Cryptomancer - Code & Dagger Vol. 01
Cryptomancer - Code & Dagger Vol. 01
volume i
010101
01010101
01010101
0101
0101
0101
0101
0101
0101010101010101010101
010101010101010101010101
010 01010101 101
01010101
010101
010101
010101
010101
010101
010101
010101
010101
010101
010101
010101
010101
0101
0101
0101
01
01
a sourcebook for
1 cryptomancer TM
credits
/root/credits
land of
0x90
2
directory listing
/root/ls
3
/root/sudo apt-get install code_and_dagger
reading package list... done
building dependency tree
reading state information... done
the following new packages will be installed:
code_and_dagger
1 upgraded, 1 newly installed, 0 to remove and 0 not upgraded.
need to get 1,337 kb of archives.
after this operation, 2,017 kb of additional disk space will be used.
do you want to continue [y/n]:y
installing code_and_dagger
trying url http://cryptorpg.com/user-generated-content.tar.gz
content type application/x-gzip length 1337000 bytes <1337 kb>
opened url
===========================================
downloaded 1337 kb
*installing *code_and_dagger*
**package code_and_dagger unpacked and md5 sums checked
...done.
/root/cd changelog
/root/changelog/ls
changelog
4
/root/changelog
Changelog
In August of 2016, we held our nose and pushed
the publish button. Cryptomancer was not without its
warts, but it was the best we could do given the constraints
we had. The alternative was to remain in development while
the real world of cryptography, privacy, and surveillance
passed us by. In the first half of 2016, we watched major
technology brands defy government demands for encryp-
tion keys and built-in backdoors to popular consumer prod-
ucts. We watched a former Attorney General acknowledge
that our eras most loved and loathed leaker of classified data
performed a public service. With all that was transpiring,
we couldnt sit on the game any longer.
-Chad Walker
cryptomancer.actual@gmail.com
5
/root/changelog/cd ..
/root/cd crypto-gear prosthesis
/root/crypto-gear prosthesis/ls
crypto-gear
prosthesis
6
Crypto-Gear Prosthesis : Eric Stewart, G. Micheal Truran, Chad Walker
/root/crypto-gear prosthesis/
Overview
Crypto-gear prosthesis is the exceedingly rare and
exorbitantly expensive synthesis of crypto-gear mechanics
and mundane (i.e. non-magical) medicine. Traditional pros-
thesis such as peg legs, hook hands, glass eyes, and the like
have been reliable, if limited, prosthesis for mortals miss-
ing organs or limbs due to accident, combat injury, disease,
or by chance at birth. Since the advent of the crypto-gear,
machinists and medics have dreamed of fusing mortal with
machine. However, only recently in the Modern Age have
advances in crypto-gear miniaturization and contact cryp-
tomancy (i.e. interacting with a shard without using ones
hands) allowed for this dream to become reality. In plain
terms, crypto-gear prosthesis is a replacement mechanical
limb or organ that is operated by a shard. The patient con-
trols the limb by issuing commands to its embedded control
shard, which happens to be making physical contact with
the patients body, often the stump of the limb that has been
replaced.
7
01010101
10101010
01010101 of crypto-gear prosthesis were planted.
10101010
Crypto-gear prosthesis, or crypto-limbs for short,
01010101
are about as rare in society as enchanted items. Perhaps 1 in
10101010 1000 mortals possess this technology, though considerably
01010101 more could benefit from it were it not so expensive. They
10101010 typically exist in the form of arms, legs, and glass eyes (imbu-
ing sight to the blind through use of the Shard Scry spell).
01010101 Each crypto-limb must be custom-made for an individuals
10101010 body dimensions and gait. Further, each crypto-limb also
01010101 contains its own orphan shard or is part of a shardnet (de-
10101010 pending on specifications), adding to its already consider-
able cost. A patient must spend several months acclimating
01010101 to a crypto-limb's control shard. Crypto-limbs do not imbue
10101010 their owners with superhuman speed or strength, though
01010101 they do hit slightly harder due to their metallic composition
and the patients inability to feel pain during impact. They
10101010
are relatively inconspicuous when clothed, save for the soft
01010101 hissing and whining of hydraulic gears. Truly exotic cryp-
10101010 to-limbs such as prehensile tails and collapsible wings are
01010101 almost unheard of, in part because the (ethical) machinists
who build prosthesis maintain a moratorium on designs that
10101010 would make society fear or restrict this medical technology.
01010101
10101010 /root/crypto-gear prosthesis/
01010101 Cryptomantic considerations
10101010
01010101 A crypto-gear works when a user issues a com-
mand to its embedded command shard, either directly to
10101010 the shard or over shardnet. Crypto-limbs contain bundles of
01010101 crypto-gears clustered to a single command shard and main-
10101010 tain locomotion by virtue of receiving a constant stream of
commands from the patient. For example, the command
01010101 step would compel a crypto-leg to step forward, while the
10101010 command kick would compel the crypto-leg to kick for-
01010101 ward. Step issued in rapid succession (e.g. step-step-step-
10101010 step) would bring the patient to a jog. Part of a patients
long acclimation to a crypto-limb is the time it takes to learn
01010101 the hundreds of command words and proper syntax required
10101010 to move the limb in a natural way. However, once acclima-
01010101
10101010 --more--
01010101
10101010 8
01010101
Crypto-Gear Prosthesis : Eric Stewart, G. Micheal Truran, Chad Walker
tion is complete, the patient is able to subconsciously issue
commands in such a rapid and fluid manner, she no longer
realizes she is even doing so. She is also able to multi-thread:
simultaneously issue commands to two or more crypto-gear
prosthesis attached to her body, so long as they are part of
the same shardnet.
