber

Meh, mostly in-game rationale.


Ravingdork wrote:
Does your black market contact have a guy capable of making DC 40+ computers checks to unlock the machine?

Yes.

To be fair, it may be a small team instead of one person, but yes. A black market contact who has any reason to be involved in illicitly acquired computers should know a person or group that can handle the checks to gain root access. The advantage these black market contacts have is that they can take their time and do it properly rather than hacking under pressure while raiding whatever place it is a computer is being stolen from. This means taking 20, or perhaps just rolling normally until they get a 20 anyway if they have a way to deal with countermeasures. Each attempt is only 6 seconds per tier, so it should normally only take a few minutes if they're going to succeed at all.

Someone who's serious about cracking these things open does need a couple things. They need you to either steal a password or have a way to acquire it themselves; having a Technomancer on a team makes this trivial with Identify, and they are in fact able to root a comm unit on their own; tier 0 is only a base DC of 13, and a CR 1 NPC should have a Master skill modifier of 10. +5 from the password means they crack DC 33 on an 18, so they'll get there eventually. Give them a partner for Aid Another or make them CR 3 and they can root tier 1 (DC 37) computers. CR 3 with two partners roots tier 2 (DC 41). For higher tiers or computers with more security, get better and possibly larger teams.

You might object to having to use a Technomancer, but you can either get any Int focused character with Technomantic Affinity or just substitute three more Aid Another checks for +6 instead of a password's +5. Team effort!

It's not perfect - a Lockout countermeasure will slow this down significantly. But if you're worried about that, you pay more.

What all this means pragmatically is that you're probably not dealing with an individual so much as a small group. There's also not much motive to go swiping comm units, wiping them, and reselling them without some other factors in play. Information is going to be the main motive, and you can get a lot of that just by stealing tier 0 comm units. Just think about everything you might learn if you had free access to someone's cell phone or tablet.

This is more true with higher tier computers. Certainly, you're not stealing that 1000 bulk tier 10 computer without a dedicated adventure, but remember that miniaturization exists. Not every high tier computer is going to be massive and bulky; some people are going to be entirely willing to pay the money to have them shrunken down, maybe even enough to cram into a high-end comm unit.

Corporate secrets? Sure. Security-conscious executive's comm unit? That'll work. Secretive research, or maybe just proprietary? Plausible. Rich people paying more than they need just because they have the money? Take it, and a few more things while you're at it. Just want to ruin someone's life? Grab it and learn all their dirty little secrets.

This approach isn't even that expensive. 100 credits for a level 1 spell Identify and then 2*skill bonus credits per person on the team per day. Even if they charge the price of a full day's work for just a few minutes, which they probably are, that's just 120 credits to get a CR 1 Technomancer to crack someone's comm unit, and still under 200 for the 3 person team headed by a CR 3 NPC to crack up to tier 2.


Pathfinder Roleplaying Game Superscriber; Pathfinder Starfinder Roleplaying Game Subscriber

Conceptually speaking, how would someone aid another while hacking a computer?

Isn't hacking generally a solo endeavor? Even if you have multiple people interfacing with the same computer simultaneously, the computer is likely treating them as different users (meaning one person getting past a firewall doesn't necessarily help the others get past it, for example).

In short, it wouldn't be aid another, it'd be a bunch of people making independent checks.


2 people marked this as a favorite.

Conceptually, how does a character with a +23 Computers modifier take 10 and force a stolen comm unit to acknowledge them as a root user in 6 seconds?

Conceptually, how does an Exocortex help the Mechanic hack faster by contributing its own actions instead of just giving a static boost earlier than level 11, when you get Coordinated Assault? What is it doing that another hacker could not do with some effort, represented by nominally having to roll?

