Kurt seems to laugh to themselves immediately before something out of the ordinary happens, a computer is unlocked, the camera turns off due to an unexplained power outage at just the right time.
Exert your Mind and spend 1 minute. Select a Computer within arm's reach. Does not work on Alien technology. Roll Intellect + Crafts, with the Difficulty set by the GM depending on the security of the system you are hacking. Sapient targets can resist by rolling Mind at Difficulty 6.
If you succeed, you may issue a single command to the targeted system. This command must have a specific outcome or be a request for specific login credentials. The command you issue must be within the machine's current capabilities. For example, you cannot order a standard security camera to grow legs and walk around.
This Effect is not obvious, and the only sign you are using an Effect is Kurt seems to laugh to themselves. If someone suspects that an Effect was used, they must roll Perception + Alertness, Difficulty 8 to pick up on your Tell.
Clyw begins focusing hard, typing away on their Cyberdeck. Suddenly, sparks fly as the infected machine switches sides, into Clyw's control.
Clyw's nature as a sentient program allows them an intrinsic understanding of computer functions and what they can and can't do. While Clyw is not a malicious program by nature or at heart, they have the capabilities to be one. Any technological blockade will soon be sorted out in the flashiest manner possible.
Spend 2 Actions. Select a Computer within 20 feet. Does not work on Alien technology. You must actively and obviously use A Portable Computer to activate this Effect. Roll Intellect + Technology, with the Difficulty set by the GM depending on the security of the system you are hacking. Sapient targets can resist by rolling Mind at Difficulty 6.
If you succeed, you may issue a single command to the targeted system. This command must have a specific outcome or be a request for specific login credentials. The command you issue must be within the machine's current capabilities. For example, you cannot order a standard security camera to grow legs and walk around.
This Gift's Cost is capped at 2 and cannot be increased further.
Dingbat has a way with all sorts of technology!
Exert your Mind and spend 2 Actions. Select a Device within 20 feet. Can be used on Alien technology. You must make a Trauma roll when you use this Effect. Its Difficulty cannot be reduced by any means. Roll Intellect + Technology, with the Difficulty set by the GM depending on the security of the system you are hacking. Sapient targets can resist by rolling Mind at Difficulty 6.
If you succeed, you may issue a single command to the targeted system. This command must have a specific outcome or be a request for specific login credentials. The command you issue must be within the machine's current capabilities. For example, you cannot order a standard security camera to grow legs and walk around.
If your command does not require bypassing the security of the target (for example, typing on a computer that is unlocked), you do not need to Exert your Mind to activate this Effect, and activation only takes a single Action.
After successfully using this Effect, you may choose to add the target to your own personal "network." You may use this Effect on any target on your network at any range. You can have up to 3 targets on your network.
When targeting non-computer devices, you may operate switches, buttons, dials, levers, and latches.
Every hack you make leaves behind The device’s screen flashes only purple and green ‘Dingbat’ font. in the system as a personal "calling card" that informs anyone who uses the system that the hack occurred.
Anyone who witnesses you during this Effect's activation will almost certainly be disturbed to see Dingbat’s eyes reflect static, or a strange looking digitalised heartbeat. perhaps it’s his own..
Henry extends his arm straight, and, holding a small source of zinc in the same hand, points with his index finger directly at the target. His arm drags back and forth slightly, looking for sensitive electronics inside.
"The automated lensing systems seem absolutely shot. At least they're pointing forward-ish. It's a lot less handy, but I can effectively 'aim' them at the target. It's not entirely unlike aiming a gun, actually. The matter forge isn't working quite right either, but that's fine. Lith can just strip the electrons needed locally. I'd just rather they not be from me."
The cyberwarfare suite is controlled by an onboard AI, which Henry was very happy to finally get working. Even if they bicker some. For example, Lith will never admit failing a hack herself. It's just Henry moving his hand the wrong way while she was working. When he does hold his arm steady enough, though, Lith is able to read and write electron states directly in the device's memory. This permits her to influence the digital state of a device directly. By reflex, she ensures she won't be detected for the operation of the mission.
Spend 2 Actions. Select a Computer within 20 feet. Can be used on Alien technology. You must use up a small amount of zinc in order to activate this Effect. Roll Dexterity + Firearms, with the Difficulty set by the GM depending on the security of the system you are hacking. Sapient targets can resist by rolling Mind at Difficulty 6.
