Key differences between Matrix rules in SR5e to SR6e
What follows in this section is a line-by-line comparison of the 5e and 6e Matrix rules. I wrote this section first, to make sure I understood the changes across the two systems. I’ve kept it here in case you are interested but you shouldn’t need to read this to use the houserules presented above.
The formatting of this section has suffered a bit when I transferred it from Google Docs to this website. It might be clearer to read the original doc.
Matrix fundamentals
5e | 6e | |
Matrix attributes | There are four attributes (ASDF.) These are intrinsic to the deck the decker is using. They act as limits on most skill checks. | The same four attributes are intrinsic to the deck and cyberjack the decker is using. They are used to calculate Attack and Defence Ratings, which in turn grant Edge on Matrix actions. |
Matrix condition monitor | 8 + (Device Rating / 2) boxes. No penalties to actions from accumulated damage | Same. -1 to all tests per three boxes of damage |
Data Spike damage | Persona’s Attack rating | (Persona’s Attack rating) / 2 |
Matrix damage resistance | Device Rating + Firewall | Firewall |
Dumpshock | 6S if in cold-sim, 6P if in hot-sim. Resisted with Willpower + Firewall (if deck just got bricked, Firewall is 0). -2 dicepool on everything for (10-Willpower) minutes | 3S if in cold-sim, 3P if in hot-sim. Resisted with Willpower only. Cannot gain or use Edge on any actions for (10-Willpower) minutes |
Link-locking | Cannot use Switch Interface Mode, Enter/Exit Host, or Reboot on the device your persona is using. Defeated with a successful opposed Jack Out action. (But will give dump shock.) | Same. |
Repairing Matrix damage | Straight test: Hardware + Logic [Mental]. Takes 1 hour. Each hit = 1 box repaired or cut time in half | Extended test: Engineering + Logic (num_box_damage / 1 hour) |
Overwatch score (OS) |
|
|
Convergence | When OS reaches 40 Not in a host: Device takes 12 DV Matrix damage User dumped (w/dumpshock) Physical location reported In a host: Host gets three marks on deck IC is deployed | When OS reaches 40 Bricks device User dumped (w/ dumpshock) Physical location reported No special rules for convergence in a host. |
Matrix initiative | AR: physical init VR cold sim: VR hot sim: | AR: physical init VR cold sim: VR hot sim: |
Skills
There is no major difference in skills between 5e and 6e, other than the fact that the 5e Skill Groups become Skills in 6e. The way the skills are used are the same however.
5e skill | 5e skill group / 6e skill |
Cybercombat | Cracking (illegal) |
Electronic Warfare | |
Hacking | |
Computer | Electronics (legal) |
Hardware | |
Software | |
Compiling | Tasking (Resonance - Technomancers only) |
Decompiling | |
Registering |
Any action using any skill in the Cracking group - so any action that uses the Cybercombat, Electronic Warfare, or Hacking skills - is considered to be illegal by the Grid Overwatch Division. These actions will increase a decker’s overwatch score when used.
Security & bypassing it
5e | 6e | |
Getting into a Host |
|
|
Getting more than one level at once | On Brute Force or Hack on the Fly: By default, they only grant one mark. Decker can shoot for two marks at a -4 dice penalty, or three marks at a -10 penalty. | Backdoor: always grants Admin access. Brute Force: normally grants User access. Decker can opt to attempt for Admin access, but target gets +2 dice pool and +4 Defence Rating in their test. |
Legitimate access to public Hosts | The host sends Invite Mark to let users get one mark. The user does that, then uses Enter Host. | The host can be configured to allow access to users with Outsider access level. |
Actions
Getting in / Mark manipulation
Where I list the 6e mechanics as “same” below, what I mean is:
- The 6e skill is the same as the 5e skill’s corresponding skill group; so, for example, if the 5e skill is Software and the 6e skill is Electronics, then these are the same.
- A 5e Simple action is the same as a 6e Minor action, and likewise for Complex / Major.
- I will highlight key differences in the actions, to make them easier to spot.
