Qdoc - Tips Cryptomancer Code Amp Dagger Volume II
Qdoc - Tips Cryptomancer Code Amp Dagger Volume II
volume ii
<scry>
<shardnet>
<entry>
<name>
Galgur
/ </name>
/ </shard></entry>
/ <source>
/ Rufdol
/ </source>
/ <siz e>
/ 0021
/ </siz e>
/ <incept >
/ 021564
/ </incept>
/ <echoes>
/ <echo>
<id> / 001 </i d>
<image>ZWNobzFSdWZkb2xzaGFyZHNjcnl2aWV3LnBuZw==</image></ e c h o><echo>
<id> \ 002 </i d>
\ <msg> #
\ duke at da wn
\ </msg >
\ </echo>
\ <count >
\ 00106 |
\ </count > #
\ </echoes>
\ <spike>
\ <detect ed>fa lse
\ </det ect ed>
\ </spike>
</dur>
5951
</dur>
</shardnet>
</scry>
a sourcebook for
1 cryptomancer
M
credits
/root/credits
@anterobot @kademorton
@bakudreamer @ksedivyhaley
@brotherphil @masterwolf2050
@chadsansing @plotanical
@cryptomancer-actual @rogueautodidact
@ f ab io c o s ta 0 3 0 5 @ tr o m a n d
land of
0x90
2
directory listing
/root/ls
3
/root/sudo apt-get install code_and_dagger_vol_ii
reading package list... done
building dependency tree
reading state information... done
the following new packages will be installed:
code_and_dagger_vol_ii
1 upgraded, 1 newly installed, 0 to remove and 0 not upgraded.
need to get 1,337 kb of archives.
after this operation, 2,017 kb of additional
additi onal disk space will be used.
do you want to continue [y/n]:y
installing code_and_dagger_vol_ii
trying url ‘https://mozilla.org/en-us/foundation/sprint.tar.gz’
content type ‘application/x-gzip’ length 1337000 bytes <1337 kb>
opened url
===========================================
downloaded 1337 kb
*installing *code_and_dagger_vol_ii*
**package ‘code_and_dagger_vol_ii’ unpacked and md5 sums checked
...done.
/root/cd changelog
/root/changelog/ls
#mozsprint
4
/root/changelog
mozsprint
On a healthy Internet, privacy doesn’t mean you
have something to hide. It means you have the ability to
choose how much you share online. At Mozilla, we work
to provide tools and fight for policies that respect people’s
identity and data across the Internet.
We invited
We invited the
the game's
game's author
author,, Chad Walker
alker,, educa-
educa-
tion professor Antero Garcia, and security expert Romand
iphane to co-lead a Global Sprint project inviting players
to invent and share their own Cryptomancer adventures to
help others:
escape the
networked
dungeon
6
/root/escape the networked dungeon/
Overview
Tis chapter contains a generic standalone adven-
ture for Cryptomancer that
that is stripped of plot elements so it
can be incorporated into any campaign. Te premise is sim-
ple: the party wakes up in a dungeon full of scrying shards
and crypto-gear security mechanisms and they must hack
their way out. Tis adventure was designed to introduce the
networking elements of Cryptomancer to to new players, while
also giving advanced players a fun playground to test their
hacking chops.
7
/root/escape the networked dungeon/
...or...
...or...
--more--
8
around a small furnace burning where a heart would nor-
mally be. It has blades for hands, and a small third limb
protruding from its belly looks to have keys for fingers
and a shard for a palm.
--more--
9
pulling him into a cell in a few seconds), they will be able to
proceed stealthily. If the encounter is chaotic and the guard
is able to resist (e.g. call for backup with his shard),
shard) , the char-
acters assume that more guards will be coming soon.
10
their movements (and perhaps making small talk) in clear-
text. Tis will make it potentially easy to masquerade as a
guard, so long as the players talk just like the other guards
talk, whether they are mortals working for the weekend, un-
dead ghouls, or steam-powdered automatons (though doing
this right will likely require a Performance skill-check).
11
to read the encrypted message, which says "onight's key-
phrase for the Cell Block door is "Wistful Wildlings
Wander
W ander."." Tis
Tis is particularly useful information when fac-
ing the final obstacle keeping the party contained in the Cell
Block area of the networked dungeon: a crypto-locked door.