--more--
9
01010101
10101010
01010101 involves popping them out of their sockets.
10101010
It should be noted that often times, a crypto-limbs
01010101
command shard is part of shardnet For example, perhaps
10101010 the machinist who designed the limb wants to ensure that
01010101 he can perform remote diagnostics on the limb and help the
10101010 patient troubleshoot problems no matter where she is. A less
savory example concerns a mogul who paid for the cryp-
01010101 to-limb making sure that he can track where his property
10101010 is going. The cryptomantic considerations at play here are
01010101 many (e.g. eaves-dropping, commandeering the limb, Trac-
10101010 er, Shard Warp, Denier, Shard Spike, etc.), and can create
exciting possibilities for players and interesting plot-hooks
01010101 for GMs. However, keep in mind, crypto-gear prosthesis is
10101010 not technically part of a patients organic self, meaning it
01010101 gets left behind during a Shard Warp.
10101010
There do exist instances of crypto-gear prosthesis
01010101 where the patient has zero control over it... in fact, she never
10101010 makes bodily contact with its command shard at all. Per-
01010101 haps the best example of this would be the crypto-heart: a
clockwork heart, built around a shard, that has its rhythm
10101010 managed by a remote golem. The security concerns of such
01010101 a prosthesis should be obvious, but the benefits can be con-
10101010 siderable. Imagine a golem performing life-saving CPR on
01010101 the owner of a crypto-heart who should have died hours
ago, from hundreds of miles away. Crypto-organs may seem
10101010 unnecessary in a world where magical resurrection is possi-
01010101 ble, but even the powerful Resurrection spell has limits: it
10101010 becomes progressively harder to cast on someone who has
been raised several times already. Where magic fails, cryp-
01010101
to-organs can keep alive an indispensable asset who is on the
10101010 last of her cat lives.
01010101
10101010
01010101
10101010
01010101
10101010
01010101
10101010
01010101
10101010 10
01010101
Crypto-Gear Prosthesis : Eric Stewart, G. Micheal Truran, Chad Walker
/root/crypto-gear prosthesis/
Mundane Security Concerns
Unless a patient purposefully draws attention to her
crypto-prosthesis (or has one that defies normal hominid
dimensions), it should be considered concealable; that is,
not readily apparent on first glance but easily detected by
someone making a point to look for it. Prosthesis detected
upon pat down are noted, announced to security forces, and
monitored intently for sudden moves, but it is in bad taste
to ask someone to leave a limb at the door. As a courtesy,
however, it is expected that air-gaps be engaged when in dis-
crete company, if only to prevent unwanted external com-
munication. Good security protocols already assume anyone
is capable of casting destructive magic or communicating
over hidden shard, so trained spellbreakers and echoeater
familiars are employed to manage these risks. Crypto-limbs
are no different in this sense.
/root/crypto-gear prosthesis/
talents
Contact Cryptomancy (2 Talent Points)
11
01010101
10101010
01010101 /root/crypto-gear prosthesis/
10101010
01010101 At What Cost?
10101010 Crypto-gear prosthesis are very expensive. Not only
01010101 are their parts custom-made and composed of rare materials
10101010 (including one or more shards), but their design, construc-
tion, installation, and ongoing maintenance is performed
01010101 by the most in-demand machinists and medics who could
10101010 make just as much coin building golems or performing ex-
01010101 periments for regents. As such, each crypto-gear prosthesis
costs 3 Strategic Assets.
10101010
01010101 While it is certainly feasible that a party could vol-
10101010 unteer 3 Strategic Assets to support and make whole one
01010101 character, this is potentially beyond the partys means (espe-
cially at the beginning of a campaign) or does not outweigh
10101010 more pressing needs. In this situation, the character acquir-
01010101 ing the crypto-gear prosthesis is on her own, incurring 3
10101010 Strategic Assets worth of debt to an organization that is not
01010101 the partys current patron. Unfortunately, that organizations
goals do not exactly align with the patrons goals (or the par-
10101010 tys goals, for that matter). This means she will have to per-
01010101 form tasks at odds with the partys mission to slowly pay
10101010 off her balance, lest the debtors send operatives to repossess
their property (or worse).
01010101
10101010 It is very likely that this organization is holding on
01010101 to a diagnostic shard that can be used to track the patient,
10101010 cause her limb to go haywire, or punish her with shard
spikes. One does not simply replace the command shard of
01010101 a crypto-gear prosthesis: it requires rewiring every lead to
10101010 conform to the a new shard's contours. It's almost easier to
01010101 start from scratch. For this reason, a patient in debt is better
10101010 off acquiescing to her debtor's demands than she is tamper-
ing with their property.
01010101
10101010 There are a number of ways that the GM and player
01010101 can handle this in a campaign. Perhaps the easiest and low-
est-drag method is to have the player in question perform a
10101010
side-campaign during her free sessions of downtime, lever-
01010101
10101010 --more--
01010101
10101010 12
01010101
Crypto-Gear Prosthesis : Eric Stewart, G. Micheal Truran, Chad Walker
aging the rules for social networking and gathering leads off
camera. Of course, she is keeping her activities secret from
the rest of the party, which can manifest in interesting ways.
Perhaps she keeps coming back empty-handed when tasked
to support the party and it complicates their upcoming op-
eration. Consider another player character secretly tailing
her during one of her mystery excursions and getting en-
snared in the what should have been a personal drama.
