Categories
Links RPG

Alternative 5e Adventures – What can I play?

firstblood20:

Perhaps you can’t afford right now one of the cool campaign hardcovers like Out of the Abyss, or are just looking for something new to expand your games with. Fear not; this hobby has provided fertile soil for the creativity of enthusiasts. Here I’ll leave links that may be helpful in finding adventures for free or less than US$5. Be sure to check a module’s level before purchasing it, and remember, the PDFs are for DM eyes only!

  • Merric’s Great List of Dungeons and Dragons 5E Adventures – An amazing resource. This Australian blogger attempts to list, link and review most of the published adventures from official and third party creator alike.
    • From the many listed, may I suggest based on commentary around: The Leviathan’s Tomb ($0.99), The Blacksmith’s Burden ($3.95), The Bandit’s Nest ($2.99), A Little Bit of Thievery (PWYW), The Cry of a Daughter (Free), The Mines of Valdhum ($4.99)
  • Wizards of the Coast has begun releasing their free modules for the Adventurer’s League (AL) to the public through the Dragon+ digital magazine. These have been the ones provided so far:
    • Harried in Hillsfar – This is the intro adventure for this season of the AL, tied to the Rage of Demons story arch. It presents the central town though 5 missions, designed to last about an hour each. Later modules will connect to it. It could work as a campaign base and start. You can also check the free Player’s Guide for this season.
    • Shackles of Blood – A four hour adventure with kidnapping all around. You can also check this forum detailing how things in the adventure might go awry.
  • There are many other official AL modules given for free to subscribed game stores around that have not yet been made available. However, arcane stuff happens if you type the module’s name + pdf into Google. From the first AL season, may I suggest: The Courting of Fire, Tales Trees Tell, Dues for the Dead, and The Scroll Thief.
  • ENWorld held a small contest last year for a 5e module. You can find and download here the winner Mind Blast! and the other entries.
  • This hobby has more than 20 years of adventures and custom material. Seriously, let Google be your guide (See: Dungeon Magazine’s Top 30 D&D Adventures.) To adapt modules from previous D&D generations, you’ll need to check each of the encounters and use:
    • Kobold’s Fight Club Online Encounter Builder – An awesome tool that must be part of every 5e DM. Based on the amount of heroes and their level, it will tell you how many 5e monsters you need for an encounter of a given difficulty, and calculate XP for you. Easy.
    • The 5e Monster Manual, to look the current stats for the foes
    • Voila!

Happy Gaming.

This is really a terrific resource! Much recommended!

Categories
Links RPG

Do you: pre-made adventures?

epicroll:

I love reading through pre-made adventures for a hook or two for my main game. The only time I’ve ever run a pre-made was on Free RPG day at my local game shop – but even then I changed things up (one guy said he’d played the adventure elsewhere that day already…).

Do you use pre-made adventures or do you prefer to make your own?

I use a combination of pre-made and my own; for overall structure I tend to use the published work but then I add in ‘micro’ adventures that work out to about 30% of a campaign that are my own creations. My additions tend to focus on improving narrative arcs in the published campaign itself, to build the story arcs of individual PCs, and to develop multi-campaign themes and stories.

I used to mostly do just self-written work when I ran 2nd edition but, sadly, just don’t have that kind of time anymore if I’m going to produce adventures that I’m personally proud of and am happy with. But maybe that’ll change if I run into a published adventure/campaign in D&D(5e) that I’m unhappy with…

Categories
Links RPG

See the Sketches J.R.R. Tolkien Used to Build Middle-Earth

Many of these are amazing, in that they show how one of the most adored fantasy world’s maps began just as those used in most homebrew D&D games.

Categories
Links

How ‘white hat’ hackers could help in the Ashley Madison investigation

How ‘white hat’ hackers could help in the Ashley Madison investigation:

TORONTO – It’s not every day that the police appeal to the hacking community to help investigate a wide-scale hacking incident.

Because much of the Ashley Madison data leak unfolded on the dark web, it makes sense that authorities are appealing to “good” hackers who may have engaged with those behind the leak to come forward. However, according to cyber security expert Chris Parsons, it could have major implications.

