Version 0.2 - 2017-06-23
This is an adaptation of Cryptomancy, from Cryptomancer RPG by Chad Walker, for Fate Accelerated Edition by Evil Hat. Although this refers in some points to Masters of Umdaar, a World of Adventure for Fate Accelerated by Dave Joria, the rules are generic enough to be used in any Fate Core or Accelerated based setting with little to nothing adaptation. All the moral rights were respected here.
This is part of Mozilla Cryptomancer Challenge.
- 0.2: Correcting some formatting to be more Cryptomancer like. Giving some extra options for Cryptolocks based on the upcoming Fate Adversary Toolkit
- 0.1: The first “usable” adaptation - small fluffy, no setting (beside some tangent talk with Dave Joria’s Masters of Umdaar) and no playtest done, some of the rules and fluffy from Cryptomancer left behind. Bare metal to go Rock’n’roll. KILL THE MASTERS! HACK THE THINGS!
Permissions and Costs
- Permission: None
- Cost: Stunt (indicating the posse of a Shard)
The Shards are special mystical crystals from the Demiurge Age (or before), that can be used to send echoes, messages to a Shardnet. There’s no need to roll to send an echo: just take an action (or even a free action) to just think about the message while holding the shard.
So, to send an message to another person, one needs to have a shard from the same crystal the other have, so he can echo his message into his private shardnet. The echo stays into the shardnet by a time based on the number of shards that make them, in hours. For example, in a shardnet made of 6 shards, an echo stays on the shardnet by 6 hours, fading away after that.
Also, the most recent echoes resonates more powerful into the shardnet than the older ones, so sometimes try to read an older echo could be burdensome, needing some roll to find his total content (although just know that there’s an echo needs no check). This is useful as a way to find if an information is useful or not, or to find if someone echoed something and then echoed some corrections on his information from the older echoes.
There’s no way to avoid someone to see shards not intended to him, except using the Cryptomancy techniques: cleartext echoes are public inside an specific shardnet, made from shards from the same crystal. There’s some special magical procedures to hide and cypher the echoes, beside other things, called Cryptomancy.
Permissions and Costs
- Permission: Aspect indicating the knowledge on Cryptomancy
- Cost: Stunts (for the Cryptomancy Magics)
Using a Keyphrase to send an echo into a shardnet (either private or Shardspace), is considered a Clever Create Advantage Roll against Fair (+2) difficulty. In Failure, the echo was sent as cleartext and/or there’s a chance the sender sent the Keyphrase. In a Tie, the echo was sent as cyphertext, however there’s a chance the sender accidently sent the Keyphrase for the echo with it (GM discretion).
Those who knows the Keyphrase will automatically receive the echo as cleartext: the mystical decrypting process is automatic as long the target knows the keyphrase. Anyone that looks for an encrypted echo into a shardnet but doesn’t know the keyphrase will only see gobleedegook. However, as this keyphrase method is simmetric, those who use it need to secure the shardnet by other was, as people that knows the keyphrase can either send or receive any message encrypted with the keyphrase.
Using Brute Force to discover the Keyphrase has a difficult based on (a) the number of words in the keyphrase and (b) the size and how common it is in idioms. Foreigner words can offer +1 on the difficult to brute force the keyphrase. The roll is done by Clever (or Careful) using the difficult based on the Keyphrase (normally Fair (+2)). A Failure could result either in still having gibberish or on the original user being alerted on the compromise of that Keyphrase. However, in a Success, the character discover the keyphrase and so can decrypt the echo.
True Name and Soul Key
Every living thing has a True Name, a special and unique name that was given someway (normally by their parents) to him. And with him there’s a Soul Key a mystical word, so powerful that freezes time. The Soul Key can’t be passed through voice: even someone could say another’s Soul Key (which is almost impossible), this would be not effective for any cryptomancy reason.
Anyone that knows someone’s True Name can encrypt an echo that will be decrypt just by the Soul Key of that person. Also, someone can “authenticate” an echo by sending a message encrypted using his Soul Key, so someone that knows his True Name could see this message as sent by the person.
To use this, the sender needs to know the True Name of the receiver (as an Aspect) and use a Clever Create Advantage, as in the Keyphrase. However, in case of failure, there’s no way to either reveal the receiver’s True Name or Soul Key, just the message was sent as Cleartext.