A fortified, dwarven-b
dwarven-built
uilt door stands before the
party and their freedom (at least, from this section of the
dungeon). It has no handle and no keyhole. Instead, it
has a single exposed shard embedded at the center of the
door. Te only way to open a crypto-locked door is to
touch its shard, encrypt with the designated keyphrase,
and then create a message containing the same key-
phrase. While this may seem redundant, encrypting first
prevents someone from simply touching the shard and
looking for the last message that was used to open the
door, and replaying that message. When you touch the
shard, you see that all guards who have used it tonight
have not forgotten to encrypt.
Summary of Part i
With the
the characters about
about to escape the
the Cell Block,
Block, let's review
review
practical lessons we've learned so far:
• Encryption
Encryptio n makes an attacker'
attacker'ss job much harder.
12
/root/escape the networked dungeon/
--more--
13
tween behaviors. Any time the cryptoadmin issues the com-
mand "operation ogre lord" (encrypted with the same) via
his control shard, the ogre's behavior cycles in the following
manner: sleepy > helpful > enraged > helpful > sleepy, etc.
Te ogre is currently set to sleepy, which means it will just
loaf around and scratch itself unless someone tries to harm
it. When the ogre is set to helpful, it will obey spoken or-
ders (in fact, the ogre helped build this facility under this
condition). When the ogre is enraged, it assumes its natural
state: smash and eat everything in sight. If the cryptoadmin
observes our heroes from the scrying shard, he will cycle the
ogre to enraged. Te ogre is a tough
tough threat,
threat, has 30 HP, and
is more than a match for the party, especially without any
equipment.
Te Eastern Path
14
engine that powers a winch used to pull and release the
heavy iron chains that raise and lower the elevator. Fixed
to the engine is a control shard. When you touch the
shard and observe historical messages, you see what must
have been a recent dialogue between the dungeon's cryp-
toadmin and his assistant. Te assistant says, in clear-
text, "I unjammed the chain. ry it now." Tere is then
an encrypted message, likely the cryptoadmin activating
the elevator remotely. Finally, there is another message,
again in clear-text, from the assistant. "It works! I will
now go perform maintenance on the lightning pylons, so
we can make
make sure
sure no one
one comes or
or goes from
from this island,
at least by air."
Of course the
the guards failed to change the elevator's
default keyphrase ("lifts levitate loads"). Te elevator plat-
form can be summoned to the floor of the cave via the con-
trol shard attached to the engine. Tere is another control
shard built into a kiosk on the elevator platform, which the
players can use to ascend out of the labyrinth once everyone
has stepped onto the platform. Note, the elevator platform
is a wide iron disc weighing several tons. It drops at a some-
what rapid pace and smashes to the the floor,
floor, kicking up clouds
of dust and causing the room to shake. In the case that the
--more--
15
ogre has been enraged, players can possibly coordinate (per-
haps over their own shardnet) to drop the elevator platform
on the ogre's head, pinning it down until the platform is
raised again.
Te Northern Path
16
Tis engine is connected to a windmill above
ground and provides power to the elevator, the lightning
pylons, and an experimental suit of animated armor called a
"siegemech," which will be discussed later in this adventure
adventure..
Currently, the engine is powering the elevator and the light-
ning pylons, while the siegemech lies dormant.
dorma nt. If the players
gain access to the control shard for this shardnet (which is
in the dungeon's
dungeon's cryptovault),
cryptovault), and they know know the correct
keyphrase to switch the output configuration ("power pro-
duces promise"), they can access the crypto-gear's
cr ypto-gear's sequential
logic to cycle through these power configurations: elevator +
pylons > pylons + siegemech > siegemtech + elevator > ele-
vator + pylons, etc. Alternatively
Alter natively,, if they sabotage this engine
(a challenging Craft skill-check), they will kill power to all
three machines attached to it. However, given the elevator
won't work if they do this, they better
better figure out how to get
out of the cave first before doing so.
Te Western Path
17
before you see them!
--more--
18
arrows resting alongside it.
