Key differences between Matrix rules in SR5e to SR6e

Line-by-line comparison of the Matrix rulesets

What follows in this section is a line-by-line comparison of the 5e and 6e Matrix rules. I wrote this section first, to make sure I understood the changes across the two systems. I’ve kept it here in case you are interested but you shouldn’t need to read this to use the houserules presented above.

The formatting of this section has suffered a bit when I transferred it from Google Docs to this website. It might be clearer to read the original doc.

Matrix fundamentals

5e6e
Matrix attributesThere are four attributes (ASDF.) These are intrinsic to the deck the decker is using. They act as limits on most skill checks.The same four attributes are intrinsic to the deck and cyberjack the decker is using. They are used to calculate Attack and Defence Ratings, which in turn grant Edge on Matrix actions.
Matrix condition monitor8 + (Device Rating / 2) boxes. No penalties to actions from accumulated damageSame. -1 to all tests per three boxes of damage
Data Spike damagePersona’s Attack rating(Persona’s Attack rating) / 2
Matrix damage resistanceDevice Rating + FirewallFirewall
Dumpshock6S if in cold-sim, 6P if in hot-sim. Resisted with Willpower + Firewall (if deck just got bricked, Firewall is 0). -2 dicepool on everything for (10-Willpower) minutes3S if in cold-sim, 3P if in hot-sim. Resisted with Willpower only. Cannot gain or use Edge on any actions for (10-Willpower) minutes
Link-lockingCannot use Switch Interface Mode, Enter/Exit Host, or Reboot on the device your persona is using. Defeated with a successful opposed Jack Out action. (But will give dump shock.)Same.
Repairing Matrix damageStraight test:

Hardware + Logic [Mental]. Takes 1 hour. Each hit = 1 box repaired or cut time in half

Extended test: Engineering + Logic (num_box_damage / 1 hour)
Overwatch score (OS)
  • +1 OS per hit on opposing roll for any Attack or Sleaze action
  • +2d6 (rolled in secret) every 15 minutes after OS first starts accumulating
  • +1 OS per hit on opposing roll for any illegal action
  • +1 for each Matrix action modified by a hacking program
  • +1/+3 per round for each host to which you are maintaining illegal User/Admin level access
ConvergenceWhen OS reaches 40

Not in a host:

Device takes 12 DV Matrix damage

User dumped (w/dumpshock)

Physical location reported

In a host:

Host gets three marks on deck

IC is deployed

When OS reaches 40

Bricks device

User dumped (w/ dumpshock)

Physical location reported

No special rules for convergence in a host.

Matrix initiativeAR: physical init

VR cold sim:
Data Processing + Int + 3d6

VR hot sim:
Data Processing + Int + 4d6 +2 dice pool to all actions

AR: physical init

VR cold sim:
Data Processing + Int + 2d6

VR hot sim:
Data Processing + Int + 3d6

Skills

There is no major difference in skills between 5e and 6e, other than the fact that the 5e Skill Groups become Skills in 6e. The way the skills are used are the same however.

5e skill5e skill group / 6e skill
CybercombatCracking (illegal)
Electronic Warfare
Hacking
ComputerElectronics (legal)
Hardware
Software
CompilingTasking (Resonance - Technomancers only)
Decompiling
Registering

Any action using any skill in the Cracking group - so any action that uses the Cybercombat, Electronic Warfare, or Hacking skills - is considered to be illegal by the Grid Overwatch Division. These actions will increase a decker’s overwatch score when used.

Security & bypassing it

5e6e
Getting into a Host
  • Legit: Invite Mark
  • Forceful: Brute Force
  • Sneaky: Hack on the Fly
  • Just go in without any access level (if the host allows it)
  • Brute force
  • Probe -> backdoor
Getting more than one level at onceOn Brute Force or Hack on the Fly:

By default, they only grant one mark. Decker can shoot for two marks at a -4 dice penalty, or three marks at a -10 penalty.

Backdoor: always grants Admin access.

Brute Force: normally grants User access. Decker can opt to attempt for Admin access, but target gets +2 dice pool and +4 Defence Rating in their test.

Legitimate access to public HostsThe host sends Invite Mark to let users get one mark. The user does that, then uses Enter Host.The host can be configured to allow access to users with Outsider access level.