5e | 6e | |
Brute Force (illegal) | roll: Cybercombat + Logic [Attack]
resist: Willpower + Firewall
action: Complex requires: no marks Gain one mark on target per net hit. Every two net hits optionally also does 1 DV or Matrix damage, resisted with Device Rating + Firewall. Can attempt to get two marks in one go at -4 dice pool, or three marks in one go at -10. Can also use this action to hop grids. | roll: same
resist: same
action: same
requires: same Gain User or Admin access on the target if the test succeeds. No mechanic for doing Matrix damage. Can attempt to get Admin access from Outsider, at a cost of +2 dice on the resistance test and +4 bonus to target’s Defence Rating. No mechanics for grid hopping. |
Hack on the Fly (5e) Probe / Backdoor Entry (6e) (illegal) | Hack on the Fly: roll: Hacking + Logic [Sleaze] resist: Intuition + Firewall action: Complex requires: no marks Gain one mark on target per net hit. Every two net hits also counts as a one hit on a Matrix Perception test, so you get some information too. Can attempt to get two marks in one go at -4 dice pool, or three marks in one go at -10. Can also use this action to hop grids. | Probe: roll: same resist: Willpower + Firewall or Firewall x2 action: Extended, 1 minute[^12] requires: no access Backdoor Entry: roll: same resist: Willpower + Firewall action: Major Action requires: no access No mechanics for grids. |
Erase Matrix Signature (illegal) | roll: Computer + Resonance [Attack] resist: Signature Rating x 2 action: Complex Action requires: No marks If the test is successful, the signature dissipates. Character must have a Resonance rating to attempt this action. This is a real Matrix Action, and illegal, so risks Matrix damage and Overwatch Score when done. | roll: Electronics + Logic resist: Willpower + Firewall or Firewall x2 action: same requires: User/Admin Same. Same. |
Invite Mark (legal) | No test | N/A |
Erase Mark (illegal) | roll: Computer + Logic [Attack] resist: Willpower + Firewall action: Complex requires: 3 marks | N/A |
Device Manipulation
5e | 6e | |
Control Device (legal) | roll: varies or Electronic Warfare + Intuition [Sleaze] resist: Intuition + Firewall action: varies requires: varies Perform an action through a device you control. Test is usually determined by the device you are controlling eg. a turret would be Gunnery+Agility. All tests are limited by [Data Processing] if that is lower than the limit you’d normally have. If there is no test associated with an action, use the test above. Can use this against multiple targets. If you are the Owner of them all and it’s the same command, no penalty. Otherwise, have to split your dice pool. Free/Simple/Complex is determined by the command given, as is the access level required (1/2/3 marks.) This is a Sleaze action, so OS accumulates. | roll: varies or change stat to Logic resist: Willpower + Firewall action: Major requires: User/Admin Same. Same. N/A. Same. Not mentioned. Always a Major action. Requirement for User or Admin access determined by GM fiat. This is a legal action. If in AR, use normal physical stats. If in VR, use mental stats (Body->Willpower, Agility->Logic, Reaction->Intuition,. Strength->Charisma.) |
Format Device
(illegal in 5e) (legal in 6e) | roll: Computer + Logic [Sleaze] resist: Willpower + Firewall action: Complex requires: 3 marks Next time device reboots, it fails to restart until repaired. Repair is an extended Software+Logic [Mental] (12, 1 hour) test. | roll: same
resist: Willpower + Firewall or Firewall x2
action: same
requires: same (Admin) Same. Repair is the same as a bricked device, requiring number of hits equal to the devices Device Rating. |
Reboot Device (legal) | roll: Computer + Logic [Data Processing] resist: Willpower + Firewall action: Complex requires: 3 marks Can’t be linked-locked, suffer dumpshock, reset OS. Comes back online at end of next Combat Turn. | roll: same
resist: Willpower + Firewall or Firewall x2
action: same
requires: same (Admin) Same. |
