Virtual Dominance Can be used for more than just doors

5
The power to issue commands to technological devices.
Used by Crane Albright, Created by GreenAppll.
(Activating this Effect is not obvious. The only sign you are using an Effect is Staring at the device for a long bit as data surges through his eye. )

What was previously merely interference has turned into true Dominance, Crane, utilizing the A.I. built into his nanite to upload a A.I. Clone of his mind into the network to achieve whatever he wishes to accomplish, deleting itself afterwards to ensure there is no traces of himself that can be found.

Upon activation. Nanites with pre-inputted program floods the machinery, executing the order


Exert your Mind and spend 1 minute. Select a Computer within 20 feet. Can be used on Alien technology. You must make a Trauma roll when you use this Effect. Its Difficulty cannot be reduced by any means. If you fail or Botch, you receive one Mind Damage and a new Trauma. Roll Intellect + Technology, with the Difficulty set by the GM depending on the security of the system you are hacking. Sapient targets can resist by rolling Mind at Difficulty 6.

If you succeed, you may issue a single command to the targeted system. This command must have a specific outcome or be a request for specific login credentials. The command you issue must be within the machine's current capabilities. For example, you cannot order a standard security camera to grow legs and walk around.

This Effect is not obvious, and the only sign you are using an Effect is Staring at the device for a long bit as data surges through his eye. If someone suspects that an Effect was used, they must roll Perception + Alertness, Difficulty 8 to pick up on your Tell.

Your command does not have to take effect immediately. Instead, upon a successful Hack, you may specify a condition under which the specified command is issued or simply suspend the Command until you desire to activate it.

If your command does not require bypassing the security of the target (for example, typing on a computer that is unlocked), you do not need to Exert your Mind to activate this Effect, and activation only takes a single Action.

Your hack cannot be discovered by system administrators or firewall software for a number of hours equal to your Outcome on the initial roll.

  • You cannot hack things outside of your range over remote connections such as the internet. The system you are affecting must be physically within range.
  • You can target yourself if you qualify as a valid target by the other requirements.
  • Your target must be within line of sight, or within range of another sense if more fitting for the Gift's flavor.

Revision purchased with:
Revision purchased with:
Improvement from writing up A Maelstrom of Typhoons spent on improving power: Virtual Dominance    (since refunded)
Revision purchased with:
Revision purchased with:
Gift from playing in Snow-White spent on improving power: Virtual Dominance    (since refunded)
Revision purchased with:
Improvement from writing up TPS delivery spent on improving power: Virtual Dominance
Revision purchased with:
Gift from playing in Skirmish spent on improving power: Virtual Interference    (since refunded)
Revision purchased with:
Improvement from writing up Slithering Patience spent on improving power: Virtual Interference
Revision purchased with:
Gift from the Asset Gifted spent on new power: Calligraphy Imprint

Community Hack Gifts

Exert your Mind and spend 1 minute. Select a Computer within 20 feet. Does not work on Alien technology. Roll a single D10 as a critical failure check. If you roll a 1, the Effect fails, and you disable the artifact for a downtime as it hacks itself.. Roll Dexterity + Technology, with the Difficulty set by the GM depending on the security of the system you are hacking. Sapient targets can resist by rolling Mind at Difficulty 6.

If you succeed, you may issue a single command to the targeted system. This command must have a specific outcome or be a request for specific login credentials. The command you issue must be within the machine's current capabilities. For example, you cannot order a standard security camera to grow legs and walk around.

If your command does not require bypassing the security of the target (for example, typing on a computer that is unlocked), you do not need to Exert your Mind to activate this Effect, and activation only takes a single Action.

Every hack you make leaves behind A gif of a seal clapping and arfing. in the system as a personal "calling card" that informs anyone who uses the system that the hack occurred.

  • You can target yourself if you qualify as a valid target by the other requirements.
  • Your target must be within line of sight, or within range of another sense if more fitting for the Gift's flavor.

Jer is able to effect technology with the chip in his head that has disfigured him the chip is pronounced on his head. He stares at the technology and through infrared and blue-tooth technology he is able to unlock it.

Spend 1 minute to activate. Select a Computer within arm's reach. Does not work on Alien technology. You must actively and obviously use Eye ball implant to activate this Effect. Roll Charisma + Technology, with the Difficulty set by the GM depending on the security of the system you are hacking. Sapient targets can resist by rolling Mind at Difficulty 6. The hacking roll and their defensive roll are both Difficulty 6.

If you succeed, you may issue a single command to the targeted system. This command must have a specific outcome or be a request for specific login credentials. The command you issue must be within the machine's current capabilities. For example, you cannot order a standard security camera to grow legs and walk around.

If your command does not require bypassing the security of the target (for example, typing on a computer that is unlocked), you do not need to Exert your Mind to activate this Effect, and activation only takes a single Action.