If you need concepts, don't think about it as anything resembling real hacking except superficially; this is a ruleset where your smart phone equivalent can have an arbitrarily large number of memory modules but cannot have both an alarm and a lockout screen without upgrading it. Go full Hollywood technobabble nonsense if you have to. Aid Another? They hook their hacking kits together and the secondary hacker(s) adjust what their computers are doing on the fly to maximize the collective processing power. Or they come in with some alternate plan of attack that's simply meant to compromise some sort of defect in the code and expose a weakness that requires a different computer to properly exploit. Or they bang on their keyboards, and with the collective power of multiple users typing they make more text appear on the monitor and therefore get more hacking done.

Or you can say Aid Another simply isn't applicable to hacking computers, because none of those are satisfactory, though this will mean it becomes nearly impossible to gain root access to a computer of a tier appropriate for your level or CR. At quite a few levels, it will in fact be completely impossible without both a password and a physical key, save for an Envoy getting lucky with their Expertise die, or a Lashunta ExoMech taking advantage of Coordinated Assault. And even that will only succeed by the narrowest of margins at some levels.

Which I suppose is fine if you want your game to be like that, though I am skeptical of that actually being the case.

Scarab Sages

2 people marked this as a favorite.
Ravingdork wrote:

Conceptually speaking, how would someone aid another while hacking a computer?

Isn't hacking generally a solo endeavor? Even if you have multiple people interfacing with the same computer simultaneously, the computer is likely treating them as different users (meaning one person getting past a firewall doesn't necessarily help the others get past it, for example).

In short, it wouldn't be aid another, it'd be a bunch of people making independent checks.

Like this.


1 person marked this as a favorite.
Ravingdork wrote:

Conceptually speaking, how would someone aid another while hacking a computer?

Isn't hacking generally a solo endeavor? Even if you have multiple people interfacing with the same computer simultaneously, the computer is likely treating them as different users (meaning one person getting past a firewall doesn't necessarily help the others get past it, for example).

In short, it wouldn't be aid another, it'd be a bunch of people making independent checks.

- The helper finds a pair of sunglasses for the hacker

- The helper gets a trench coat for the hacker (black, not tan)

- The helper gets more monitors and keyboards for the hacker

- The helper inspires the hacker with computer puns & rad codenames

- Skull GIF


^They forgot pizza and/or hot pockets.


4 people marked this as a favorite.

I'm an IT person, not a hacker by any streach, but far closer to it than most people get. Group hacking would probably look a lot like any group research. Maybe one is searching the web for information to use to unlock user accounts, another might be looking around for programs on the computer with known vulnerabilities that can be used as a method of entry, using some external device to read through whatever data they can access that way that'd help other attempts, running a password cracker on several different user accounts, using some social engineering to find information they couldn't get some other way. While they all have ranks in computer, in real life that could refer to various different specialisations within that range, and by working in tandem and sharing whatever they uncover they can each be more effective than any would've been on their own.


Ravingdork wrote:

Low tier computers are low value, and high tier computers are usually large and virtually unhackable.

So why then would anyone ever attempt to steal a computer in Starfinder? Does your black market contact have a guy capable of making DC 40+ computers checks to unlock the machine? I doubt it. Even if he did, it would probably cost an arm and a leg (maybe literally), thus reducing the overall value of the machine.

1. I want that computer. Just to have.

2. I want to steal something.. Oh look, a computer.
3. I want the computer to use it.
4. I want something on the computer.
5. I want to sell the computer.
6. I want you to not have that computer.
7. A skittermander decided someone needs that computer more than you do.
ect.


You wouldn't steal a computer.


2 people marked this as a favorite.
Segovax wrote:
Ravingdork wrote:

Conceptually speaking, how would someone aid another while hacking a computer?

Isn't hacking generally a solo endeavor? Even if you have multiple people interfacing with the same computer simultaneously, the computer is likely treating them as different users (meaning one person getting past a firewall doesn't necessarily help the others get past it, for example).

In short, it wouldn't be aid another, it'd be a bunch of people making independent checks.

Like this.

... and I'm dead.