An important thing: if someone dies, his True Name became a simple Keyphrase. This is important because, if someone kills other person and knows his True Name, there’s some ways for him to pass on it, and, as the True Name is now a common Keyphrase, he could decrypt echoes sent encrypted with it. This will be important in the future.
- Denier: By using some Cryptomancy techniques, there’s a way to bring down for some time a private shardnet. The character rolls his Powerful against a difficult based on the size of the shardnet and if there’s some kind of protections, from Fair (+2) for shardnet with less than or 6 shards from even Fantastic (+6) for shardnets with 20+ shards, as an Attack action. If successful, No new shards can be created for some turns (at most, the end of the scene). This don’t avoid people to look for echoes that were in the shardnet before the Denier
- Tracer: Using his Cryptomancy techniques, a Tracer can track down where all the shards in the private shardnet is phisically. The characters needs to roll his Careful against the size of the shardnet (as in the Denier) as an Overcome action. A Tie can result in general locations, while a success shows where each one is. A Success With Style can result into a Precise location Aspect
- Shard Scry: Using this magic, a cryptomancer can see everything that is happening where there’s other shards from the shardnet, as the shards were security cameras. This is considered a Create Advantage being Clever action, against a difficult based on the Shardnet size. A Tie gives a Scry boost that can be used only in shards that sent recently echoes that the user could understand (either cleartext or using keyphrases or True Names the user knows). With a Success, he can see everything in any shard that recently echoed anything, even the character being unable to decrypt. A Success with Style allows the user to see everywhere, even on those places whose shards had not sent any live echo recently. Lasts by one scene or until disarmed by the cryptomancer
- Shard Spike: a offensive tracking technique, is based on the cryptomancer lace the magic into an echo that will be encrypted and sent in the shardnet. When someone decrypt it, the Spike explodes, and the Cryptomancer knows it. This is a Create Advantage action being Sneaky, the difficult based on the Shardnet. A Tie allow the cryptomancer to knows the Spike was triggered. A Success geolocate the victim (as by Tracer). A Success with Style will also deal a 2-stress damage straight the victim’s Consequences, because of the Brain frying effect of the magic. Last until the spike is triggered or defused by the cryptomancer, and the cryptomancer can have only one spike active.
In the ancient past, even before the Demiurge time, a massive shard crystal was found in a big mountain. The Demiurge documents founds says that this crystal crashed in Umdaar ages before the Demiurge ascension, and the Gods themselves sent it to Umdaar. Some says that those who touched this crystal found knowledge beyond the wildest dreams from the humans or any race. Some, however, says that those who tried to touch it straight had gone totally, utterly bonkers, babbling about the future, the past, the stars and utterly having their mind shattered, crashed by the sheer, massive, quantities of knowledge they needed to process all those.
However, some discovered how to safely lapidate the crystal, taking some big shards to cities and, using this, they could create the Shardscape, a kind of public network where everyone could search for information.
However, there’s some problems on the Shardscape.
First of all, the shards from Shardscape are really big, too much to be practical for common use, the smallest ones at the size of a melon. So, very difficult to be transported.
Second, the Sheer volume of information on it turns very difficult to use it as communication network. The one who tries to find things into the Shardscape needs to really focus himself into the action, to “search” for the echoes that they wants.
Third, unlike the private shardnets, in the Shardscape there’s almnost no echo fading, echoes getting into the Shardscape for months. This is important because:
- There’s no way to remove an echo from the Shardscape, so there’s some problemns with fake information and so on;
- Echoes encrypted with True Name can be read for other people, as soon the True Name owner is dead: this because the True Name then turns itself into a common Keyphrase, so everyone who knew it can decrypt any echo still on the True Name;
Fourth, if you want to send a message to a specific person, you’ll need to make it clear somewhat that the message is for her specifically. Some techniques for this:
- Using Cryptomancy, either by arranging a common Keyphrase or by know her True Name
- Just send as cleartext and using his common name, as it’s a common practice for those who use the Shardscape search for their own common name to find information about him;
- Using some initial information that put on focus on the message, like “Looking for bodyguards at the Fartime Elysium”, so everyone that is looking for a job as bodyguard and uses the Shardscape could find this echo easily. This can be used as a way to stabilish social networks inside the Shardscape: the Fartime Monastery Monks are knows by using this, confident into the Elysium tradition of non-violence as a way to propagate echoes with information and requests otherwise impossible to be done. Some of the Masters, however, are accomplished on use this technique to bring innocent people under their grasp.