This Gift's level is capped at 2 Gifts and cannot be increased further.

Possession of this Power grants the following Battle Scar: Left eye with green veins.

  • You can target yourself if you qualify as a valid target by the other requirements.

Everything has mana, each has a specific unique frequency in sapiens mana is their soul everything reveals themselves in their mana wether they know it or not.

Increase your sacrificial Injury's Severity by 1 and spend 2 Actions. Investigate an area with a radius of up to 100 feet You must actively and obviously use staff, stave, wand. to activate this Effect. At the end of your investigation, roll Intellect + Occult at Difficulty 6.

You learn the following information about the area:

  • You learn where exactly creatures and people live within the area, and what sorts of creatures they are.
  • You learn You detect any areas of social/cultural importance or significance (heritage sites, memorials, ritual sites)
The quality and specificity of information gained depends on your Outcome.

If you do not have a sacrificial Injury when you activate this Effect, take a new Severity-1 Injury.

You cannot investigate the same area more than once per day.

  • The sacrificial Injury received from activating this Effect cannot be prevented by any means or healed before 1 day has passed. It is shared with all Effects that use sacrifice. This Injury does not requires Stabilization or cause Battle Scars when it becomes Severe.
  • You can target yourself if you qualify as a valid target by the other requirements.
  • Your target must be within line of sight, or within range of another sense if more fitting for the Gift's flavor.

Exert your Mind and spend 1 minute. Select a Computer within 20 feet. Does not work on Alien technology. You must actively and obviously use laptop to activate this Effect. Roll Dexterity + Technology, with the Difficulty set by the GM depending on the security of the system you are hacking. Sapient targets can resist by rolling Mind at Difficulty 6.

If you succeed, you may issue a single command to the targeted system. This command must have a specific outcome or be a request for specific login credentials. The command you issue must be within the machine's current capabilities. For example, you cannot order a standard security camera to grow legs and walk around.

If your command does not require bypassing the security of the target (for example, typing on a computer that is unlocked), you do not need to Exert your Mind to activate this Effect, and activation only takes a single Action.

  • You cannot hack things outside of your range over remote connections such as the internet. The system you are affecting must be physically within range.
  • You can target yourself if you qualify as a valid target by the other requirements.
  • Your target must be within line of sight, or within range of another sense if more fitting for the Gift's flavor.

Spend 2 Actions. Select a Device within arm's reach. Can be used on Alien technology. Roll Intellect + Technology, with the Difficulty set by the GM depending on the security of the system you are hacking. Sapient targets can resist by rolling Mind at Difficulty 6.

If you succeed, you may issue a single command to the targeted system. This command must have a specific outcome or be a request for specific login credentials. The command you issue must be within the machine's current capabilities. For example, you cannot order a standard security camera to grow legs and walk around.

This Effect is not obvious, and the only sign you are using an Effect is Her eye shutter with code for a split second. If someone suspects that an Effect was used, they must roll Perception + Alertness, Difficulty 8 to pick up on your Tell.

When targeting non-computer devices, you may operate switches, buttons, dials, levers, and latches.

This Gift cannot have more than 3 Drawbacks, and its Gift Cost is capped at 2.

Possession of this Power grants the following Battle Scar: Disfigured and Wheezing.

Possession of this Power grants the following Trauma at all times: Technomania.

  • You cannot hack things outside of your range over remote connections such as the internet. The system you are affecting must be physically within range.
  • You can target yourself if you qualify as a valid target by the other requirements.
  • Your target must be within line of sight, or within range of another sense if more fitting for the Gift's flavor.

Stock Hack Gifts

Exert your Mind and spend 1 minute. Select a Computer within arm's reach. Does not work on Alien technology. Roll Intellect + Technology, with the Difficulty set by the GM depending on the security of the system you are hacking. Sapient targets can resist by rolling Mind at Difficulty 6.

If you succeed, you may issue a single command to the targeted system. This command must have a specific outcome or be a request for specific login credentials. The command you issue must be within the machine's current capabilities. For example, you cannot order a standard security camera to grow legs and walk around.

If your command does not require bypassing the security of the target (for example, typing on a computer that is unlocked), you do not need to Exert your Mind to activate this Effect, and activation only takes a single Action.

Your Hack cannot be reversed through mundane means for a number of hours equal to your Outcome.

Every hack you make leaves behind a flickering image of a ghost in the system as a personal "calling card" that informs anyone who uses the system that the hack occurred.

  • You cannot hack things outside of your range over remote connections such as the internet. The system you are affecting must be physically within range.
  • You can target yourself if you qualify as a valid target by the other requirements.
  • Your target must be within line of sight, or within range of another sense if more fitting for the Gift's flavor.