Actions

Getting in / Mark manipulation

Where I list the 6e mechanics as “same” below, what I mean is:

  • The 6e skill is the same as the 5e skill’s corresponding skill group; so, for example, if the 5e skill is Software and the 6e skill is Electronics, then these are the same.
  • A 5e Simple action is the same as a 6e Minor action, and likewise for Complex / Major.
  • I will highlight key differences in the actions, to make them easier to spot.
5e6e
Brute Force (illegal)roll: Cybercombat + Logic [Attack] resist: Willpower + Firewall action: Complex

requires: no marks

Gain one mark on target per net hit.

Every two net hits optionally also does 1 DV or Matrix damage, resisted with Device Rating + Firewall.

Can attempt to get two marks in one go at -4 dice pool, or three marks in one go at -10.

Can also use this action to hop grids.

roll: same resist: same action: same requires: same

Gain User or Admin access on the target if the test succeeds.

No mechanic for doing Matrix damage.

Can attempt to get Admin access from Outsider, at a cost of +2 dice on the resistance test and +4 bonus to target’s Defence Rating.

No mechanics for grid hopping.

Hack on the Fly (5e)

Probe / Backdoor Entry (6e)

(illegal)

Hack on the Fly:

roll: Hacking + Logic [Sleaze] resist: Intuition + Firewall action: Complex

requires: no marks

Gain one mark on target per net hit.

Every two net hits also counts as a one hit on a Matrix Perception test, so you get some information too.

Can attempt to get two marks in one go at -4 dice pool, or three marks in one go at -10.

Can also use this action to hop grids.

Probe:

roll: same resist: Willpower + Firewall or Firewall x2 action: Extended, 1 minute[^12] requires: no access

Backdoor Entry:

roll: same resist: Willpower + Firewall action: Major Action requires: no access

No mechanics for grids.

Erase Matrix Signature

(illegal)

roll: Computer + Resonance [Attack]

resist: Signature Rating x 2

action: Complex Action

requires: No marks

If the test is successful, the signature dissipates.

Character must have a Resonance rating to attempt this action. This is a real Matrix Action, and illegal, so risks Matrix damage and Overwatch Score when done.

roll: Electronics + Logic

resist: Willpower + Firewall or Firewall x2

action: same

requires: User/Admin

Same.

Same.

Invite Mark

(legal)

No testN/A
Erase Mark

(illegal)

roll: Computer + Logic [Attack]

resist: Willpower + Firewall

action: Complex

requires: 3 marks

N/A

Device Manipulation

5e6e
Control Device

(legal)

roll: varies or

Electronic Warfare + Intuition [Sleaze]

resist: Intuition + Firewall

action: varies

requires: varies

Perform an action through a device you control.

Test is usually determined by the device you are controlling eg. a turret would be Gunnery+Agility.

All tests are limited by [Data Processing] if that is lower than the limit you’d normally have.

If there is no test associated with an action, use the test above.

Can use this against multiple targets. If you are the Owner of them all and it’s the same command, no penalty. Otherwise, have to split your dice pool.

Free/Simple/Complex is determined by the command given, as is the access level required (1/2/3 marks.)

This is a Sleaze action, so OS accumulates.

roll: varies or

change stat to Logic

resist: Willpower + Firewall

action: Major

requires: User/Admin

Same.

Same.

N/A.

Same.

Not mentioned.

Always a Major action. Requirement for User or Admin access determined by GM fiat.

This is a legal action.

If in AR, use normal physical stats. If in VR, use mental stats (Body->Willpower, Agility->Logic, Reaction->Intuition,. Strength->Charisma.)

Format Device (illegal in 5e)

(legal in 6e)

roll: Computer + Logic [Sleaze]

resist: Willpower + Firewall

action: Complex

requires: 3 marks

Next time device reboots, it fails to restart until repaired.

Repair is an extended Software+Logic [Mental] (12, 1 hour) test.

roll: same resist: Willpower + Firewall or Firewall x2 action: same requires: same (Admin)

Same.

Repair is the same as a bricked device, requiring number of hits equal to the devices Device Rating.

Reboot Device

(legal)

roll: Computer + Logic [Data Processing]

resist: Willpower + Firewall

action: Complex

requires: 3 marks

Can’t be linked-locked, suffer dumpshock, reset OS. Comes back online at end of next Combat Turn.

roll: same resist: Willpower + Firewall or Firewall x2 action: same requires: same (Admin)

Same.