And another problem, no Cryptomancy spell (like Denier, Tracer, Shard Spike and so) don’t work in the Shardscape
Querying the Shardscape
For searching for some information in the Shardscape, the character needs to be totally concentrated on the action of querying the Shardscape and roll against a Fair (+2) difficult, until otherwise said, even if he was expecting echoes encrypted with Keyphrases or True Name cryptomancy: the sheer volume of information in the Shardscape is enough to make things burdensome. The GM can increase the difficult based on time and specifics, or can decrese it if he was trying some generic information (like, discovering if there’s some job from a group he knows).
A Tie should be treated as an Success, but maybe he can take some Irrelevant Information with the desired echo. In case of Failure, a character can suffer a Too Much Information!!! Aspect (or similar), representing the amount of echoes he somewhat bring with the one he needed, as a Cost for the Success. A Sucess with Style can bring some Extra Information useful for the characters.
A Private Shardnet is a good thing, but sometimes the use of private shardnets are limited by the small number of shards oft the same shard crystal, and so in the same shardnet. But using the Shardscape has the drawbacks on the privacy and limitations because of the sheer volume of echoes on it.
But there’s a way to use more than a shardnet for communication, and it is by bridging the communication between two shardnets by holding shards of each shardnet on each hand, so the echoes from both shardnet resonates in both. The one who works as bridge can listen all the echoes on it (as long he could do it normally, like by knowing the keyphrases involved), but can’t echo himself any message. Also, this would be apply only for new echoes: old echoes don’t replicate into the shardnets.
The new echoes into group of bridged shardnets stays on them as the bridged shardnets where only one: so, in two bridged shardnets with 4 shards each, the echoes resonates for 8 hours. So, a way to discover if there’s any bridge in a shardnet that should not be bridged is by how much the echo stays on it.
You can expand even more the bridge, by putting a “broker” shardnet that surrogates the echoes between two shardnets that otherwise could not be bridged (by any reason). The resonation time is calculated the same way, by summing all the shards in the shardnets in hours. Normally, when someone wants to send an echo to other people using a third shardnet as bridge, by travesing it, uses True Name to warrant the message arrive to the sender and only for them.
This can be used agrresively, by offer access to a shardnet for people that should not, and as long no echoes are send, it difficult to detect the bridge. It can be done even by bridging the shardnet to the Shardspace, by touching a Shardscape shard while holding a private shardnet. Or people could send echoes and echoes, so creating so much noise in the private shardnet that the communication could be impractical for hours!
A Cryptoadmin is someone that act as a facilitator on bridging shardnets, and as a registrar of all communications that passed by him, with informations on who created an echo (if possible), the content and keyphrases used (if possible). They also know the authorized users and their passphrases they use to prove their identities and to access their services, all of them registered into a registry.
A Cryptoadmin can enforce security policies, by forcing people to exchange periodically their Keyphrases, scolding or kicking users that uses cleartext in the shardnet, query the Shardscape on the users’ behalf if needed, and using challenge questions to detect if the shardnet was somehow compromised.
As they can take information from a shardnet and repass them to another, they can work as information broker for some groups: some of the Masters uses henchmen as Cryptoadmins, so they could insolate themselves and send information to and from troop via a broker. Because of this, their homes, cryptovaults, tends to be heavily fortified and/or in a inaccesible place. Considering the registry, this is also very important.
When they bridge two shardnets, is common protocol the Cryptoadmin to create and send into each shardnet a keyphrase that they could use for secure communication, so if there was a illegal bridge after the bridge being stabilished the communications could be still secure.
Created by the Demiurges or some people before, they are artificial constructs that, when he first activates, create a True Name and tell to a cryptoadmin. Since them he use his multiple squid like limbs to bridge shardnets, while one of them register the operations into a registry. In a very simple understanding, the Golems are a kinds of automated cryptoadmin, fasters and more capable than common cryptoadmins. So, a Golem has lots of shards near himself, and sometimes even a Shardscape shard.
The main problem is that Golems are expensive, needs a constant power source (like a waterwell or steam), and a cryptoadmin needs to be there to make maintenances on it. Also, a Golem is somewhat vulnerable physically, so they should be put into cryptovaults.
