Difference between revisions of "Quantronic Combat (Hacking)"

From Infinity
Jump to: navigation, search
(PDF 2.1)
 
(26 intermediate revisions by the same user not shown)
Line 1: Line 1:
 
{{section-combat-module}}
 
{{section-combat-module}}
 +
{{section-hacking}}
  
  
In Infinity CodeOne, infowar and cyberwarfare tasks, defined as Hacking, falls upon the Hackers’ shoulders, those Troopers equipped with Hacking Devices.
+
In Infinity, infowar and cyberwarfare tasks, defined as Hacking, are shouldered by the Hackers, specialized Troopers who can use the different Hacking Programs which define quantronic combat.  
 
 
{{greybox-start}}
 
'''Getting Started with Hacking'''
 
  
 +
{{greybox-start | Getting Started with Hacking}}
 
According to their nature, Hacking Programs allow the Hacker to act in an aggressive or defensive manner, support other Troopers, interact with scenery, etc.
 
According to their nature, Hacking Programs allow the Hacker to act in an aggressive or defensive manner, support other Troopers, interact with scenery, etc.
 
{{greybox-end}}
 
{{greybox-end}}
Line 12: Line 11:
  
 
{{remember-start}}
 
{{remember-start}}
When making your Army Lists in ''[[Infinity Army]]'', a summary of the Hacking Programs will be included, in the same way that a summary of your Troopers’ weapons is included.
+
When making your Army Lists in [https://www.infinitytheuniverse.com/ Infinity Army], a summary of the Hacking Programs will be included, in the same way that a summary of your Troopers’ weapons is included.
 
{{remember-end}}
 
{{remember-end}}
  
  
 +
== [[Hacker]] ==
 +
'''See [[Hacker]] Special Skill'''
 +
 +
 +
{{n4}}
 +
 +
== Upgrade Programs (UPGRADE) ==
 +
 +
Custom-made software tailored to the style and preference of specific infowar operatives. If available, they will be listed in the Unit Profile, in round brackets next to the name of the Hacker or the Device.
 +
 +
== Supportware Programs ==
 +
 +
These are programs of extended duration which are mainly designed to support allied Troopers on the battlefield by granting them bonuses to improve their combat capabilities. Likewise, they may also be designed to hinder enemy Troopers, applying negative MODs to them.
 +
 +
{{important-start}}
 +
* A Trooper can benefit from the effects of only one Program with the Supportware Label at a time.
 +
* Each Hacker can only sustain one active Supportware Program at a time.
 +
* A Hacker can cancel an active Supportware Program by declaring another Program and expending the corresponding Order or ARO.
 +
{{update | PDF 2.1, July 2023}}
 +
* {{erratahighlight}}A Supportware Program is automatically cancelled if the target of the Supportware is targeted by a new Supportware Program, or if the Hacker running the Program enters Isolated State or any Null States.{{erratahighlight-end}}
 +
{{update-end}}
 +
{{original}}
 +
* {{originalhighlight}}Supportware is automatically cancelled if the Trooper or Troop Type that benefits from the Supportware becomes targeted by a new Supportware Program, or the Hacker that is running it becomes Isolated or enters a Null State.{{originalhighlight-end}}
 +
{{original-end}}
 +
{{important-end}}
 +
 +
 +
{{greybox-start | Example of Supportware Use and Cancellation }}
 +
During their Active Turn, a Player that has two Troopers with EVO Hacking Devices on the table, declares Fairy Dust with one of them and chooses REMs as the Troop Type that will benefit from this Supportware.
 +
 +
For tactical reasons, they decide to spend the last Order on the other Trooper with an EVO Hacking Device to declare Enhanced Reaction on a REM located in the vanguard.
 +
 +
By designating a REM that was already benefitting from Fairy Dust, the new Supportware Program deactivates the Fairy Dust Program and the corresponding Token is removed from the table.
 +
{{greybox-end}}
 +
 +
== [[Firewall]] ==
 +
'''See [[Firewall]]'''
 +
 +
 +
 +
{{n4end}}
 
== Hacking Devices and Hacking Programs: Characteristics ==
 
== Hacking Devices and Hacking Programs: Characteristics ==
  
[[Hacking Devices]]'' and ''[[Hacking Programs]]'' have the following characteristics:
+
Hacking Devices and Hacking Programs have the following characteristics:
 +
 
 +
*They act in the user's Hacking Area.
 +
*They do not require LoF to act, unless the Hacking Program's own description states otherwise.
 +
{{n4list}}
 +
{{update | PDF 2.1, July 2023}}
 +
* Only Troopers in Model form may be targeted by Hacking Programs.
 +
{{update-end}}
 +
{{original}}
 +
* Only Troopers {{originalhighlight}}or Peripherals{{originalhighlight-end}} in Model form may be targeted by Hacking Programs.
 +
{{original-end}}
 +
{{n4end}}
 +
* They benefit, if applicable, from the target's [[Targeted]] State.
  