13
01010101
10101010
01010101 /root/crypto-gear prosthesis/
10101010
01010101 Rules and Qualities
10101010
01010101 Crypto-gear prosthesis are composed of rules and
10101010 qualities, just like weapons and armor. The following sec-
tions describe the various rules and qualities for crypto-gear
01010101
prosthesis, then provides sample prosthesis composed of
10101010 rules.
01010101
10101010
01010101
10101010
01010101
10101010 SQL>SELECT * FROM
01010101 Prosthesis Rules
10101010
01010101 Prosthesis Description
10101010 Rule
01010101 Circulatory
Stability
The prosthesis strategically managed the patients blood sup-
ply. Mortal wounds are automatically downgraded to critical
10101010 wounds and the patient is stabilized automatically if she has
been reduced to 0 or less HP.
01010101
Damage + X The prosthesis does a number of HP damage equal to the suc-
10101010 cesses of an Unarmed skill check, plus or minus a value (e.g. 1).
01010101 Hardened The prosthesis can be used to parry any type of melee attack,
as if it was a shield.
10101010
Hardened The prosthesis can be used to parry any type of melee attack,
01010101 (Martial Artist) as if it was a shield, so long as the patient has the Martial Artist
10101010 talent.
Managed The prosthesis is air-gapped from the patient and managed re-
01010101 motely by a golem. The patient can use shards normally with-
10101010 out worrying about the cryptomantic considerations.
01010101 Paired The prosthesis comes as a pair, where each instance has its own
command shard, both of which are part of the same shardnet.
10101010 Poison Proof The prosthesis filters the patient's blood, making her immune
01010101 to the effects of all weak poison, strong poison, truth serum,
paralytic poison, and alcoholic intoxication.
10101010 Respiratory The prosthesis strategically managed the patients oxygen sup-
01010101 Redundancy ply. The patient can hold her breathe for the duration of a
10101010 scene.
01010101
10101010 14
01010101
Crypto-Gear Prosthesis : Eric Stewart, G. Micheal Truran, Chad Walker
SQL>SELECT * FROM
Prosthesis Qualities
Prosthesis Description
Quality
(D)evolved The prosthesis has a slightly less-than-mortal build: a digiti-
grade crypto-leg, an elongated crypto-arm, or crypto-eyes with
hexagonal pupils.
Doll Parts The facade of the prosthesis appears delicate or fanciful: an
epidermis of soft porcelain, with painted-on palm lines and
fingernails; equal parts beautiful and unsettling.
Ghost Sign The prosthesis harasses the patient with sudden or nagging
bouts of pain that appear to be triggered by external events, as
if it is trying to tell her something.
Golem Skin The facade of the prosthesis appears as if it was designed by
machines: perfect symmetry, octagonal patterns covering lay-
ers of shiny metal chitin, and soft light emanating from seams.
Macabre Graft The facade of the prosthesis appears grotesque and painful: ex-
posed bone, rusty rivets hold torn strips of flesh to cables of
fibrous metal; almost as if the body has rejected the machine.
Message The prosthesis is embroidered/etched with an encrypted mes-
sage, which the owner may or may not be able to decrypt.
Noisy The prosthesiss construction, materials, and accessories make
it particularly noticeable: hissing valves, grating clockwork, or
the grinding of ball bearings.
Personality The prosthesis has a tendency of acting on its own, malfunc-
tioning in ways that impede, assist, or annoy its owner.
Precious The prosthesis is constructed of precious materials and/or
adorned with jewels, making it a public badge of affluence and
likely coveted by the greedy.
Previous Owner The prosthesis once belonged to someone else of significance
or maybe had many owners over time, changing hands on pur-
pose or by accident. They might even want it back.
Shoddy The prosthesis appears to be worn down, rusted, chipped, and
dull-looking, either the result of extensive use, poor mainte-
nance, or purposeful display of humility.
15
01010101
10101010
01010101 SQL>SELECT * FROM
10101010
01010101 Sample Prosthesis
10101010 Prosthesis Rules Description
01010101
10101010 Crypto-Arm Damage +0, Dirty, A synthetic arm composed of fibrous
Hardened, Short, metal wrapped around a steel bone struc-
01010101 Melee, Unarmed ture, granted locomotion by a network
10101010 Melee of crypto-gear actuators connected to a
single command shard. Connected to
01010101 flesh via leather harness and bolts fixed
10101010 to bone.
01010101
10101010
01010101
10101010
01010101
10101010
01010101
10101010
01010101
10101010 16
01010101
Crypto-Gear Prosthesis : Eric Stewart, G. Micheal Truran, Chad Walker
/root/crypto-gear prosthesis/
Upgrades
Crypto-gear prosthesis can be upgraded with new
functionality by anyone with the time, skill, resources, and
imagination to do so. Crypto-limbs can be fitted with any
number of options, including retractable claws, hidden
storage, spanning reach, pop-up crossbows, auto-injecting
soma quills, modular hand-attachments, and grappling
hooks tethered to hand-turned winches, just to name a few.
A crypto-heart could be configured to puncture implanted
sacs of healing tincture after trauma, a crypto-lung could
be modified to suck in poison gas so it can be belched out
offensively later, and a crypto-kidney could be fitted with an
external spigot to harvest filtered poisons. Code & Dagger
does not and ought not cover all the possibilities here, but
will instead provide a few guidelines.
17
/root/crypto-gear prosthesis/cd ..