Spoof Command (illegal) | roll: Hacking + Intuition [Sleaze] resist: Logic + Firewall action: Complex requires: 1 mark, on some other device Give device or agent command. Need mark on owner you are imitating. “You spoof a device’s owner’s identity, making the device think that your command is a legitimate one from its owner. You need one mark on the icon you are imitating; you do not need a mark on the target. The opposing dice roll is still based on the target, though. This trick only works on devices and agents, not IC, sprites, hosts, personas, or any other icons.“ | roll: Cracking + Logic
resist: Firewall + (Data Processing or Pilot)
action: same
requires: none Same. No access needed on anything. “You send a signal to a device with a command the target perceives as coming from its owner. The device then automatically attempts to perform the action as its next available major action.” |
File Manipulation
5e | 6e | |
Crack File (illegal) | roll: Hacking + Logic [Attack] resist: Protection Rating x2 action: Complex requires: 1 mark Remove encryption on a file. | roll: same
resist: same
action: same
requires: same Same. |
Disarm Data Bomb (illegal[^13]) | roll: Software + Intuition [Firewall] resist: Data Bomb Rating x2 action: Complex requires: no marks Attempt to disarm a data bomb. Bomb deleted if you get any net hits. If not, data bomb activates, damaging file it was attached to. | roll: Cracking + Logic
resist: same
action: same
requires: User or Admin Same. |
Edit File (legal) | roll: Computer + Logic [Data Processing] resist: Intuition + Firewall action: Complex requires: 1 mark Create, change, copy, delete file. Defender is either the host holding the file or the owner of the file if it’s not on a host. | roll: same
resist: same or Intuition + Sleaze[^14]
action: same
requires: same Same. Same. |
Set Data Bomb illegal | roll: Software + Logic [Sleaze] resist: Device Rating x2 action: Complex requires: no marks Player chooses:
| roll: same
resist: same
action: same
requires: same Same Same Same Does (Rating x 4) Matrix damage. Same. |
Encrypt File (legal) | N/A | roll: Electronics + Logic
action: Major
requires: User/Admin Number of hits is the Encryption Rating on the file. |
Information Gathering
5e | 6e | |
Check Overwatch Score (illegal) | roll: Electronic Warfare + Logic [Sleaze] resist: 6 dice action: Simple requires: no marks Find out your own Overwatch Score. The 6 dice rolled against this increases your score, and the player finds the score before they are (secretly) added, not afterward. | roll: Same resist: threshold 4 resist: 10 dice (if target is a stealth tag) action: Major requires: Admin[^15] Same. Doesn’t seem to increase your OS…? |
Matrix Perception (legal) | roll: Computer + Intuition [Data Processing] resist: (if opposed) Logic + Sleaze action: Complex requires: no marks Simple test when used to analyze a Matrix object or scan for silent running icons. For each net hit, get an answer to one question on the table below. If trying to spot icons further than 100 m away, take a simple test: first hit spots target, then additional hits reveal things as above. To spot an icon running silent, make an opposed test as above. First hit spots it, other hits can be used for more information. | roll: same resist: same action: Major; Minor if user has ‘deck or Resonance requires: no access “A successful test gives you information about the target[^16]. With a tie, you can perceive the item’s icon. A single net hit will give you basic information, such as device rating, or whatever name the device or icon calls itself. Two net hits will give you more specific information, including individual attribute ratings, and what programs it is currently running. Additional hits will give you more information based on what the gamemaster wishes to reveal. This test can also be used to attempt to spot any icons in the vicinity that are running silent.” |
