Deus Ex Machina

1
The power to issue commands to technological devices.
Used by Allister Wildheart, Created by jjkilla234.
(When activating this Effect, it is obvious you are interacting with the target. )

Allister Reeves up his R.E.D Queen engine in his skull, overclocking it to allow it to make connections to the device. he then uses his mind scape (A Literal forge, anvil, and flowing lava in the shape of code and blueprints) to reforge the designs and intentions of the device to carry out his will.


Exert your Mind and spend 2 Actions. Select a Computer within 20 feet. Does not work on Alien technology. Roll Intellect + Technology, with the Difficulty set by the GM depending on the security of the system you are hacking. Sapient targets can resist by rolling Mind at Difficulty 6.

If you succeed, you may issue a single command to the targeted system. This command must have a specific outcome or be a request for specific login credentials. The command you issue must be within the machine's current capabilities. For example, you cannot order a standard security camera to grow legs and walk around.

Possession of this Power grants the following Trauma at all times: Compulsion to Protect The Innocent: When faced with a new opportunity to act on your compulsion, you must succeed a Self-Control roll to resist..

  • You can target yourself if you qualify as a valid target by the other requirements.
  • Your target must be within line of sight, or within range of another sense if more fitting for the Gift's flavor.

You are viewing an old version of this Gift.
To view the most recent version Click Here

Revision purchased with:
Improvement from running ANOINTED spent on improving power: Deus Ex Machina    (since refunded)
Revision purchased with:
Revision purchased with:
Revision purchased with:
Improvement from writing up ANOINTED spent on improving power: Deus Ex Machina    (since refunded)
Improvement from running ANOINTED spent on improving power: Deus Ex Machina    (since refunded)
Improvement from running ANOINTED spent on improving power: Deus Ex Machina    (since refunded)
Gift from playing in Animal Farm spent on improving power: Deus Ex Machina    (since refunded)
Revision purchased with:
Revision purchased with:
Improvement from running ANOINTED spent on improving power: Deus Ex Machina    (since refunded)
Improvement from running ANOINTED spent on improving power: Deus Ex Machina    (since refunded)
Revision purchased with:
Revision purchased with:
Improvement from writing up Dragons speak louder then words spent on improving power: synchronized clockwork    (since refunded)
Revision purchased with:
Revision purchased with:
Improvement from writing up ANOINTED spent on improving power: synchronized clockwork    (since refunded)
Revision purchased with:
Revision purchased with:

Community Hack Gifts

Exert your Mind and spend 1 minute. Select a Computer within 20 feet. Does not work on Alien technology. Roll Intellect + Technology, with the Difficulty set by the GM depending on the security of the system you are hacking. Sapient targets can resist by rolling Mind at Difficulty 6.

If you succeed, you may issue a single command to the targeted system. This command must have a specific outcome or be a request for specific login credentials. The command you issue must be within the machine's current capabilities. For example, you cannot order a standard security camera to grow legs and walk around.

This Effect is not obvious, and the only sign you are using an Effect is unfocused eyes. If someone suspects that an Effect was used, they must roll Perception + Alertness, Difficulty 8 to pick up on your Tell.

Your Hack cannot be reversed through mundane means for a number of hours equal to your Outcome.

Every hack you make leaves behind a warning pop-up that the system has been overriden and locked down on the order of C&C in the system as a personal "calling card" that informs anyone who uses the system that the hack occurred.

  • You cannot hack things outside of your range over remote connections such as the internet. The system you are affecting must be physically within range.
  • You can target yourself if you qualify as a valid target by the other requirements.
  • Your target must be within line of sight, or within range of another sense if more fitting for the Gift's flavor.

Owl had a great idea!

A way to interface with her computers and other devices without having that ability be tracked or stolen.

She didn’t think about all the consequences till halfway through the surgery.

Exert your Mind and spend 1 minute. Select a Computer within 300 feet. Does not work on Alien technology. Roll Intellect + Technology, with the Difficulty set by the GM depending on the security of the system you are hacking. Sapient targets can resist by rolling Mind at Difficulty 6.

If you succeed, you may issue a single command to the targeted system. This command must have a specific outcome or be a request for specific login credentials. The command you issue must be within the machine's current capabilities. For example, you cannot order a standard security camera to grow legs and walk around.

This Effect is not obvious, and the only sign you are using an Effect is Owl touches a scar near one of her eyes rubbing it some. If someone suspects that an Effect was used, they must roll Perception + Alertness, Difficulty 8 to pick up on your Tell.

Your command does not have to take effect immediately. Instead, upon a successful Hack, you may specify a condition under which the specified command is issued or simply suspend the Command until you desire to activate it.

Possession of this Power grants the following Battle Scar: Implant scars: Owl has several large scars covering her face, particularly around her eyes. This increases the difficulty of social rolls by one..

Possession of this Power grants the following Trauma at all times: Technological Paranoia: You come across an active security system you don’t control, you must make a self control roll to not attempt to take it over..

