Portunalia Mk7 Remote Interface Implant

1
The power to issue commands to technological devices.
Used by Liv Hall, Created by Iamangelofwar.
(This Effect is obviously Alien when used. When activating this Effect, it is obvious you are interacting with the target. )

This implant sits behind Liv’s left ear, a patch of metal that has an odd, unique port in it, alongside what appears to be slots for memory cards.

When she uses this implant, the implant projects the code in front of her face or above her hand, as she runs through it all, making it easier for her to see, but also easier for her to be spotted.


Exert your Mind and spend 1 minute. Select a Computer within 20 feet. Does not work on Alien technology. Roll Intellect + Technology, with the Difficulty set by the GM depending on the security of the system you are hacking. Sapient targets can resist by rolling Mind at Difficulty 6.

If you succeed, you may issue a single command to the targeted system. This command must have a specific outcome or be a request for specific login credentials. The command you issue must be within the machine's current capabilities. For example, you cannot order a standard security camera to grow legs and walk around.

  • You cannot hack things outside of your range over remote connections such as the internet. The system you are affecting must be physically within range.
  • You can target yourself if you qualify as a valid target by the other requirements.
  • Your target must be within line of sight, or within range of another sense if more fitting for the Gift's flavor.

Community Hack Gifts

Exert your Mind and spend 1 minute. Select a Device within 20 feet. Does not work on Alien technology. Roll Intellect + Technology, with the Difficulty set by the GM depending on the security of the system you are hacking. Sapient targets can resist by rolling Mind at Difficulty 6.

If you succeed, you may issue a single command to the targeted system. This command must have a specific outcome or be a request for specific login credentials. The command you issue must be within the machine's current capabilities. For example, you cannot order a standard security camera to grow legs and walk around.

Your command does not have to take effect immediately. Instead, upon a successful Hack, you may specify a condition under which the specified command is issued or simply suspend the Command until you desire to activate it.

If your command does not require bypassing the security of the target (for example, typing on a computer that is unlocked), you do not need to Exert your Mind to activate this Effect, and activation only takes a single Action.

When targeting non-computer devices, you may operate switches, buttons, dials, levers, and latches.

Anyone who touches this Artifact will notice it warping their mind and may drop it. If they choose to hold or use it, they immediately receive the following Trauma: Father of Machines: You are a creation of man, and you love your fellow devices and computers. (You must roll self control to damage or destroy any devices computers.). If they lose possession of this Artifact, the Trauma heals over the course of the next day.

  • You can target yourself if you qualify as a valid target by the other requirements.
  • Your target must be within line of sight, or within range of another sense if more fitting for the Gift's flavor.

Exert your Mind and spend 1 minute. Select a Computer within 20 feet. Does not work on Alien technology. This Effect cannot be used unless the target is capable of connecting via bluetooth. You must actively and obviously use a smartphone to activate this Effect. Roll Dexterity + Technology, with the Difficulty set by the GM depending on the security of the system you are hacking. Sapient targets can resist by rolling Mind at Difficulty 6.

If you succeed, you may issue a single command to the targeted system. This command must have a specific outcome or be a request for specific login credentials. The command you issue must be within the machine's current capabilities. For example, you cannot order a standard security camera to grow legs and walk around.

You may issue a "self-destruct" command that leaves the hacked system's hardware inoperable, even if that machine had no such functionality previously. Only works on Computers.

Your Hack cannot be reversed through mundane means for a number of hours equal to your Outcome.

Your hack cannot be discovered by system administrators or firewall software for a number of hours equal to your Outcome on the initial roll.

You may only use this Effect once per day.

  • You can target yourself if you qualify as a valid target by the other requirements.
  • Your target must be within line of sight, or within range of another sense if more fitting for the Gift's flavor.

Exert your Mind and spend 1 minute. Select a Computer within 20 feet. Does not work on Alien technology. Roll a single D10 as a critical failure check. If you roll a 1, the Effect fails, and you disable the artifact for a downtime as it hacks itself.. Roll Dexterity + Technology, with the Difficulty set by the GM depending on the security of the system you are hacking. Sapient targets can resist by rolling Mind at Difficulty 6.

If you succeed, you may issue a single command to the targeted system. This command must have a specific outcome or be a request for specific login credentials. The command you issue must be within the machine's current capabilities. For example, you cannot order a standard security camera to grow legs and walk around.

