Eclipse Phase (4th printing).pdf

(39162 KB) Pobierz
The Roleplaying Game of Transhuman Conspiracy and Horror
Your mind is software.
Your body is a shell.
Death is a disease.
Extinction is approaching.
Program it.
Change it.
Cure it.
Fight it.
PROGRAM.
CHANGE.
CURE.
Origins Award: Best Roleplaying Game • ENnie Award: Best Writing (Gold), Best Cover, Best Product (Silver)
FIGHT.
Eclipse Phase
created by
Posthuman Studios
Eclipse Phase is a trademark of Posthuman Studios LLC. Some content licensed under a Creative Commons License (BY-NC-SA); Some Rights Reserved. © 2009–2014
PROGRAM.
CHANGE.
CURE.
FIGHT.
STARTING OUT
LACK
ENTER
THE SINGULARITY …
What Is A Roleplaying Game?
What is Transhumanism?
Post-apocalyptic, Conspiracy, and
Horror Themes
But How Do You Actually Play?
What Do Players Do?
Where Does It Take Place?
Ego vs. Morph
Where To Go From Here?
6
16
18
18
18
19
20
22
24
24
24
FACTIONS
The Hypercorps
Psiclone
War Crimes
Union Busting
Political Blocs
Inner System Politics
Autonomist Alliance
Call for Solidarity
Socio-Political Movements
Neo-Primitivists
Out’sters
Sybils
Religious Groups
Criminal Factions
Firewall
Project Ozma
70
70
70
71
72
74
75
76
77
79
80
80
81
82
83
84
85
THINGS CHARACTERS USE
Identity
Social Networks
Cred
Rep
Gear
Implants
Psi
Game Rules Summary
124
124
124
125
125
125
126
126
127
CHARACTER CREATION AND
ADVANCEMENT
128
CHARACTER GENERATION
Character Concept
Choose Background
Choose Faction
Spend Free Points
Spend Customization Points
Purchase Gear
Choose Motivations
Final Touches
Example Motivations
130
TERMINOLOGY
Welcome to Firewall
What You Really Need to Know
25
28
29
A TIME OF ECLIPSE
A PEOPLE’S HISTORY OF AN
UNFORTUNATE UNIVERSE
Eclipse Phase Timeline
30
32
37
SYSTEM GAZETEER
Sol (The Sun)
A Quick Primer On
Transhuman Habitats
Solar System Map
Vulcanoids
Mercury
Venus
Earth
Venusian Rumors
Luna
TILION’s Jupiter Brain
Mars
Martian Manhunt
Martian Trojans
Asteroid Belt
Jupiter
Europa
Ganymede and Callisto
The Trojans (Jovian Trojan
and Greek Asteroids)
Saturn
Gate Expedition Report 901127
Titan
Uranus
Neptune
The Edge of the System
Extrasolar Systems
Analysis: Myst Trees
86
86
86
87
88
88
89
90
90
91
92
93
95
96
96
97
99
99
100
102
102
106
107
108
109
109
111
130
131
132
134
135
137
138
138
138
THE SOLAR SYSTEM
AFTER THE FALL
TRANSHUMANITY
Inequality
Clades and Separation
First Contact: The Factors
STARTING MORPHS
Biomorphs
Pods
Synthetic Morphs
Infomorphs
139
139
142
143
145
38
38
38
39
40
TRAITS
Positive Traits
Negative Traits
145
145
148
CULTURE AND SOCIETY
The Longing For Earth
Nostalgia Jewelry
Fear and Paranoia
An Exsurgent Threat?
