Unlicensed: The Relay Program | DataPath
Technical License I: DataFlow Analyzer
Technical License II: DataFlow Disruptor | DataFlow Splicer
Technical License III: DataFlow Decrypter | DataFlow Encrypter | DataFlow Terminator
DataFlow devices are all the devices that are used to interact with data being sent across a relay.
Under-Licensed Use. If you attempt to use any DataFlow devices that you do not have the license for, your inexperience makes it difficult. You are unable to use any DataFlow devices that you do not have the licence for.
The Relay Program
A relay is a program that allows a device to create and manage Dataflows (one-to-one communication channels) between itself and other devices. It is a small program chip that has the relay program built into it. The relay program must be inserted into a device with adequate program ports.
Once installed, the device that hosts the relay program becomes the relay hub. You can form or terminate data connections between devices and the hub device as an action. However the target device and the hub device must be within 30 feet of each other.
A relay can connect to a number of devices equal to the number of channels it can simultaneously host. If a relay attempts to connect to a device beyond the number of channels it has available, the new connection fails.
By default, all devices have innate security to prevent unwanted connections. A DC 20 Hacking roll is required to bypass this encryption which is made when you attempt to form the connection. All devices come with a password that will automatically bypass this encryption that can be set and changed by the owner. Unless stated otherwise in a device’s description, it is assumed the device holds this security system.
After a relay is formed between the targeted device and the hub device, the devices become connected through an invisible string of magic known as a DataFlow. This string will stretch and grow as the hub and the relayed device are moved apart, however the DataFlow can only be extended up to 1 astral mile away before the DataFlow breaks and ends the connection. A DataFlow can penetrate 1 foot of stone, 1 inch of common metal, or up to 3 feet of wood or dirt. Thicker substances block the DataFlow, as does a thin sheet of lead. However, the dataflow will attempt to move around objects to find a path through (such as going through a wooden door or a glass window to bypass a thick stone wall).
When a device is connected by a DataFlow to a hub device, it is able to send data to the hub, as well as receive data sent by the hub. This enables remote control of devices through directly interfacing with the hub device. However the strength of a relay is in its ability to set up conditional switches to automate functions between all devices that the hub device is relayed into.
Some basic examples of relay channels are:
Remote Detonation & Sensors. Once the hub device receives a positive data signal from a sensor that was relayed into it, it will automatically pass that along to a charge that it is also relayed into, causing it to detonate.
Ioun Screen/Speaker & Bugs. Once the hub device receives a data stream from a bug that was relayed into it, it will automatically pass that along to a ioun screen or other device that it is also relayed into, allowing the device to display the bugs feed.
|Atrox Home 1||¢ 20||3|
|Atrox Home Plus 1||¢ 35||5|
|Atrox Security 1, 2||¢ 1,205||15|
|Otova Private 3||¢ 65||2|
|Otova Agent 3||¢ 300||7|
|Scypher Business||¢ 575||30|
|Scypher Enterprise||¢ 1,920||100|
|Scypher Unbound||¢ 19,990||1,000|
|Zumios Basic||¢ 125||5|
|Zumios Pro||¢ 260||10|
Unlicensed DataFlow Devices
Scrypher DataPath. A datapath is a long insulated cable. On each end of the cable is a connector that is a soft, flat pad that can be attached to a device. When two devices are connected by a DataPath they send and receive data between the two devices. Unlike a DataFlow, only devices built with the receiving pad can use DataPaths. Similarly, there is no way to set up conditional switches, or manually manipulate the data unless the connected devices are built to work with a DataPath.
DataPaths are largely obsolete, and have been replaced with DataFlows. However, some devices or security systems utilize them since the connection is highly secure and must be physically intercepted. Scrypher is the only company that still sells DataPaths for these niche industries. A DataPath costs 10 credits plus 5 credits per foot of cable. The cable weights 1 pound for every 5 feet of cable. After 50 feet of cable, a DataPath booster must be connected to maintain data integrity, else the data is corrupted. A booster costs 40 credits.
Technical License I DataFlow Devices
Scrypher DataFlow Analyzer. A DataFlow analyzer is a device that can detect any DataFlows in its immediate vicinity and can learn information about the nature of the DataFlow. It is a brief-case sized box with a handle that is connected to a detection wand through a 3-foot long wire. The detection wand requires one free hand to use. This device costs 250 credits, weighs 4 lbs, and requires a large battery to use. When used it drains 3 cells of energy from its battery and detects all DataFlows within a 15 foot cone of where you point the detection wand, even if an endpoint is not visible. For each non-encrypted DataFlow detected the analyzer will return the following information:
- The total length of the DataFlow
- The uptime of the DataFlow
- Any public comments that are present in the DataFlow
A DataFlow analyzer’s detection can penetrate 1 foot of stone, 1 inch of common metal, or up to 3 feet of wood or dirt. Thicker substances block the analyzer, as does a thin sheet of lead.
