....
Spend 1 minute. Select a Device within arm's reach. Can be used on Alien technology. This Effect cannot be used unless only works on vehicles. Roll Intellect + Drive, with the Difficulty set by the GM depending on the security of the system you are hacking. Sapient targets can resist by rolling Mind at Difficulty 6.
If you succeed, you may issue a single command to the targeted system. This command must have a specific outcome or be a request for specific login credentials. The command you issue must be within the machine's current capabilities. For example, you cannot order a standard security camera to grow legs and walk around.
You may issue a "self-destruct" command that leaves the hacked system's hardware inoperable, even if that machine had no such functionality previously. Only works on Computers.
Your Hack cannot be reversed through mundane means for a number of hours equal to your Outcome.
After successfully using this Effect, you may choose to add the target to your own personal "network." You may use this Effect on any target on your network at any range. You can have up to 3 targets on your network.
When targeting non-computer devices, you may operate switches, buttons, dials, levers, and latches.
Every hack you make leaves behind and apple with a sunrise behind it in the system as a personal "calling card" that informs anyone who uses the system that the hack occurred.
This Gift cannot have more than 3 Drawbacks, and its Gift Cost is capped at 1.
The Gamer starts cinematically clacking on the keyboard, looking as if they are just typing random bullshit, their fingers moving with comical (and impossible) speed, before they are in the system.
Spend 1 minute. Select a Computer within arm's reach. Does not work on Alien technology. Roll Intellect + Technology, with the Difficulty set by the GM depending on the security of the system you are hacking. Sapient targets can resist by rolling Mind at Difficulty 6.
If you succeed, you may issue a single command to the targeted system. This command must have a specific outcome or be a request for specific login credentials. The command you issue must be within the machine's current capabilities. For example, you cannot order a standard security camera to grow legs and walk around.
This Gift cannot have more than 3 Drawbacks, and its Gift Cost is capped at 2.
The key from another dimension only works in a limited manner now in a new dimension. When pointing the key at any vehicle, a strange reverberation of energy courses through the entire vehicle, and suddenly everything in the vehicle begins working as it should.
The vehicle makes the stereotypical noise a vehicle being unlocked (whether or not that model does or even has unlocks electronic or not.)
Exert your Mind and spend 2 Actions. Select a Device within 20 feet. Does not work on Alien technology. This Effect cannot be used unless hacking a vehicle. Roll Dexterity + Thievery, with the Difficulty set by the GM depending on the security of the system you are hacking. Sapient targets can resist by rolling Mind at Difficulty 6.
If you succeed, you may issue a single command to the targeted system. This command must have a specific outcome or be a request for specific login credentials. The command you issue must be within the machine's current capabilities. For example, you cannot order a standard security camera to grow legs and walk around.
If your command does not require bypassing the security of the target (for example, typing on a computer that is unlocked), you do not need to Exert your Mind to activate this Effect, and activation only takes a single Action.
When targeting non-computer devices, you may operate switches, buttons, dials, levers, and latches.
Your hack cannot be discovered by system administrators or firewall software for a number of hours equal to your Outcome on the initial roll.
A small device that's the size of a poker chip. One side has a black adhesive while the other side has a miniature screen for the command to be placed.
Spend 2 Actions and use up this device that's the size of a poker chip. Select a Computer within arm's reach. Does not work on Alien technology. Roll 7 dice Difficulty 6, dice penalties do not apply. Sapient targets can resist by rolling Mind at Difficulty 6.
If you succeed, you may issue a single command to the targeted system. This command must have a specific outcome or be a request for specific login credentials. The command you issue must be within the machine's current capabilities. For example, you cannot order a standard security camera to grow legs and walk around.
You may issue a "self-destruct" command that leaves the hacked system's hardware inoperable, even if that machine had no such functionality previously. Only works on Computers.
This artifact is a plain, handheld cylinder, has a microphone on the top of it, and a transmitter on the bottom. When held in the hand, and holding a button on the side, the unit will accept voice commands and transmit them to the desired target.
The onboard AI will explain the steps it's undertaking to carry out the command while it works, and occasionally ask for clarification. If the target is used on a computer the calling card manifests as a wolf head joker playing card displayed on the screen. If used on a device that's doesn't have a screen, instead a laser engraving will appear on the target of a wolf head joker card.
Exert your Mind and spend 1 minute. Select a Device within 20 feet. Does not work on Alien technology. Roll Intellect + Technology, with the Difficulty set by the GM depending on the security of the system you are hacking. Sapient targets can resist by rolling Mind at Difficulty 6.
If you succeed, you may issue a single command to the targeted system. This command must have a specific outcome or be a request for specific login credentials. The command you issue must be within the machine's current capabilities. For example, you cannot order a standard security camera to grow legs and walk around.
When targeting non-computer devices, you may operate switches, buttons, dials, levers, and latches.
Every hack you make leaves behind a wolf head joker playing card. in the system as a personal "calling card" that informs anyone who uses the system that the hack occurred.
The world violently distorts and tears apart as Aira forcibly inputs code into the world of Neo-GENIS as she enters a command to her phone, doing as she wants, with screams and glitches from everything in the world destroying and quickly recreating it with her input put into place.
Spend 2 Actions. Select a Device within arm's reach. Can be used on Alien technology. You must actively and obviously use Smartphone to activate this Effect. Roll Intellect + Technology, with the Difficulty set by the GM depending on the security of the system you are hacking. Sapient targets can resist by rolling Mind at Difficulty 6.
If you succeed, you may issue a single command to the targeted system. This command must have a specific outcome or be a request for specific login credentials. The command you issue must be within the machine's current capabilities. For example, you cannot order a standard security camera to grow legs and walk around.
When targeting non-computer devices, you may operate switches, buttons, dials, levers, and latches.
Every hack you make leaves behind Distorted pieces of reality writing Aira in all caps. in the system as a personal "calling card" that informs anyone who uses the system that the hack occurred.
Anyone who witnesses you during this Effect's activation will almost certainly be disturbed to see The world violently distorts and tears apart as Aira forcibly inputs code, with the voices and screams of the worlds npcs, players, and admins as creations from outside Neo-GENIS, outside the world and things that are incomprehensible distort the world around Aira.
This Gift cannot have more than 3 Drawbacks, and its Gift Cost is capped at 2.
True to their namesake, the hacker can penetrate the security of any computer system, granting access to its informational stores, or, in a pinch, allowing them to issue commands. The hacked system will display a flickering image of a ghost until it is dismissed.
While hacking, The Technician's fingers move with supernatural speed, blurring like a ghost.
Exert your Mind and spend 1 minute. Select a Computer within arm's reach. Does not work on Alien technology. Roll Intellect + Technology, with the Difficulty set by the GM depending on the security of the system you are hacking. Sapient targets can resist by rolling Mind at Difficulty 6.
If you succeed, you may issue a single command to the targeted system. This command must have a specific outcome or be a request for specific login credentials. The command you issue must be within the machine's current capabilities. For example, you cannot order a standard security camera to grow legs and walk around.
If your command does not require bypassing the security of the target (for example, typing on a computer that is unlocked), you do not need to Exert your Mind to activate this Effect, and activation only takes a single Action.
Your Hack cannot be reversed through mundane means for a number of hours equal to your Outcome.
Every hack you make leaves behind a flickering image of a ghost in the system as a personal "calling card" that informs anyone who uses the system that the hack occurred.