Difference between revisions of "Hacking Device"

From Infinity
Jump to: navigation, search
(PDF 2.1)
 
Line 12: Line 12:
 
*They do not require LoF to act, unless the Hacking Program's own description states otherwise.  
 
*They do not require LoF to act, unless the Hacking Program's own description states otherwise.  
 
{{n4list}}
 
{{n4list}}
* Only Troopers or Peripherals in Model form may be targeted by Hacking Programs.
+
{{update | PDF 2.1, July 2023}}
 +
* Only Troopers in Model form may be targeted by Hacking Programs.
 +
{{update-end}}
 +
{{original}}
 +
* Only Troopers {{originalhighlight}}or Peripherals{{originalhighlight-end}} in Model form may be targeted by Hacking Programs.
 +
{{original-end}}
 
{{n4end}}
 
{{n4end}}
 
* They benefit, if applicable, from the target's [[Targeted]] State.
 
* They benefit, if applicable, from the target's [[Targeted]] State.
Line 48: Line 53:
 
{{n4end}}
 
{{n4end}}
 
{{n4list}}
 
{{n4list}}
 +
 
== Hacking Device ==
 
== Hacking Device ==
 
{{skillbox |black| HACKING DEVICE | AUTOMATIC EQUIPMENT }}
 
{{skillbox |black| HACKING DEVICE | AUTOMATIC EQUIPMENT }}

Latest revision as of 14:52, 11 October 2023


Hacking Devices are the tools used during cybercombat. Multipurpose and versatile, these devices can be useful as support elements or to perform powerful cyberattacks, depending on the Device.

Hacking Devices and Hacking Programs: Characteristics

Hacking Devices and Hacking Programs have the following characteristics:

  • They act in the user's Hacking Area.
  • They do not require LoF to act, unless the Hacking Program's own description states otherwise.

Update PDF 2.1, July 2023

  • Only Troopers in Model form may be targeted by Hacking Programs.

Show original text.

Original

  • Only Troopers or Peripherals in Model form may be targeted by Hacking Programs.
  • They benefit, if applicable, from the target's Targeted State.


Device Program 1 Program 2
Hacking Device Carbonite Spotlight


HACKING DEVICE AUTOMATIC EQUIPMENT
Comms Equipment
Effects
Device Program 1 Program 2 Program 3 Program 4 Program 6 Program 6
Hacking Device Carbonite Spotlight Total Control Oblivion -- --
Hacking Device Plus Carbonite Spotlight Total Control Oblivion White Noise Cybermask
Killer Hacking Device Trinity Cybermask -- -- -- --
EVO Hacking Device Assisted Fire Enhanced Reaction Fairy Dust Controlled Jump -- --


Hacking Device

HACKING DEVICE AUTOMATIC EQUIPMENT
Comms Equipment
Effects


Hacking Device Plus

HACKING DEVICE PLUS AUTOMATIC EQUIPMENT
Comms Equipment
Effects


Killer Hacking Device

KILLER HACKING DEVICE AUTOMATIC EQUIPMENT
Comms Equipment
Effects


EVO Hacking Device

EVO HACKING DEVICE AUTOMATIC EQUIPMENT
Comms Equipment
Effects


REMEMBER

Both Hackers and Hacking Devices may benefit from Upgrades.