Summary of Part ii
With the
the characters about to escape the
the cave, let's
let's review practi-
cal lessons we've learned so far:
19
/root/escape the networked dungeon/
20
cess to cryptovault. Either way, this chest contains all of the
weapons, outfits, and
and equipment
equipment that were confiscated from
the party when they were initially captured.
Te Hallway
--more--
21
a large set of double doors that look as if they lead to the
courtyard outside, if the daylight shining through the
seems is any indicator.
Te Cryptovault
--more--
22
used to provide power to the golem, but it's not current-
ly plugged into anything. Tere are no shards current-
ly held in the golem's many hands. Instead, there are a
number of shards, each of a different size and hue, rest-
ing on squat stands made of silver atop the wooden desk.
Tere is also a massive, dusty tome with its pages open,
laying on the desk, with the keyphrase "pilfered prisoner
provisions,"
provisio ns," being the last thing written in it.
--more--
23
gency. Tey also have access to the fortress's secrets. Te pile
of books and journals will tell the story of this place and its
strategic purpose. We leave those details up the GM as an
opportunity to tie this adventure to an existing campaign, or
provide a teaser for the next adventure.
Te Courtyard
Te courtya
courtyard
rd is barren, save for stacks of wood-
en crates and canvas satchels full of spare parts soaking
in the rain, and a single menacing siegemech, a mecha-
nized suit of armor standing several meters tall, tethered
to a chain-mail cord that runs to a small shed. It stands in
front of a barn door that leads the a gigaphid aviary, and
the closed portcullis that leads to the beach. Tis siege-
mech is not fitted for the purposes of siege, lacking any
type of battering ram to cave in doors or tower shield to
protect columns of infantry from arrows. Instead, this
siegemech looks to be designed to help build the fortress,
doing the heavy lifting and stone-setting that it would
take dozens of people to perform with simple machines
like lifts and pulleys. It is still a very formidable threat,
however, and the guard inside it sees you and readies his
giant suit of armor for combat.
24
Or...
Te Aviary
Te Lightning Pylons
25
which is very
very frequent
frequent in this stormy part of the sea. Te
batteries are so heavy that the only way to remove one,
effectively
effectiv ely disabling the pylon, is to use the siegemech, or
maybe even enlist the aid of the ogre.
Te Beach
Conclusion
26
Summary of Part iii
27
/root/the networked dungeon/cd ..
/root/cd enterprise shardnet architecture
/root/enterprise shardnet architecture/ls
Enterprise
shardnet
architecture
28
/root/enterprise shardnet architecture/
Overview
leaf
shardnet
shardscape
root
shardnet
golem
branch
shardnet
--more--
29
/root/enterprise shardnet architecture/
30
However, a complex and highly connected shard-
However,
net architecture can introduce a lot of risk to the enterprise.
What if a new employe
employeee who has access to the enterprise
shardnet is actually an enemy agent? What if an employee
has her shard stolen by an adversary who can now directly
access the golem? What if a disgruntled employee bridges
her personal shard to the Shardscape to flood the enterprise
shardnet and render it useless? What if several shards in the
larger enterprise shardnet have been compromised by the
enemy?
User Groups
Fundamental to enterprise shardnet architecture is
the idea of user groups . A user group is essentially a group of
people who share the same set of permissions. If an individu-
al is added to the "archivist" group, she is permitted to enter
the city-state's archive, peruse its records, and update records
to account for legal changes (e.g. births, deaths, marriages,
inheritances, etc.). If she is removed from that group, she
is no longer permitted to do any of those tasks. As another
example, an individual added to the "constable" group is
permitted to arrest people, sleep at the local barracks, and
be allowed entry into any building so long as he announces
himself. If he is removed from that group, he loses those
privileges. Lastly, an individual can be part of multiple user
groups depending on their role. For example, an inquisitor
who hunts
hunts down, interrogat
interrogates,
es, and meets justice
justice on enemies
of the state is added to both the "archivist" and "constable"
--more--
31
groups. If she falls out of favor with the local regent approv-
ing her authority, she is removed from the inquisitor role,
and subsequently removed from both the "archivist" and
"constable" groups.
32
/root/enterprise shardnet architecture/
Compartmentalization
Compartmentalization is the process of keeping
Compartmentalization
some information subjects separate from others. In an es-
pionage context, it is done to minimize the damage that an
individual insider threat or captured/interrogated agent can
do to the larger organization. Consider the spying agency of
a human city-state, keeping an eye on neighboring factors.
