EPSILON reaches to its internal code to find what he retains of REVENANT seedcode. From there it starts to stream a command to a device it can reach. Nothing more than blurred communication can be seen underneath where mouth should be.
As a P.S.L. (Psionic Synthetic Liveform) it can interact with a device like a human or via standart dataport.
Spend 2 Actions. Select a Computer within arm's reach. Does not work on Alien technology. Roll a single D10 as a critical failure check. If you roll a 1, the Effect fails, and you Revenant: The Remnants of The REVENANT OS hidden iside you conquers the system instead of you causing it to malfunction in a way to harm you.. You must make a Trauma roll when you use this Effect. Its Difficulty cannot be reduced by any means. If you fail or Botch, you receive one Mind Damage and a new Trauma. Roll Intellect + Technology, with the Difficulty set by the GM depending on the security of the system you are hacking. Sapient targets can resist by rolling Mind at Difficulty 6.
If you succeed, you may issue a single command to the targeted system. This command must have a specific outcome or be a request for specific login credentials. The command you issue must be within the machine's current capabilities. For example, you cannot order a standard security camera to grow legs and walk around.
This Effect is not obvious, and the only sign you are using an Effect is Command symbols rolling under mouth area, blurred. If someone suspects that an Effect was used, they must roll Perception + Alertness, Difficulty 8 to pick up on your Tell.
This Gift cannot have more than 3 Drawbacks, and its Gift Cost is capped at 2.
Spend 2 Actions. Select a Device within arm's reach. Can be used on Alien technology. Roll Charisma + Occult, with the Difficulty set by the GM depending on the security of the system you are hacking. Sapient targets can resist by rolling Mind at Difficulty 6.
If you succeed, you may issue a single command to the targeted system. This command must have a specific outcome or be a request for specific login credentials. The command you issue must be within the machine's current capabilities. For example, you cannot order a standard security camera to grow legs and walk around.
When targeting non-computer devices, you may operate switches, buttons, dials, levers, and latches.
Every hack you make leaves behind Holy Symbols in the system as a personal "calling card" that informs anyone who uses the system that the hack occurred.
This Gift cannot have more than 3 Drawbacks, and its Gift Cost is capped at 1.
The Core separates, and the wires reach out towards the device and writhe like antennas of an insect searching for prey. If you are within arms reach the wires reach out and touch the target, melding with it. Coiling around it like eels.
Exert your Mind and spend 1 minute. Select a Device within 20 feet. Does not work on Alien technology. Roll Intellect + Technology, with the Difficulty set by the GM depending on the security of the system you are hacking. Sapient targets can resist by rolling Mind at Difficulty 6.
If you succeed, you may issue a single command to the targeted system. This command must have a specific outcome or be a request for specific login credentials. The command you issue must be within the machine's current capabilities. For example, you cannot order a standard security camera to grow legs and walk around.
Your command does not have to take effect immediately. Instead, upon a successful Hack, you may specify a condition under which the specified command is issued or simply suspend the Command until you desire to activate it.
If your command does not require bypassing the security of the target (for example, typing on a computer that is unlocked), you do not need to Exert your Mind to activate this Effect, and activation only takes a single Action.
When targeting non-computer devices, you may operate switches, buttons, dials, levers, and latches.
Anyone who touches this Artifact will notice it warping their mind and may drop it. If they choose to hold or use it, they immediately receive the following Trauma: Father of Machines: You are a creation of man, and you love your fellow devices and computers. (You must roll self control to damage or destroy any devices computers.). If they lose possession of this Artifact, the Trauma heals over the course of the next day.
A small device that's the size of a poker chip. One side has a black adhesive while the other side has a miniature screen for the command to be placed.
Spend 2 Actions and use up this device that's the size of a poker chip. Select a Computer within arm's reach. Does not work on Alien technology. Roll 7 dice Difficulty 6, dice penalties do not apply. Sapient targets can resist by rolling Mind at Difficulty 6.
