A golden Lotus pattern begins revolving in Amarjeet's eyes. After the Hack is completed, an identical pattern will be displayed somewhere on the UI of the affected device.
The Lotus III implant has been upgraded. Sophisticated decryption & code-breaking software is pre-loaded into the implant, optimized to synchronize with the end-user's conscious attempts to crack security systems. Capable of defeating the most sophisticated systems in moments, use of this feature causes the user's eyes to display the familiar Lotus Logo as a revolving pattern on the iris. Additionally, in what we consider to be a win for our marketing team, any device compromised by our software will display our Lotus Logo in system - all the better to alert potential clients of system vulnerabilities.
Operating the system linkage on a regular basis has been proven to damage the optic nerves: always use caution when operating prototype cybernetics.
Exert your Mind and spend 1 Action to activate. Select a Computer within 300 feet. Can be used on Alien technology. Roll a single D10 as a critical failure check. If you roll a 1, the Effect fails, and you Blindness. Roll Intellect + Technology, with the Difficulty set by the GM depending on the security of the system you are hacking. Sapient targets can resist by rolling Mind at Difficulty 6. The hacking roll and their defensive roll are both Difficulty 6.
If you succeed, you may issue a single command to the targeted system. This command must have a specific outcome or be a request for specific login credentials. The command you issue must be within the machine's current capabilities. For example, you cannot order a standard security camera to grow legs and walk around.
If your command does not require bypassing the security of the target (for example, typing on a computer that is unlocked), you do not need to Exert your Mind to activate this Effect, and activation only takes a single Action.
Every hack you make leaves behind Lotus Logo in the system as a personal "calling card" that informs anyone who uses the system that the hack occurred.
btacdbra holds out a hand to the device, in a sort of clawed position. The outline of a red anthropomorphic fox form briefly flickers over btacdbra's own. In a screen flash of solid red, the device then opens up to a special red-text terminal, now hacked.
Exert your Mind and spend 2 Actions. Select a Computer within arm's reach. Does not work on Alien technology. Roll Intellect + Technology, with the Difficulty set by the GM depending on the security of the system you are hacking. Sapient targets can resist by rolling Mind at Difficulty 6.
If you succeed, you may issue a single command to the targeted system. This command must have a specific outcome or be a request for specific login credentials. The command you issue must be within the machine's current capabilities. For example, you cannot order a standard security camera to grow legs and walk around.
Your hack cannot be discovered by system administrators or firewall software for a number of hours equal to your Outcome on the initial roll.
You may only use this Effect once per day.
You've always preferred the company of machines to people. Maybe because, unlike people, they tend to do what you ask without much fuss.
Exert your Mind and spend 2 Actions. Select a Computer within arm's reach. Does not work on Alien technology. You must actively and obviously use a device-compatible cable to activate this Effect. Roll Intellect + Technology, with the Difficulty set by the GM depending on the security of the system you are hacking. Sapient targets can resist by rolling Mind at Difficulty 6.
If you succeed, you may issue a single command to the targeted system. This command must have a specific outcome or be a request for specific login credentials. The command you issue must be within the machine's current capabilities. For example, you cannot order a standard security camera to grow legs and walk around.
Your hack cannot be discovered by system administrators or firewall software for a number of hours equal to your Outcome on the initial roll.
Danile has always liked computers. Now he can use them easily without having a problem. He creates a small USB device and hands it over to the user.
Expend a point of Battery and spend 2 Actions to activate. Select a Device within arm's reach. Does not work on Alien technology. Roll Intellect + Technology, with the Difficulty set by the GM depending on the security of the system you are hacking. Sapient targets can resist by rolling Mind at Difficulty 6. The hacking roll and their defensive roll are both Difficulty 6.
If you succeed, you may issue a single command to the targeted system. This command must have a specific outcome or be a request for specific login credentials. The command you issue must be within the machine's current capabilities. For example, you cannot order a standard security camera to grow legs and walk around.
If your command does not require bypassing the security of the target (for example, typing on a computer that is unlocked), you do not need to Exert your Mind to activate this Effect, and activation only takes a single Action.