Tis organizatio
organizationn might have a spy placed at a near-
by dwarven clanhall and a spy placed at a nearby elven la-
cuna tree. Trough compartmentalization, these two spies
don't know anything about each other. If the dwarven spy
gets caught and is interrogated, there is no chance of him
giving up the identity of the elven spy, because he doesn't
even know she exists, and vice versa. Going up the chain,
there are likely two separate case managers back in the hu-
man city-state handling these spies. Tese case managers
know each other exists, and maybe even work in the same
building, but they don't know anything about the other's
work. If
If the dwarf spy is compelled
compelled to
to turn on his case man-
man-
ager, and she is caught and interrogated as a result, the case
manager might know everything about spying operations
against the dwarves, but doesn't know anything about spy-
ing operations against the elves.
--more--
33
leaf
shardnet
--more--
34
However, if the lieutenant loses her branch shard,
However,
which she uses to communicate with other lieutenan
lieutenants
ts and
the golem, there is considerable risk to the larger organi-
zation. An adversary now has the ability to eavesdrop on
communications in the branch shardnet, masquerade as her,
or disrupt the network in other ways (e.g. cast Denier, drop
Shard Spikes, geolocate the other lieutenants, or bridge the
branch shardnet with the Shardscape in order to flood it
and bring normal communications to a halt). It is for this
reason that lieutenants are assigned personal security details,
are instructed to destroy their branch shards if capture is
imminent, and are often kept in the dark regarding what the
other lieutenants are up to.
Leaf Shardnets
leaf
shardnet
--more--
35
I am part of something very big and very organized, but I
don't have access to all of it, because I am just a worker.
Te organizatio
organization n gave me a shard. Tey call it a
"leaf shard," because just like a leaf on tree, when a leaf is
cut or falls off of a tree, no harm is done to the tree. My leaf
shard is part of a small shardnet, composed of maybe four to
six other leaf shards. My immediate comrades and cowork-
ers are holding on to the other shards, as is my local boss,
the one who gives me assignments. We use our leaf shard-
net to talk to each other and coordinate our actions during
an assignment. We try to use cryptomancy to encrypt our
communication in case one of our leaf shards falls into the
wrong hands, but sometimes we forget. Te boss yells at us
for this and we try
tr y harder next time.
36
/root/enterprise shardnet architecture/
golem
branch
shardnet
--more--
37
Aside from the other managers, there are two very
important beings who also possess a branch shard: our cryp-
cr yp-
toadmin and our golem. Tey are both in our organization's
secret and heavily fortified cryptovault. I sometimes talk
with the cryptoadmin about security matters, but most of
the time, I am talking to the golem. Sort of. When I want
to access the Shardscape, I encrypt my request using the
golem's true name. Only the cryptoadmin and the other
managers know the golem's true name, for security purpos-
es. Sometimes I tell it to perform queries to find informa-
tion that one of my workers asked for. Sometimes I tell it
to send an encrypted message and then start listening for
a certain keyphrase that my recipient will use to reply back
to me. Because I am encrypting my requests to the golem
with its true
true name,
name, none
none of the other managers can see
see these
these
communications.
communicat ions. However,
However, the golem logs everything in the
registry, so I know the cryptoadmin can review what I'm up
to. Sometimes, I have to have a chat with someone on the
root shardnet because of what I have been querying.
shardscape
root
shardnet
golem
I am our organization
organization's
's cryptoadmin. My job is
mission critical. I keep the golem in working order and
manage our overall shardnet infrastructure. You could say
our entire mission rests in my hands. I have been extensively
vetted, but the big bosses have taken measures to ensure I
don't get any ideas about betraying the organization. Every
once in a while, they send an inquisitor to have a chat with
me. Sometimes, he'll cast the "Mind Read" spell on me to
--more--
38
make sure I tell them the truth. It's all part of being trusted
with this responsibilit
responsibilityy, I guess. Tey also have leverage on
me. Tey know my true name, and the true names of my
family members. Tey can and will find me if something
goes wrong. However, it won't come to that, because they
take good care of me. And the last thing I want to wake up
to is a Risk Eater crawling through my window.