Matrix Search (legal) | roll: Computer + Intuition [Data Processing] resist: threshold; see below action: special requires: no marks Search the Matrix for information about a subject. Threshold determined by table below. Hit beyond the threshold can be used to reduce the time taken (divide the time by the number of net hits.) If you fail the test, still spend the entire base time looking. Can also use Matrix Search while inside a host. Always has a base time of 1 minute. Only works if the information is online within the host; some is in cold (offline) storage. | roll: same resist: none action: “extended, 10 minutes” requires: same Same. Threshold determined by Legwork Table (see below.) N/A. Replaced by the Hash Search action (see below.) |
Snoop (illegal) | roll: Electronic Warfare + Intuition [Sleaze] resist: Logic + Firewall action: Complex requires: 1 mark Intercept traffic sent to and from target. Listen to, view, or read data live, or save it to storage. | roll: stat changes to Logic
resist: same or Data Processing + Firewall[^17]
action: same
requires: Admin access Same. |
Trace Icon (illegal but I think should be legal) | roll: Computer + Intuition [Data Processing] resist: Willpower + Sleaze action: Complex requires: 2 marks Find the physical location of a device or persona. After succeeding with this action, you know the target;’s location as long as you have at least one mark. Doens’t work on hosts (as they have no physical location), or IC programs (as they live inside hosts.) | roll: same
resist: same or Firewall + Sleaze[^18]
action: same
requires: Admin access Same. You know the location “as long as you can detect the target.” Same, but it does work on offline hosts with physical hardware. (But you likely know where the are already.) |
Hash Check[^19] (illegal) | N/A | roll: Electronics + Logic (1 or 4)
resist: threshold 1 or 4
action:Major
requires: User access Search for a file on a host or device based on known metadata. Threshold is 1 if the hash data was known (eg. given to them by Mr Johnson), 4 otherwise. Passing the test narrows the number of possible files down to 32. For every net hit, that number is divided in half. So 5 net hits in total will narrow it down to a single file. If the number of matches is too large after the first test, can repeat, with the usual -2 dice pool penalty. Again, each net hit reduces the number of possible files by 2. |
Matrix Combat
5e | 6e | |
Crash Program (illegal) | roll: Cybercombat + Logic [Attack] resist: Intuition + Firewall action: Complex requires: 1 mark Overload a chosen program on a chosen target, crashing it. Can use Matrix Perception first to figure out what programs are running, or can observe its effects. Device has to reboot to use the program again. | roll: same
resist: Data Processing + Device Rating
action: same
requires: Admin access Same. |
Data Spike (illegal) | roll: Cybercombat + Logic [Attack] resist: Intuition + Firewall damage resist: Device Rating + Firewall action: Complex requires: no marks Does Matrix damage. DV = persona’s Attack rating ...plus one box of damage per net hit ...plus two additional boxes of damage for each mark you have on the target | roll: same
resist: Data Processing + Firewall damage resist: Firewall action: same requires: same Same. DV = persona’s Attack rating / 2 (round up) ...same ...no additional damage from access levels |
Full Matrix Defence (legal) | action: Interrupt (-10 init) requires: 4 marks (owner)[^20] Adds Willpower to defence pool against all Matrix Attack actions for the rest of the Combat Turn. | action: Major
requires: any access level Add Firewall to the “next time you are attacked in the Matrix.”[^21] |
Tarpit | N/A | Tarpit is a sort of stun-damage analog to the Matrix damage attack of Data Spike. |
Miscellaneous
5e | 6e | |
Change Icon (legal) | action: Simple requires: 4 marks Change target’s icon to one you have a copy of or have designed yourself. This doesn’t change the results of a Matrix Perception action, but might fool a cursory inspection. You can target your own icon. | action: same requires: User/Admin Same. |
Enter/Exit Host (legal) | action: Simple requires: 1 mark on host | action: same requires: depends on host |
Grid hop (legal) | action: Complex requires: no marks Can only do this if you have access to the target grid. If you don’t have legal access, can use Brute Force or Hack on the Fly. Can’t hop grids inside a host. | N/A (removed) |