/root/cd hacks and exploits
/root/hacks and exploits/ls
hacks and
exploits
18
/root/hacks and exploits/
Overview
This chapter is a survey of creative ways to hack the
various magical, mundane, and cryptomantic systems pres-
ent in the Cryptomancer setting. By hack, were not merely
talking about breaking or abusing systems, but more gen-
erally about using them in ways that the creators of those
systems did not anticipate when they were designed. What
the reader will find here are new Shardscape architectures,
new business models that could thrive in Sphere, new spells
(and new combinations of old spells), and new ways to both
create and solve problems for players and GM characters
alike.
19
01010101
10101010
01010101 /root/hacks and exploits/
10101010 Goblin Switches
01010101
10101010 Everyones least-favorite, cackling, belching, fe-
ces-flinging nuisance, the eminently insufferable goblin,
01010101
is smart enough to pick-locks, solve simple puzzles, and
10101010 perform a multitude of parlor tricks. However, there is
01010101 also enough going on its small but still oversized noggin to
10101010 where it can actually interact with shards in a very limited
manner. It turns out that they can maintain bridges between
01010101 two shardnets, while also being far too simple to eavesdrop
10101010 on echoes or detonate shard spikes. Hundreds of attempts
01010101 in training or forcing goblins to be half-wit cryptoadmins
10101010 failed spectacularly. The prototype for the first working gob-
lin switch was designed by none other than a nanny who
01010101 managed the two dozen tyrant-spawn of a particularly pro-
10101010 lific duke and duchess.
01010101
A goblin switch is a small, spherical cage, where at
10101010
the center lies a goblin suspended by harness. The goblin
01010101 cannot actually reach the bars of the spherical cage, but can
10101010 grasp two levers which are used to propel and steer the con-
01010101 traption. At the tip of each lever is a mounted shard, which
the goblin grasps onto. While the goblin is hyper-actively
10101010 driving the contraption in circles, ramming it into every-
01010101 thing in sight, and shrieking maniacally, it also maintaining
10101010 a bridge. Ingeniously, the goblin switch is also a shardnetted
01010101 crypto-gear with sequential logic. Whoever has the com-
mand shard for this gear can determine which two levers
10101010 are extended to goblin. Considering that each lever is tipped
01010101 with a shard from a different shardnet, this switching de-
10101010 termines which shardnets will be bridged by the golem as it
tears across the entire safehouse.
01010101
10101010 Only a goblin familiar acquired by a character with
01010101 the Whisperer talent can man a goblin switch. Meanwhile,
10101010 the rig, composed of a chassis and a crypto-gear, costs 1 Stra-
tegic Asset. Goblin switches are frequently left at the safe-
01010101 house, where the righteous hell-raising of their pilots wont
10101010 be problematic to everyone in earshot and everything below
01010101 shin height.
10101010
01010101
10101010 20
01010101
/root/hacks and exploits/
Messenger Drones
and Mail Bombs
21
01010101
10101010
01010101 /root/hacks and exploits/
10101010 Credit Shards and the
01010101
10101010 EchoChain Ledger
01010101 Credit shards are shards that are loaned to bank
10101010 customers. They permit a customer to transfer money to an-
other account, usually for services rendered, without having
01010101
to actually exchange physical coin or visit a bank branch.
10101010 In most cases, a credit shardnet is composed of two shards:
01010101 one for the customer, and one for the banks golem. The
10101010 customer uses a simple syntax to manager her funds, en-
crypted with the keyphrase she established with the bank.
01010101 Its as simple as creating an echo that reads Transfer X coin
10101010 from account Y to account Z. Assuming the customer used
01010101 the correct keyphrase associated with account Y, the golem
10101010 will dutifully comply and transfer the funds, but not until it
has assured that adequate funds exist by querying the Echo-
01010101 Chain ledger.
10101010
01010101 The EchoChain is a public ledger of account balanc-
es accessible via the Shardscape. The EchoChain is actually
10101010
created by a neutral network of six geographically dispersed
01010101 golems paid for by participating banks and managed by the
10101010 Couriers. In defiance of secure shardnet engineering princi-
01010101 ples, the true names of these six golems are public knowl-
edge found posted on every town board. At any given time,
10101010 one of these golems is creating public Shardscape echoes of
01010101 private transactions and account balances, and encrypting
10101010 these echoes with its soul key. Given that the general public
01010101 knows each of the golems true names, these transactions
and balances can be reviewed by anyone querying account
10101010 numbers. One can be assured that a transaction echo is valid
01010101 because it could have only originated from an EchoChain
10101010 golem, given that only an EchoChain golem's true name
decrypts these echoes.
01010101
10101010 Bank golems are bridged to EchoChain golems via
01010101 private shardnets, with goblin switches in between, so banks
10101010 can easily sever the connection if and when the EchoChain
comes under attack. EchoChain golems are programmed
01010101
10101010 --more--
01010101
10101010 22
01010101
to understand that only transactions originating from these
private networks are valid, and that transactions originating
from the Shardscape should not be appended to the Echo-
Chain.
25
01010101
10101010
01010101 /root/hacks and exploits/
10101010 Cryptovault Hardening
01010101
10101010 The cryptovault is the operational nerve center of
any organization, big or small, that requires communica-
01010101 tion between multiple shardnets or on-demand access to
10101010 the Shardscape. This facility houses the organization's cryp-
01010101 toadmin, golem, registry (containing keyphrases, passwords,
10101010 true names, etc.), and at least one shard from each man-
aged shardnet. As such, a compromised cryptovault can be
01010101 a deathstroke from which an organization is simply unable
10101010 to recover from. Cryptovault hardening is the application of
01010101 security architecture and protocols to mitigate direct threats
10101010 to this sensitive location. Though most cryptovaults are
located in secret, remote, and fortified locations, the most
01010101 dangerous threats to them don't come from the outside, but
10101010 rather, arrive over shard. A secure cryptovault is one that is
01010101 hardened against Shard Scry surveillance, Shard Spike at-
tacks on cryptoadmins, and Shard Warp infiltration.