*They act in the user's ''[[Hacking Area]]''.
+
== [[Hacking Area]] ==
*They do not require LoF to act, unless the ''[[Hacking Program]]'''s own description states otherwise.
 
They benefit, if applicable, from the target's ''[[Targeted]]'' State.
 
  
 +
This term refers to the Area of Effect of Hacking Programs. [[Hacking Area | [continued...] ]]
  
== Hacking Area ==
 
This term refers to the ''[[Area of Effect]]'' of ''[[Hacking Programs]]''. In Infinity CodeOne a Hacker's ''[[Hacking Area]]'' matches their ''[[Zone of Control]]''.
 
  
 +
== [[Hacking Programs Chart]] ==
  
== Key to the Hacking Programs Quick Reference Chart ==
+
'''See [[Hacking Programs Chart]]'''
  
Each Hacking Program grants a series of ''[[MODs]]'' and advantages when used, that are reflected in charts listing following information:
 
  
*'''Attack MOD.''' A MOD that is applied to the user's WIP Attribute.
+
== [[Hacking Device]]s ==
*'''Opponent's MOD.''' A MOD that is applied to an enemy Trooper's Attribute when performing a Face to Face Roll.
 
*'''Damage.''' The value used to determine the Damage when applying a successful Hacking Program Roll. Unless otherwise stated, the Attribute used in the Saving Roll to resist Damage from a Hacking Program is BTS.
 
*'''Burst.''' The number of dice the Active Player must roll when declaring the Hacking Program. When the [[B]] value is higher than 1, it may be concentrated on a single target or be divided among several targets.
 
:Remember that in the Reactive Turn the ''[[B]]'' value is generally 1, unless modified by a rule or Skill.
 
*'''Target.''' The Troop Type that can be targeted by the Hacking Program.
 
*'''Type of Skill.''' Indicates the type of Skill (Entire Order, Short Skill, ARO, etc.) that must be spent to use the Hacking Program.
 
*'''Special.''' Indicates the special effects that the Hacking Program's user may apply. This section may also indicate a State that will be imposed on the target, or the type of '''[[Ammunition]]''' and [[Traits]] that may apply.
 
  
Unless otherwise stated, the range of every Program is always the Hacker's ''Hacking Area''.
+
'''See [[Hacking Device]]s'''
  
  
== Hacking Programs Chart ==
+
== Example ==
 +
{{greybox-start | Example of Quantronic Combat (Hacking)}}
 +
'''Step 1:'''
  
{| class="wikitable"
+
The Active Player declares Move with their Jujak from point A to B.  
|-
 
! Name !! Attack ''MOD'' !! Opponent's ''MOD'' !! Damage !! B !! Target !! Skill Type !! Special
 
|-
 
| Carbonite || 0 || 0 || 13 || 2 || TAG, HI, REM, Hacker || Short Skill/ARO || [[DA Ammo]], [[Non-Lethal]], [[State: Immobilized-B]].
 
|-
 
| Spotlight || 0 || 0 || -- || 1 || -- || Short Skill/ARO || [[Non-Lethal]], [[State: Targeted]].
 
|}
 
  
 +
The Reactive Player declares the use of the Carbonite Hacking Program with their Shrouded Hacker.
  