Hide (illegal) | roll: Electronic Warfare + Intuition [Sleaze] resist: Intuition + Data Processing action: Complex requires: no marks If test succeeds, target has to do a new Matrix Perception test to find you again. Cannot hide from a target that has a mark on you. | roll: same
resist: same or Data Processing + Sleaze
action: same
requires: same Same. Same. |
Jack Out (legal) | roll: Hardware + Willpower [Firewall] resist: Logic + Attack (only if link-locked) action: Simple requires: 4 marks Jacks out, reboots device being used. Suffer dumpshock if in VR. Defence pool only applies if persona is link-locked and comes from the persona that link-locked you; if multiple you have to roll against them all. Can only Jack Out to yourself. | roll: same
resist: Charisma[^22] + Data Processing or Attack + Data Processing action: Major requires: any Same. Same. Same. Same. |
Jam Signals (illegal) | roll: Electronic Warfare + Logic [Attack] action: Complex requires: 4 marks Turns device into jammer. Range: 100m Jam rating: hits on test Cannot use it for anything else while it is being a jammer. | roll: same
action: same
requires: Admin[^23] Same. Same. |
Jump In (legal) | roll: Electronic Warfare + Logic [Data Proc] resist: Willpower + Firewall action: Complex requires: 3 marks Jump into vehicle, drone, or other device. Requirements:
| roll: Electronics + Logic
resist: same or Firewall x2
action: same
requires: User/Admin Same. Same. Same. Same. When jumped in, the device’s icon becomes part of your persona. |
Send Message (legal) | action: Simple requires: no marks Send a message to a commcode: a short sentence, or an image, or a single file. If you’re using the Matrix through DNI (even if via AR), can send a longer message (about a paragraph.) Can also use this to open a live feed (audio/video/whatever) to one or more recipients. | action: same
requires: same Same. |
Switch Interface Mode (legal) | action: Simple requires: no marks Switch from AR to VR, or vice versa. Cannot do this if you are link-locked. Can’t do it to other people. | action: same
requires: same Same. Can also turn silent running on or off. |
PANs & WANs
5e | 6e | |
Firewall & hacking in | All devices inside the PAN can use the commlink, deck, or host’s Firewall stat to make Matrix defence tests, unless it is being hacked via a direct cable connection. If you get a mark on any slave, you also get a mark on the master. | All devices inside the PAN can use the master commlink or deck’s Firewall stat and the master device’s owner’s Willpower attribute to make Matrix defence tests. Deckers attempting to gain access levels to a device inside the PAN must first compromise the PAN. They cannot Hack on the Fly or Probe devices within a PAN directly. Once they get a level of access against the PAN (User or Admin), they have that level of access for every device on the PAN. However, Data Spike, Tarpit, and Spoof Command can be used against any device a decker can see on the Matrix, regardless of its PAN status, and without hacking the PAN first.1 |
Direct connections | If you are directly connected to a device inside a PAN or WAN, you bypass the cyberdeck or host’s Firewall stat. Remember that if you get a mark on a slave, you also get a mark on the host. | No specific rules. Getting a direct connection to a device still rolls the PAN/WAN’s full Firewall stat. |
Maximum size & nesting PANs | A commlink or deck can slave up to (Device Rating x3) devices. PANs cannot be nested. | RAW: A commlink or deck can slave up to (Device Rating) devices.[^25] |
Iconography | “The PAN is the primary means of displaying the persona, or the icon of the user. Programs and devices attached to the PAN appear as smaller representations of their normal icons, carried by the persona.” | |
WANs | Same as a PAN, but slaved to a host instead of a commlink or cyberdeck If you are inside a host with a WAN, you are considered to be directly connected to all devices in the WAN | Not explicitly mentioned. |
Noise
Nose is the same in 5e and 6e: the same numeric values, under the same conditions, and with the same mechanical effect.