If you succeed, you may issue a single command to the targeted system. This command must have a specific outcome or be a request for specific login credentials. The command you issue must be within the machine's current capabilities. For example, you cannot order a standard security camera to grow legs and walk around.
Your hack cannot be discovered by system administrators or firewall software for a number of hours equal to your Outcome on the initial roll.
This Gift cannot have more than 3 Drawbacks, and its Gift Cost is capped at 1.
Anyone who touches this Artifact will notice it warping their body and may drop it. If they choose to hold or use it, they immediately receive the following Battle Scar: Extensive Augmentation - Head - Your head has had extensive augmentation performed to it, and some tradeoffs had to be made. Take +2 damage from called shots to the head. If they lose possession of this Artifact, the Battle Scar heals over the course of the next day.
Chip pulls out his laptop, cracks his knuckles and flicks his collar up.
He clicks 'Hacking.exe' (And can quickly code the 3 lines of script that somehow make the software work in moments if it doesn't exist yet)
The screen goes black, with technicolor symbols flickering down from the top of the screen (A la The MATRIX), forming a first person view similiar to a game. He controls the view by typing seemingly nonsensical code at a blistering speed. It often portrays metaphorical version of the hack (stealing files might be entering a ghostly/matrixy version of reality and finding the golden orb, turning on a TV is walking into a room and picking up the remote control, etc)
Exert your Mind and spend 1 minute. Select a Computer within 20 feet. Does not work on Alien technology. You must actively and obviously use laptop to activate this Effect. Roll Dexterity + Technology, with the Difficulty set by the GM depending on the security of the system you are hacking. Sapient targets can resist by rolling Mind at Difficulty 6.
If you succeed, you may issue a single command to the targeted system. This command must have a specific outcome or be a request for specific login credentials. The command you issue must be within the machine's current capabilities. For example, you cannot order a standard security camera to grow legs and walk around.
If your command does not require bypassing the security of the target (for example, typing on a computer that is unlocked), you do not need to Exert your Mind to activate this Effect, and activation only takes a single Action.
Nik taps at his smartphone for a few moments. Faintly glowing lines resembling the traces of a circuit board flow over the ground to the targeted device. As they fade away, a satisfied smirk appears on their face.
Was that thing even on the network? Doesn't matter, they have access.
If it exists, it can be hacked. Nik believes that this maxim should be true for everything that exists, and this gift is their first step towards making that a reality.
Exert your Mind and spend 2 Actions. Select a Computer within 20 feet. Does not work on Alien technology. You must actively and obviously use smartphone to activate this Effect. Roll Intellect + Technology, with the Difficulty set by the GM depending on the security of the system you are hacking. Sapient targets can resist by rolling Mind at Difficulty 6.
If you succeed, you may issue a single command to the targeted system. This command must have a specific outcome or be a request for specific login credentials. The command you issue must be within the machine's current capabilities. For example, you cannot order a standard security camera to grow legs and walk around.
If your command does not require bypassing the security of the target (for example, typing on a computer that is unlocked), you do not need to Exert your Mind to activate this Effect, and activation only takes a single Action.
True to their namesake, the hacker can penetrate the security of any computer system, granting access to its informational stores, or, in a pinch, allowing them to issue commands. The hacked system will display a flickering image of a ghost until it is dismissed.
While hacking, The Technician's fingers move with supernatural speed, blurring like a ghost.
Exert your Mind and spend 1 minute. Select a Computer within arm's reach. Does not work on Alien technology. Roll Intellect + Technology, with the Difficulty set by the GM depending on the security of the system you are hacking. Sapient targets can resist by rolling Mind at Difficulty 6.
If you succeed, you may issue a single command to the targeted system. This command must have a specific outcome or be a request for specific login credentials. The command you issue must be within the machine's current capabilities. For example, you cannot order a standard security camera to grow legs and walk around.
If your command does not require bypassing the security of the target (for example, typing on a computer that is unlocked), you do not need to Exert your Mind to activate this Effect, and activation only takes a single Action.
Your Hack cannot be reversed through mundane means for a number of hours equal to your Outcome.
Every hack you make leaves behind a flickering image of a ghost in the system as a personal "calling card" that informs anyone who uses the system that the hack occurred.