“Such hackers possess a technical skill set and may use it to analyze leaked data or to try and track down or identify those suspected for leaking the Ashley Madison data,” said Parsons.

“The danger…is that in hunting for suspected leakers some parties may act beyond, or outside, the law in an attempt to help authorities. In the course of behaving this way they might actually endanger the investigation’s legitimacy or even compromise legitimate evidence.”

Parsons added that without a clearer set of ‘terms of engagement,’ police could bring on further investigations into those “recruited” to help them – putting a strain on resources and risking the integrity into the investigation into the Ashley Madison data breach.

Categories
Links

Feds considering warrantless access to internet subscriber info: police chiefs

Feds considering warrantless access to internet subscriber info: police chiefs:

OTTAWA – A new administrative scheme that would allow police to obtain basic information about Internet subscribers without a warrant is one option being considered by federal officials following a landmark Supreme Court ruling that curbed access to such data, Canadian police chiefs say.

A researcher who has long pressed for more transparency around police access to subscriber data said Monday that law-enforcement agencies have yet to make the case for warrantless access – especially since companies can make information available quickly in a genuine emergency.

“We’re not at a point where it’s clear the police have a legitimate concern,” said Christopher Parsons, a postdoctoral fellow with the Citizen Lab at Toronto’s Munk School of Global Affairs.

In June last year, the Supreme Court ruled police need judicial authorization to obtain subscriber data linked to online activities. The high court rejected the notion the federal privacy law governing companies allowed them to hand over subscriber identities voluntarily.

The court judgment came amid swelling public concern about authorities quietly gaining access to customer information with little evident scrutiny or oversight.

Parsons wants police to release more statistical information about their requests. “They actually have to make the argument with data, so we can have an evidence-based policy discussion.”

He would also like to see civil society groups and others included in the discussions about possible legislative change.

 

Categories
Links

Twitter closes off ability to track and repost politicians’ deleted tweets | Toronto Star

Twitter closes off ability to track and repost politicians’ deleted tweets:

Twitter has shut off the ability of more than two dozen accounts to track and repost tweets deleted by politicians and other officials in 30 countries around the world, including Canada.

Christopher Parsons, a fellow at the Citizen Lab at the University of Toronto’s Munk School of Global Affairs, said Twitter’s decision shows that the company “is unwilling to have its API routinely used to monitor what people have tried to delete.

“It appears as though Twitter is saying, ‘Look we know it’s possible, but we don’t want it being done.’ ”

According to Parsons, the weekend Twitter closures may force groups to analyze the different reasons tweets are deleted, rather than posting all deletions automatically, which could change the data’s impact.

“The way in which (the information is) published can be very different, the context can be much broader, and depending on the intent of the group in question, it could be more damning,” he said.

The debate, he added, shows the impact corporations such as Twitter can have on how public figures communicate with people.

“With the American election right now and the Canadian election going on, that’s where these sorts of deletions are often most interesting to the general public,” he said.

 

Categories
Links

Canadian companies have no incentive to report cyber attacks, like that on Ashley Madison | Toronto Star

Canadian companies have no incentive to report cyber attacks, like that on Ashley Madison:

Canada’s Digital Privacy Act, passed by Parliament in June, will require companies to report breaches once regulations are prepared. But experts say it is essentially toothless because it contains few financial penalties.

The Act will introduce fines up to $100,000 for deliberately not reporting a breach.

“There’s the obligation to report, which is, of course, positive,” said Christopher Parsons, managing director of the telecom transparency project at the Munk School of Global Affairs’ Citizen Lab.

“But without any sort of punitive consequences you run into the question of how useful is the notification itself.”

There is little data on how secure corporate Canada truly is partly because of a lack of breach notification laws, Parsons said.

Without a financial imperative to beef up security, companies are unlikely to shell out the millions of dollars required to identify and prevent them, Parsons said.

“For most companies, security is a drag,” Parsons said, adding that executives tend to reject investment in cybersecurity, where concerns tend to lead to IT professionals saying “no” to a lot of ideas, while also eating up company time, money and resources.

