Difference between revisions of "Repeater"
(Updated see FAQ links.) |
(PDF 2.1) |
||
(One intermediate revision by the same user not shown) | |||
Line 10: | Line 10: | ||
{{skill-label | Comms Equipment, Obligatory, Zone of Control. }} | {{skill-label | Comms Equipment, Obligatory, Zone of Control. }} | ||
{{effects}} | {{effects}} | ||
+ | {{update | PDF 2.1, July 2023}} | ||
* Repeaters extend the [[Hacking Area]] of all [[Hacker]]s in the same [[Army List]]. | * Repeaters extend the [[Hacking Area]] of all [[Hacker]]s in the same [[Army List]]. | ||
− | * Hackers '''within the [[Zone of Control]]''' of an '''enemy Repeater''' may use Hacking Programs against any enemy Hacker, but | + | * Hackers '''within the [[Zone of Control]]''' of an '''enemy Repeater''' may use {{erratahighlight}}it to apply{{erratahighlight-end}} Hacking Programs against any enemy Hacker, but '''{{erratahighlight}}applying {{erratahighlight-end}} [[Firewall]] MODs (-3)'''. |
* There can be no reaction against a Repeater that is being used by an enemy Hacker, only against the Hacker, if possible. | * There can be no reaction against a Repeater that is being used by an enemy Hacker, only against the Hacker, if possible. | ||
+ | {{update-end}} | ||
+ | {{original}} | ||
+ | * Repeaters extend the [[Hacking Area]] of all [[Hacker]]s in the same [[Army List]]. | ||
+ | * Hackers '''within the [[Zone of Control]]''' of an '''enemy Repeater''' may use Hacking Programs against any enemy Hacker, but {{originalhighlight}}they will have to '''apply{{originalhighlight-end}} [[Firewall]] MODs (-3)'''. | ||
+ | * There can be no reaction against a Repeater that is being used by an enemy Hacker, only against the Hacker, if possible. | ||
+ | {{original-end}} | ||
Latest revision as of 15:38, 15 August 2023
Hacker | Firewall | Hacking Area | Repeater | Deployable Repeater | Hacking Programs Chart | Hacking Device
Programs and StatesAssisted Fire | Carbonite & Immobilized-B State | Controlled Jump | Cybermask & Impersonation State | Enhanced Reaction | Fairy Dust | Oblivion & Isolated State | Spotlight & Targeted State | Total Control & Possessed State | Trinity | White Noise | Zero Pain
360º Visor | AI Motorcycle | Albedo | Baggage | Biometric Visor | Cube | Dazer | Deactivator | Deployable Repeater | ECM | Escape System | FastPanda | Firewall | GizmoKit | Hacking Device | HoloMask & HoloMask State | Holoprojector & Holoecho State | MediKit | Motorcycle | Multispectral Visor | Nanoscreen | Repeater | SymbioMate | TinBot | X-Visor
This N4 rule is not used in CodeOne.
This is a range amplifier for Hackers.
REPEATER | AUTOMATIC EQUIPMENT |
Comms Equipment, Obligatory, Zone of Control. |
Update PDF 2.1, July 2023
- Repeaters extend the Hacking Area of all Hackers in the same Army List.
- Hackers within the Zone of Control of an enemy Repeater may use it to apply Hacking Programs against any enemy Hacker, but applying Firewall MODs (-3).
- There can be no reaction against a Repeater that is being used by an enemy Hacker, only against the Hacker, if possible.
Show original text.
Original
- Repeaters extend the Hacking Area of all Hackers in the same Army List.
- Hackers within the Zone of Control of an enemy Repeater may use Hacking Programs against any enemy Hacker, but they will have to apply Firewall MODs (-3).
- There can be no reaction against a Repeater that is being used by an enemy Hacker, only against the Hacker, if possible.
This piece of Equipment is automatically active and cannot be deactivated by its owner, unless its carrier is in Isolated State or any Null States.
Firewall imposes an additional MOD (-3, -6...) to the WIP Roll of the Trooper that declared the Comms Attack against a Trooper that benefits from a Firewall, for example if attacking through an enemy Repeater.
The Trooper benefitting from a Firewall applies a -3 MOD to the Attack Damage of the Comms Attack, if a Saving Roll needs to be made.
Only the MODs of a single Firewall can be applied, even if the Trooper benefits from more than one. In the case of the Trooper benefitting from more than one Firewall, their player will decide which one to apply.
FAQs & Errata
Q: When do you apply the Firewall MODs for enemy Repeaters?
A: The Firewall MODs will only apply if using the enemy Repeater to use a Hacking Program against an enemy Hacker. If you are in the Zone of Control of an enemy Repeater, it is not mandatory to use the enemy Repeater.
Related Pages: Firewall, Repeater