Allister Reeves up his R.E.D Queen engine in his skull, overclocking it to allow it to make connections to the device. he then uses his mind scape (A Literal forge, anvil, and flowing lava in the shape of code and blueprints) to reforge the designs and intentions of the device to carry out his will.
Exert your Mind and spend 1 minute. Select a Device within 20 feet. Does not work on Alien technology. Roll Intellect + Technology, with the Difficulty set by the GM depending on the security of the system you are hacking. Sapient targets can resist by rolling Mind at Difficulty 6.
If you succeed, you may issue a single command to the targeted system. This command must have a specific outcome or be a request for specific login credentials. The command you issue must be within the machine's current capabilities. For example, you cannot order a standard security camera to grow legs and walk around.
When targeting non-computer devices, you may operate switches, buttons, dials, levers, and latches.
Possession of this Power grants the following Trauma at all times: Compulsion to Protect The Innocent: When faced with a new opportunity to act on your compulsion, you must succeed a Self-Control roll to resist..
Mr. Tummy has a Tamagotchi in her Tummy!
Mametchi gives a short vibration of confirmation from inside the Tummy. Mr. Tummy Mrrp's in surprise --
15 feet away, the Officer's service weapon goes off, angled unfortunately into his thigh by the body of the man he's holding down.
⁝⁝⁝⁞⁞⁝⁞⁝⁞⁞⁝⁞⁝⁞⁝⁞ʕु•̫͡•ʔु☂⁝⁞⁝⁝⁞⁝⁞⁝⁞⁝
Exert your Mind and spend 2 Actions. Select a Device within 20 feet. Does not work on Alien technology. Roll Perception + Technology, with the Difficulty set by the GM depending on the security of the system you are hacking. Sapient targets can resist by rolling Mind at Difficulty 6.
If you succeed, you may issue a single command to the targeted system. This command must have a specific outcome or be a request for specific login credentials. The command you issue must be within the machine's current capabilities. For example, you cannot order a standard security camera to grow legs and walk around.
If your command does not require bypassing the security of the target (for example, typing on a computer that is unlocked), you do not need to Exert your Mind to activate this Effect, and activation only takes a single Action.
When targeting non-computer devices, you may operate switches, buttons, dials, levers, and latches.
Every hack you make leaves behind a pixelated Mametchi in the system as a personal "calling card" that informs anyone who uses the system that the hack occurred.
Possession of this Power grants the following Battle Scar: Soft spot - Sensitive tummy.
Possession of this Power grants the following Trauma at all times: Weak Willed - I can't stomach this!!!.
The modem, when placed and given a target device, will quietly bleep and bloop for a number of minutes, sending it's payload over the airways and through the subnets a couple bytes at a time so as to not fly any flags. After it's upload is completed, it will immediately self destruct, jacking the user out unsafely.
Spend 15 minutes and use up this Modem. Select a Computer within 300 feet. Does not work on Alien technology. Roll 7 dice Difficulty 6, dice penalties do not apply. Sapient targets can resist by rolling Mind at Difficulty 6.
If you succeed, you may issue a single command to the targeted system. This command must have a specific outcome or be a request for specific login credentials. The command you issue must be within the machine's current capabilities. For example, you cannot order a standard security camera to grow legs and walk around.
Your Hack cannot be reversed through mundane means for a number of hours equal to your Outcome.
Your hack cannot be discovered by system administrators or firewall software for a number of hours equal to your Outcome on the initial roll.
After you finish activating this Effect, you cannot move quicker than a walk (max 15 feet per Round) for one minute and suffer a -1 dice penalty for an hour. Exhaustion’s penalty and duration stacks with multiple activations.
Be it a mobile phone, desktop, vending machine, somehow if the OS can be on a machine it will be when Eun-Ha interacts with it. Even if the device wasn't originally hers or in her possession long enough for her to have downloaded or uploaded it.