Spoof Command

(illegal)

roll: Hacking + Intuition [Sleaze]

resist: Logic + Firewall

action: Complex

requires: 1 mark, on some other device

Give device or agent command.

Need mark on owner you are imitating.

“You spoof a device’s owner’s identity, making the device think that your command is a legitimate one from its owner. You need one mark on the icon you are imitating; you do not need a mark on the target. The opposing dice roll is still based on the target, though. This trick only works on devices and agents, not IC, sprites, hosts, personas, or any other icons.“

roll: Cracking + Logic resist: Firewall + (Data Processing or Pilot) action: same requires: none

Same.

No access needed on anything.

“You send a signal to a device with a command the target perceives as coming from its owner. The device then automatically attempts to perform the action as its next available major action.”

File Manipulation

5e6e
Crack File

(illegal)

roll: Hacking + Logic [Attack]

resist: Protection Rating x2

action: Complex

requires: 1 mark

Remove encryption on a file.

roll: same resist: same action: same requires: same

Same.

Disarm Data Bomb

(illegal[^13])

roll: Software + Intuition [Firewall]

resist: Data Bomb Rating x2

action: Complex

requires: no marks

Attempt to disarm a data bomb. Bomb deleted if you get any net hits. If not, data bomb activates, damaging file it was attached to.

roll: Cracking + Logic resist: same action: same requires: User or Admin

Same.

Edit File

(legal)

roll: Computer + Logic [Data Processing]

resist: Intuition + Firewall

action: Complex

requires: 1 mark

Create, change, copy, delete file.

Defender is either the host holding the file or the owner of the file if it’s not on a host.

roll: same resist: same or Intuition + Sleaze[^14] action: same requires: same

Same.

Same.

Set Data Bomb

illegal

roll: Software + Logic [Sleaze]

resist: Device Rating x2

action: Complex

requires: no marks

Player chooses:

  • Rating of data bomb (up to net hits on test)
  • Effect (delete file or not?)
  • Passcode to access file

    A file can only have one data bomb on it at any one time.

    Bomb triggers when anyone tries to read, edit, copy, protect, delete, or put another bomb on the file without using the passcode.

    It does (Rating)D6 Matrix damage to the icon that tripped it.

    Bomb can be detected with Matrix Perception and then removed with Disarm Data Bomb action.

roll: same resist: same action: same requires: same

Same

Same

Same

Does (Rating x 4) Matrix damage.

Same.

Encrypt File

(legal)

N/Aroll: Electronics + Logic action: Major requires: User/Admin

Number of hits is the Encryption Rating on the file.

Information Gathering

5e6e
Check Overwatch Score

(illegal)

roll: Electronic Warfare + Logic [Sleaze]

resist: 6 dice

action: Simple

requires: no marks

Find out your own Overwatch Score.

The 6 dice rolled against this increases your score, and the player finds the score before they are (secretly) added, not afterward.

roll: Same

resist: threshold 4

resist: 10 dice (if target is a stealth tag)

action: Major

requires: Admin[^15]

Same.

Doesn’t seem to increase your OS…?

Matrix Perception

(legal)

roll: Computer + Intuition [Data Processing]

resist: (if opposed) Logic + Sleaze

action: Complex

requires: no marks

Simple test when used to analyze a Matrix object or scan for silent running icons. For each net hit, get an answer to one question on the table below.

If trying to spot icons further than 100 m away, take a simple test: first hit spots target, then additional hits reveal things as above.

To spot an icon running silent, make an opposed test as above. First hit spots it, other hits can be used for more information.

roll: same

resist: same

action: Major; Minor if user has ‘deck or Resonance

requires: no access

“A successful test gives you information about the target[^16]. With a tie, you can perceive the item’s icon. A single net hit will give you basic information, such as device rating, or whatever name the device or icon

calls itself. Two net hits will give you more specific information, including individual attribute ratings, and what programs it is currently running. Additional hits will give you more information based on what

the gamemaster wishes to reveal.

This test can also be used to attempt to spot any icons in the vicinity that are running silent.”

Matrix Search

(legal)

roll: Computer + Intuition [Data Processing]

resist: threshold; see below

action: special

requires: no marks

Search the Matrix for information about a subject.

