Virtual Interference Can be used for more than just doors

1
This Artifact grants you the power to issue commands to technological devices.
Used by Crane Albright, Created by GreenAppll.
(When activating this Effect, it is obvious you are interacting with the target. You must use this Artifact obviously when activating this Effect.)

When utilizing this gift, the necklace gives off some electricity as the nanites within your body swarms with the necklace as a command center.

Upon activation. Nanites with pre-inputted program floods the machinery, executing the order


Exert your Mind and spend 1 minute to activate. Select a Computer within arm's reach. Does not work on Alien technology. Roll Brawn + Alertness, with the Difficulty set by the GM depending on the security of the system you are hacking. Sapient targets can resist by rolling Mind at Difficulty 6. The hacking roll and their defensive roll are both Difficulty 6.

If you succeed, you may issue a single command to the targeted system. This command must have a specific outcome or be a request for specific login credentials. The command you issue must be within the machine's current capabilities. For example, you cannot order a standard security camera to grow legs and walk around.

Every hack you make leaves behind A Clown taunting in the system as a personal "calling card" that informs anyone who uses the system that the hack occurred.

  • You can target yourself if you qualify as a valid target by the other requirements.

You are viewing an old version of this Gift.
To view the most recent version Click Here

Revision purchased with:
Revision purchased with:
Improvement from writing up A Maelstrom of Typhoons spent on improving power: Virtual Dominance    (since refunded)
Revision purchased with:
Revision purchased with:
Gift from playing in Snow-White spent on improving power: Virtual Dominance    (since refunded)
Revision purchased with:
Improvement from writing up TPS delivery spent on improving power: Virtual Dominance
Revision purchased with:
Gift from playing in Skirmish spent on improving power: Virtual Interference    (since refunded)
Revision purchased with:
Improvement from writing up Slithering Patience spent on improving power: Virtual Interference
Revision purchased with:
Gift from the Asset Gifted spent on new power: Calligraphy Imprint

Community Hack Gifts

the arm looks very much non human, and mechanical, like the arm Tay lost and the stone left behind is modeled after the artifact that allows time travel. This all works do to special parts of the circuit that try to interact with the arm, but instead as a fail-safe make the holographic arm temporarily. This power merely gives a means to interact with the circuit board to hack a system.

Exert your Mind and spend 1 minute to activate. Select a Computer within arm's reach. Can be used on Alien technology. You must actively and obviously use Modified Circuit Board to activate this Effect. Roll Intellect + Technology, with the Difficulty set by the GM depending on the security of the system you are hacking. Sapient targets can resist by rolling Mind at Difficulty 6. The hacking roll and their defensive roll are both Difficulty 6.

If you succeed, you may issue a single command to the targeted system. This command must have a specific outcome or be a request for specific login credentials. The command you issue must be within the machine's current capabilities. For example, you cannot order a standard security camera to grow legs and walk around.

Your command does not have to take effect immediately. Instead, upon a successful Hack, you may specify a condition under which the specified command is issued or simply suspend the Command until you desire to activate it.

Every hack you make leaves behind a shining pink stone in the system as a personal "calling card" that informs anyone who uses the system that the hack occurred.

  • You can target yourself if you qualify as a valid target by the other requirements.

Spend 2 Actions. Select a Computer within arm's reach. Can be used on Alien technology. Roll Intellect + Technology, with the Difficulty set by the GM depending on the security of the system you are hacking. Sapient targets can resist by rolling Mind at Difficulty 6.

If you succeed, you may issue a single command to the targeted system. This command must have a specific outcome or be a request for specific login credentials. The command you issue must be within the machine's current capabilities. For example, you cannot order a standard security camera to grow legs and walk around.

This Gift cannot have more than 3 Drawbacks, and its Gift Cost is capped at 1.

  • You cannot hack things outside of your range over remote connections such as the internet. The system you are affecting must be physically within range.
  • You can target yourself if you qualify as a valid target by the other requirements.
  • Your target must be within line of sight, or within range of another sense if more fitting for the Gift's flavor.