Real and Social Distance
The Rise of Cultural Regions
Cultural Experimentation
Gender, Sexuality, and Relationships
The Diversity of Habitats
41
41
41
42
42
43
44
44
45
45
CHARACTER ADVANCEMENT
Changing Motivation
Switching Morphs
Improving Aptitudes
Improving Skills
Specializations
Improving Moxie
Gaining/Losing Traits
Improving Rep
Making Credit
Improving Psi
152
152
152
152
152
153
153
153
153
153
153
SYNOPSIS
TECHNOLOGY
Living With Infotech
Opening Pandora’s Gate
Going Beyond the Known
Muses
Attitudes Toward AGIs
Attitudes Towards Mental Alterations
Travel
Privacy
Low-Tech Existence
Life, Death, and Morphs
Entertainment and Media
Lost Lore
Metacelebrities
Popular Types of Entertainment
46
46
46
47
47
48
48
48
49
50
50
51
51
52
52
WELCOME TO FIREWALL
A TIME OF ECLIPSE
GAME MECHANICS
CHARACTER CREATION
SAMPLE CHARACTERS
SKILLS
ACTIONS AND COMBAT
MIND HACKS
THE MESH
ACCELERATED FUTURE
GEAR
RUNNING THE GAME
REFERENCE
SAMPLE CHARACTERS
SKILLS
SKILLS OVERVIEW
Core Skills: Aptitudes
Learned Skills
Specializations
154
170
172
172
172
173
GAME MECHANICS
POLITICS AND POWER
The Inner System
The Outer System
55
55
57
KEEPING THE PEACE
Law Enforcement
Punishment
58
59
60
The Ultimate Rule
Dice
A Note on Terminology and Gender
Making Tests
Target Numbers
When to Make Tests
Difficulty and Modifiers
Criticals: Rolling Doubles
Defaulting: Untrained Skill Use
Simplifying Modifiers
Narrative Modifiers
Teamwork
Success Tests
Opposed Tests
112
114
114
114
115
115
115
115
116
116
116
116
117
117
119
USING SKILLS
Defaulting
Complementary Skills
Skill Ranges
173
173
173
174
APTITUDES
Aptitude-Only Tests
Aptitude Comparison:
Flats vs. Splicers and Exalts
174
174
174
COMPLETE SKILL LIST
Academics: [Field]
Animal Handling
Art: [Field]
Beam Weapons
Blades
Climbing
Clubs
Control
Deception
Demolitions
Disguise
Exotic Melee Weapon: [Field]
Exotic Ranged Weapon: [Field]
Flight
Fray
Free Fall
176
176
177
177
177
177
177
178
178
178
178
178
178
178
178
178
179
THE ECONOMY
The Old Economy
The Transitional Economy
The New Economy
Restricting Dangerous Technologies
Irreproducible Goods
61
61
62
62
63
64
TYPES OF TESTS
TIME AND ACTIONS
Action Turns
Types of Actions
117
119
119
119
HABITATS
Planetary Settlements
Space Habitats
A Diversity of Floating Worlds
The Largest Habitats
Microgravity Habitats
Private Habitats
66
66
67
68
68
68
69
DEFINING YOUR CHARACTER
Concept
Motivations
Ego vs. Morph
Character Stats
Character Skills
Character Traits
Character Morph
120
120
120
121
121
122
123
123
2
Freerunning
Gunnery
Hardware: [Field]
Impersonation
Infiltration
Infosec
Interest: [Field]
Interfacing
Intimidation
Investigation
Kinesics
Kinetic Weapons
Language: [Field]
Languages In
Eclipse Phase
Medicine: [Field]
Navigation
Networking: [Field]
Palming
Perception
Persuasion
Pilot: [Field]
Profession: [Field]
Programming
Protocol
Psi Assault
Psychosurgery
Research
Scrounging
Seeker Weapons
Sense
Spray Weapons
Swimming
Throwing Weapons
Unarmed Combat
179
179
179
180
180
180
180
180
180
180
181
181
181
181
182
182
182
182
182
183
183
183
183
183
184
184
184
184
184
184
184
184
184
185
Gravity
Grenades and Seekers
Hostile Environments
Improvised Weapons
Knockdown/Knockback
Melee and Thrown Damage Bonus
Multiple Targets
Objects and Structures
Range
Reach
Scatter
Shock Attacks
Subdual
Suppressive Fire
Surprise
Tactical Networks
Touch-only Attack
Two-Handed Weapons
Wielding Two or More Weapons
198
199
200
202
202
202
202
202
203