Threshold determined by table below.

Hit beyond the threshold can be used to reduce the time taken (divide the time by the number of net hits.) If you fail the test, still spend the entire base time looking.

Can also use Matrix Search while inside a host. Always has a base time of 1 minute. Only works if the information is online within the host; some is in cold (offline) storage.

roll: same

resist: none

action: “extended, 10 minutes”

requires: same

Same.

Threshold determined by Legwork Table (see below.)

N/A.

Replaced by the Hash Search action (see below.)

Snoop

(illegal)

roll: Electronic Warfare + Intuition [Sleaze]

resist: Logic + Firewall

action: Complex

requires: 1 mark

Intercept traffic sent to and from target. Listen to, view, or read data live, or save it to storage.

roll: stat changes to Logic resist: same or Data Processing + Firewall[^17] action: same requires: Admin access

Same.

Trace Icon

(illegal but I think should be legal)

roll: Computer + Intuition [Data Processing]

resist: Willpower + Sleaze

action: Complex

requires: 2 marks

Find the physical location of a device or persona.

After succeeding with this action, you know the target;’s location as long as you have at least one mark.

Doens’t work on hosts (as they have no physical location), or IC programs (as they live inside hosts.)

roll: same resist: same or Firewall + Sleaze[^18] action: same requires: Admin access

Same.

You know the location “as long as you can detect the target.”

Same, but it does work on offline hosts with physical hardware. (But you likely know where the are already.)

Hash Check[^19]

(illegal)

N/Aroll: Electronics + Logic (1 or 4) resist: threshold 1 or 4 action:Major requires: User access

Search for a file on a host or device based on known metadata. Threshold is 1 if the hash data was known (eg. given to them by Mr Johnson), 4 otherwise.

Passing the test narrows the number of possible files down to 32. For every net hit, that number is divided in half. So 5 net hits in total will narrow it down to a single file.

If the number of matches is too large after the first test, can repeat, with the usual -2 dice pool penalty. Again, each net hit reduces the number of possible files by 2.

Matrix Combat

5e6e
Crash Program (illegal)roll: Cybercombat + Logic [Attack]

resist: Intuition + Firewall

action: Complex

requires: 1 mark

Overload a chosen program on a chosen target, crashing it. Can use Matrix Perception first to figure out what programs are running, or can observe its effects. Device has to reboot to use the program again.

roll: same resist: Data Processing + Device Rating action: same requires: Admin access

Same.

Data Spike (illegal)roll: Cybercombat + Logic [Attack]

resist: Intuition + Firewall

damage resist: Device Rating + Firewall

action: Complex

requires: no marks

Does Matrix damage.

DV = persona’s Attack rating

...plus one box of damage per net hit

...plus two additional boxes of damage for each mark you have on the target

roll: same resist: Data Processing + Firewall

damage resist: Firewall action: same requires: same

Same.

DV = persona’s Attack rating / 2 (round up)

...same

...no additional damage from access levels

Full Matrix Defence (legal)action: Interrupt (-10 init)

requires: 4 marks (owner)[^20]

Adds Willpower to defence pool against all Matrix Attack actions for the rest of the Combat Turn.

action: Major requires: any access level

Add Firewall to the “next time you are attacked in the Matrix.”[^21]

TarpitN/A

Tarpit is a sort of stun-damage analog to the Matrix damage attack of Data Spike.

Miscellaneous

5e6e
Change Icon

(legal)

action: Simple

requires: 4 marks

Change target’s icon to one you have a copy of or have designed yourself. This doesn’t change the results of a Matrix Perception action, but might fool a cursory inspection. You can target your own icon.

action: same

requires: User/Admin

Same.

Enter/Exit Host

(legal)

action: Simple

requires: 1 mark on host

action: same

requires: depends on host

Grid hop

(legal)

action: Complex

requires: no marks

Can only do this if you have access to the target grid. If you don’t have legal access, can use Brute Force or Hack on the Fly.

Can’t hop grids inside a host.

N/A (removed)
Hide

(illegal)

roll: Electronic Warfare + Intuition [Sleaze]

resist: Intuition + Data Processing

action: Complex

requires: no marks

If test succeeds, target has to do a new Matrix Perception test to find you again.