Spend 1 minute. Select a Computer within arm's reach. Does not work on Alien technology. Roll Intellect + Technology, with the Difficulty set by the GM depending on the security of the system you are hacking. Sapient targets can resist by rolling Mind at Difficulty 6.

If you succeed, you may issue a single command to the targeted system. This command must have a specific outcome or be a request for specific login credentials. The command you issue must be within the machine's current capabilities. For example, you cannot order a standard security camera to grow legs and walk around.

This Gift cannot have more than 3 Drawbacks, and its Gift Cost is capped at 2.

  • You cannot hack things outside of your range over remote connections such as the internet. The system you are affecting must be physically within range.
  • You can target yourself if you qualify as a valid target by the other requirements.
  • Your target must be within line of sight, or within range of another sense if more fitting for the Gift's flavor.

Spend 1 minute. Select a Computer within 20 feet. Can be used on Alien technology. You must actively and obviously use an electrum shard to activate this Effect. Roll Intellect + Technology, with the Difficulty set by the GM depending on the security of the system you are hacking. Sapient targets can resist by rolling Mind at Difficulty 6.

If you succeed, you may issue a single command to the targeted system. This command must have a specific outcome or be a request for specific login credentials. The command you issue must be within the machine's current capabilities. For example, you cannot order a standard security camera to grow legs and walk around.

Every hack you make leaves behind distorted lightning in the system as a personal "calling card" that informs anyone who uses the system that the hack occurred.

This Gift cannot have more than 3 Drawbacks, and its Gift Cost is capped at 2.

  • You cannot hack things outside of your range over remote connections such as the internet. The system you are affecting must be physically within range.
  • You can target yourself if you qualify as a valid target by the other requirements.
  • Your target must be within line of sight, or within range of another sense if more fitting for the Gift's flavor.

Spend 1 minute. Select a Device within arm's reach. Does not work on Alien technology. Roll Intellect + Technology, with the Difficulty set by the GM depending on the security of the system you are hacking. Sapient targets can resist by rolling Mind at Difficulty 6.

If you succeed, you may issue a single command to the targeted system. This command must have a specific outcome or be a request for specific login credentials. The command you issue must be within the machine's current capabilities. For example, you cannot order a standard security camera to grow legs and walk around.

When targeting non-computer devices, you may operate switches, buttons, dials, levers, and latches.

Every hack you make leaves behind Shows a picture of a silenced pistol in the system as a personal "calling card" that informs anyone who uses the system that the hack occurred.

This Gift's Cost is capped at 2 and cannot be increased further.

  • You can target yourself if you qualify as a valid target by the other requirements.
  • Your target must be within line of sight, or within range of another sense if more fitting for the Gift's flavor.

Stock Hack Gifts

Exert your Mind and spend 1 minute. Select a Computer within arm's reach. Does not work on Alien technology. Roll Intellect + Technology, with the Difficulty set by the GM depending on the security of the system you are hacking. Sapient targets can resist by rolling Mind at Difficulty 6.

If you succeed, you may issue a single command to the targeted system. This command must have a specific outcome or be a request for specific login credentials. The command you issue must be within the machine's current capabilities. For example, you cannot order a standard security camera to grow legs and walk around.

If your command does not require bypassing the security of the target (for example, typing on a computer that is unlocked), you do not need to Exert your Mind to activate this Effect, and activation only takes a single Action.

Your Hack cannot be reversed through mundane means for a number of hours equal to your Outcome.

Every hack you make leaves behind a flickering image of a ghost in the system as a personal "calling card" that informs anyone who uses the system that the hack occurred.

  • You cannot hack things outside of your range over remote connections such as the internet. The system you are affecting must be physically within range.
  • You can target yourself if you qualify as a valid target by the other requirements.
  • Your target must be within line of sight, or within range of another sense if more fitting for the Gift's flavor.