  • You cannot hack things outside of your range over remote connections such as the internet. The system you are affecting must be physically within range.
  • You can target yourself if you qualify as a valid target by the other requirements.
  • Your target must be within line of sight, or within range of another sense if more fitting for the Gift's flavor.

Spend 1 minute. Select a Computer within arm's reach. Can be used on Alien technology. Roll Intellect + Technology, with the Difficulty set by the GM depending on the security of the system you are hacking. Sapient targets can resist by rolling Mind at Difficulty 6.

If you succeed, you may issue a single command to the targeted system. This command must have a specific outcome or be a request for specific login credentials. The command you issue must be within the machine's current capabilities. For example, you cannot order a standard security camera to grow legs and walk around.

Your command does not have to take effect immediately. Instead, upon a successful Hack, you may specify a condition under which the specified command is issued or simply suspend the Command until you desire to activate it.

Every hack you make leaves behind Any lights attached to the system turning purple and yellow in the system as a personal "calling card" that informs anyone who uses the system that the hack occurred.

Anyone who witnesses you during this Effect's activation will almost certainly be disturbed to see Kanni's fingers split open and fold back, many tools revealing themselves as they begin to pluck and play with the device, scanning, prodding, etc.

This Gift cannot have more than 3 Drawbacks, and its Gift Cost is capped at 2.

  • When narrating disturbing content, be cognizant of your group's tone and accommodating to those who would like to "fast forward" through the description.
  • You cannot hack things outside of your range over remote connections such as the internet. The system you are affecting must be physically within range.
  • You can target yourself if you qualify as a valid target by the other requirements.
  • Your target must be within line of sight, or within range of another sense if more fitting for the Gift's flavor.

Exert your Mind and spend 1 minute. Select a Device within 300 feet. Does not work on Alien technology. You must actively and obviously use an electronic device capable of some form of internet or networking to activate this Effect. Roll Intellect + Technology, with the Difficulty set by the GM depending on the security of the system you are hacking. Sapient targets can resist by rolling Mind at Difficulty 6.

If you succeed, you may issue a single command to the targeted system. This command must have a specific outcome or be a request for specific login credentials. The command you issue must be within the machine's current capabilities. For example, you cannot order a standard security camera to grow legs and walk around.

You may issue a "self-destruct" command that leaves the hacked system's hardware inoperable, even if that machine had no such functionality previously. Only works on Computers.

When targeting non-computer devices, you may operate switches, buttons, dials, levers, and latches.

Every hack you make leaves behind an impossible locale in the system as a personal "calling card" that informs anyone who uses the system that the hack occurred.

  • You can target yourself if you qualify as a valid target by the other requirements.
  • Your target must be within line of sight, or within range of another sense if more fitting for the Gift's flavor.

Exert your Mind and spend 1 minute. Select a Computer within 20 feet. Does not work on Alien technology. This Effect cannot be used unless the target is capable of connecting via bluetooth. You must actively and obviously use a smartphone to activate this Effect. Roll Dexterity + Technology, with the Difficulty set by the GM depending on the security of the system you are hacking. Sapient targets can resist by rolling Mind at Difficulty 6.

If you succeed, you may issue a single command to the targeted system. This command must have a specific outcome or be a request for specific login credentials. The command you issue must be within the machine's current capabilities. For example, you cannot order a standard security camera to grow legs and walk around.

You may issue a "self-destruct" command that leaves the hacked system's hardware inoperable, even if that machine had no such functionality previously. Only works on Computers.

Your Hack cannot be reversed through mundane means for a number of hours equal to your Outcome.

Your hack cannot be discovered by system administrators or firewall software for a number of hours equal to your Outcome on the initial roll.

You may only use this Effect once per day.

  • You can target yourself if you qualify as a valid target by the other requirements.
  • Your target must be within line of sight, or within range of another sense if more fitting for the Gift's flavor.

Stock Hack Gifts

Exert your Mind and spend 1 minute. Select a Computer within arm's reach. Does not work on Alien technology. Roll Intellect + Technology, with the Difficulty set by the GM depending on the security of the system you are hacking. Sapient targets can resist by rolling Mind at Difficulty 6.

If you succeed, you may issue a single command to the targeted system. This command must have a specific outcome or be a request for specific login credentials. The command you issue must be within the machine's current capabilities. For example, you cannot order a standard security camera to grow legs and walk around.

If your command does not require bypassing the security of the target (for example, typing on a computer that is unlocked), you do not need to Exert your Mind to activate this Effect, and activation only takes a single Action.

Your Hack cannot be reversed through mundane means for a number of hours equal to your Outcome.

Every hack you make leaves behind a flickering image of a ghost in the system as a personal "calling card" that informs anyone who uses the system that the hack occurred.

  • You cannot hack things outside of your range over remote connections such as the internet. The system you are affecting must be physically within range.
  • You can target yourself if you qualify as a valid target by the other requirements.
  • Your target must be within line of sight, or within range of another sense if more fitting for the Gift's flavor.