Cannot hide from a target that has a mark on you.

roll: same resist: same or Data Processing + Sleaze action: same requires: same

Same.

Same.

Jack Out

(legal)

roll: Hardware + Willpower [Firewall]

resist: Logic + Attack (only if link-locked)

action: Simple

requires: 4 marks

Jacks out, reboots device being used.

Suffer dumpshock if in VR.

Defence pool only applies if persona is link-locked and comes from the persona that link-locked you; if multiple you have to roll against them all.

Can only Jack Out to yourself.

roll: same resist: Charisma[^22] + Data Processing or

Attack + Data Processing action: Major requires: any

Same.

Same.

Same.

Same.

Jam Signals

(illegal)

roll: Electronic Warfare + Logic [Attack]

action: Complex

requires: 4 marks

Turns device into jammer.

Range: 100m

Jam rating: hits on test

Cannot use it for anything else while it is being a jammer.

roll: same action: same requires: Admin[^23]

Same.

Same.

Jump In

(legal)

roll: Electronic Warfare + Logic [Data Proc]

resist: Willpower + Firewall

action: Complex

requires: 3 marks

Jump into vehicle, drone, or other device.

Requirements:

  1. Have 3+ marks
  2. Be in VR
  3. Device has to have rigger adaptation
  4. Have to have a control rig

    If you are device owner or you have permission from device owner, no test is necessary.

    Cannot jump in if someone else is already jumped in to it.

roll: Electronics + Logic resist: same or Firewall x2 action: same requires: User/Admin

Same.

Same.

Same.

Same.

When jumped in, the device’s icon becomes part of your persona.

Send Message

(legal)

action: Simple

requires: no marks

Send a message to a commcode: a short sentence, or an image, or a single file. If you’re using the Matrix through DNI (even if via AR), can send a longer message (about a paragraph.) Can also use this to open a live feed (audio/video/whatever) to one or more recipients.

action: same requires: same

Same.

Switch Interface Mode

(legal)

action: Simple

requires: no marks

Switch from AR to VR, or vice versa. Cannot do this if you are link-locked. Can’t do it to other people.

action: same requires: same

Same.

Can also turn silent running on or off.

PANs & WANs

5e6e
Firewall & hacking in All devices inside the PAN can use the commlink, deck, or host’s Firewall stat to make Matrix defence tests, unless it is being hacked via a direct cable connection.

If you get a mark on any slave, you also get a mark on the master.

All devices inside the PAN can use the master commlink or deck’s Firewall stat and the master device’s owner’s Willpower attribute to make Matrix defence tests.

Deckers attempting to gain access levels to a device inside the PAN must first compromise the PAN. They cannot Hack on the Fly or Probe devices within a PAN directly. Once they get a level of access against the PAN (User or Admin), they have that level of access for every device on the PAN.

However, Data Spike, Tarpit, and Spoof Command can be used against any device a decker can see on the Matrix, regardless of its PAN status, and without hacking the PAN first.1

Direct connectionsIf you are directly connected to a device inside a PAN or WAN, you bypass the cyberdeck or host’s Firewall stat.

Remember that if you get a mark on a slave, you also get a mark on the host.

No specific rules. Getting a direct connection to a device still rolls the PAN/WAN’s full Firewall stat.
Maximum size & nesting PANs A commlink or deck can slave up to (Device Rating x3) devices. PANs cannot be nested.RAW: A commlink or deck can slave up to (Device Rating) devices.[^25]
Iconography“The PAN is the primary means of displaying the persona, or the icon of the user. Programs and devices attached to the PAN appear as smaller representations of their normal icons, carried by the persona.”
WANsSame as a PAN, but slaved to a host instead of a commlink or cyberdeck

If you are inside a host with a WAN, you are considered to be directly connected to all devices in the WAN

Not explicitly mentioned.

Noise

Nose is the same in 5e and 6e: the same numeric values, under the same conditions, and with the same mechanical effect.

Running silent & Matrix Perception

5e6e
BasicsSwitching to silent running is a Simple Action.

Running silent imposes a –2 dice pool modifier to all of your Matrix actions due to “the processing power needed to cover your tracks.”

Silent running is switched on/off on a per-device basis.

Switching to silent running is the “Change Device Mode” Minor Action.

No dice pool penalty.