204
204
204
204
204
204
205
206
206
206
ISLANDS IN THE NET
Darkcasts
242
243
MESH ABUSES
Hackers
Malware
243
243
244
AI
s
AND INFOLIFE
AIs
Muses
AGIs
What Your Muse Can Do For You
Seed AI
Transhuman Infomorphs
Mesh Interface
Non-standard AIs and AGIs
Mesh ID
Accounts and Access Privileges
Mesh Gear Quality
Computer Capabilities
Software
Elite Exploits
Traffic Filters and Mist
Slaving Devices
Issuing Commands
Distance Lag
Accessing Multiple Devices
244
244
244
244
244
245
245
245
245
246
246
247
247
247
247
248
248
248
248
249
PHYSICAL HEALTH
Damage Points
Damage Types
Durability and Health
Damage Value
Wounds
Death
206
206
206
207
207
207
207
HEALING AND REPAIR
Biomorph Healing
Synthmorph and Object Repair
208
208
208
ONLINE RESEARCH
Search Challenges
Search Capabilities
Handling Searches
Real-Time Searches
Hidden Data
249
249
249
250
251
251
MENTAL HEALTH
Stress Points
Lucidity and Stress
Stress Value
Trauma
Derangements
Disorders
Stressful Situations
Willpower Stress Tests
Hardening
Mental Healing and Psychotherapy
209
209
209
209
209
210
211
214
214
214
215
SPECIAL SKILLS
185
SCANNING, TRACKING,
AND MONITORING
Wireless Scanning
Physical Tracking
Digital Activity Tracking
Sniffing
Privacy Mode
Anonymization
251
251
251
252
252
252
252
ACTION AND COMBAT
ACTION TURNS
187
188
188
188
188
188
Step 1: Roll Initiative
Step 2: Begin First Action Phase
Step 3: Declare and Resolve Actions
Step 4: Rotate and Repeat
PRIVACY AND ANONYMIZATION 252
MESH SECURITY
Authentication
Firewalls
Active Monitoring
Encryption
INITIATIVE
Initiative Order
Speed
Delayed Actions
188
189
189
189
MIND HACKS
PSI
The Nature of Psi
Æther Jabber: Asyncs
Using Psi
Psi-Chi Sleights
Psi-Gamma Sleights
216
218
218
219
221
223
226
253
253
253
253
253
ACTIONS
Automatic Actions
Quick Actions
Complex Actions
Task Actions
189
190
190
190
190
PSI
220
INTRUSION
Preconditions
Circumventing Authentication
Intrusion Tests
Intruder Status
Changing Status
Brute-Force Hacking
254
254
255
255
256
257
257
PSYCHOSURGERY
The Process of Psychosurgery
The Human Cognome Project
Psychosurgery Mechanics
Roleplaying Mind Edits
Psychosurgery Procedures
The Lost
229
229
229
230
231
231
233
MOVEMENT
Movement Rates
190
191
COMBAT
Resolving Combat
Combat Summary
191
191
193
INTRUSION
COUNTERMEASURES
Security Alerts
Passive Countermeasures
Active Countermeasures
Joint Hacking/Securing
257
ACTION AND COMBAT
COMPLICATIONS
Aimed Shots
Ammunition and Reloading
Area Effect Weapons
Armor
Asphyxiation
Beam Weapons
Blind Attacks
Bots, Synthmorphs, and Vehicles
Called Shots
Charging
Demolitions
Falling
Fire
Firing Modes and Rate of Fire
Full Defense
193
193
193
193
194
194
194
195
195
197
197
197
197
198
198
198
THE MESH
MESH CAPABILITIES
Meshing Technologies
Solarchive Search: Ecto(-Link)
Legacy of the TITANs
Information Overload
Augmented Reality
Information at your Fingertips
Æther Jabber
Virtual Reality
Experience Playback
234
236
237
237
237
238
239
239
240
240
241
SUBVERSION
Augmented Reality Illusions
Backdoors
Crashing Software
Eliminating Intrusion Traces
Hacking VPNs
Scripting
259
259
260
260
260
260
260
INTERFACING: AR, VR, AND XP 239
CYBERBRAIN HACKING
Entrapment
Memory Hacking
Puppeteering
Scorching
Shutdown
Terminate Cortical Stack Feed
261
261
261
261
261
262
262
MESH USES
Personal Area Networks
Virtual Private Networks
Social Networks
Mobile Offices
241
241
241
242
242
TABLE OF CONTENTS
3
257
257
258
258
Zgłoś jeśli naruszono regulamin