NOTICE: Infinity N5.2 and FAQ 5.0.0
The wiki currently uses the N5.1.1 rules. Until it has been updated, please download the N5.2 rules PDF and v5.0.0 FAQ from the Rules section of https://infinityuniverse.com/resources/infinity.
Cybermask
From Infinity
Hacker | Firewall | Hacking Area | Repeater | Deployable Repeater | Hacking Programs Chart | Hacking Device
Programs and StatesAssisted Fire | Carbonite & Immobilized-B State | Controlled Jump | Cybermask & Impersonation State | Enhanced Reaction | Fairy Dust | Oblivion & Isolated State | Spotlight & Targeted State | Total Control & Possessed State | Trinity | White Noise | Zero Pain
This N4 rule is not used in CodeOne.
CYBERMASK | ENTIRE ORDER |
REQUIREMENTS
EFFECTS
- The user enters the Impersonation-2 state, which does not require a Roll, replacing the user's model with an Impersonation-2 Marker (IMP-2).
- The effects of this Program persist until the user reveals themselves as per the Impersonation-2 state rules.
- This Program affects only the Hacker himself and therefore has no range.
REMEMBER
NFB:
The Hacker cannot be in IMP-2 state while being in Camouflaged state or other similar state.
Name | Attack MOD | Opp. MOD | DAM | B | Target | Skill Type | Special |
---|---|---|---|---|---|---|---|
Cybermask | -- | -- | -- | -- | -- | Entire Order | Replace user with IMP-2 Marker. |