Silent running is applied to an entire PAN at once (say, a user’s commlink and all their devices.)

Matrix Perception

(legal)

roll: Computer + Intuition [Data Processing]

resist: (if opposed) Logic + Sleaze

action: Complex

requires: no marks

Simple test when used to analyze a Matrix object or scan for silent running icons. For each net hit, get an answer to one question on the table below.

If trying to spot icons further than 100 m away, take a simple test: first hit spots target, then additional hits reveal things as above.

To spot an icon running silent, make an opposed test as above. First hit spots it, other hits can be used for more information.

roll: same

resist: same

action: Major; Minor if user has ‘deck or Resonance

requires: no access

“A successful test gives you information about the target[^26]. With a tie, you can perceive the item’s icon. A single net hit will give you basic information, such as device rating, or whatever name the device or icon

calls itself. Two net hits will give you more specific information, including individual attribute ratings, and what programs it is currently running. Additional hits will give you more information based on what

the gamemaster wishes to reveal.

This test can also be used to attempt to spot any icons in the vicinity that are running silent.”

Silent running vs Matrix PerceptionIf there are multiple icons running silent, user has to pick icons (at random) to be revealed.User can reveal all icons that fail the Matrix perception resistance test in one go.
Range for automatically spotting iconsEverything not running silent within 100 m of your deck or commlink is always considered spotted.No defined concept of “spotting.”

Hosts & intrusion countermeasures

5e6e
Host statsHost Rating, HR+1, HR+2, HR+3

Distributed across ASDF similarly to how cyberdecks work

Same.

Same.

Launching ICLaunch 1 IC per Combat Turn (at the beginning of the turn). Can run up to (Host Rating) IC simultaneously. Can only run 1 copy of any given IC at once. Can restart “bricked” IC next turnSame.
IC stats(Host Rating x 2) for IC Attack Rating (limited by hosts’s [Attack]).

Initiative: Host Rating + Data Processing + 4D6.

Condition monitor: 8+(Host Rating /2)[^27]

Defensive rolls and effects vary by IC type.

(Host Rating x 2) for Attack Rating, Condition Monitor, and most rolls.

Initiative: (Data Processing x 2) + 3D6.

Condition monitor: (Host Rating x2)

Same.

IC

5e6e
All IC rolls the same attack roll:

roll: (Host Rating x 2) [Attack]

action: Complex

All IC rolls the same attack roll:

roll: (Host Rating x 2)

attack rating: Host Attack Rating

action: Complex

Acidresist: Willpower + Firewall

If it gets 1 or more net hits, reduces target’s Firewall by 1.

If Firewall is 0, causes 1 DV Matrix damage per net hit.

Firewall stat cannot be restored until you reboot.

resist: same

Firewall attribute reduced by number of net hits.

Does not cause Matrix damage.

Firewall stat restores itself after you leave the host, at the rate of 1 point per minute.

Binderresist: Willpower + Data Processing

Same as Acid, above, but affecting Data Processing.

resist: same

Same.

If Data Processing is reduced to 0, no Matrix actions can be taken at all.

Black ICresist: Intuition + Firewall

If get 1+ hits, target is link-locked.

(Attack) DV Matrix damage

...+1 DV per net hit

…+2 DV per mark on target

Plus the same amount of biofeedback damage

resist: same

Doesn’t mention link-locking.[^28]

Deals (host rating + net hits) in Matrix damage and biofeedback damage.

Blasterresist: Logic + Firewall

As Black IC but only causes Stun biofeedback damage.

resist: same

(Host rating[^29]) Matrix damage and link-locks target.

Crashresist: Intuition + Firewall

If Crash IC (or its host) has a mark on you, a random one of your programs crashes. It cannot be run again without a deck reboot.

resist: same

Same. Doesn’t need a mark on you, though.

Jammerresist: Intuition + Firewall

Same as Acid, above, but affecting Firewall.

resist: Willpower + Attack

Same as Acid, above, but affecting Firewall.

No Attack actions can be used if your attack rating is 0.

Killerresist: Intuition + Firewall

(Attack) DV Matrix damage

…+1 DV per net hit

…+2 DV per mark on target

resist: same

Deals (host rating + net hits) in Matrix damage.

Markerresist: Willpower + Sleaze

Same as Acid, above, but affecting the Sleaze attribute.

resist: same

Same.

