A golden Lotus pattern begins revolving in Amarjeet's eyes. After the Hack is completed, an identical pattern will be displayed somewhere on the UI of the affected device.
The Lotus III implant has been upgraded. Sophisticated decryption & code-breaking software is pre-loaded into the implant, optimized to synchronize with the end-user's conscious attempts to crack security systems. Capable of defeating the most sophisticated systems in moments, use of this feature causes the user's eyes to display the familiar Lotus Logo as a revolving pattern on the iris. Additionally, in what we consider to be a win for our marketing team, any device compromised by our software will display our Lotus Logo in system - all the better to alert potential clients of system vulnerabilities.
Operating the system linkage on a regular basis has been proven to damage the optic nerves: always use caution when operating prototype cybernetics.
Exert your Mind and spend 1 Action. Select a Computer within 300 feet. Can be used on Alien technology. Roll a single D10 as a critical failure check. If you roll a 1, the Effect fails, and you go Blind. Roll Intellect + Technology, with the Difficulty set by the GM depending on the security of the system you are hacking. Sapient targets can resist by rolling Mind at Difficulty 6.
If you succeed, you may issue a single command to the targeted system. This command must have a specific outcome or be a request for specific login credentials. The command you issue must be within the machine's current capabilities. For example, you cannot order a standard security camera to grow legs and walk around.
If your command does not require bypassing the security of the target (for example, typing on a computer that is unlocked), you do not need to Exert your Mind to activate this Effect, and activation only takes a single Action.
Every hack you make leaves behind Lotus Logo in the system as a personal "calling card" that informs anyone who uses the system that the hack occurred.
True to their namesake, the hacker can penetrate the security of any computer system, granting access to its informational stores, or, in a pinch, allowing them to issue commands. The hacked system will display a flickering image of a ghost until it is dismissed.
While hacking, The Technician's fingers move with supernatural speed, blurring like a ghost.
Exert your Mind and spend 1 minute. Select a Computer within arm's reach. Does not work on Alien technology. Roll Intellect + Technology, with the Difficulty set by the GM depending on the security of the system you are hacking. Sapient targets can resist by rolling Mind at Difficulty 6.
If you succeed, you may issue a single command to the targeted system. This command must have a specific outcome or be a request for specific login credentials. The command you issue must be within the machine's current capabilities. For example, you cannot order a standard security camera to grow legs and walk around.
If your command does not require bypassing the security of the target (for example, typing on a computer that is unlocked), you do not need to Exert your Mind to activate this Effect, and activation only takes a single Action.
Your Hack cannot be reversed through mundane means for a number of hours equal to your Outcome.
Every hack you make leaves behind a flickering image of a ghost in the system as a personal "calling card" that informs anyone who uses the system that the hack occurred.
"With holy light the world is revealed and those that want to transcend now may look upon the sacred rite and now my succumb the the dark and see the truth" (Uckerberg, 10)
Jer is able to effect technology with the chip in his head that has disfigured him the chip is pronounced on his head. He stares at the technology and through infrared and blue-tooth technology he is able to unlock it.
Spend 1 minute to activate. Select a Computer within arm's reach. Does not work on Alien technology. You must actively and obviously use Eye ball implant to activate this Effect. Roll Charisma + Technology, with the Difficulty set by the GM depending on the security of the system you are hacking. Sapient targets can resist by rolling Mind at Difficulty 6. The hacking roll and their defensive roll are both Difficulty 6.
If you succeed, you may issue a single command to the targeted system. This command must have a specific outcome or be a request for specific login credentials. The command you issue must be within the machine's current capabilities. For example, you cannot order a standard security camera to grow legs and walk around.
If your command does not require bypassing the security of the target (for example, typing on a computer that is unlocked), you do not need to Exert your Mind to activate this Effect, and activation only takes a single Action.
This Gift's level is capped at 2 Gifts and cannot be increased further.
Possession of this Power grants the following Battle Scar: Left eye with green veins.
S0L scratches or burns something that looks like a small sun into a surface, but is actually a complex set of instructions in insanely small symbols. A complete system override for any robot or "living computer" not prepared to look at it.
Once the trap triggers, S0L is connected to the victim and may even make their circuits overheat and their bodies burn.
Anyone checking the system afterwards will find an ASCII sun prominently "burnt" into the code.
If you know that an evil copy of you is somewhere out there, you have to find a way to defeat them without giving up on your ideals.