10101010
01010101 Shard Scry permits an attacker to look inside a
10101010 cryptovault and glean sensitive information that can be used
01010101 against it. For example, an attacker could observe the cryp-
toadmin (potentially identifying her), an open page of the
10101010 registry (to harvest user names or keyphrases), the number of
01010101 shards (and thus, shardnets) the golem is managing, and the
10101010 physical security controls inside the facility. A cryptovault
01010101 hardened against this type of attack will employ excessive
darkness, excessive light (amplified by mirrors), props that
10101010 exaggerate the facility's defenses (e.g. scarecrow guards), and
01010101 obstruction to block views. For example, a golem can be
10101010 instructed to reach into a bucket to touch and interact with
a shard, meaning that anyone scrying through a shard will
01010101 only be able to see the facility's ceiling.
10101010
01010101 Shard Spike permits an attacker to administer a le-
10101010 thal psychic attack on a cryptoadmin, an attack she may not
be able to recover from if she is alone (which is very often
01010101 the case with cryptoadmins). While a handy strong healing
10101010 potion might be enough to stave off death, she will be very
01010101 hesitant to interact with that shard again, which may sever
10101010 --more--
01010101
10101010 26
01100100
her connection to operatives in the field relying on her. She
needs to be ready to distribute keyphrases or intelligence
(e.g. "someone is trying to kill me") to the field through
other means, such as Messenger or Share Sight, or have her
connection with all shardnets be mediated by a golem.
27
01010101
10101010
01010101 /root/hacks and exploits/
10101010 New Spells
01010101
10101010 Kill Arc (Basic Spell)
01010101 A spell that transfers a blinding arc of destructive
10101010 magical energy from one shard to another, lashing out
01010101 against anyone caught in between these two nodes. Caster
10101010 clutches a shard, focuses on a fresh echo (that is, an echo
that was just created during the current turn), and makes
01010101 an opposed Willpower skill check versus a groups Resolve
10101010 ranks (use the opposed skill checks vs. groups mechanic to
01010101 resolve): each success results in 2 HP damage, ignoring all
10101010 armor, to every actor that is directly in between the casters
shard and the shard that was the source of the echo she fo-
01010101 cused on. The spell requires that the source and destination
10101010 shards are no further than long range from each other. This
01010101 spell requires far more coordination than Kill Bolt, but
does permit the caster to inflict magical damage on multiple
10101010 targets simultaneously. This spell does work over bridges but
01010101 does not work on the Shardscape or traverse golems.
10101010
01010101 Kill Zone (Greater Spell)
10101010 A spell that transforms the geometric space between
01010101 the shards of a shardnet into a cauldron of destructive en-
10101010 ergy, to the peril of anyone caught within this space. Caster
01010101 clutches a shard and makes an unopposed Willpower skill
check of tough difficulty. Upon 1 or more success, a dull
10101010 hum drowns the space, dirt and pebbles levitate from the
01010101 ground, and bolts of ethereal magic rapidly bounce back
10101010 and forth from every shard composing the kill zones web.
Destructive energy amplifies all forms of physical harm that
01010101 occur in the kill zone. Every actor in this space suffers an
10101010 additional 1 HP damage to any physical or magical damage
01010101 they sustain. The effect lasts 2 turns for ever successes rolled.
10101010 The spell ends immediately if the caster lets go of her shard
or if any of the member shards are relocated in a way that
01010101 makes any of the lines outlining the kill zone cross. Further,
10101010 the spell requires that none of the shardnets shards are fur-
01100100 ther than long range from the caster.
01101110 --more--
01100101
01100101 28
01100100
For a kill zone to be effective, the shards composing
the impacted shardnet must be distributed in a way that
forms a triangle, square, or some other type of polygon that
surrounds the targeted space. Only the caster must be hold-
ing her shard in hand for the kill zone to stay in effect; other
members of the casters party (perhaps those who positioned
themselves for maximum effect) need not be holding onto
their shard. While this spell does not have the immediate
destructive potential of the Kill Ball spell, it does permit
attackers to deliver surgical devastation with spells and mis-
sile weapons in a way that avoids collateral damage to struc-
tures, treasure, hostages, or bystanders. This spell does work
over bridges but does not work on the Shardscape or traverse
golems.
29
/root/hacks and exploits/cd ..
/root/cd threat intel
/root/threat intel/ls
threat intel
30
/root/threat intel/
Vampires (Tough)
Vampires are cursed undead creatures that covet
and hunt for the thing that mortals possess but they do not:
true names. They resemble hairless dwarfs, elves, and hu-
mans - whatever race they were originally - with pallid gray
skin, bat-like ears, and lumpy clay-like faces fixed with wide
maws full of hollow, needle-like teeth. They dwell in the
underbellies and outskirts of civilization, hiding in sewers
and abandoned hovels, waiting for an opportunity to feed.
Vampires thrive on mortal blood for nourishment, but more
importantly, feeding permits vampires to reenter society,
however temporarily. If a vampire can drink straight from
the veins of mortal, it has the option to steal its victim's soul
key.
