The Hacker's Exploits | A Change of Pledge Manager
First of all, we hit our £75000 Manhattan 2185 sourcebook stretch goal just yesterday, and we're at £79000 already! How awesome is that?! You guys are the best cyberpunks a crew could ask for! We're well on our way to London 2185, so get your Longs ready to pay your entry fees!
If you didn't already know that we unlocked Manhattan 2185, then check out our update from yesterday, it's got some really awesome stuff in there! (psst, everyone gets Manhattan as a FREE PDF, but if you want a softcover, you'll have to add £20 to your pledge).
I know we said BackerKit, but it'll be PledgeManager
This will not affect you guys at all, if anything it'll make your post campaign experience EASIER, but we want to be completely transparent with you all.
Throughout the campaign, we've told people that we'll be using BackerKit after the campaign for people to manage their pledges, add-ons, shipping etc. This was true, but today we made the decision to follow in the footsteps of some of the greats in the industry and switch over to PledgeManager. PledgeManager was just a better fit for the project now that we've reached a certain amount of backers and units sold.
Again, this will not affect you guys at all, we just wanted to be clear!
Why you're all reading this: Hacker's Exploits
We've taken a more streamlined approach to Hacking than most cyberpunk tabletop rpgs. This again follows our design philosophy for Carbon 2185 and the Carbon RPG System we've developed from the D&D 5e OGL. This philosophy is this: Ease of Use, Simple & Streamlined, Familiarity, and Cinematic Feel.
Hacking for most is treated as a Skill with which you can be proficient. For general hacking the system works just like it does for lockpicking, or feats of acrobatics, you simply make a Skill Check against a relevant Difficulty Class (DC) as set by your GM or the campaign or adventure you are playing.
The more in depth system is that of the Hacker Class, who has a Class Feature called Exploits.
Let's take a look at some of the Exploits from the playtest document!
Think of all the fun you can have with these!
To answer some questions I know we'll get:
1. Hackers only have a certain amount of Exploit uses between Long Rests.
2. At certain class levels, these Exploits 'Upgrade' to better versions of themselves.
3. This is the playtest document so spelling, grammar, and strange wording is to be expected. The final product will be a lot more polished.
4. The final book will be a lot more interesting than the simple black and white layout above.