btacdbra holds out a hand to the device, in a sort of clawed position. The outline of a red anthropomorphic fox form briefly flickers over btacdbra's own. In a screen flash of solid red, the device then opens up to a special red-text terminal, now hacked.
Exert your Mind and spend 2 Actions. Select a Computer within arm's reach. Does not work on Alien technology. Roll Intellect + Technology, with the Difficulty set by the GM depending on the security of the system you are hacking. Sapient targets can resist by rolling Mind at Difficulty 6.
If you succeed, you may issue a single command to the targeted system. This command must have a specific outcome or be a request for specific login credentials. The command you issue must be within the machine's current capabilities. For example, you cannot order a standard security camera to grow legs and walk around.
Your hack cannot be discovered by system administrators or firewall software for a number of hours equal to your Outcome on the initial roll.
You may only use this Effect once per day.
The eye sparks & sputters, leaving an imprint from which Grace can extend her senses. Grace can communicate through it at will.
Exert your Mind and spend an Action. Select a Location within 10 feet.
You place a ward, which is fixed to its initial location. You can perceive with all your senses through the ward as though you were standing at its location. This Artifact may have at most 3 wards active at once.
The ward requires Concentration to monitor, though it will remain active until you deactivate it. It can be detected with a roll and destroyed through mundane means.
You may destroy the Ward to activate one Investigate Individual, >Object, or Area Effect as though you were standing at its location.
You may communicate through your ward, though doing so will reveal its presence.
Rei's innate technique, or Mahojutsu, allows them to channel their internal energies into other technological devices to manipulate them. They do so through by using electrum as a conduit- which allows them to manifest their sorcery in the form of coursing electricity between the focus and target. This lightning continues to linger after the hack is completed, acting as a calling card and allowing them to access previously hacked machines as well.
Spend 1 minute. Select a Computer within 20 feet. Can be used on Alien technology. You must actively and obviously use an electrum shard to activate this Effect. Roll Intellect + Technology, with the Difficulty set by the GM depending on the security of the system you are hacking. Sapient targets can resist by rolling Mind at Difficulty 6.
If you succeed, you may issue a single command to the targeted system. This command must have a specific outcome or be a request for specific login credentials. The command you issue must be within the machine's current capabilities. For example, you cannot order a standard security camera to grow legs and walk around.
After successfully using this Effect, you may choose to add the target to your own personal "network." You may use this Effect on any target on your network at any range. You can have up to 3 targets on your network.
Every hack you make leaves behind distorted lightning in the system as a personal "calling card" that informs anyone who uses the system that the hack occurred.
This Gift's Cost is capped at 2 and cannot be increased further.
Possession of this Power grants the following Battle Scar: Mana Core: Your body is powered by a mana-infused core, similar to a heart. Called shots against your mana core (heart) do +2 damage. If an attack hits you which could conceivably hit your mana core, roll 1d10 at Difficulty 6. If you fail, the attack hits your soft spot and does +2 damage.
Danile has always liked computers. Now he can use them easily without having a problem. He creates a small USB device and hands it over to the user.
Expend a point of Battery and spend 2 Actions to activate. Select a Device within arm's reach. Does not work on Alien technology. Roll Intellect + Technology, with the Difficulty set by the GM depending on the security of the system you are hacking. Sapient targets can resist by rolling Mind at Difficulty 6. The hacking roll and their defensive roll are both Difficulty 6.
If you succeed, you may issue a single command to the targeted system. This command must have a specific outcome or be a request for specific login credentials. The command you issue must be within the machine's current capabilities. For example, you cannot order a standard security camera to grow legs and walk around.
If your command does not require bypassing the security of the target (for example, typing on a computer that is unlocked), you do not need to Exert your Mind to activate this Effect, and activation only takes a single Action.
After you finish activating this Effect, you cannot move quicker than a walk (max 15 feet per Round) for one minute and suffer a -1 dice penalty for an hour.
Possession of this Artifact causes the following Trauma to manifest over the course of a day: Must be helpful to anyone with a Kevin bracelet. If you lose possession of this Artifact, the Trauma heals over the course of the next month.
A series of neon-green numbers and letters flood rapidly down the lenses of the sunglasses. This jumbled macro-condensed code is then simplified and ‘gameified’ for the user’s ease of access. Upon completion, the Elite Eyewear’s then provides a digital display and interface — allowing for access and manipulation of the hacked device.
Hacking is freaking hard… So why not make it easier? At the end of the day, I’m a gamer — and with this power, even the most complicated system is like putty in my hands… as long as it’s within range, anyways. Sure, it might take a minute but hacking is freaking hard, OK?? Give me a break…
Exert your Mind and spend 1 minute. Select a Device within 300 feet. Does not work on Alien technology. Roll Intellect + Technology, with the Difficulty set by the GM depending on the security of the system you are hacking. Sapient targets can resist by rolling Mind at Difficulty 6.
If you succeed, you may issue a single command to the targeted system. This command must have a specific outcome or be a request for specific login credentials. The command you issue must be within the machine's current capabilities. For example, you cannot order a standard security camera to grow legs and walk around.
If your command does not require bypassing the security of the target (for example, typing on a computer that is unlocked), you do not need to Exert your Mind to activate this Effect, and activation only takes a single Action.
When targeting non-computer devices, you may operate switches, buttons, dials, levers, and latches.
True to their namesake, the hacker can penetrate the security of any computer system, granting access to its informational stores, or, in a pinch, allowing them to issue commands. The hacked system will display a flickering image of a ghost until it is dismissed.
While hacking, The Technician's fingers move with supernatural speed, blurring like a ghost.
Exert your Mind and spend 1 minute. Select a Computer within arm's reach. Does not work on Alien technology. Roll Intellect + Technology, with the Difficulty set by the GM depending on the security of the system you are hacking. Sapient targets can resist by rolling Mind at Difficulty 6.
If you succeed, you may issue a single command to the targeted system. This command must have a specific outcome or be a request for specific login credentials. The command you issue must be within the machine's current capabilities. For example, you cannot order a standard security camera to grow legs and walk around.
If your command does not require bypassing the security of the target (for example, typing on a computer that is unlocked), you do not need to Exert your Mind to activate this Effect, and activation only takes a single Action.
Your Hack cannot be reversed through mundane means for a number of hours equal to your Outcome.
Every hack you make leaves behind a flickering image of a ghost in the system as a personal "calling card" that informs anyone who uses the system that the hack occurred.
True to their namesake, the hacker can penetrate the security of any computer system, granting access to its informational stores, or, in a pinch, allowing them to issue commands. The hacked system will display a flickering image of a ghost until it is dismissed.
While hacking, The Technician's fingers move with supernatural speed, blurring like a ghost.
Exert your Mind and spend 1 minute. Select a Computer within arm's reach. Does not work on Alien technology. Roll Intellect + Technology, with the Difficulty set by the GM depending on the security of the system you are hacking. Sapient targets can resist by rolling Mind at Difficulty 6.
If you succeed, you may issue a single command to the targeted system. This command must have a specific outcome or be a request for specific login credentials. The command you issue must be within the machine's current capabilities. For example, you cannot order a standard security camera to grow legs and walk around.
If your command does not require bypassing the security of the target (for example, typing on a computer that is unlocked), you do not need to Exert your Mind to activate this Effect, and activation only takes a single Action.
Your Hack cannot be reversed through mundane means for a number of hours equal to your Outcome.
Every hack you make leaves behind a flickering image of a ghost in the system as a personal "calling card" that informs anyone who uses the system that the hack occurred.