Cybermask
From Infinity
Hacker | Firewall | Hacking Area | Repeater | Deployable Repeater | Hacking Programs Chart | Hacking Device
Programs and StatesAssisted Fire | Carbonite & Immobilized-B State | Controlled Jump | Cybermask & Impersonation State | Enhanced Reaction | Fairy Dust | Oblivion & Isolated State | Spotlight & Targeted State | Total Control & Possessed State | Trinity | White Noise | Zero Pain
This N4 rule is not used in CodeOne.
CYBERMASK | ENTIRE ORDER |
NFB, No Roll. |
Requirements
Effects
- The user enters the Impersonation-2 state, which does not require a Roll, replacing the user's model with an Impersonation-2 Marker (IMP-2).
- The effects of this Program persist until the user reveals themselves as per the Impersonation-2 state rules.
- This Program affects only the Hacker himself and therefore has no range.
REMEMBER
NFB:
The Hacker cannot be in IMP-2 state while being in Camouflaged state or other similar state.
Name | Attack MOD | Opp. MOD | DAM | B | Target | Skill Type | Special |
---|---|---|---|---|---|---|---|
Cybermask | -- | -- | -- | -- | -- | Entire Order | Replace user with IMP-2 Marker. |
REMEMBER
Supportware is automatically cancelled if the Trooper or Troop Type that benefits from the Supportware becomes targeted by a new Supportware Program, or the Hacker that is running it becomes Isolated or enters a Null State.