PatrolPatrols a host, regularly using Matrix Perception actions on all icons within it.Rolls Matrix Perception once per minute.
Scrambleresist: Willpower + Firewall

If the host has three marks on you and you are hit by this, it immediately reboots your deck, hitting you with dumpshock.

resist: same

If it hits, it forces you to reboot on your next turn, unless you are link-locked. (No marks required.)

Sparkyresist: Intuition + Firewall

(Attack) DV Matrix damage

…+1 DV per net hit

…+2 DV per mark on target

Plus the same amount of biofeedback damage.

resist: same

Deals (host rating + net hits) in biofeedback damage.

Tar babyresist: Logic + Firewall

If it hits, you are link-locked.

If you’re already link-locked, it puts a mark on you.

resist: same

Same.

Does not change access levels.

Trackresist: Willpower + Firewall

If this IC hits and the host has 2+ marks on you, the host (and its owners) discover your real-world location.

resist: Willpower + Firewall

Same, but does not require any access levels / marks on the target. The location is revealed if it hits, regardless.

Programs

Common programs

5e6e
Baby MonitorN/A; Baby Monitor is a “hacking program” in 5eMake user aware of their Overwatch Score at all times.[^30]
BrowseCuts time for Matrix Search actions in half.Grants 1 Edge to be used on the Matrix Search roll.
ConfiguratorStore a deck config (ASDF allocation & program load.) Swap the entire config for a Free action, rather than a single pair of stats.Same.
Edit+2 to [Data Processing] limit for Edit tests.1 Edge on Edit File actions.
Encryption+1 to Firewall.+2 dice pool when using Encrypt File actions.
Signal ScrubRating 2 noise reduction.Same.
Toolbox+1 to Data Processing.Same.
Virtual Machine+2 program slots, but whenever your persona takes Matrix damage, it incurs an additional box that cannot be resisted.Same.

Hacking programs

5e6e
Armor+2 dice to resist Matrix damage.+2 to matrix Defense Rating.
Baby MonitorAlways know your current Overwatch Score.N/A; Baby Monitor is a “common program” in 6e
BiofeedbackWhen you attack a persona that’s backed by a biological entity (eg. a decker), the character takes Stun or Physical damage equal to the Matrix damage you do (depending on if they are in cold sim or hot sim.)

Damage is resisted with Willpower + Firewall, as usual.

Same.

Damage is resisted with Willpower alone, as usual.

Biofeedback filter+2 dice pool to resist biofeedback damage.Allow Device Rating or Body to soak Matrix damage.
BlackoutAs Biofeedback, but only ever causes Stun damage.Same.
Decryption+1 to Attack.+2 dice on Crack File action.
Defuse+4 dice pool modifier to resist damage from Data Bombs.Allow Device Rating or Body to soak damage from Data Bomb.
Demolition+1 rating to any Data Bombs you create.N/A
Exploit+2 to Sleaze attribute when attempting Hack on the Fly.Reduce defense rating of hacking targets by 2.
ForkCan perform a single Matrix action against two targets without splitting your dice pool - make one test, and each target defends separately against the test result.Same.
GuardReduces the extra damage you take from marks against you by 1 DV per mark.N/A
Hammer+2DV to all Matrix damage dealt.N/A
LockdownWhen you cause Matrix damage, link-locks your target until you stop running Lockdown or they Jack Out.Same.
MuggerBonus Matrix damage from having a mark on your target is increased by 1 DV per mark.N/A
OverclockN/AAdd two dice to a Matrix action; one must be the wild die.
Shell+1 dice pool to resist Matrix damage and biofeedback damage. Stacks with similar modifiers from other programs.N/A
Sneak+2 dice pool to resist Trace User.

If you are Converged on, GOD don’t get your physical location.

N/A
Stealth+1 to Sleaze.Gain 1 Edge when doing the Hide action.
Track/Trace+2 to Data processing when doing Trace User tests, or negate the +2 bonus from Sneak if your target is using that.Gain 1 Edge when doing the Trace Icon action.
WrapperChange icon of something to look like a different sort of icon entirely. Can be penetrated by Matrix Perception.N/A

  1. Bit weird, that one. It’s not like you can do Full Matrix defence to anyone else. ↩︎