Difference between revisions of "Cybermask"
From Infinity
(Removed Supportware box.) |
|||
Line 25: | Line 25: | ||
|} | |} | ||
− | |||
− | |||
− | |||
− | |||
{{n4end}} | {{n4end}} |
Revision as of 11:44, 3 February 2021
Hacker | Firewall | Hacking Area | Repeater | Deployable Repeater | Hacking Programs Chart | Hacking Device
Programs and StatesAssisted Fire | Carbonite & Immobilized-B State | Controlled Jump | Cybermask & Impersonation State | Enhanced Reaction | Fairy Dust | Oblivion & Isolated State | Spotlight & Targeted State | Total Control & Possessed State | Trinity | White Noise | Zero Pain
This N4 rule is not used in CodeOne.
CYBERMASK | ENTIRE ORDER |
NFB, No Roll. |
Requirements
Effects
- The user enters the Impersonation-2 state, which does not require a Roll, replacing the user's model with an Impersonation-2 Marker (IMP-2).
- The effects of this Program persist until the user reveals themselves as per the Impersonation-2 state rules.
- This Program affects only the Hacker himself and therefore has no range.
REMEMBER
NFB:
The Hacker cannot be in IMP-2 state while being in Camouflaged state or other similar state.
Name | Attack MOD | Opp. MOD | DAM | B | Target | Skill Type | Special |
---|---|---|---|---|---|---|---|
Cybermask | -- | -- | -- | -- | -- | Entire Order | Replace user with IMP-2 Marker. |