As it can only work on Leng system locale it will automatically change the locale of any system it interacts with before any command is issued. Afterwards any machine or device within 300 feet is beholden to the system. No exceptions. Except for those most alien for now...
Exert your Mind and spend 1 minute. Select a Device within 300 feet. Does not work on Alien technology. You must actively and obviously use an electronic device capable of some form of internet or networking to activate this Effect. Roll Intellect + Technology, with the Difficulty set by the GM depending on the security of the system you are hacking. Sapient targets can resist by rolling Mind at Difficulty 6.
If you succeed, you may issue a single command to the targeted system. This command must have a specific outcome or be a request for specific login credentials. The command you issue must be within the machine's current capabilities. For example, you cannot order a standard security camera to grow legs and walk around.
You may issue a "self-destruct" command that leaves the hacked system's hardware inoperable, even if that machine had no such functionality previously. Only works on Computers.
When targeting non-computer devices, you may operate switches, buttons, dials, levers, and latches.
Every hack you make leaves behind an impossible locale in the system as a personal "calling card" that informs anyone who uses the system that the hack occurred.
Spend 2 Actions. Select a Device within arm's reach. Can be used on Alien technology. Roll Charisma + Occult, with the Difficulty set by the GM depending on the security of the system you are hacking. Sapient targets can resist by rolling Mind at Difficulty 6.
If you succeed, you may issue a single command to the targeted system. This command must have a specific outcome or be a request for specific login credentials. The command you issue must be within the machine's current capabilities. For example, you cannot order a standard security camera to grow legs and walk around.
When targeting non-computer devices, you may operate switches, buttons, dials, levers, and latches.
Every hack you make leaves behind Holy Symbols in the system as a personal "calling card" that informs anyone who uses the system that the hack occurred.
This Gift cannot have more than 3 Drawbacks, and its Gift Cost is capped at 1.
Clyw begins focusing hard, typing away on their Cyberdeck. Suddenly, sparks fly as the infected machine switches sides, into Clyw's control.
Clyw's nature as a sentient program allows them an intrinsic understanding of computer functions and what they can and can't do. While Clyw is not a malicious program by nature or at heart, they have the capabilities to be one. Any technological blockade will soon be sorted out in the flashiest manner possible.
Spend 2 Actions. Select a Computer within 20 feet. Does not work on Alien technology. You must actively and obviously use A Portable Computer to activate this Effect. Roll Intellect + Technology, with the Difficulty set by the GM depending on the security of the system you are hacking. Sapient targets can resist by rolling Mind at Difficulty 6.
If you succeed, you may issue a single command to the targeted system. This command must have a specific outcome or be a request for specific login credentials. The command you issue must be within the machine's current capabilities. For example, you cannot order a standard security camera to grow legs and walk around.
This Gift's Cost is capped at 2 and cannot be increased further.
True to their namesake, the hacker can penetrate the security of any computer system, granting access to its informational stores, or, in a pinch, allowing them to issue commands. The hacked system will display a flickering image of a ghost until it is dismissed.
While hacking, The Technician's fingers move with supernatural speed, blurring like a ghost.
Exert your Mind and spend 1 minute. Select a Computer within arm's reach. Does not work on Alien technology. Roll Intellect + Technology, with the Difficulty set by the GM depending on the security of the system you are hacking. Sapient targets can resist by rolling Mind at Difficulty 6.
If you succeed, you may issue a single command to the targeted system. This command must have a specific outcome or be a request for specific login credentials. The command you issue must be within the machine's current capabilities. For example, you cannot order a standard security camera to grow legs and walk around.
If your command does not require bypassing the security of the target (for example, typing on a computer that is unlocked), you do not need to Exert your Mind to activate this Effect, and activation only takes a single Action.
Your Hack cannot be reversed through mundane means for a number of hours equal to your Outcome.
Every hack you make leaves behind a flickering image of a ghost in the system as a personal "calling card" that informs anyone who uses the system that the hack occurred.