--more--
39
I use to contact a stormer crew we contract in emergencies.
I create a bridge for them to join our (noisy) shardnet, and
they Shard Warp over to the troublemaker and solve the
problem. Violently
Violently..
40
My Secrets, Their Assets
While privacy
privacy laws vary wildly
wildly from country to country
country,, it is
typically a safe bet to assume that an individual worker has no
expectation of online privacy when leveragin
leveragingg company assets.
Many organizations log all of their employee's online activi-
ty, and not just because they are nosy or worried about your
productivity! Tey are often compelled to log all online activity
in order to comply with regulations or compliance obligations,
or to detect malicious traffic from company devices that have
been compromised by malware. Unfortunately, using anonymiz-
ing services such as OR or a private VPN at work are rarely
viable alternatives and are frequently prohibited. Again, this
isn't because companies are nosy. It is because they are trying to
protect their organization from data loss. An encrypted, anony-
mous, outbound connection is exactly the type of thing that an
adversary would use to exfiltrate sensitive
sensitive data from your organi-
zation. When security analysts see this type of activity, it is often
their duty to investigate it and treat it as malicious until they can
verify otherwise.
All this is to
to say that if
if a secret is worth
worth keeping from
from someone,
don't use their devices to keep it from them. It is often their
right and their obligation to know what's happening on their
property. It's nothing personal. For secrets worth keeping, stick
to your own devices, like your phone.
41
/root/enterprise shardnet architecture/cd ..
/root/cd offline security
/root/offline security/ls
offline security
42
/root/offline security/
Overview
Tis chapter explores fantasy methods of evading
physical surveillance, disrupting techniques to geolocate
shards, and securely generating/exchanging shared secrets
(e.g. keyphrases) when traditional methods are either im-
practicle or presumed compromised.
43
/root/offline security/
Psychometric Crypto
Te PsyPsychometry
chometry spell in Cryptomancer permits a
spell caster to receive psychic impressions from an inanimate
object. Tis spell has clear investigative purposes. For ex-
ample, an investigator can cast Psychometry on a discarded
murder weapon to get impressions of the last person who
touched it. However, the spell also has immense potential
to facilitate secret communication outside the context of the
Shardscape.
Shard scape. Consider the following scenario of a case man-
ager communicating secretly with one of her clandestine as-
sets in broad daylight.
44
/root/offline security/
oday
oday,, the gigaphid drones have a very different
mission from the one that was proposed years earlier. Tey
--more--
45
are used to spy on enemies of the state (real or imagined,
but mostly imagined) as well as keep tabs on the paranoid
regent's political rivals. Te cryptoadmins monitoring the
streets and public squares that the drones survey
sur vey are not sim-
ply watching passively, looking for problems. Instead, they
are scribbling down the times and locations of meetings
occurring between the subjects under scrutiny in massive
tomes, and correlating events to establish possible relation-
ships between actors who never actually met under the gaze
of the gigaphid drone. Trace was seen in the marketplace
with Moriarta, and Moriarta was seen in the gardens with
Herkin, so Trace must know Herkin. Guilt by association
is the new regent's favorite tool for culling his rivals.
r ivals.
46
/root/offline security/
Astral Crypto
Te Astral Eye cantrip in Cryptomancer permits
permits a
spell caster to perceive traces of magical or physical evidence
that would otherwise be invisible to the naked eye, such as
fingerprints or cleaned blood splatters. Much like the Psy-
chometry spell, this cantrip has clear investigative purposes
but can also be used to facilitate secret communication out-
side the context of the Shardscape. Consider another scenar-
io of a case manager communicating secretly
secretly with one of her
clandestine assets in front of witnesses.
47
/root/offline security/
Counter-Location Techniques
You've acquired a shard that doesn't belong to you.
Perhaps you've pick-pocketed it from a constable, or looted
it from the corpse of an enemy you just bested in combat,
or maybe you just found it somewhere and you don't really
know who it belongs to. Either way, you've stumbled into
someone else's shardnet and now have access to their secrets.
At the same time, you've inherited some potentiall
potentiallyy seri-
ous security and privacy problems. Let's count the ways this
could come back to haunt you:
Shadow Cache
--more--
48
via Shard Warp.