31
01010101
10101010
01010101 Vampires must feed on one victim every 24 to sus-
10101010 tain their mimesis. An attack that inflicts a mortal wound
(typically achieved through a successful sneak attack) allows
01010101
a vampire to drink its victim's blood, as does any successful
10101010 attack that occurs during a grapple. Wooden stakes, garlic,
01010101 sunlight, blessed water, and other folklore banes have no
10101010 effect on a vampire. However, from dawn until dusk, vam-
pires are lethargic and distracted, downgraded to a trivial
01010101 threat instead of tough one. It is for this reason that they will
10101010 find a secure place to hide during the day.
01010101
10101010 GMs should run vampires not simply as frighten-
ing nighttime predators, but as illusive underground crim-
01010101 inals. Even less clever vampires run a shadow fiefdom built
10101010 on laundered coin and exploited trust gained through stolen
01010101 identities. They typically benefit from unwitting allies (or
witting mercenaries) protecting them. One does not hunt
10101010
a vampire by following a trail of blood. Instead, one hunts
01010101 a vampire by auditing bank accounts and EchoChain trans-
10101010 actions, and luring them into engagements that seem too
01010101 profitable to pass up. A lone vampire abhors direct con-
frontation, preferring to lurk in the shadows and wait for
10101010 an opportunity to isolate a single enemy so that they can
01010101 overpower them, feed, and impersonate their victim long
10101010 enough to repeat the process, picking off a group of mor-
01010101 tals one at a time. It is very likely that some vampires are
currently masquerading as mortals in positions of power:
10101010 constables, seneschals, regents, and perhaps even the party's
01010101 own patron.
10101010 /root/threat intel/
01010101
10101010 Juggernauts (Tough)
01010101 Juggernauts are enormous orcs who have been made
10101010 even more fearsome through exotic and profane crypto-gear
01100100 prosthesis experimentation. The orc's natural biological du-
rability and tolerance of (if not thirst for) toxicity and pain
01101110 make them the perfect canvas for nightmarish bio-mechan-
01100101 ical creation. Juggernauts are several meters tall, even tower-
01100101 ing over gnolls, and several times as heavy as those Sylvetic
01100100 terrors. They typically have one or more limb replaced by
01101110 --more--
01100101
01100101 32
01100100
a steam-spewing, rusting, crypto-geared implement of war,
though many have exotic prosthesis such as prehensile tails
barbed with jagged blades and arachnid legs supporting their
massive frames. They are always followed by, and frequently
swarmed by, a legion of diminutive orcish tinkerers charged
with repairing and maintaining the juggernaut's monstrous
frame. The single uniform feature of all juggernauts is their
hammering crypto-heart, desperately pumping black ichor
through the veins of these monstrosities and keeping them
alive and fighting.
33
/root/threat intel/cd ..
/root/cd endgame/
/root/endgame/ls
endgame
34
/root/endgame/
Storm the Spire!
The public execution of the elf Vyndreck, esteemed
speaker of tribes Tereskhan and Mrozow, slayer of dragons
Karak, Zogliark, and Aasomirandr, and silencer of the 17th
Calling, was nearly as bloody and grandiose as his storied
WE OUTNUMBER THEM!
Vyndreck wasnt speaking of the elf sympathizers
in the crowd. In fact, there were few. Tensions between the
races had eclipsed all reason. Weeks earlier, the Tereskhan
and Mrozow tribes took turns firebombing the city in an
effort to slow anti-elf and anti-dwarf pogroms that broke
out after the violent assassinations of the Duke and Duchess
of Lampestad. Parts of the city still smoldered, and columns
of black smoke crisscrossed the sky like colossal gallows.
--more--
35
01010101
10101010
01010101 The apocalypse had come and everything, every-
10101010 thing, was exactly as it had been, save for the destroyed
homes and poisoned wells the rest of us would trudge back
01010101
to after Vyndreck expired.
10101010
01010101 You know the next part of my story, because you
10101010 lived it yourself. The creeping paranoia, the sideways glanc-
es, the flapping shutters of a ransacked dormitory... all odd-
01010101 ities dismissed until they crescendoed in the clashing of
10101010 blades with dissembled assassins. Like you, I found others
01010101 who were hunted. We protected each other as best as we
10101010 could, but you know how relentless they can be.
01010101 You also know what happened next, because you
10101010 were given the keyphrase that decrypted this message. We
01010101 found another cell, exactly like us, fleeing the same pursu-
ers, and flailing against the darkness, like ants thinking they
10101010
could bear the weight of the boot about to crush them. Two
01010101 cells became three, three became four, and soon, we had a
10101010 veritable army, distributed and silent, slaughtering our op-
01010101 pressors in their rats nests. We took many heads, but you
know how cunning they can be.
10101010
01010101 One of our numbers, an artisan of death, had cho-
10101010 reographed and participated in the assassination of countless
01010101 Risk Eaters. Her skills peerless and her loyalty unquestion-
able, she became our chief spymaster. Her unquestionable
10101010 loyalty, however, was to them, not us. Such was her ded-
01010101 ication to the mission, that she slew her peers gleefully in
10101010 order to infiltrate our inner circle. Her final masterpiece was
simultaneously directing every one of our cells right into a
01100100
deathtrap so elaborate and devious that even a Cloak would
01100110 be green with envy.
01100101
01100101 They are coming. Hundreds of them. There is no
way we can win this fight. The twelve of us will hold this
01100100 rickety keep and kill as many as we can. But that is where
01100110 my story and your's part ways. You will find others like you.
01100101 You will raise an invisible army that outnumbers them. You
01100101 will not make the mistakes we made. You will storm the
Spire.
