Back to the main page

Mailing List Logs for ShadowRN

From: "James E. Frazer" <jimmicane@**********.COM>
Subject: Re: Lone Star's Dirtiest Card
Date: Wed, 27 May 1998 12:08:22 -0700
>Keldon Mor wrote:
>
>> >Gear's a slightly different case. Weapons directly modify a Runner's
>> >Attack Value, so they're added in. Spells like Fireball, when used,
>> >replace the Runner's Attack Value, so if Ravage was a mage and had cast
>> >a powerbolt, you'd be adding the result to the Challenge. Gear like
>> >Drones and Spirits are considered separate from the Runner, however, and
>> >so wouldn't get added in.
>
>> I'd have to disagree as gear is only used if you want it to, you choose
>> the gear you are using before combat. Like if you had 2 ares predators, one
>> with explosive ammo and the other with apds, you would have to choose which
>> one you where using. You don't have to use any gear if you don't want to.
>
>It's pretty obvious when a mage has used a powerbolt -- the player has
>to roll a D6. If that's the case, then the powerbolt is active until
>the end of the combat. The Lone Star Undercover card pulls a quick
>switch -- the mage, whose owner decided to cast a powerbolt, is now
>fighting alongside the Challenge against the Runners. Sooner or later,
>the player has to decide what gear he's using (or make the tacit
>assumption fram an earlier Challenge that he's using a particular Gear)
>and, at that moment, the LSUC player strikes.
>
>Sucks, doesn't it?
>
Yep, it does, which is why it's a unique card. :)

Actually, I think you can use it before or after the gear is used. If not, a person with
invisibility would be able to trash a challenge before you can LSUC it, and I know this
isn't right. In the same way you can GAQ a runner before or after they use gear, I think
you can LSUC a runner before or after.




Free web-based email, Forever, From anywhere!
http://www.mailexcite.com

Disclaimer

These messages were posted a long time ago on a mailing list far, far away. The copyright to their contents probably lies with the original authors of the individual messages, but since they were published in an electronic forum that anyone could subscribe to, and the logs were available to subscribers and most likely non-subscribers as well, it's felt that re-publishing them here is a kind of public service.