Running silent & Matrix Perception
5e | 6e | |
Basics | Switching to silent running is a Simple Action. Running silent imposes a –2 dice pool modifier to all of your Matrix actions due to “the processing power needed to cover your tracks.” Silent running is switched on/off on a per-device basis. | Switching to silent running is the “Change Device Mode” Minor Action. No dice pool penalty. Silent running is applied to an entire PAN at once (say, a user’s commlink and all their devices.) |
Matrix Perception (legal) | roll: Computer + Intuition [Data Processing] resist: (if opposed) Logic + Sleaze action: Complex requires: no marks Simple test when used to analyze a Matrix object or scan for silent running icons. For each net hit, get an answer to one question on the table below. If trying to spot icons further than 100 m away, take a simple test: first hit spots target, then additional hits reveal things as above. To spot an icon running silent, make an opposed test as above. First hit spots it, other hits can be used for more information. | roll: same resist: same action: Major; Minor if user has ‘deck or Resonance requires: no access “A successful test gives you information about the target[^26]. With a tie, you can perceive the item’s icon. A single net hit will give you basic information, such as device rating, or whatever name the device or icon calls itself. Two net hits will give you more specific information, including individual attribute ratings, and what programs it is currently running. Additional hits will give you more information based on what the gamemaster wishes to reveal. This test can also be used to attempt to spot any icons in the vicinity that are running silent.” |
Silent running vs Matrix Perception | If there are multiple icons running silent, user has to pick icons (at random) to be revealed. | User can reveal all icons that fail the Matrix perception resistance test in one go. |
Range for automatically spotting icons | Everything not running silent within 100 m of your deck or commlink is always considered spotted. | No defined concept of “spotting.” |
Hosts & intrusion countermeasures
5e | 6e | |
Host stats | Host Rating, HR+1, HR+2, HR+3 Distributed across ASDF similarly to how cyberdecks work | Same. Same. |
Launching IC | Launch 1 IC per Combat Turn (at the beginning of the turn). Can run up to (Host Rating) IC simultaneously. Can only run 1 copy of any given IC at once. Can restart “bricked” IC next turn | Same. |
IC stats | (Host Rating x 2) for IC Attack Rating (limited by hosts’s [Attack]). Initiative: Host Rating + Data Processing + 4D6. Condition monitor: 8+(Host Rating /2)[^27] Defensive rolls and effects vary by IC type. | (Host Rating x 2) for Attack Rating, Condition Monitor, and most rolls. Initiative: (Data Processing x 2) + 3D6. Condition monitor: (Host Rating x2) Same. |
IC
5e | 6e | |
All IC rolls the same attack roll: roll: (Host Rating x 2) [Attack] action: Complex | All IC rolls the same attack roll: roll: (Host Rating x 2) attack rating: Host Attack Rating action: Complex | |
Acid | resist: Willpower + Firewall If it gets 1 or more net hits, reduces target’s Firewall by 1. If Firewall is 0, causes 1 DV Matrix damage per net hit. Firewall stat cannot be restored until you reboot. | resist: same Firewall attribute reduced by number of net hits. Does not cause Matrix damage. Firewall stat restores itself after you leave the host, at the rate of 1 point per minute. |
Binder | resist: Willpower + Data Processing Same as Acid, above, but affecting Data Processing. | resist: same Same. If Data Processing is reduced to 0, no Matrix actions can be taken at all. |
Black IC | resist: Intuition + Firewall If get 1+ hits, target is link-locked. (Attack) DV Matrix damage ...+1 DV per net hit …+2 DV per mark on target Plus the same amount of biofeedback damage | resist: same Doesn’t mention link-locking.[^28] Deals (host rating + net hits) in Matrix damage and biofeedback damage. |
Blaster | resist: Logic + Firewall As Black IC but only causes Stun biofeedback damage. | resist: same (Host rating[^29]) Matrix damage and link-locks target. |
Crash | resist: Intuition + Firewall If Crash IC (or its host) has a mark on you, a random one of your programs crashes. It cannot be run again without a deck reboot. | resist: same Same. Doesn’t need a mark on you, though. |
Jammer | resist: Intuition + Firewall Same as Acid, above, but affecting Firewall. | resist: Willpower + Attack Same as Acid, above, but affecting Firewall. No Attack actions can be used if your attack rating is 0. |