Warp. Te shard still receives
receive s echoes in the shadow
shad ow
realm, however, meaning that it can be extracted later and
reviewed for previous communications. Of course, the sto-
len shard maintains all of the previously mentioned security
problems once it is pulled back into the corporeal realm.
Faraday Bond
Moving arg
arget
et
49
/root/offline security/
Key Generation
Under Deep Surveillance
Under ideal circumstances, it is simple for two ac-
Under
tors to communicate securely on the Shardscape, so long
as at least one of the actors know the other's true name.
However, let's consider the worst possible circumstances:
neither actor knows the other's true name, and all in-person
communication between the two actors is being monitored
closely by enemy agents, or neither actor knows where the
other is but still needs to reach them. In order to generate
and then use new keyphrases that they both know, but oth-
ers won't know, they need to leverage some piece of infor-
mation that is provided by the physical world that is both
somewhat random and somewhat reliable. Tey also need to
agree on this source of information before they find them-
selves separated or under deep surveillance,
sur veillance, as an emergency
measure.
--more--
50
impossible to exchange notes or even whisper to each other
without being compromised. A possible technique to use
here is to play a game with each other that produces random
or semi-random results, and then use those results as key-
phrase material. For example, two actors under surveillance
can go to a tavern nightly, and play a few turns of chess
against each other while drinking a mug of ale and making
perfectly innocent
inno cent small talk. Perhaps they play three turns a
night, and ask the barkeep to not disrupt their board. What
they are doing is generating keyphrases. After three turns,
the keyphrase for the evening might be "pawn moves, bish-
op moves, rook takes bishop." omorrow, after three more
moves, the keyphrase will be different. Te agents monitor-
ing these two actors might be watching the game and even
tracking the movements, but it would take a pretty savvy
analyst to determine what's actually going on here.
51
/root/offline security/cd ..
/root/cd new talents and spells
/root/new talents and spells/ls
new talents
and spells
52
/root/new talents and spells/
New Talents
Tis section introduces new talents for Crypto-
mancer characters,
characters, some of which were designed to better
facilitate the adventure modules in this sourcebook.
--more--
53
Pattern Recognition 1 alent Point
--more--
54
empe
empered
red ast
astee 1 alen
alentt Point
Vermin
Vermin Vantage
Vantage 3 alent
alent Points
Points
55
/root/new spells/
New Spells
Tis section introduces new spells for Cryptomancer
characters, some of which were designed to better facilitate
the adventure modules in this source book.
Anti-Scry (Cantrip)
(Cantrip)
--more--
56
Rope Sprite (Basic Spell)
57
/root/new talents and spells/cd ..
/root/cd the crypto masquerade
/root/the crypto masquerade/ls
the crypto
masquerade
58
/root/the crypto masquerade/
Overview
Tis chapter contains material that is not so much
an adventure module as it is an interesting social sandbox
that can be incorporated into any Cryptomancer campaign.
campaign.
By "sandbox," we're referring to a very open-ended scenario
where players can explore, immerse themselves in the story
stor y
space, and pursue the plotlines that interest them the most,
as opposed to playing a module that has a distinct beginning
and end (like most dungeons).
59
/root/the crypto masquerade/
The Invitation
Te party has acquired invitation
invitationss to the local re-
gent's Crypto Masquerade. Given that player characters in
Cryptomancer are
are fugitives trying to keep a low-profile, it is
unlikely they were directly invited. It is far more likely that
their patron provided them with invitations, or they were
able to successfully steal invitations from another group
during a previous caper.
60
stole someone else's invitation. It is also feasible that the
regent's investigators could use the Psychometry spell
to review how the invitations changed hands before the
event.
even t. Ten again, these types of accountability measures
measures
would violate the very spirit of the
t he Crypto Masquerade,
wouldn't they? If the guests suspected the regent was spy-
ing on them during this even
event,
t, all attendance would stop.
