Repeater

From Infinity
Revision as of 15:38, 15 August 2023 by Ian (talk | contribs) (PDF 2.1)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to: navigation, search


This N4 rule is not used in CodeOne.

This is a range amplifier for Hackers.

REPEATER AUTOMATIC EQUIPMENT
Comms Equipment, Obligatory, Zone of Control.
Effects

Update PDF 2.1, July 2023

  • Repeaters extend the Hacking Area of all Hackers in the same Army List.
  • Hackers within the Zone of Control of an enemy Repeater may use it to apply Hacking Programs against any enemy Hacker, but applying Firewall MODs (-3).
  • There can be no reaction against a Repeater that is being used by an enemy Hacker, only against the Hacker, if possible.

Show original text.

Original

  • Repeaters extend the Hacking Area of all Hackers in the same Army List.
  • Hackers within the Zone of Control of an enemy Repeater may use Hacking Programs against any enemy Hacker, but they will have to apply Firewall MODs (-3).
  • There can be no reaction against a Repeater that is being used by an enemy Hacker, only against the Hacker, if possible.


IMPORTANT

This piece of Equipment is automatically active and cannot be deactivated by its owner, unless its carrier is in Isolated State or any Null States.


REMEMBER

Firewall imposes an additional MOD (-3, -6...) to the WIP Roll of the Trooper that declared the Comms Attack against a Trooper that benefits from a Firewall, for example if attacking through an enemy Repeater.

The Trooper benefitting from a Firewall applies a -3 MOD to the Attack Damage of the Comms Attack, if a Saving Roll needs to be made.

Only the MODs of a single Firewall can be applied, even if the Trooper benefits from more than one. In the case of the Trooper benefitting from more than one Firewall, their player will decide which one to apply.


FAQs & Errata

N4 FAQ
Version: 1.0, Jan 2021

Q: When do you apply the Firewall MODs for enemy Repeaters?

A: The Firewall MODs will only apply if using the enemy Repeater to use a Hacking Program against an enemy Hacker. If you are in the Zone of Control of an enemy Repeater, it is not mandatory to use the enemy Repeater.

Related Pages: Firewall, Repeater