Another thing prospective computer-theft patrons likely have is specialized hardware. If they hire you to steal a room-sized computer. . . or more likely, the desk-sized main memory unit or whatnot. . . they probably have their *own* room-sized computer. Loaded down with software specifically created to facilitate cracking secured systems.

Basically, if a computer is actually in the possession of someone of relevant scale, its best to assume that it *will* be cracked. The question is when, not if, or perhaps "how much do they recover?" The exception is if someone somehow gets a hold of stolen hardware/data that is *way* out of their league, like a CR 4ish gang of thieves landing a tier 9 secured PC from the planetary Not-CIA. In those cases, its better to just treat it as a macguffin, impossible to decrypt but notable because of all the heat it brings down and everyone bigger who wants it.


Pathfinder Roleplaying Game Superscriber; Pathfinder Starfinder Roleplaying Game Subscriber
CeeJay wrote:
Segovax wrote:
Ravingdork wrote:

Conceptually speaking, how would someone aid another while hacking a computer?

Isn't hacking generally a solo endeavor? Even if you have multiple people interfacing with the same computer simultaneously, the computer is likely treating them as different users (meaning one person getting past a firewall doesn't necessarily help the others get past it, for example).

In short, it wouldn't be aid another, it'd be a bunch of people making independent checks.

Like this.
... and I'm dead.

Bwahahaha! That's so awful it hurts!

Dark Archive

"I'm in."


What about devices (like smartphones today) that erase themselves if you try to get in a certain number of times and fail?


Pathfinder Starfinder Maps, Starfinder Roleplaying Game Subscriber
UnArcaneElection wrote:

What about devices (like smartphones today) that erase themselves if you try to get in a certain number of times and fail?

That would be the Wipe countermeasure (pg. 217) listed in the computer rules.

As for why steal one, the most likely reasons I see are for the information on it or access to another device (Control, pg. 215).

I would expect the resale value of a computer itself to be very low.


Ravingdork wrote:

Conceptually speaking, how would someone aid another while hacking a computer?

Isn't hacking generally a solo endeavor? Even if you have multiple people interfacing with the same computer simultaneously, the computer is likely treating them as different users (meaning one person getting past a firewall doesn't necessarily help the others get past it, for example).

In short, it wouldn't be aid another, it'd be a bunch of people making independent checks.

It’s like paired programming, but black hat. You’ve got people checking your work, correcting mistakes that could trip countermeasures, doing research into possible unpatched exploits, and monitoring diagnostic tools for you while you do the actual hacking.

Heck, if the 8-Int vesk soldier with one rank in Computers makes their aid another check, I’d have them on rubber duck duty, or providing some mechanical assistance like using upside-down cans of compressed air to cool the RAM down and slow state decay (or some sci-fi equivalent).


Pathfinder Roleplaying Game Superscriber; Pathfinder Starfinder Roleplaying Game Subscriber

QuidEst, do you know of any examples in media or literature of hackers aiding one another against the same device, simultaneously, in a somewhat sensible/realistic fashion?


Ravingdork wrote:
QuidEst, do you know of any examples in media or literature of hackers aiding one another against the same device, simultaneously, in a somewhat sensible/realistic fashion?

“In a somewhat sensible/realistic fashion” is an unreasonable standard. Almost no portrayals of hacking at all come anywhere close to realistic. But how many times has somebody in a show been trying passwords with someone looking over their shoulder making suggestions? That’s a hacking aid another check.

Plus, we’re talking about contacts doing something off-screen. “I’ll have a team of experts look it over and get back to you” is pretty common.


1 person marked this as a favorite.

I don't know about fictional hackers, but I do know about real-life computer programming, and having a second person looking over your shoulder, making suggestions and spotting mistakes before they lead to complicated bugs, can be really useful.

Or really annoying.

Or both.


Ravingdork wrote:
QuidEst, do you know of any examples in media or literature of hackers aiding one another against the same device, simultaneously, in a somewhat sensible/realistic fashion?