If your command does not require bypassing the security of the target (for example, typing on a computer that is unlocked), you do not need to Exert your Mind to activate this Effect, and activation only takes a single Action.

Every hack you make leaves behind A gif of a seal clapping and arfing. in the system as a personal "calling card" that informs anyone who uses the system that the hack occurred.

  • You can target yourself if you qualify as a valid target by the other requirements.
  • Your target must be within line of sight, or within range of another sense if more fitting for the Gift's flavor.

If you know that an evil copy of you is somewhere out there, you have to find a way to defeat them without giving up on your ideals.

Exert your Mind and spend 30 seconds to trap a region of any shape that contains your current location and fits entirely within 20 feet. This trap lasts until triggered or disarmed. This Effect cannot be used unless the target is an Animate Computer. Roll Perception + Technology, with the Difficulty set by the GM depending on the security of the system you are hacking.

The trap looks like a scratched or burnt sun pictogram. Only those who have seen this trap before can identify it as a trap. Anyone who is aware of the trap may intuitively avoid, trigger, or destroy it.

Any Computer that enters the chosen region will trigger the trap. Sapient targets can resist by rolling Mind at Difficulty 6.

If you succeed, you may issue a single command to the targeted system. This command must have a specific outcome or be a request for specific login credentials. The command you issue must be within the machine's current capabilities. For example, you cannot order a standard security camera to grow legs and walk around.

You may issue a "self-destruct" command that leaves the hacked system's hardware inoperable, even if that machine had no such functionality previously. Only works on Computers.

Every hack you make leaves behind A sun on a prominent display in the system as a personal "calling card" that informs anyone who uses the system that the hack occurred.

You may only use this Effect once per day.

  • Multiple traps cannot be placed in the exact same location or be triggered by the same single Action. Nor can one trap triggering cause another to trigger.
  • Trap can only be spotted by someone who has witnessed this particular trap before, has been informed, or possesses relevant supernatural abilities. They must achieve an Outcome of 4 or higher on a Perception + Alertness roll to do so.
  • The area you choose where the trap can be triggered may be just a single location, similar to a tripwire or a pressure plate, or it can be a proximity trigger which hits anyone who comes within the specified range of the trap. This is defined by you when you place the trap and cannot be changed once the trap is placed.

Spend 2 Actions. Select a Computer within 20 feet. Can be used on Alien technology. Roll Intellect + Technology, with the Difficulty set by the GM depending on the security of the system you are hacking. Sapient targets can resist by rolling Mind at Difficulty 6.

If you succeed, you may issue a single command to the targeted system. This command must have a specific outcome or be a request for specific login credentials. The command you issue must be within the machine's current capabilities. For example, you cannot order a standard security camera to grow legs and walk around.

Every hack you make leaves behind a sheriff's star icon. in the system as a personal "calling card" that informs anyone who uses the system that the hack occurred.

This Gift's Cost is capped at 2 and cannot be increased further.

  • You can target yourself if you qualify as a valid target by the other requirements.
  • Your target must be within line of sight, or within range of another sense if more fitting for the Gift's flavor.

Stock Hack Gifts

Exert your Mind and spend 1 minute. Select a Computer within arm's reach. Does not work on Alien technology. Roll Intellect + Technology, with the Difficulty set by the GM depending on the security of the system you are hacking. Sapient targets can resist by rolling Mind at Difficulty 6.

If you succeed, you may issue a single command to the targeted system. This command must have a specific outcome or be a request for specific login credentials. The command you issue must be within the machine's current capabilities. For example, you cannot order a standard security camera to grow legs and walk around.

If your command does not require bypassing the security of the target (for example, typing on a computer that is unlocked), you do not need to Exert your Mind to activate this Effect, and activation only takes a single Action.

Your Hack cannot be reversed through mundane means for a number of hours equal to your Outcome.

Every hack you make leaves behind a flickering image of a ghost in the system as a personal "calling card" that informs anyone who uses the system that the hack occurred.

  • You cannot hack things outside of your range over remote connections such as the internet. The system you are affecting must be physically within range.
  • You can target yourself if you qualify as a valid target by the other requirements.
  • Your target must be within line of sight, or within range of another sense if more fitting for the Gift's flavor.