Difference between revisions of "Cybermask"
From Infinity
(PDF 2.1) |
(N5 first version.) |
||
Line 1: | Line 1: | ||
− | {{section-hacking}} | + | {{n5-section-hacking}} |
− | {{ | + | {{css_skillbox |red| CYBERMASK | LONG SKILL }} |
− | |||
− | |||
{{skill-label | NFB, No Roll. }} | {{skill-label | NFB, No Roll. }} | ||
{{requirements}} | {{requirements}} | ||
− | * The user must be outside the [[LoF]] of enemy | + | * The user must be outside the [[LoF]] of enemy Markers or Troopers. |
{{effects}} | {{effects}} | ||
− | * The user enters the [[Impersonation-2 | + | * The user enters the [[Impersonation]-2 state, which does not require a Roll, replacing the user's model with an Impersonation-2 Marker (IMP-2). |
* The effects of this Program persist until the user reveals themselves as per the Impersonation-2 state rules. | * The effects of this Program persist until the user reveals themselves as per the Impersonation-2 state rules. | ||
* This Program affects only the Hacker himself and therefore has no range. | * This Program affects only the Hacker himself and therefore has no range. | ||
+ | {{css_skillbox-end}} | ||
{{remember-start}} | {{remember-start}} | ||
− | + | While the Hacker is in IMP-2 State, the Program’s NFB Label applies, so they cannot use or apply any other Skill, piece of Equipment, or Hacking Program that has the NFB Label, for example [[Mimetism]], [[Albedo]], [[Holoprojector]] etc. | |
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
{{remember-end}} | {{remember-end}} | ||
− | { | + | {| class="n5table-dark |
− | + | |- | |
+ | ! Name !! Attack MOD !! Opp. MOD !! PS !! Burst !! Target !! Skill Type !! Special | ||
+ | |- | ||
+ | | [[Cybermask]] || -- || -- || -- || -- || -- || Long Skill || Replace user with [[IMP-2]] Marker. | ||
|} | |} | ||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
+ | [[Category: Hacking]] | ||
− | + | <!-- Label and Trait categories. --> | |
− | [[Category: | + | [[Category: NFB ]] |
+ | [[Category: No Roll ]] |
Revision as of 16:19, 27 March 2025
Hacker | Firewall | Hacking Area | Repeater | Deployable Repeater | Hacking Programs Chart | Hacking Device
Hacking ProgramsAssisted Fire | Carbonite | Controlled Jump | Cybermask | Enhanced Reaction | Fairy Dust | Oblivion | Spotlight | Total Control | Trinity | White Noise | Zero Pain
CYBERMASK
LONG SKILL
REQUIREMENTS
- The user must be outside the LoF of enemy Markers or Troopers.
EFFECTS
- The user enters the [[Impersonation]-2 state, which does not require a Roll, replacing the user's model with an Impersonation-2 Marker (IMP-2).
- The effects of this Program persist until the user reveals themselves as per the Impersonation-2 state rules.
- This Program affects only the Hacker himself and therefore has no range.
REMEMBER
While the Hacker is in IMP-2 State, the Program’s NFB Label applies, so they cannot use or apply any other Skill, piece of Equipment, or Hacking Program that has the NFB Label, for example Mimetism, Albedo, Holoprojector etc.
Name | Attack MOD | Opp. MOD | PS | Burst | Target | Skill Type | Special |
---|---|---|---|---|---|---|---|
Cybermask | -- | -- | -- | -- | -- | Long Skill | Replace user with IMP-2 Marker. |