Technical License II DataFlow
Scrypher DataFlow Disruptor. A DataFlow disrupter is a device that can scramble a DataFlow, similar to if the DataFlow ran into interference naturally. When a DataFlow becomes scrambled by the DataFlow disruptor, the data is unusable with experiential data becoming static and other types of data returning an error. The affected DataFlow however maintains its length and integrity, returning back to normal once the disruption is resolved. The device is about the size of a handheld and weighs 1 lb. It costs 400 credits.
In order to use a DataFlow disrupter, it must be connected through a DataPath to a DataFlow analyzer that has already spliced into a DataFlow. Once that condition is met, you can spend 1 minute and make a DC 15 Hacking roll to successfully splice the DataFlow. The result of this Hacking roll becomes the disruption level of the DataFlow that another creature must overcome to return the dataflow to normal. Regardless of success or failure, this attempt drains 4 cells of energy from the analyzer’s battery.
The dataflow will remain disrupted until the disruptor is in longer connected to the analyzer, or the splice is terminated. In addition, any data you send along the DataFlow continues to be transmitted, and can replace the static or errors to simulate a functional DataFlow.
Scrypher DataFlow Splicer. A DataFlow splicer is a device that can be used to intercept or connect directly into a DataFlow. The device is the size of a handheld and weights 1lb. It costs 300 credits. To function, it must be connected to a DataFlow analyzer by a DataPath.
After you have connected a splicer to an analyzer, you must spend 1 minute and make a DC 15 Networking roll to successfully splice the DataFlow. Regardless of success or failure, this attempt drains 2 cells of energy from the analyzer’s battery. Any data sent along a DataFlow that has been spliced will be displayed on the DataFlow analyzer.
You are able to send data into any DataFlow you have spliced into. To do this, you must relay data from another device to the analyzer, or have a terminal transmit the data through a DataPath into the analyzer. This new data will appear alongside the original data on the DataFlow. Data sent this way is not detectable as coming from a splicer.
When spliced into an encrypted dataflow, the data being transmitted across it is unreadable and you are unable to upload anything into it, this includes disrupting or terminating the dataflow as long as the encryption remains in place.
Technical License III DataFlow
Scrypher DataFlow Decrypter. A DataFlow Decrypter is a device that can be used to decrypt a DataFlow. Successful decryption makes an encrypted dataflow readable to interceptors or splicers. The device is about the size of a handheld and weighs 1 lbs. It costs 1,400 credits and requires one hand to operate.
In order to use a DataFlow Decrypter it must be connected through a DataPath to a DataFlow analyzer that has already spliced into a DataFlow. Once that condition is met, you must drain 4 cells of energy from the analyzer’s battery and take 15 minutes to attack the encryption by making a Hacking roll to decrypt the DataFlow. The DC for this roll is equal to the encryption’s level, determined when the encryption was made.
Scrypher DataFlow Encrypter. A DataFlow Encrypter is a device that can be used to encrypt an already existing DataFlow. Encrypted dataflows are unreadable by interceptors or splicers without the proper decryption. The device is about the size of a handheld and weighs 1 lb. It costs 1,200 credits and requires one hand to operate.
In order to use a DataFlow Encrypter it must be connected through a DataPath to a DataFlow analyzer that has already spliced into a DataFlow. Once that condition is met, you must drain 4 cells of energy from the analyzer’s battery and take 15 minutes to build an encryption protocol by making a Database roll to encrypt the DataFlow. The result of this roll becomes the encryption level of the DataFlow that must be overcome to decrypt your encryption. The two connected devices are able to read the data as normal despite this encryption. You can not re-encrypt any DataFlow you have encrypted until it has been decrypted. The encryption remains in place, even when the splice is terminated.
Scrypher DataFlow Terminator. A DataFlow Terminator is a device that can be used to remove a dataflow as a third party. The device is about the size of a handheld and weighs 1 lb. It costs 1,750 credits and requires one hand to operate.
In order to use a DataFlow Terminator it must be connected through a DataPath to a DataFlow analyzer that has already spliced into a DataFlow. Once that condition is met, you must drain 4 cells of energy from the analyzer’s battery and take 1 minute to assault the dataflow. Doing this removes the DataFlow entirely, disconnecting all devices that are connected through it.