Killer | resist: Intuition + Firewall (Attack) DV Matrix damage …+1 DV per net hit …+2 DV per mark on target | resist: same Deals (host rating + net hits) in Matrix damage. |
Marker | resist: Willpower + Sleaze Same as Acid, above, but affecting the Sleaze attribute. | resist: same Same. |
Patrol | Patrols a host, regularly using Matrix Perception actions on all icons within it. | Rolls Matrix Perception once per minute. |
Scramble | resist: Willpower + Firewall If the host has three marks on you and you are hit by this, it immediately reboots your deck, hitting you with dumpshock. | resist: same If it hits, it forces you to reboot on your next turn, unless you are link-locked. (No marks required.) |
Sparky | resist: Intuition + Firewall (Attack) DV Matrix damage …+1 DV per net hit …+2 DV per mark on target Plus the same amount of biofeedback damage. | resist: same Deals (host rating + net hits) in biofeedback damage. |
Tar baby | resist: Logic + Firewall If it hits, you are link-locked. If you’re already link-locked, it puts a mark on you. | resist: same Same. Does not change access levels. |
Track | resist: Willpower + Firewall If this IC hits and the host has 2+ marks on you, the host (and its owners) discover your real-world location. | resist: Willpower + Firewall Same, but does not require any access levels / marks on the target. The location is revealed if it hits, regardless. |
Programs
Common programs
5e | 6e | |
Baby Monitor | N/A; Baby Monitor is a “hacking program” in 5e | Make user aware of their Overwatch Score at all times.[^30] |
Browse | Cuts time for Matrix Search actions in half. | Grants 1 Edge to be used on the Matrix Search roll. |
Configurator | Store a deck config (ASDF allocation & program load.) Swap the entire config for a Free action, rather than a single pair of stats. | Same. |
Edit | +2 to [Data Processing] limit for Edit tests. | 1 Edge on Edit File actions. |
Encryption | +1 to Firewall. | +2 dice pool when using Encrypt File actions. |
Signal Scrub | Rating 2 noise reduction. | Same. |
Toolbox | +1 to Data Processing. | Same. |
Virtual Machine | +2 program slots, but whenever your persona takes Matrix damage, it incurs an additional box that cannot be resisted. | Same. |
Hacking programs
5e | 6e | |
Armor | +2 dice to resist Matrix damage. | +2 to matrix Defense Rating. |
Baby Monitor | Always know your current Overwatch Score. | N/A; Baby Monitor is a “common program” in 6e |
Biofeedback | When you attack a persona that’s backed by a biological entity (eg. a decker), the character takes Stun or Physical damage equal to the Matrix damage you do (depending on if they are in cold sim or hot sim.) Damage is resisted with Willpower + Firewall, as usual. | Same. Damage is resisted with Willpower alone, as usual. |
Biofeedback filter | +2 dice pool to resist biofeedback damage. | Allow Device Rating or Body to soak Matrix damage. |
Blackout | As Biofeedback, but only ever causes Stun damage. | Same. |
Decryption | +1 to Attack. | +2 dice on Crack File action. |
Defuse | +4 dice pool modifier to resist damage from Data Bombs. | Allow Device Rating or Body to soak damage from Data Bomb. |
Demolition | +1 rating to any Data Bombs you create. | N/A |
Exploit | +2 to Sleaze attribute when attempting Hack on the Fly. | Reduce defense rating of hacking targets by 2. |
Fork | Can perform a single Matrix action against two targets without splitting your dice pool - make one test, and each target defends separately against the test result. | Same. |
Guard | Reduces the extra damage you take from marks against you by 1 DV per mark. | N/A |
Hammer | +2DV to all Matrix damage dealt. | N/A |
Lockdown | When you cause Matrix damage, link-locks your target until you stop running Lockdown or they Jack Out. | Same. |
Mugger | Bonus Matrix damage from having a mark on your target is increased by 1 DV per mark. | N/A |
Overclock | N/A | Add two dice to a Matrix action; one must be the wild die. |
Shell | +1 dice pool to resist Matrix damage and biofeedback damage. Stacks with similar modifiers from other programs. | N/A |
Sneak | +2 dice pool to resist Trace User. If you are Converged on, GOD don’t get your physical location. | N/A |
Stealth | +1 to Sleaze. | Gain 1 Edge when doing the Hide action. |
Track/Trace | +2 to Data processing when doing Trace User tests, or negate the +2 bonus from Sneak if your target is using that. | Gain 1 Edge when doing the Trace Icon action. |
Wrapper | Change icon of something to look like a different sort of icon entirely. Can be penetrated by Matrix Perception. | N/A |
Bit weird, that one. It’s not like you can do Full Matrix defence to anyone else. ↩︎