After you finish activating this Effect, you cannot move quicker than a walk (max 15 feet per Round) for one minute and suffer a -1 dice penalty for an hour.
Possession of this Artifact causes the following Trauma to manifest over the course of a day: Must be helpful to anyone with a Kevin bracelet. If you lose possession of this Artifact, the Trauma heals over the course of the next month.
Tam starts to tap her fingers against her side, a soft smile on her face as she looks away a little. This was just another kind of sparring - and she was good at that.
A manifestation of Tam's telekinetic abilities, Tam has learned to manipulate the internals of electronics.
Exert your Mind and spend 2 Actions. Select a Computer within 20 feet. Does not work on Alien technology. You must make a Trauma roll when you use this Effect. Its Difficulty cannot be reduced by any means. If you fail or Botch, you receive one Mind Damage and a new Trauma. Roll Intellect + Technology, with the Difficulty set by the GM depending on the security of the system you are hacking. Sapient targets can resist by rolling Mind at Difficulty 6.
If you succeed, you may issue a single command to the targeted system. This command must have a specific outcome or be a request for specific login credentials. The command you issue must be within the machine's current capabilities. For example, you cannot order a standard security camera to grow legs and walk around.
This Effect is not obvious, and the only sign you are using an Effect is fingers tapping against your side. If someone suspects that an Effect was used, they must roll Perception + Alertness, Difficulty 8 to pick up on your Tell.
Possession of this Power grants the following Battle Scar: Atrophied Shoulder - One of your shoulders is damaged. Whenever it takes a major blow or is otherwise put under stress the GM may dislocate it. A dislocated limb cannot be used until you Exert your Mind and spend an Action to reset it.
The world violently distorts and tears apart as Aira forcibly inputs code into the world of Neo-GENIS as she enters a command to her phone, doing as she wants, with screams and glitches from everything in the world destroying and quickly recreating it with her input put into place.
Spend 2 Actions. Select a Device within arm's reach. Can be used on Alien technology. You must actively and obviously use Smartphone to activate this Effect. Roll Intellect + Technology, with the Difficulty set by the GM depending on the security of the system you are hacking. Sapient targets can resist by rolling Mind at Difficulty 6.
If you succeed, you may issue a single command to the targeted system. This command must have a specific outcome or be a request for specific login credentials. The command you issue must be within the machine's current capabilities. For example, you cannot order a standard security camera to grow legs and walk around.
When targeting non-computer devices, you may operate switches, buttons, dials, levers, and latches.
Every hack you make leaves behind Distorted pieces of reality writing Aira in all caps. in the system as a personal "calling card" that informs anyone who uses the system that the hack occurred.
Anyone who witnesses you during this Effect's activation will almost certainly be disturbed to see The world violently distorts and tears apart as Aira forcibly inputs code, with the voices and screams of the worlds npcs, players, and admins as creations from outside Neo-GENIS, outside the world and things that are incomprehensible distort the world around Aira.
This Gift cannot have more than 3 Drawbacks, and its Gift Cost is capped at 2.
True to their namesake, the hacker can penetrate the security of any computer system, granting access to its informational stores, or, in a pinch, allowing them to issue commands. The hacked system will display a flickering image of a ghost until it is dismissed.
While hacking, The Technician's fingers move with supernatural speed, blurring like a ghost.
Exert your Mind and spend 1 minute. Select a Computer within arm's reach. Does not work on Alien technology. Roll Intellect + Technology, with the Difficulty set by the GM depending on the security of the system you are hacking. Sapient targets can resist by rolling Mind at Difficulty 6.
If you succeed, you may issue a single command to the targeted system. This command must have a specific outcome or be a request for specific login credentials. The command you issue must be within the machine's current capabilities. For example, you cannot order a standard security camera to grow legs and walk around.
If your command does not require bypassing the security of the target (for example, typing on a computer that is unlocked), you do not need to Exert your Mind to activate this Effect, and activation only takes a single Action.
Your Hack cannot be reversed through mundane means for a number of hours equal to your Outcome.
Every hack you make leaves behind a flickering image of a ghost in the system as a personal "calling card" that informs anyone who uses the system that the hack occurred.