Difference between revisions of "Cybermask"

From Infinity
Jump to: navigation, search
Line 24: Line 24:
 
{{hackingrow | [[Cybermask]] | -- | -- | -- | -- | -- | Entire Order | Replace user with [[IMP-2]] Marker.}}
 
{{hackingrow | [[Cybermask]] | -- | -- | -- | -- | -- | Entire Order | Replace user with [[IMP-2]] Marker.}}
 
|}
 
|}
 +
 +
 +
{{remember-start}}
 +
[[Labels|Supportware]] is automatically cancelled if the [[Trooper]] or [[Troop Type]] that benefits from the Supportware becomes targeted by a new Supportware Program, or the Hacker that is running it becomes [[Isolated]] or enters a [[Null]] State.
 +
{{remember-end}}
 +
 
{{n4end}}
 
{{n4end}}
  

Revision as of 16:32, 24 November 2020


This N4 rule is not used in CodeOne.

CYBERMASK ENTIRE ORDER
NFB, No Roll.
Requirements
Effects
  • The user enters the Impersonation-2 state, which does not require a Roll, replacing the user's model with an Impersonation-2 Marker (IMP-2).
  • The effects of this Program persist until the user reveals themselves as per the Impersonation-2 state rules.
  • This Program affects only the Hacker himself and therefore has no range.


REMEMBER

NFB:

The Hacker cannot be in IMP-2 state while being in Camouflaged state or other similar state.


Name Attack MOD Opp. MOD DAM B Target Skill Type Special
Cybermask -- -- -- -- -- Entire Order Replace user with IMP-2 Marker.


REMEMBER

Supportware is automatically cancelled if the Trooper or Troop Type that benefits from the Supportware becomes targeted by a new Supportware Program, or the Hacker that is running it becomes Isolated or enters a Null State.