Cybermask
Hacker | Firewall | Hacking Area | Repeater | Deployable Repeater | Hacking Programs Chart | Hacking Device
Programs and StatesAssisted Fire | Carbonite & Immobilized-B State | Controlled Jump | Cybermask & Impersonation State | Enhanced Reaction | Fairy Dust | Oblivion & Isolated State | Spotlight & Targeted State | Total Control & Possessed State | Trinity | White Noise | Zero Pain
This N4 rule is not used in CodeOne.
CYBERMASK | ENTIRE ORDER |
NFB, No Roll. |
- The user enters the Impersonation-2 state, which does not require a Roll, replacing the user's model with an Impersonation-2 Marker (IMP-2).
- The effects of this Program persist until the user reveals themselves as per the Impersonation-2 state rules.
- This Program affects only the Hacker himself and therefore has no range.
NFB:
Update PDF 2.1, July 2023
While the Hacker is in IMP-2 State, the Program’s NFB Label applies, so they cannot use or apply any other Skill, piece of Equipment, or Hacking Program that has the NFB Label, for example Mimetism, Albedo, Holoprojector etc.
Show original text.
Original
The Hacker cannot be in IMP-2 state while being in Camouflaged state or other similar state.
Name | Attack MOD | Opp. MOD | DAM | B | Target | Skill Type | Special |
---|---|---|---|---|---|---|---|
Cybermask | -- | -- | -- | -- | -- | Entire Order | Replace user with IMP-2 Marker. |
FAQs & Errata
Q: Can a Hacker in IMP-2 State (via Cybermask) use the Surprise Attack Special Skill if they don't have Surprise Attack listed on their Unit Profile?
A: No. If the Trooper doesn't have the Surprise Attack Special Skill, the Trooper cannot use it.
Related Pages: Cybermask, Impersonation State, Surprise Attack