Perhaps not that realistic and not really aiding exactly but the Chaos/Hardisson duel over control of a target building's security systems might be applicable. This was mainly in "The two live crew job". Either that or "The ho ho ho job" it has been a while.


Steal the computer with all the data the guy who owns it needs, then sell it back to him. Or have him hire you to steal it back


Though not a professional pen-tester (what they call the white-hat hacker-types), The_Defiant would have an accurate portrayal of what a "coordinated" attempt would likely look like -- I would even say if you wanted to make it even better, you could adapt the rules from Ultimate Intrigue on group research attempts vs. the knowledge points of a research task (the "hacking points") to represent a complex hack.

Ignoring that for a moment, I also agree that "real-world" examples aren't the gauge -- cinematic and literary examples of "group hacking" abound, from the old and laughable but fun movie Hackers, to Sneakers, to the venerable Neuromancer (the Panther Moderns causing a diversion for Molly Millions). So, precedent enough, in my view to allow it.


Because the Ysoki mechanic just had to take it apart, because "reasons".


1 person marked this as a favorite.
Ravingdork wrote:

Low tier computers are low value, and high tier computers are usually large and virtually unhackable.

So why then would anyone ever attempt to steal a computer in Starfinder? Does your black market contact have a guy capable of making DC 40+ computers checks to unlock the machine? I doubt it. Even if he did, it would probably cost an arm and a leg (maybe literally), thus reducing the overall value of the machine.

I would steal a high tier computer in starfinder if my black market (or whatever) contact was paying me a crap load of money to do so.

Why would HE pay me to do it? Because someone paid him to arrange it.

Why would THEY pay said crap load? Who knows? Depends entirely on the story. If you are getting too far into the sciency techno-details of Starfinder, you're really doing it wrong, this isn't Star Trek. It's more like Star Wars meets Firefly. That customer that wants you to steal the "unhackable" computer maybe is really Triune just looking for something to do with their extra CPU cycles? *shrug*

That said, if you're looking for story ideas:
* Computer contains classified information and customer is doing industrial espionage.

* Computer contains incriminating evidence and the customer wants it destroyed.

* Computer is controlling a nano-drone cloud that's about to consume all organic material on Castrovel and the only way to stop it is to hack/break/steal the computer.

* Computer has become sentient and it's current owners are treating it like a slave. The extreme arm of the Android Abolitionist Front has contracted you to rescue said sentient from it's captors.

I mean... really... the list goes on and on...


Ravingdork wrote:
QuidEst, do you know of any examples in media or literature of hackers aiding one another against the same device, simultaneously, in a somewhat sensible/realistic fashion?

The show Sense8 on Netflix has some reasonable group hacking going on.

they don't have the cool screen typing montages, but they do have segmented responsibilities, hacker 1 focuses on the visual security, hacker 2 focuses on room access programs, hacker 3 on communication in and out. Things like that. So hacker one would be trying exploits on Company 1's, ADT say, system setups; Hacker 2 would be running intrusion programs meant to override the door security company's access and hacker 3 would be snarling AT&T's cell towers that affect the location.

Now these are physical examples, but they can be applied to an internal logic as well. Hacker 3 could be blocking and spoofing the server on the network to isolate the external warning and monitoring systems of the network, hacker 2 would be working the actual hack and hacker 1 would be suppressing the internal security and monitoring routines that would attempt to remove the data or increase the security levels.

Johnny Mnemonic is also an older but decent movie that has some dual/multi hacker movie style setups.


Pathfinder Roleplaying Game Superscriber; Pathfinder Starfinder Roleplaying Game Subscriber

Thanks Legion42.

Community / Forums / Starfinder / Starfinder General Discussion / Why would anyone steal a computer in Starfinder? All Messageboards

Want to post a reply? Sign in.
Recent threads in Starfinder General Discussion