If you succeed, you may issue a single command to the targeted system. This command must have a specific outcome or be a request for specific login credentials. The command you issue must be within the machine's current capabilities. For example, you cannot order a standard security camera to grow legs and walk around.
You may issue a "self-destruct" command that leaves the hacked system's hardware inoperable, even if that machine had no such functionality previously. Only works on Computers.
Owl touches a scar near her eye, looking at some device. After a bit, the connection is made, and her command is sent.
Owl had a great idea!
A way to interface with her computers and other devices without having that ability be tracked or stolen.
She didn’t think about all the consequences till halfway through the surgery.
Exert your Mind and spend 1 minute. Select a Computer within 300 feet. Does not work on Alien technology. Roll Intellect + Technology, with the Difficulty set by the GM depending on the security of the system you are hacking. Sapient targets can resist by rolling Mind at Difficulty 6.
If you succeed, you may issue a single command to the targeted system. This command must have a specific outcome or be a request for specific login credentials. The command you issue must be within the machine's current capabilities. For example, you cannot order a standard security camera to grow legs and walk around.
This Effect is not obvious, and the only sign you are using an Effect is Owl touches a scar near one of her eyes rubbing it some. If someone suspects that an Effect was used, they must roll Perception + Alertness, Difficulty 8 to pick up on your Tell.
Your command does not have to take effect immediately. Instead, upon a successful Hack, you may specify a condition under which the specified command is issued or simply suspend the Command until you desire to activate it.
Possession of this Power grants the following Battle Scar: Implant scars: Owl has several large scars covering her face, particularly around her eyes. This increases the difficulty of social rolls by one..
Possession of this Power grants the following Trauma at all times: Technological Paranoia: You come across an active security system you don’t control, you must make a self control roll to not attempt to take it over..
Kanni's fingers split open, revealing minute tools, which promptly begin to work constructing and implementing various codes and objects into the computer, allowing Kanni complete access to the system while she works.
Spend 1 minute. Select a Computer within arm's reach. Can be used on Alien technology. Roll Intellect + Technology, with the Difficulty set by the GM depending on the security of the system you are hacking. Sapient targets can resist by rolling Mind at Difficulty 6.
If you succeed, you may issue a single command to the targeted system. This command must have a specific outcome or be a request for specific login credentials. The command you issue must be within the machine's current capabilities. For example, you cannot order a standard security camera to grow legs and walk around.
Your command does not have to take effect immediately. Instead, upon a successful Hack, you may specify a condition under which the specified command is issued or simply suspend the Command until you desire to activate it.
Every hack you make leaves behind Any lights attached to the system turning purple and yellow in the system as a personal "calling card" that informs anyone who uses the system that the hack occurred.
Anyone who witnesses you during this Effect's activation will almost certainly be disturbed to see Kanni's fingers split open and fold back, many tools revealing themselves as they begin to pluck and play with the device, scanning, prodding, etc.
This Gift cannot have more than 3 Drawbacks, and its Gift Cost is capped at 2.
True to their namesake, the hacker can penetrate the security of any computer system, granting access to its informational stores, or, in a pinch, allowing them to issue commands. The hacked system will display a flickering image of a ghost until it is dismissed.
While hacking, The Technician's fingers move with supernatural speed, blurring like a ghost.
Exert your Mind and spend 1 minute. Select a Computer within arm's reach. Does not work on Alien technology. Roll Intellect + Technology, with the Difficulty set by the GM depending on the security of the system you are hacking. Sapient targets can resist by rolling Mind at Difficulty 6.
If you succeed, you may issue a single command to the targeted system. This command must have a specific outcome or be a request for specific login credentials. The command you issue must be within the machine's current capabilities. For example, you cannot order a standard security camera to grow legs and walk around.
If your command does not require bypassing the security of the target (for example, typing on a computer that is unlocked), you do not need to Exert your Mind to activate this Effect, and activation only takes a single Action.
Your Hack cannot be reversed through mundane means for a number of hours equal to your Outcome.
Every hack you make leaves behind a flickering image of a ghost in the system as a personal "calling card" that informs anyone who uses the system that the hack occurred.