01100100
01100110 You are going to kill every last one of them.
01100101
01100101 36
01100100
/root/endgame/
The Path To Victory
For those who want to play Cryptomancer but find
its thematic death-spiral a little too nihilistic for their gam-
ing group, we now introduce a path to victory which per-
mits a party to complete a campaign on a triumphant note,
/root/endgame/
The Couriers
Its easy to not even realize they are there. These
unassuming satchel-carriers make meager wages to travel
from town to town nailing notices to boards, all to main-
tain a plodding communication system rapidly falling out
of vogue. Indeed, if the Risk Eaters are hand-chosen from
the most remarkable members of the noble races, those who
form the Couriers might just be the most unremarkable.
However, they have a code they commit to with more zeal
than even the most devoted Risk Eaters could muster. They
see frank and unrestricted communication as a moral imper-
ative, not only as a means of stabilizing relations between the
realms, but as a check on those who have power and would
abuse it. Their commitment to this ideal is stronger than
the Risk Eaters devotion to their mission, primarily because
it was chosen instead of impressed upon through violence,
--more--
37
01010101
10101010
01010101 fear-mongering, political coercion, and re-education. The
10101010 ultimate expression of their belief is the Shardscape.
01010101
Indeed, it was the Couriers who labored for de-
10101010 cades expertly splitting and distributing the obsidian mete-
01010101 orite that would form the Shardscape. They knew the early
10101010 decades of the Shardscape would be absolutely disruptive
to the secular and religious powers that be, and that this
01010101 disruption would manifest in some truly terrible ways. Yet,
10101010 they were assured it was absolutely necessary. Those unfor-
01010101 tunate souls at the meteors excavation site who laid a hand
10101010 on this great shard witnessed something that wracked their
sanity. Between bouts of sheer incoherence, they recalled the
01010101 self-inflicted obliteration of a civilization. That lost people
10101010 could not communicate freely, but could only viciously bark
01010101 slogans manufactured by power centers vying for control.
The tongue was unknown but the sentiment of these echoes,
10101010
spewed with venom and vitriol from the mouths of those
01010101 who had seen this truth, was unmistakable.
10101010
01010101 What the Couriers did not anticipate, however, is
that the feuding powers manufacturing a similar death-spi-
10101010 ral for Sphere would conspire together to ensure it. The Risk
01010101 Eaters were formed and it was only decades after that orga-
01100101 nization amassed power that even conspiracists, let alone the
01100100 Couriers, recognized them for what they were. The fiefdoms
and interests that built the Risk Eaters assumed they could
01100110 leverage them for their own advantage. They underestimat-
01100101 ed the vigor and fury in which its agents would carry out the
01100101 mission of protecting the status quo. Even those leaders who
wanted to cede or share power were destroyed by the very
01100100
apparatus they built to protect themselves.
01100110
01100101 Once they discovered the power of the Analytic En-
01100101 gines of the Spire, the Couriers knew that even the seed of
an idea of resisting the Risk Eaters would be prophesied and
01100100 mitigated with extreme prejudice. It would not be enough
01100110 to keep a low profile and prohibit their ranks from taking
01100101 direct action. They needed a way to hide from the all-see-
01100101 ing eye for years, decades, perhaps even centuries... however
long it would take for an opportunity to strike decisively at
01100100 the Risk Eaters to materialize.
01100110
01100101
01100101 38
01100100
/root/endgame/
The Blind Spot
The Couriers code of never eavesdropping on the
communications they are charged with delivering is not
broken lightly. Its akin to blasphemy and a betrayal to the
very civilization they wish to elevate. One of the more note-
39
01010101
10101010
01010101 /root/endgame/
10101010 The Cult of Cassandra
01010101
10101010 Before the voracious consumption of news and gos-
sip on the Shardscape became the primary form of intrigue
01010101 and entertainment throughout the realms, wandering cara-
10101010 vans of minstrels, thespians, troubadours, dancers, illusion-
01010101 ists, and soma-inspired oracles brought mystery and delight
10101010 to rural podunks and sprawling cities alike. The narratives
weaved by these performers were so compelling and so in-
01010101 fluential that rich patrons would contract them to subtly
10101010 promote their own agendas. It was a very successful strategy.
01010101 Even the most cunning of politicos were thrashed in the
court of public opinion by political novices who could pay
10101010
off the season's most popular artists. Theatre, street perfor-
01010101 mance, and publication became political weapons wielded
01100110 by the highest bidder.
01100101
An aged and revered troupe of performers lamented
01100101 what was transpiring. To them, the mercenary nature that
01100100 their craft had adopted was not just killing art, but also free
01100110 expression and rational thought. They retreated to a steppe
01100101 wasteland, far away from the influence of politics and mon-
ey, to develop a more pure form of art. After two decades of
01100101 isolation, they were all but forgotten. Under the clear skies
01100100 of the steppe, however, they had been communing with
01100110 something very ancient and very distant. And they changed.
What finally returned to society was not a troupe of per-
01100101
formers but the Cult of Cassandra.
01100101
01100100 The acolytes of the cult are enigmatic purveyors of
01100110 a universal antithesis: every single political, social, econom-
ic, or scientific authority is simply a fount of lies. Nothing
01100101 and no one is to be believed. Their maxims are ever-chang-
01100101 ing and eminently incongruous. They'll declare that scien-
01100100 tific progress is moral regression, but in same breath, declare
01100110 that piety is a mental shackle. Today, poverty is liberation,
but tomorrow, charity is a disease. While cult acolytes do
01100101 sometimes perform in traditional venues, the world is truly
01100101 their stage. They choreograph infidelities, script insurrec-
01100100 tions, pen suicide notes, and paint tapestries of carnage.
