Virtual Interference Can be used for more than just doors

1
The power to issue commands to technological devices.
Used by Crane Albright, Created by GreenAppll.
(When activating this Effect, it is obvious you are interacting with the target. You must actively and obviously be using Nanite Factory.)

When utilizing this gift, the factory gives off some electricity as the nanites within your body swarms with the factory as a command center.

Upon activation. Nanites with pre-inputted program floods the machinery, executing the order


Exert your Mind and spend 1 minute to activate. Select a Device within arm's reach. Does not work on Alien technology. You must actively and obviously use Nanite Factory to activate this Effect. Roll Intellect + Technology, with the Difficulty set by the GM depending on the security of the system you are hacking. Sapient targets can resist by rolling Mind at Difficulty 6. The hacking roll and their defensive roll are both Difficulty 6.

If you succeed, you may issue a single command to the targeted system. This command must have a specific outcome or be a request for specific login credentials. The command you issue must be within the machine's current capabilities. For example, you cannot order a standard security camera to grow legs and walk around.

You may issue a "self-destruct" command that leaves the hacked system's hardware inoperable, even if that machine had no such functionality previously.

Every hack you make leaves behind A Clown taunting in the system as a personal "calling card" that informs anyone who uses the system that the hack occurred.

  • When targeting non-computer devices, you may operate switches, buttons, dials, levers, and latches.
  • You can target yourself if you qualify as a valid target by the other requirements.

You are viewing an old version of this Gift.
To view the most recent version Click Here

Revision purchased with:
Improvement from writing up A Maelstrom of Typhoons spent on improving power: Virtual Dominance    (since refunded)
Revision purchased with:
Revision purchased with:
Gift from playing in Snow-White spent on improving power: Virtual Dominance    (since refunded)
Revision purchased with:
Improvement from writing up TPS delivery spent on improving power: Virtual Dominance
Revision purchased with:
Gift from playing in Skirmish spent on improving power: Virtual Interference    (since refunded)
Revision purchased with:
Improvement from writing up Slithering Patience spent on improving power: Virtual Interference
Revision purchased with:
Gift from the Asset Gifted spent on new power: Calligraphy Imprint

Community Hack Gifts

Exert your Mind and spend an Action. Select a Location within 10 feet.

You place a ward, which is fixed to its initial location. You can perceive with all your senses through the ward as though you were standing at its location. This Artifact may have at most 3 wards active at once.

The ward requires Concentration to monitor, though it will remain active until you deactivate it. It can be detected with a roll and destroyed through mundane means.

You may destroy the Ward to activate one Investigate Individual, Object, or Area Effect as though you were standing at its location.

You may communicate through your ward, though doing so will reveal its presence.

  • Full Spectrum: This investigation Effect is as obvious as it would normally be. The Effect is targeted as though you were standing at the location of the Ward. You must pay all activation costs and satisfy all activation requirements of the Effect.
  • Your ward cannot be used to satisfy the line of sight requirement for targeted Effects.
  • You can target yourself if you qualify as a valid target by the other requirements.
  • Your target must be within line of sight, or within range of another sense if more fitting for the Gift's flavor.

Fortuna's not aware she's manipulating the slot machines with just the right timing of button presses and lever pulls. She thinks she's just lucky...

Spend 15 minutes. Select a Device within arm's reach. Does not work on Alien technology. This Effect cannot be used unless it is used on slot machines. Roll Charisma + Thievery, with the Difficulty set by the GM depending on the security of the system you are hacking. Sapient targets can resist by rolling Mind at Difficulty 6.

If you succeed, you may issue a single command to the targeted system. This command must have a specific outcome or be a request for specific login credentials. The command you issue must be within the machine's current capabilities. For example, you cannot order a standard security camera to grow legs and walk around.

When targeting non-computer devices, you may operate switches, buttons, dials, levers, and latches.

Your hack cannot be discovered by system administrators or firewall software for a number of hours equal to your Outcome on the initial roll.

This Gift's Cost is capped at 2 and cannot be increased further.

  • You can target yourself if you qualify as a valid target by the other requirements.
  • Your target must be within line of sight, or within range of another sense if more fitting for the Gift's flavor.

