Difference between revisions of "Cybermask"
From Infinity
(PDF 2.1) |
m |
||
(3 intermediate revisions by the same user not shown) | |||
Line 1: | Line 1: | ||
− | {{section-hacking}} | + | {{n5-section-hacking}} |
− | {{ | + | {{css_skillbox |red| CYBERMASK | LONG SKILL }} |
− | |||
− | |||
{{skill-label | NFB, No Roll. }} | {{skill-label | NFB, No Roll. }} | ||
{{requirements}} | {{requirements}} | ||
− | * The user must be outside the [[LoF]] of enemy | + | * The user must be outside the [[LoF]] of enemy Markers or Troopers. |
{{effects}} | {{effects}} | ||
− | * The user enters the [[Impersonation-2]] | + | * The user enters the [[Impersonation State | Impersonation-2 state]], which does not require a Roll, replacing the user's model with an Impersonation-2 Marker (IMP-2). |
* The effects of this Program persist until the user reveals themselves as per the Impersonation-2 state rules. | * The effects of this Program persist until the user reveals themselves as per the Impersonation-2 state rules. | ||
− | * This Program affects only the Hacker himself and therefore has no range. | + | * This Program affects only the [[Hacker]] himself and therefore has no range. |
+ | {{css_skillbox-end}} | ||
{{remember-start}} | {{remember-start}} | ||
− | + | While the [[Hacker]] is in [[Impersonation State | IMP-2 State]], the Program’s [[NFB]] Label applies, so they cannot use or apply any other Skill, piece of Equipment, or Hacking Program that has the NFB Label, for example [[Mimetism]], [[Albedo]], [[Holoprojector]] etc. | |
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
{{remember-end}} | {{remember-end}} | ||
− | { | + | {| class="n5table-dark |
− | + | |- | |
+ | ! Name !! Attack MOD !! Opp. MOD !! PS !! Burst !! Target !! Skill Type !! Special | ||
+ | |- | ||
+ | | [[Cybermask]] || -- || -- || -- || -- || -- || Long Skill || Replace user with [[IMP-2]] Marker. | ||
|} | |} | ||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
+ | [[Category: Hacking]] | ||
− | + | <!-- Label and Trait categories. --> | |
− | [[Category: | + | [[Category: NFB ]] |
+ | [[Category: No Roll ]] |
Latest revision as of 10:28, 23 April 2025
Hacker | Firewall | Hacking Area | Repeater | Deployable Repeater | Hacking Programs Chart | Hacking Device
Hacking ProgramsAssisted Fire | Carbonite | Controlled Jump | Cybermask | Enhanced Reaction | Fairy Dust | Oblivion | Spotlight | Total Control | Trinity | White Noise | Zero Pain
CYBERMASK
LONG SKILL
REQUIREMENTS
- The user must be outside the LoF of enemy Markers or Troopers.
EFFECTS
- The user enters the Impersonation-2 state, which does not require a Roll, replacing the user's model with an Impersonation-2 Marker (IMP-2).
- The effects of this Program persist until the user reveals themselves as per the Impersonation-2 state rules.
- This Program affects only the Hacker himself and therefore has no range.
REMEMBER
While the Hacker is in IMP-2 State, the Program’s NFB Label applies, so they cannot use or apply any other Skill, piece of Equipment, or Hacking Program that has the NFB Label, for example Mimetism, Albedo, Holoprojector etc.
Name | Attack MOD | Opp. MOD | PS | Burst | Target | Skill Type | Special |
---|---|---|---|---|---|---|---|
Cybermask | -- | -- | -- | -- | -- | Long Skill | Replace user with IMP-2 Marker. |