61
/root/the crypto masquerade/
Up To No Good
Te players are not attending the Crypto Mas-
querade just to hobnob with the most powerful and well
connected people in the kingdom. In fact, they aren't even
supposed to be there. Tey are there because they have a
very important task to carry out, likely assigned to them by
their patron. Tis is a rare opportunity for their patron to
send deniable operatives into the most secure and exclusive
place in the kingdom wearing the equivalent of magical ski-
masks. So, what are the players hoping to achieve during
this event? Here are a few ideas:
--more--
62
perhaps the regent is suspected of being in on the plot.
--more--
63
tainly permitted to share the keyphrase encrypting their
own face with other guests they have chosen to trust, if
only to prove that they are who they say they are. How-
ever, sharing someone else's keyphrase or their name
without their consent is consider
considereded taboo, and will be
considered a sign that you are untrustworthy. Obviously,
this doesn't stop some guests from doing so, and occa-
sionally, the regent's guard is forced to remove someone
who is subverting
subverting the spirit of the event.
event.
--more--
64
Guests understand that the Crypto Masquerade
begins before they arrive at the event. Tey must cast
Dissemble in a secure location, travel under cloak, take
diversionary and roundabout methods to get to the cas-
tle, and not arrive on a carriage or mount known to be
affiliated with their houses. Once a guest leaves the event,
event,
they are not permitted re-entry.
Shard scryi
scrying
ng during an event is an offense even
more egregious than dropping your Dissemble spell.
Shards are certainly permitted during the event and used
frequently, but if regent's guard become suspicious that
someone is shard scrying through a guest's shard (e.g. a
guest is "aiming" their shard to get a good vantage point,
or wearing it on an amulet, etc.), this behavior will be
addressed immediately and potentially result in remov-
al and/or a permanent ban. Te primary concern with
shard scrying is the
t he risk that there could be Code Clerics
on the other end of a shardnet seeing and then decrypt-
ing everyone's face and sharing this intelligence with
their client.
65
Social, Security
66
/root/the crypto masquerade/
The Ballroom
Te following text can be read aloud to the players,
to introduce them to the venue they'll be spending the eve-
ning in:
67
place. Tere is a court cryptomancer on either side of the
ballroom, each one dressed in gray and wearing a hood,
ready to create or tear down a cryptomantic Maze to af-
ford privacy to the groups wishing to use these spaces.
Intrigues
Intrigues are interestin
interestingg bits of drama, gossip, or
intelligence that can be gleaned by talking with guests and
earning their trust, eavesdropping on conversations, or
maybe even pick-pocketing their shards. It is up to both
the GM and the players how they'd like to interact. Some
players will want to role-play out conversations with GM
characters, while other characters will want to chuck dice
resolve social interactions using their characters' Charm,
Deception, Menace, Performance, or Sleight of Hand skills.
Te Highbred talent from Cryptomancer is also very likely to
pay dividends here, as is the Veteran talent, given that many
guests in attendance are storied war heroes.
--more--
68
• One of the servants carrying wine to the guests is spy-
ing on the regent and intends to use this opportunity
to pass off important information regarding the castle
layout or the regent's political machinations to one of
the guests. Te party could intercept this information
or at least notice it - which implicates the spy, though
probably not the guest.
--more--
69
gy, and race (i.e. dwarf, elf, or human). Of course, this
could only be detected by someone who casts the Astral
Eye cantrip. Tis guest is clearly trying to hide some-
thing. Or they are trying to ensure they are not recog-
nized if they drop their Dissemble spell... and perhaps
they intend to in order to execute a very public false flag
operation implicating another fantasy race or faction
for what they are about to do.
70
Fed, Ripper, Skid,
or Time-Waster?
71
/root/the crypto masquerade/
What's Next?
What ultimately transpires during this event is up
to the GM and the players. We've endeavored to create an
interestingg and exciting social encounter ripe with opportu-
interestin
nities for espionage, intrigue, danger, and maybe even some
humor. o make this sandbox an adventure, the GM is go-
ing to have to either specify a specific goal for the party or
present them with some kind of seriously dramatic event.
Will the discovery
discovery of
of a murder in one of the Maze
Mazedd enclaves
enclaves
send shock-waves throughout the party? Will some type of
grand announcement by the regent or one of the regent's
retainers change the very contours of all the conversations
and dealings that have been happening during the evening?
Have enough skilled warriors infiltrated the party to final-
ly execute the coup they have been planning for years? We
leave all that up to you, GM.