To use a Golem to send an echo to another shardnet he could, the sender should first send a message to the Golem encrypted with his True Name, and them the message, encrypted by any keyphrase or True Name that he wants. Then the Golem will send the echo through all the shardnets he can, including if needed the Shardscape.
Also, he can listen for echoes that are encrypted with his True Name from all shardnets he’s connected, including the Shardscape: if someone in the Shardscape wants to send something to the shardnets connected to that Golem, he can do this by sending a message to it encripted with his True Name, the message being encrypted with any keyphrase or True Name he wanted.
Someone that knows the True Name of a Golem can use it to listen for some specifics keyphrases, by sending them to the Golem using a message encrypted with its True Name. Every echo in the shardnets that the Golem can access, including the Shardscape, are sent for the shardnet that send the message. This could be a problem, as someone could try to take down the shardnet and even the Golem by sending lots and lots of messages and mae the Golem goes down being unable to traverse all the messages to the shardnet, or to create so much noise the target shardnet could not be usable.
Many shardnets, specially those that have cryptoadmins and/or Golems on it, can use some Authentication to use it, so the cryptoadmin/Golem could verify if the user is who they say they are and, by this, registry and somehow grant or forbid access to some shardnets or keyphrases he can listen or echo on it. Normally, the authentication on a shardnet secured this way is done by sending his name and a presetted passphrase, encrypting this message by the same combination of name and passphrase as keyphrase. When he authenticates, the cryptoadmin confirms if he’s an authorized user and grants the access for the resources he can use. Sometimes, in some shardnets that has some secured parts, some kind of Banners (we’ll see more about this later) can be set by Cryptoadmins, so new users (or lazy ones) can be remembered on the procedures to authenticate into the shardnet.
An even more complex and secure authentication is the True Authentication, that is based on True Name: when touching the secure shard, the used send his common name. The cryptoadmin/Golem encrypt a keyphrase with the True Name of the user (that he gave to them before). As only the Soul Key that matches that True Name (the user’s) can receive the message, only him could receive the keyphrase. After that, the user uses the keyphrase to ask for access to shardnet resources.
When the authentication potential of Cryptomancy was shown, some people started to develop cryptogears, mechanical devices that respond to operations based on cryptomancy authentication. The simpler one is the cryptolock, a lock with a shard imbedded on it that responds only when touched by the user, that them send a message with the passphrase encrypt with the passphrase (this is done to avoid the risk of someone just take an unused shard and listen to the passphrase as cleartext).
To change a cryptolock passphrase, you just need to send an echo with the new passphrase encrypted by the old one. If the cryptolock shard is removed, he can either get into a default state (like a door that should stay shut) or engage a security protocol (like start to make gas gone into the place).
There’s some more complex cryptogears, like those who would rotate a chamber accordingly with the passphrase used. Constructing and repairing cryptogears (including changing the shard) are Challenges. Specially when repairing, while repairing, the cryptolock goes either in the default state or in the security protocol.
Some of the most complex or secure cryptogears can have their shards hidden somewhere, only a remotely placed “command shard” being used for issuing commands.
In Fate Rules, you can treat cryptogears as Extras, and cryptolocks as Aspects on it. If you have access to the Fate Adversary Toolkit, Cryptolocks can be treated as a Distraction, Countdowns and Hazards, like the sample below:
Distraction: A common Cryptolock
- Choice: How the character will open the Cryptolock?
- Opposition: Fair (+2)
- Repercussion (using the correct Keyphrase to activate it:) The cryptolock will open correctly
- Repercussion (trying to remove/change the Cryptolock shard:) The cryptolock engage into a default state or security protocol
- Hazard: Fair (+2) Knockout Gas Security Protocol Weapon: 3
There’s some cryptomantic spells that can be used in “real life”, to somewhat encrypt parts of reality or make some of the reality works with the shardnets. Some of them have limitations, the main one being that no cryptomantic spell works against the Shardscape: it’s impossible to use the Shardspace as a Shard Scry or to Trace someone via Shardscape. Also, it’s impossible to do this by traversing shardnets, althought those directly bridged by real people (not by Golems) can be target of cryptomantic spells.
Below we list some of the more common cryptomantic spells that works into real life. Each one is treated as a Stunt, with an Cryptomancer Aspect as a Permission, with the optional rule for the GM to treat them as small artifacts: the user needs to pay 1 FP to be able to use them for an adventure, and they need to find someone the give them some kind of parchment or otherwise give them a copy of the spell.