01100110 --more--
01100101
01100101 40
01100100
What is left in their wake are shattered wills, swollen egos,
maelstroms of doubt, and confused choruses proudly echo-
ing inane falsehoods.
41
01010101
10101010
01010101 SQL>SELECT * FROM
10101010
01010101 New Cell
10101010 Cell Description Strategic
01010101 Assets
10101010 Cult of
Cassandra
A cell of hypnotists, illusionists, and meddlers that
will cover one of the partys operations with a one time
1
43
/root/ssh nameless@spire
verification code:
password for nameless@spire:
44
[nameless@spire ~/reports]
It Still Comes
The high seer had arrived. He slowly rose from
a kneeling position as soon as the arcs of electrical magic
stopped coursing his naked flesh. Two loin-clothed thralls,
cryptomanticly disfigured, immediately converged. One
wrapped the seer's frame in a black, regal mantle and the
other placed a gnarled scepter in his open hand. Without
even acknowledging the several agents who knelt before
him, he walked to the propped door, towards the sound of
massive waves beating the cliff below the fortress in which
he stood. Mist swept across his face. The storming sky was
the color of his eyes, milky gray, like a hurricane being baked
by the sun. The monster was gliding in slowly, its massive
wings seemed to span the horizon. It could have careened
into the fort like a meteor, but its final descent and landing
--more--
45
01100101
01100101
01100100 back at the beast. "We want you, and the others, to destroy
01100110 it before it reaches the continent of man."
01100101
The dragon let out a soft but methodical "No."
01100101
01100100 The seer turned to face the Axhollek and spoke ag-
01100110 itatedly. "Name your price, lizard. Do you want to reign
over man? Do you want to be gods, again? We'll make it so.
01100101 Jewel encrusted roosts, herds of sacrificial thralls throwing
01100101 themselves into your maw. A new golden age for-"
01100100
01100110 The seer stopped his pitch when he observed the
dragon's belly shaking in a muted chuckle.
01100101
01100101 "Godhood is boring, seer. We've done that already.
01100100 Even if you had something we wanted, there aren't enough
of us to stop it. Mortals - most mortals - are like rodents to
01100110
us, but even we dragons are like insects to it. You'll see. It is
01100101 going to crest soon."
01100101
01100100 The seer felt his spare hand tremble slightly, so he
used it to clutch his scepter. He turned again towards the
01100110 sea, planting the scepter's tip firmly on the stone floor below
01100101 him. He spoke again in a calm tone, "If your girth does us
01100101 no good, we'll still need those wizened skulls of yours. If we
01100100 can discover its true name..."
01100110 "Yes, maybe we could storm it to death, or slow it
01100101 down. But our ocean-floor-striding golem doesn't seem to
01100101 want to talk, seer. It only listens."
01100100
"It doesn't listen, dragon. It devours, by design.
01100110 The Analytic Engines must be force fed intelligence, and we
01100101 can't help but feed them the wrong reports composed of the
01100101 wrong events and the wrong names. Our methods are crude,
like birds masticating food for their chicks. We needed to
01100100 build an engine with its own appetite. Its own hunger. Its-"
01100110
01100101 "You must have known things were going to end
01100101 poorly, seer. Why else would you have sent an expedition to
construct it in the icy wastes at the world's end?"
01100100
01100110 --more--
01100101
01100101 46
01100100
"Yes, the Engines foresaw disaster, but also great
discovery. We took every precaution to isolate whatever neg-
ative outcomes manifested. We had no idea that it would...
walk, and... grow... and-"
"And of those?"
--more--
47
01100010
01110010
01100101 no had erupted below it and then hung in the air for what
01100101 seemed to be the longest few seconds of the seer's life. When
the suspended water finally acquiesced to gravity, it pulled
01100100
away a water curtain hiding the largest and most grotesque
01100010 construct, no, colossus, he could have ever imagined. Several
01110010 dozen stalks composed of metal, choral, and meat, as thick
01100101 and tall as lacuna trees, held up the chassis of a crab-like
golem, made of just as much with muscle and chitin as it
01100101 was with sheets of metal and coiled chains. At the center
01100100 of the mass was a single blood-red eye, alternating between
01100010 staring directly into the seer's soul and violently whipping
01110010 backwards into a bristled socket. This mountain of metal
and meat then plunged back down into the ocean's depths,
01100101 creating white-ridged squalls that sped towards their death,
01100101 thrashing against the cliff below the fort.
01100100
The seer stood speechless. The dragon continued its
01100010
revelation, but had to scream in order to contend with the
01110010 ocean's roar. "True names and soul keys dissolve into key-
01100101 phrases upon their owner's death. The walking golem isn't
01100101 just hungry for knowledge, seer. It's hungry for all of the
knowledge. Every last morsel. And its found a way to get it."
01100100
01100010 The seer closed his eyes for a moment, then nod-
01110010 ded, as if he had committed to a plan of action.
01100101
"I am returning to the Spire, Axhollek. And no one
01100101 is to follow me, understood? This outpost no longer exists.
01100100 This island is no longer on any map. We have a precious
01100010 few months to develop a strategy and I will not let hysteria
countermand our efforts." With that, he turned around and
01110010
walked back towards the fort's interior.
01100101
01100101 "Anything for you, old friend," replied the dragon.
01100100 "But one last thing."
01100010 The seer stopped in his tracks, but did not turn to
01110010 face the dragon.
01100101
01100101 "Its larva swims very fast, seer. Much faster that it
itself can walk. Much, much faster."
01100100
01100010
01110010
01100101 48
01100101