Difference between revisions of "Cybermask"

From Infinity
Jump to: navigation, search
(N5 first version.)
m
 
(2 intermediate revisions by the same user not shown)
Line 7: Line 7:
 
* The user must be outside the [[LoF]] of enemy Markers or Troopers.
 
* The user must be outside the [[LoF]] of enemy Markers or Troopers.
 
{{effects}}
 
{{effects}}
* The user enters the [[Impersonation]-2 state, which does not require a Roll, replacing the user's model with an Impersonation-2 Marker (IMP-2).
+
* The user enters the [[Impersonation State | Impersonation-2 state]], which does not require a Roll, replacing the user's model with an Impersonation-2 Marker (IMP-2).
 
* The effects of this Program persist until the user reveals themselves as per the Impersonation-2 state rules.
 
* The effects of this Program persist until the user reveals themselves as per the Impersonation-2 state rules.
* This Program affects only the Hacker himself and therefore has no range.
+
* This Program affects only the [[Hacker]] himself and therefore has no range.
 
{{css_skillbox-end}}
 
{{css_skillbox-end}}
  
  
 
{{remember-start}}
 
{{remember-start}}
While the Hacker is in IMP-2 State, the Program’s NFB Label applies, so they cannot use or apply any other Skill, piece of Equipment, or Hacking Program that has the NFB Label, for example [[Mimetism]], [[Albedo]], [[Holoprojector]] etc.
+
While the [[Hacker]] is in [[Impersonation State | IMP-2 State]], the Program’s [[NFB]] Label applies, so they cannot use or apply any other Skill, piece of Equipment, or Hacking Program that has the NFB Label, for example [[Mimetism]], [[Albedo]], [[Holoprojector]] etc.
 
{{remember-end}}
 
{{remember-end}}
  

Latest revision as of 10:28, 23 April 2025


CYBERMASK
LONG SKILL
REQUIREMENTS
  • The user must be outside the LoF of enemy Markers or Troopers.
EFFECTS
  • The user enters the Impersonation-2 state, which does not require a Roll, replacing the user's model with an Impersonation-2 Marker (IMP-2).
  • The effects of this Program persist until the user reveals themselves as per the Impersonation-2 state rules.
  • This Program affects only the Hacker himself and therefore has no range.


REMEMBER

While the Hacker is in IMP-2 State, the Program’s NFB Label applies, so they cannot use or apply any other Skill, piece of Equipment, or Hacking Program that has the NFB Label, for example Mimetism, Albedo, Holoprojector etc.


Name Attack MOD Opp. MOD PS Burst Target Skill Type Special
Cybermask -- -- -- -- -- Long Skill Replace user with IMP-2 Marker.