- Babel: This magic can turn the voice of a target into a great babble for anyone that doesn’t know an specific keyphrase, the Caster’s Soul Key or a True Name that’s not his own. It’s considered an Create Advantage action and the difficult is the Careful (or Powerful) of the target (that can be the caster itself). In case of Failure, the caster itself is put under the Babel magic. The spell last until the caster revokes the spell, dies, or when too much people knows the keyphrase. During the effect of the spell, the target is under a Incompreensive gobbledygook Aspect for everyone except the ones that know the keyphrase.
- Dissemble: By touching the target face, the caster can turn the target face into an unrecognizable shifting mess for everyone that doesn’t know an specific keyphrase, the Caster’s Soul Key or a True Name that’s not his own. It’s considered an Create Advantage action and the difficult is the Careful (or Powerful) of the target (that can be the caster itself). In case of Failure, the caster itself is put under the Dissemble magic. The spell last until the caster revokes the spell, dies, or when too much people knows the keyphrase. During the effect of the spell, the target is under a Unrecognizable shifting mess Aspect for everyone except the ones that know the keyphrase, his face and any distinguishible features turned into anything that could not be recognized by anyone except those who knows the keyphrase.
- Messenger: By using this, the caster can invoke a magical creature that can deliver small objects for someone who he knows his True Name. This creature will do anything he can to deliver his cargo for the person, and he’ll always who is the one he need to deliver the cargo (because of the True Name). He can be really fast and is Almost undetectable, and they would not try to defend themselves if detected. It’s a Creat Advantage action being clever with a Fair (+2) difficult to create the Messenger, with the result being the difficult of any roll to detect it.
- Share Sight: With this spell, the character can share what he’s seeing with a target. The character rolls his Clever agains target’s Powerful. If the target is a voluntary one, the roll is against Mediocre (+0). This is considered a Create Advantage action, but in case of Failure, False visions can be sent for a voluntary target and for an involuntary target some tactical advantage can be provided.
- Maze: by using a Keyphrase, the caster can transform a door, portal or entrance of any kind into a vertigo-inducing puzzle for anyone that doesn’t know the keyphrase, the Caster’s Soul Key or a True Name that’s not his own. This is a Create Advantage being Clever (or Sneaky) roll against Fair (+2) difficult. The GM can raise the difficult by the size of the object. The spell last until the caster revokes the spell, dies, or when too much people knows the keyphrase. Closing the eyes doesn’t work to try to cross a Maze enchanted entrance, but people can be led through the a Maze for someone that knows the keyphrase.
- Name Wraith: (Permission: at least two other Cryptomancy Spells) By using a target’s True Name, the caster can invoke a shadowy spirit that will torment him to do whatever the Caster wants. Every night, the spirit get to the caster to see if there’s new orders. This is a Create Advantage roll using any specific Approach against target’s Powerful. The compulsions will be based on the Approach used: a Clever roll can maje the target do something that could be beneficial for the caster, but that could not necessarily put the target into risk (like “I need to spy the Master’s cargos”), while a _Powerful or Flashy roll could make the target takes unnecessary risks or fight their allies. The compulsion is put under the target as an Aspect. The spell last until the caster revokes the spell, dies, or when too much people knows the keyphrase. Every night, the caster can exchange the compulsion with another roll, with a +1 as the target is already enchanted. However, in a Failure the Name Wraith is dispelt and the target can grow conscious that he was under a Name Wraith. A Failure in the first cast can result in the Name Wraith offering the caster True Name and the target collude with it to torment or deceive the caster.
- Shard Warp: (Permission: at least two other Cryptomancy Spells) By focusing into a recently sent echo into a shard that the caster can Decrypt or that is a clear-text, the caster can teleport himself (and nothing else) through the shardnet to the place where the shard that sent the echo is. This is an Overcome roll being Clever (or Sneaky), the difficult based on the Shardnet size, as per the Denier magic. In a Tie the character arrives into the place he wants to but receive a 2-stress damage, although not straight in the Consequences. With a Success with Style, the caster can see the place before arrive and chose exactly the place and position he wants to arrive. In a Failure, the caster can turn into a bodiless consciousness into the shardnet, arrive somewhere else, or suffer a Moderate Consequence by lefting behind some of his limbs or forgetting something very important. Also he can send his plans as a cleartext into the shardnet and so on.