Smoke fills the targeted system. Changing the devices hardware to affect its coding. Wiping it completely if necessary.
Spend 1 minute and use up this cigarette. Select a Computer within 20 feet. Does not work on Alien technology. Roll 7 dice Difficulty 6, dice penalties do not apply. Sapient targets can resist by rolling Mind at Difficulty 6.
If you succeed, you may issue a single command to the targeted system. This command must have a specific outcome or be a request for specific login credentials. The command you issue must be within the machine's current capabilities. For example, you cannot order a standard security camera to grow legs and walk around.
You may issue a "self-destruct" command that leaves the hacked system's hardware inoperable, even if that machine had no such functionality previously. Only works on Computers.
This Effect is not obvious, and the only sign you are using an Effect is the end of the cigarette burns slightly brighter. If someone suspects that an Effect was used, they must roll Perception + Alertness, Difficulty 8 to pick up on your Tell.
Luna has immense control over digital systems, although it's come at the cost of her body and... to a degree, her mind. Spending all her time in cyberspace.
Spend 2 Actions. Select a Computer within 20 feet. Can be used on Alien technology. Roll Intellect + Technology, with the Difficulty set by the GM depending on the security of the system you are hacking. Sapient targets can resist by rolling Mind at Difficulty 6.
If you succeed, you may issue a single command to the targeted system. This command must have a specific outcome or be a request for specific login credentials. The command you issue must be within the machine's current capabilities. For example, you cannot order a standard security camera to grow legs and walk around.
This Effect is not obvious, and the only sign you are using an Effect is her nose wiggling. If someone suspects that an Effect was used, they must roll Perception + Alertness, Difficulty 8 to pick up on your Tell.
This Gift cannot have more than 3 Drawbacks, and its Gift Cost is capped at 2.
Possession of this Power grants the following Battle Scar: Minor Vertigo: Take a -1 to any rolls involving balance or grace. and Weak Stomach: Your time in a more perfect world has left you weaker to the more ugly parts of the one you live in.
Possession of this Power grants the following Trauma at all times: Fear of the Dark: You are utterly terrified of darkness. You must succeed a Self-Control roll in order to leave a well-lit area. If you fail, you may Exert your Mind to face your fear. Take a Mind Damage if you are ever surprised while it’s dark.
Nik taps at his smartphone for a few moments. Faintly glowing lines resembling the traces of a circuit board flow over the ground to the targeted device. As they fade away, a satisfied smirk appears on their face.
Was that thing even on the network? Doesn't matter, they have access.
If it exists, it can be hacked. Nik believes that this maxim should be true for everything that exists, and this gift is their first step towards making that a reality.
Exert your Mind and spend 2 Actions. Select a Computer within 20 feet. Does not work on Alien technology. You must actively and obviously use smartphone to activate this Effect. Roll Intellect + Technology, with the Difficulty set by the GM depending on the security of the system you are hacking. Sapient targets can resist by rolling Mind at Difficulty 6.
If you succeed, you may issue a single command to the targeted system. This command must have a specific outcome or be a request for specific login credentials. The command you issue must be within the machine's current capabilities. For example, you cannot order a standard security camera to grow legs and walk around.
If your command does not require bypassing the security of the target (for example, typing on a computer that is unlocked), you do not need to Exert your Mind to activate this Effect, and activation only takes a single Action.
You've always preferred the company of machines to people. Maybe because, unlike people, they tend to do what you ask without much fuss.
Exert your Mind and spend 2 Actions. Select a Computer within arm's reach. Does not work on Alien technology. You must actively and obviously use a device-compatible cable to activate this Effect. Roll Intellect + Technology, with the Difficulty set by the GM depending on the security of the system you are hacking. Sapient targets can resist by rolling Mind at Difficulty 6.
If you succeed, you may issue a single command to the targeted system. This command must have a specific outcome or be a request for specific login credentials. The command you issue must be within the machine's current capabilities. For example, you cannot order a standard security camera to grow legs and walk around.
Your hack cannot be discovered by system administrators or firewall software for a number of hours equal to your Outcome on the initial roll.
The eye sparks & sputters, leaving an imprint from which Grace can extend her senses. Grace can communicate through it at will.
Exert your Mind and spend an Action. Select a Location within 10 feet.
You place a ward, which is fixed to its initial location. You can perceive with all your senses through the ward as though you were standing at its location. This Artifact may have at most 3 wards active at once.
The ward requires Concentration to monitor, though it will remain active until you deactivate it. It can be detected with a roll and destroyed through mundane means.
You may destroy the Ward to activate one Investigate Individual, >Object, or Area Effect as though you were standing at its location.
You may communicate through your ward, though doing so will reveal its presence.
Jane's mind had unlocked part of its potential. When she touches a device be it a computer, laptop, or even a cell phone she establishes a link between her mind and herself. When touching a device her hand will have blue lines spread from her to the device and her eyes will stream data across their surface.
When Jane wants to make something 'Self-destruct' her eyes turn briefly red with red data moving the opposite direction when she uses her secondary ability.
Exert your Mind and spend 1 minute. Select a Computer within arm's reach. Does not work on Alien technology. Roll Intellect + Technology, with the Difficulty set by the GM depending on the security of the system you are hacking. Sapient targets can resist by rolling Mind at Difficulty 6.
If you succeed, you may issue a single command to the targeted system. This command must have a specific outcome or be a request for specific login credentials. The command you issue must be within the machine's current capabilities. For example, you cannot order a standard security camera to grow legs and walk around.
You may issue a "self-destruct" command that leaves the hacked system's hardware inoperable, even if that machine had no such functionality previously. Only works on Computers.
If your command does not require bypassing the security of the target (for example, typing on a computer that is unlocked), you do not need to Exert your Mind to activate this Effect, and activation only takes a single Action.
True to their namesake, the hacker can penetrate the security of any computer system, granting access to its informational stores, or, in a pinch, allowing them to issue commands. The hacked system will display a flickering image of a ghost until it is dismissed.
While hacking, The Technician's fingers move with supernatural speed, blurring like a ghost.
Exert your Mind and spend 1 minute. Select a Computer within arm's reach. Does not work on Alien technology. Roll Intellect + Technology, with the Difficulty set by the GM depending on the security of the system you are hacking. Sapient targets can resist by rolling Mind at Difficulty 6.
If you succeed, you may issue a single command to the targeted system. This command must have a specific outcome or be a request for specific login credentials. The command you issue must be within the machine's current capabilities. For example, you cannot order a standard security camera to grow legs and walk around.
If your command does not require bypassing the security of the target (for example, typing on a computer that is unlocked), you do not need to Exert your Mind to activate this Effect, and activation only takes a single Action.
Your Hack cannot be reversed through mundane means for a number of hours equal to your Outcome.
Every hack you make leaves behind a flickering image of a ghost in the system as a personal "calling card" that informs anyone who uses the system that the hack occurred.