Expend a point of Battery and spend 2 Actions to activate. Select a Device within arm's reach. Does not work on Alien technology. Roll Intellect + Technology, with the Difficulty set by the GM depending on the security of the system you are hacking. Sapient targets can resist by rolling Mind at Difficulty 6. The hacking roll and their defensive roll are both Difficulty 6.

If you succeed, you may issue a single command to the targeted system. This command must have a specific outcome or be a request for specific login credentials. The command you issue must be within the machine's current capabilities. For example, you cannot order a standard security camera to grow legs and walk around.

If your command does not require bypassing the security of the target (for example, typing on a computer that is unlocked), you do not need to Exert your Mind to activate this Effect, and activation only takes a single Action.

After you finish activating this Effect, you cannot move quicker than a walk (max 15 feet per Round) for one minute and suffer a -1 dice penalty for an hour.

Possession of this Artifact causes the following Trauma to manifest over the course of a day: Must be helpful to anyone with a Kevin bracelet. If you lose possession of this Artifact, the Trauma heals over the course of the next month.

  • When targeting non-computer devices, you may operate switches, buttons, dials, levers, and latches.
  • You can target yourself if you qualify as a valid target by the other requirements.

The vehicle makes the stereotypical noise a vehicle being unlocked (whether or not that model does or even has unlocks electronic or not.)

Exert your Mind and spend 2 Actions. Select a Device within 20 feet. Does not work on Alien technology. This Effect cannot be used unless hacking a vehicle. Roll Dexterity + Thievery, with the Difficulty set by the GM depending on the security of the system you are hacking. Sapient targets can resist by rolling Mind at Difficulty 6.

If you succeed, you may issue a single command to the targeted system. This command must have a specific outcome or be a request for specific login credentials. The command you issue must be within the machine's current capabilities. For example, you cannot order a standard security camera to grow legs and walk around.

If your command does not require bypassing the security of the target (for example, typing on a computer that is unlocked), you do not need to Exert your Mind to activate this Effect, and activation only takes a single Action.

When targeting non-computer devices, you may operate switches, buttons, dials, levers, and latches.

Your hack cannot be discovered by system administrators or firewall software for a number of hours equal to your Outcome on the initial roll.

  • You cannot hack things outside of your range over remote connections such as the internet. The system you are affecting must be physically within range.
  • You can target yourself if you qualify as a valid target by the other requirements.
  • Your target must be within line of sight, or within range of another sense if more fitting for the Gift's flavor.

Exert your Mind and spend 2 Actions. Select a Computer within arm's reach. Does not work on Alien technology. Roll Intellect + Technology, with the Difficulty set by the GM depending on the security of the system you are hacking. Sapient targets can resist by rolling Mind at Difficulty 6.

If you succeed, you may issue a single command to the targeted system. This command must have a specific outcome or be a request for specific login credentials. The command you issue must be within the machine's current capabilities. For example, you cannot order a standard security camera to grow legs and walk around.

Your hack cannot be discovered by system administrators or firewall software for a number of hours equal to your Outcome on the initial roll.

You may only use this Effect once per day.

  • You can target yourself if you qualify as a valid target by the other requirements.
  • Your target must be within line of sight, or within range of another sense if more fitting for the Gift's flavor.

Stock Hack Gifts

Exert your Mind and spend 1 minute. Select a Computer within arm's reach. Does not work on Alien technology. Roll Intellect + Technology, with the Difficulty set by the GM depending on the security of the system you are hacking. Sapient targets can resist by rolling Mind at Difficulty 6.

If you succeed, you may issue a single command to the targeted system. This command must have a specific outcome or be a request for specific login credentials. The command you issue must be within the machine's current capabilities. For example, you cannot order a standard security camera to grow legs and walk around.

If your command does not require bypassing the security of the target (for example, typing on a computer that is unlocked), you do not need to Exert your Mind to activate this Effect, and activation only takes a single Action.

Your Hack cannot be reversed through mundane means for a number of hours equal to your Outcome.

Every hack you make leaves behind a flickering image of a ghost in the system as a personal "calling card" that informs anyone who uses the system that the hack occurred.

  • You cannot hack things outside of your range over remote connections such as the internet. The system you are affecting must be physically within range.
  • You can target yourself if you qualify as a valid target by the other requirements.
  • Your target must be within line of sight, or within range of another sense if more fitting for the Gift's flavor.