Danile has always liked computers. Now he can use them easily without having a problem. He creates a small USB device and hands it over to the user.
Expend a point of Battery and spend 2 Actions to activate. Select a Device within arm's reach. Does not work on Alien technology. Roll Intellect + Technology, with the Difficulty set by the GM depending on the security of the system you are hacking. Sapient targets can resist by rolling Mind at Difficulty 6. The hacking roll and their defensive roll are both Difficulty 6.
If you succeed, you may issue a single command to the targeted system. This command must have a specific outcome or be a request for specific login credentials. The command you issue must be within the machine's current capabilities. For example, you cannot order a standard security camera to grow legs and walk around.
If your command does not require bypassing the security of the target (for example, typing on a computer that is unlocked), you do not need to Exert your Mind to activate this Effect, and activation only takes a single Action.
After you finish activating this Effect, you cannot move quicker than a walk (max 15 feet per Round) for one minute and suffer a -1 dice penalty for an hour.
Possession of this Artifact causes the following Trauma to manifest over the course of a day: Must be helpful to anyone with a Kevin bracelet. If you lose possession of this Artifact, the Trauma heals over the course of the next month.
When Corey goes up to touch the lock or computer he seems to know his way around the security and he’s able to access anything that he touches. His hand glow an iridescent blue and then you see the silenced pistol on the screen after he has gotten what he needs.
Spend 1 minute. Select a Device within arm's reach. Does not work on Alien technology. Roll Intellect + Technology, with the Difficulty set by the GM depending on the security of the system you are hacking. Sapient targets can resist by rolling Mind at Difficulty 6.
If you succeed, you may issue a single command to the targeted system. This command must have a specific outcome or be a request for specific login credentials. The command you issue must be within the machine's current capabilities. For example, you cannot order a standard security camera to grow legs and walk around.
When targeting non-computer devices, you may operate switches, buttons, dials, levers, and latches.
Every hack you make leaves behind Shows a picture of a silenced pistol in the system as a personal "calling card" that informs anyone who uses the system that the hack occurred.
This Gift's Cost is capped at 2 and cannot be increased further.
Spend 2 Actions. Select a Device within arm's reach. Does not work on Alien technology. Roll Intellect + Technology, with the Difficulty set by the GM depending on the security of the system you are hacking. Sapient targets can resist by rolling Mind at Difficulty 6.
If you succeed, you may issue a single command to the targeted system. This command must have a specific outcome or be a request for specific login credentials. The command you issue must be within the machine's current capabilities. For example, you cannot order a standard security camera to grow legs and walk around.
When targeting non-computer devices, you may operate switches, buttons, dials, levers, and latches.
Every hack you make leaves behind a lightning bolt in the system as a personal "calling card" that informs anyone who uses the system that the hack occurred.
This Gift's Cost is capped at 2 and cannot be increased further.
A small silver ring with linked blue boxes engraved into it.
The user extends their hand towards the target. When they do thin tendrils extend from the ring and search for purchase on the wearer. The tendrils attach and start sucking small amounts of power from the user as they continue to crawl along their body before retreating after the hack is done.
The user's packaged will and commands are transmitted through the ring and then antenna tendrils towards the target.
Expend a point of Battery and spend 1 Action. Select a Device within 300 feet. Can be used on Alien technology. Roll Intellect + Technology, with the Difficulty set by the GM depending on the security of the system you are hacking. Sapient targets can resist by rolling Mind at Difficulty 6.
If you succeed, you may issue a single command to the targeted system. This command must have a specific outcome or be a request for specific login credentials. The command you issue must be within the machine's current capabilities. For example, you cannot order a standard security camera to grow legs and walk around.
When targeting non-computer devices, you may operate switches, buttons, dials, levers, and latches.
Anyone who witnesses you during this Effect's activation will almost certainly be disturbed to see Ring tendrils.
Anyone who touches this Artifact will notice it warping their mind and may drop it. If they choose to hold or use it, they immediately receive the following Trauma: Irrational anger and disrespect of people who have truly shoddy security setups.. If they lose possession of this Artifact, the Trauma heals over the course of the next day.
This device is a small metal box with a digital display & a single button - when you press the button, a minute countdown begins to tick off, accompanied by a gut churning nausea. When the timer hits zero, the wielder vomits a stream of ghostly, fractal spiders which crawl into a chosen device - the wielder can then issue a single command.
Increase your sacrificial Injury's Severity by 1 and spend 1 minute. Select a Device within 20 feet. Does not work on Alien technology. Roll Intellect + Technology, with the Difficulty set by the GM depending on the security of the system you are hacking. Sapient targets can resist by rolling Mind at Difficulty 6.
If you succeed, you may issue a single command to the targeted system. This command must have a specific outcome or be a request for specific login credentials. The command you issue must be within the machine's current capabilities. For example, you cannot order a standard security camera to grow legs and walk around.
You may issue a "self-destruct" command that leaves the hacked system's hardware inoperable, even if that machine had no such functionality previously. Only works on Computers.
When targeting non-computer devices, you may operate switches, buttons, dials, levers, and latches.
Every hack you make leaves behind Fractal Spiders crawl across the screen/device in the system as a personal "calling card" that informs anyone who uses the system that the hack occurred.
Anyone who witnesses you during this Effect's activation will almost certainly be disturbed to see You vomit a stream of fractal spiders onto the device.
If you do not have a sacrificial Injury when you activate this Effect, take a new Severity-1 Injury.
Removing a small device from the handle of the pickaxe and touching it to the target, you begin interfacing with the device in a manner similar to Dig-Dug, poking around the inner workings to achieve the desired result.
Spend 1 minute. Select a Computer within arm's reach. Does not work on Alien technology. Roll Brawn + Melee, with the Difficulty set by the GM depending on the security of the system you are hacking. Sapient targets can resist by rolling Mind at Difficulty 6.
If you succeed, you may issue a single command to the targeted system. This command must have a specific outcome or be a request for specific login credentials. The command you issue must be within the machine's current capabilities. For example, you cannot order a standard security camera to grow legs and walk around.
You may issue a "self-destruct" command that leaves the hacked system's hardware inoperable, even if that machine had no such functionality previously. Only works on Computers.
After successfully using this Effect, you may choose to add the target to your own personal "network." You may use this Effect on any target on your network at any range. You can have up to 3 targets on your network.
This Gift's Cost is capped at 2 and cannot be increased further.
True to their namesake, the hacker can penetrate the security of any computer system, granting access to its informational stores, or, in a pinch, allowing them to issue commands. The hacked system will display a flickering image of a ghost until it is dismissed.
While hacking, The Technician's fingers move with supernatural speed, blurring like a ghost.
Exert your Mind and spend 1 minute. Select a Computer within arm's reach. Does not work on Alien technology. Roll Intellect + Technology, with the Difficulty set by the GM depending on the security of the system you are hacking. Sapient targets can resist by rolling Mind at Difficulty 6.
If you succeed, you may issue a single command to the targeted system. This command must have a specific outcome or be a request for specific login credentials. The command you issue must be within the machine's current capabilities. For example, you cannot order a standard security camera to grow legs and walk around.
If your command does not require bypassing the security of the target (for example, typing on a computer that is unlocked), you do not need to Exert your Mind to activate this Effect, and activation only takes a single Action.
Your Hack cannot be reversed through mundane means for a number of hours equal to your Outcome.
Every hack you make leaves behind a flickering image of a ghost in the system as a personal "calling card" that informs anyone who uses the system that the hack occurred.