72
common name Alisea Magmafort
true name Charl
sex, age, race Female, Dwarf
the party
wits resolve
take cover resist
vs miss
ssile vs magic
8 4
4 4 2 2
Knowledge Cunning Presence Willpower
alchemy deception beast ken mana points
craft scrounge charm
medicine tracking menace
query traps performance
appearance qualities
build Frail, Short
speed power
dodge parry
eyes Golden vs melee vs melee
tends to Lose her temper escape artistry precise melee thrown missile
Shardsplitter (Can split one shard into -1 hp if move and act -1 hp per turn
many sha
hards).
Codebreaker (1% chance to know any trademark weapon: Hamm
mmer and
nd Spike
ke
symmetric keyphrase). Hammer: Brute Melee, Conc
ncealable, Dirty, Damage 0, Ligh
ght,
Melee, Short, Thrown Missile
Tracer (1 MP, Unopposed of Varying rules
(Plus Spike): Tw
Two-handed, Pr
Precise Mel
elee instead of Brute
Difficulty, locate shards). Melee, Damage + 1.
1.
Artisan (Ignore 1 bo
botch to Craft,
sometimes Performance). qualities Shoddy
equipment,
t, consumables, and loot
Clock, Torch, Str
trong He
Healing Pot
otion, Strong Man
ana Potion
Amethyst Dragon Figurine
cryptomancer
common name Robric Ravenwing
true name Robenitton
sex, age, race Male, 20, Humann
the party
wits resolve
take cover resist
vs miss
ssile vs magic
4 6
1 3 4 2
Knowledge Cunning Presence Willpower
alchemy deception beast ken mana points
craft scrounge charm
medicine tracking menace
query traps performance
appearance qualities
build Athletic, Built
speed power
dodge parry
eyes Blue, determined vs melee vs melee
tends
ds to Shirk
rk responsibility escape artistry precise melee thrown missile
Highbred (Can save others from social -1 hp if move and act -1 hp per turn
gaffes with no
nobility).
Tempered Taste (Ignore 1 botch to Charm, trademark weapon: Ravenwing Family Sword
Deception, Menace, or Performance when
rules Brute Melee, Damage + 1,
1, Melee, Short
using Food/Drink as anecdote).
True Named Plate (+1 DR
DR against anyone Precious (jeweled), Striking Storage (the scabbard
qualities
who knows his True Name). has Ravenwing heraldry, not the sword)
Brawler (+1 to Un
Unarmed attacks)
Powerhouse (Ignore 1 Botch to Feat of trademark outfit
it: Scale Armor
Strength and Athletics)
Enduranc
nce Requiremen
ent 3, Heavy Deflection, Max
Rope Sprite (3 MP, Unopposed rules
Agility 3.
Challenging, conjures a magical rope).
Human Ma
Make (Sh
Shiny st
steel scales, eac
ach stamped with a
qualities
raven em
emblem), storied (it’s been in the family…)
equipment, consu
sumables, and loot
Clock, Torch, Str
trong He
Healing Pot
otion, Strong Man
ana Potion
Signet Ring, Scrolls, Wax for Seals
cryptomancer
common name Evoness Guthrex
true name (Abandoned Very Young, Doesn’t Know)
sex, age, race Unspecified, 31, Elf
the party
wits resolve
take cover resist
vs miss
ssile vs magic
6 8
3 3 3 5
Knowledge Cunning Presence Willpower
alchemy deception beast ken mana points
craft scrounge charm
medicine tracking menace
query traps performance
appearance qualities
build Lithe
speed power
dodge parry
eyes Long eyelashes, brooding vs melee vs melee
tends to Look for an angle escape artistry precise melee thrown missile
used to Live with a human family stealth sleight of hand unarmed melee
Shard Wa
Warp (5 MP,
P, Unopposed of varying
Human Make (s
sl
leeveless, made of woo
ool), Di
Distracting
difficulty, warp through shards).
qualities Feature (Large wooden medallion), Awkward Fit (tight
and baggy in alterna
nating places).
equipment,
t, consumables, and loot
Clock, Torch, Str
trong He
Healing Pot
otion, Strong Man
ana Potion
Abacus, Carving Knife
cryptomancer