“All those no’s either inhibit fast fluid business, or they increase the cost and the friction of anything a company wants to do.”
Meanwhile, hackers are getting more sophisticated, but they don’t even need to because the defence systems are so weak, Parsons said.

“If you’re a hacker, you have to succeed once; if you’re a defender, you have to succeed every single time.”

 

Categories
Links

So your name is in the Ashley Madison database … are you a cheater? | Metro News

So your name is in the Ashley Madison database … are you a cheater?:

“There was no requirement for verification prior to being added to their database,” said Christopher Parsons, a post-doctoral researcher and cyber-security expert at the University of Toronto’s Citizen Lab.

“It’s entirely possible that people’s email addresses were added by friends or co-workers as a prank.”

But, he said, the likelihood of that “is somewhat low.”

Just because someone’s email address can be found in the database doesn’t mean they were active users who committed adultery. They could have just been curious about the site, Parsons said.

While those who registered for the site using their official, government-issued email addresses may be naïve, Parsons said some of them may have done so intentionally.

“Perhaps they share a personal email account with their spouse or partner,” he said. “Using their government account might have been seen as safer.”

Although there have been larger data breaches in the past, Parsons said the Ashley Madison hack is worrying because government officials found using the site could become victims of blackmail.

It’s happened after data breaches in the U.S. and could happen just as easily in Canada, he said.

 

Categories
Links

Partnership between NSA and telecoms pose both security and privacy risk, experts say

Partnership between NSA and telecoms pose both security and privacy risk, experts say:

Speculation remains as to whether the programs still exist, but as Cohn said: “The story that [these documents] tell is [the NSA is] just grabbing more, and more, and more, and more. Nothing in this six-year span is of them getting anything less. [So our] best guess is that trajectory continued.”

Christopher Parsons, postdoctoral fellow, Citizen Lab at the Munk School of Global Affairs, seconded Cohn’s thoughts and expressed surprise that no documents have indicated any change in programs.

Even if Americans aren’t exactly concerned about their data, per se, Parsons reminded that beyond losing its citizens’ trust, the U.S. government loses diplomatic credibility through these leaked documents. The government can’t argue for a free and open internet if it monitors foreigners and its own citizens, he said.

“If you use the internet, and the data goes through the U.S., the government is spying on it,” he said.

Categories
Links

Encryption: Officials seek ‘backdoor’ entry points; critics decry government overreach

Encryption: Officials seek ‘backdoor’ entry points; critics decry government overreach:

In other words, University of Toronto’s Chris Parsons wrote on Twitter, “you either support backdoors, or you support the murderers and child abuser.”

“I think that each company will have to evaluate the corporate risks associated with implementing any backdoors,” Mr. Parsons, a postdoctoral fellow who studies privacy and security at Citizen Lab, a division of the university’s Munk School of Global Affairs, told The Washington Times this week.

“While satisfying U.S. and U.K. government authorities might (temporarily) relieve pressure, the companies would suffer tremendous international criticism and suspicion were they to undermine the security of their products,” he continued, adding that a likely plummet in profits, if nothing else, “will buttress corporate principles and force companies (on their shareholders’ behalfs) to maintain their current security stances.”

Neither Google nor Apple has publicly responded yet to this week’s op-ed, but Mr. Parsons in Toronto says that it’s so far been promising to hear that law enforcement can’t crack a type of encryption that now comes standard.

“To a certain degree, it is reassuring that consumer-level encryption is sufficiently robust that even state authorities find it challenging to break. People and businesses entrust highly sensitive information and capabilities to their devices, and so this affirmation confirms that criminals who steal devices will have similar difficulties in using these against their owners,” he told The Times.

But it’s also reassuring, he added, “because the adoption of these strong standards is a result of companies acknowledging that law enforcement and other state agencies are overreaching in their access to customer data,” including federal and local security and law enforcement groups.

“Legal protections have simply not kept up with the people’s privacy expectations, and the adoption of these strong standards is an encouraging sign that companies are responding accordingly,” he said. “The reality is that, while this may close off one avenue of investigation to state agencies, these agencies now have access to more information with fewer legal restrictions than at any time in recent history.”