Exert your Mind and spend 30 seconds to trap a region of any shape that contains your current location and fits entirely within 20 feet. This trap lasts until triggered or disarmed. This Effect cannot be used unless the target is an Animate Computer. Roll Perception + Technology, with the Difficulty set by the GM depending on the security of the system you are hacking.
The trap looks like a scratched or burnt sun pictogram. Only those who have seen this trap before can identify it as a trap. Anyone who is aware of the trap may intuitively avoid, trigger, or destroy it.
Any Computer that enters the chosen region will trigger the trap. Sapient targets can resist by rolling Mind at Difficulty 6.
If you succeed, you may issue a single command to the targeted system. This command must have a specific outcome or be a request for specific login credentials. The command you issue must be within the machine's current capabilities. For example, you cannot order a standard security camera to grow legs and walk around.
You may issue a "self-destruct" command that leaves the hacked system's hardware inoperable, even if that machine had no such functionality previously. Only works on Computers.
Every hack you make leaves behind A sun on a prominent display in the system as a personal "calling card" that informs anyone who uses the system that the hack occurred.
You may only use this Effect once per day.
Minerva wiggles her nose absentmindedly as she finds her target in the Dreamlands. Once she does, she slips into its Dream - for all things have Dreams - even objects. Once inside of its dream, she can talk with it, persuading it to behave as she desires.
"I am locked."
"Yes, but you *could* be unlocked."
-----------------------------------
It does require her to be able to focus properly and not distracted.
Spend 2 Actions. Select a Computer within arm's reach. Can be used on Alien technology. This Effect cannot be used unless you have no Body damage and your Mind is Agitated or better. Roll Charisma + Influence, with the Difficulty set by the GM depending on the security of the system you are hacking. Sapient targets can resist by rolling Mind at Difficulty 6.
If you succeed, you may issue a single command to the targeted system. This command must have a specific outcome or be a request for specific login credentials. The command you issue must be within the machine's current capabilities. For example, you cannot order a standard security camera to grow legs and walk around.
This Effect is not obvious, and the only sign you are using an Effect is nose wiggling. If someone suspects that an Effect was used, they must roll Perception + Alertness, Difficulty 8 to pick up on your Tell.
This Gift cannot have more than 3 Drawbacks, and its Gift Cost is capped at 2.
Possession of this Power grants the following Trauma at all times: More Thought than Form: Failing a limit roll causes a momentary crisis, and Minerva's form flickers. She takes a severity one from this.
Nik taps at his smartphone for a few moments. Faintly glowing lines resembling the traces of a circuit board flow over the ground to the targeted device. As they fade away, a satisfied smirk appears on their face.
Was that thing even on the network? Doesn't matter, they have access.
If it exists, it can be hacked. Nik believes that this maxim should be true for everything that exists, and this gift is their first step towards making that a reality.
Exert your Mind and spend 2 Actions. Select a Computer within 20 feet. Does not work on Alien technology. You must actively and obviously use smartphone to activate this Effect. Roll Intellect + Technology, with the Difficulty set by the GM depending on the security of the system you are hacking. Sapient targets can resist by rolling Mind at Difficulty 6.
If you succeed, you may issue a single command to the targeted system. This command must have a specific outcome or be a request for specific login credentials. The command you issue must be within the machine's current capabilities. For example, you cannot order a standard security camera to grow legs and walk around.
If your command does not require bypassing the security of the target (for example, typing on a computer that is unlocked), you do not need to Exert your Mind to activate this Effect, and activation only takes a single Action.
True to their namesake, the hacker can penetrate the security of any computer system, granting access to its informational stores, or, in a pinch, allowing them to issue commands. The hacked system will display a flickering image of a ghost until it is dismissed.
While hacking, The Technician's fingers move with supernatural speed, blurring like a ghost.
Exert your Mind and spend 1 minute. Select a Computer within arm's reach. Does not work on Alien technology. Roll Intellect + Technology, with the Difficulty set by the GM depending on the security of the system you are hacking. Sapient targets can resist by rolling Mind at Difficulty 6.
If you succeed, you may issue a single command to the targeted system. This command must have a specific outcome or be a request for specific login credentials. The command you issue must be within the machine's current capabilities. For example, you cannot order a standard security camera to grow legs and walk around.
If your command does not require bypassing the security of the target (for example, typing on a computer that is unlocked), you do not need to Exert your Mind to activate this Effect, and activation only takes a single Action.
Your Hack cannot be reversed through mundane means for a number of hours equal to your Outcome.
Every hack you make leaves behind a flickering image of a ghost in the system as a personal "calling card" that informs anyone who uses the system that the hack occurred.