Difference between revisions of "Cybermask"
From Infinity
(Created page with "{{section-combat-module}} {{n4only}} {{n4list}} {{skillbox |red| CYBERMASK | ENTIRE ORDER }} {{skill-label | NFB, No Roll. }} {{requirements}} * The user must be outside the...") |
|||
Line 1: | Line 1: | ||
− | {{section- | + | {{section-hacking}} |
Line 27: | Line 27: | ||
− | |||
− | [[Category: | + | [[Category: Hacking]] |
Revision as of 10:58, 16 September 2020
Hacker | Firewall | Hacking Area | Repeater | Deployable Repeater | Hacking Programs Chart | Hacking Device
Programs and StatesAssisted Fire | Carbonite & Immobilized-B State | Controlled Jump | Cybermask & Impersonation State | Enhanced Reaction | Fairy Dust | Oblivion & Isolated State | Spotlight & Targeted State | Total Control & Possessed State | Trinity | White Noise | Zero Pain
This N4 rule is not used in CodeOne.
CYBERMASK | ENTIRE ORDER |
NFB, No Roll. |
Requirements
Effects
- The user enters the Impersonation-2 state, which does not require a Roll, replacing the user's model with an Impersonation-2 Marker (IMP-2).
- The effects of this Program persist until the user reveals themselves as per the Impersonation-2 state rules.
- This Program affects only the Hacker himself and therefore has no range.
REMEMBER
NFB:
The Hacker cannot be in IMP-2 state while being in Camouflaged state or other similar state.
Name | Attack MOD | Opp. MOD | DAM | B | Target | Skill Type | Special |
---|---|---|---|---|---|---|---|
Cybermask | -- | -- | -- | -- | -- | Entire Order | Replace user with IMP-2 Marker. |