{{n4-hacking-header}}
+
Facing the possibility that the Jujak had passed within the Hacker’s ZoC, the Active Player declares Reset. They do not declare BS Attack to face the Hacker because it is clear that during their entire path they lack LoF to the Shrouded Hacker.
{{hackingrow | Carbonite | 0 | 0 | 13 | 2 | TAG, HI, REM, Hacker | Short Skill/ARO | [[DA Ammo]], [[Non-Lethal]], [[State: Immobilized-B]].}}
+
 
{{hackingrow | Spotlight | 0 | 0 | -- | 1 | -- | Short Skill/ARO | [[Non-Lethal]], [[State: Targeted]].}}
+
{{image | name=eng-hacking-example-1.jpg | style=512border }}
|}
+
 
 +
 
 +
'''Step 2:'''
 +
 
 +
It is determined that, during their Movement, the Jujak indeed entered the Hacker’s ZoC and the Face to Face Rolls are performed.
 +
 
 +
Face to Face Roll:
 +
 
 +
Active Player, Reset (WIP Roll, in this case there are no MODs to be applied): 1 d20 with Success Value (SV) = 13.
 +
 
 +
Reactive Player, Carbonite (WIP Roll, in this case there are no MODs to be applied): 1 d20 with SV = 13.
 +
 
 +
They both succeed, but the 7 cancels the 3.
 +
 
 +
{{image | name=eng-hacking-example-2.jpg | style=512border }}
 +
 
 +
 
 +
'''Step 3:'''
 +
 
 +
Therefore, after the Shrouded Hacker won the Face to Face Roll, the Jujak must perform 2 Saving Rolls due to the DA Ammunition against Damage 13.
 +
 
 +
Attack Damage = 10 (13 - 3 for BTS).
 +
 
 +
Due to the 6, the Jujak places an Immobilized-B Token next to him.
 +
 
 +
{{image | name=eng-hacking-example-3.jpg | style=512border }}
 +
{{greybox-end}}
  
  
== Hacking Devices ==
+
== FAQs & Errata ==
  
{| class="wikitable"
+
{{faqbox |
|-
+
type = faq |
! Device !! Program 1 !! Program 2
+
title = N4 FAQ |
|-
+
version = Updated 1.1.1, Dec 2021 |
| Hacking Device || Carbonite || Spotlight
+
q = Q: How does Isolated State interact with Hacking Programs that are not granted by a Hacking Device? |
|}
+
a = <s>A: While in Isolated State all the Trooper’s Hacking Programs, Skills and pieces of Equipment with the Comms Attack or Comms Equipment Labels or Traits (Hacking Device, Repeater...) are disabled.</s>
  
 +
{{erratahighlight}}A: While in Isolated State all the Trooper's Skills and pieces of Equipment with the Comms Attack or Comms Equipment Labels or Traits (Hacking Device, Repeater...) are disabled. In addition, all their Hacking Programs are disabled.{{erratahighlight-end}} |
 +
related = [[Hacker]], [[Isolated State]], [[Quantronic Combat (Hacking)]] }}
  
  
 
{{section-combat-module}}
 
{{section-combat-module}}
 +
{{section-hacking}}
  
  
  
 
[[Category: Combat Module]]
 
[[Category: Combat Module]]

Latest revision as of 15:58, 15 August 2023


In Infinity, infowar and cyberwarfare tasks, defined as Hacking, are shouldered by the Hackers, specialized Troopers who can use the different Hacking Programs which define quantronic combat.

Getting Started with Hacking

According to their nature, Hacking Programs allow the Hacker to act in an aggressive or defensive manner, support other Troopers, interact with scenery, etc.


REMEMBER

When making your Army Lists in Infinity Army, a summary of the Hacking Programs will be included, in the same way that a summary of your Troopers’ weapons is included.


Hacker

See Hacker Special Skill


Upgrade Programs (UPGRADE)

Custom-made software tailored to the style and preference of specific infowar operatives. If available, they will be listed in the Unit Profile, in round brackets next to the name of the Hacker or the Device.

Supportware Programs

These are programs of extended duration which are mainly designed to support allied Troopers on the battlefield by granting them bonuses to improve their combat capabilities. Likewise, they may also be designed to hinder enemy Troopers, applying negative MODs to them.

IMPORTANT
  • A Trooper can benefit from the effects of only one Program with the Supportware Label at a time.
  • Each Hacker can only sustain one active Supportware Program at a time.
  • A Hacker can cancel an active Supportware Program by declaring another Program and expending the corresponding Order or ARO.

Update PDF 2.1, July 2023

  • A Supportware Program is automatically cancelled if the target of the Supportware is targeted by a new Supportware Program, or if the Hacker running the Program enters Isolated State or any Null States.

Show original text.

Original

  • Supportware is automatically cancelled if the Trooper or Troop Type that benefits from the Supportware becomes targeted by a new Supportware Program, or the Hacker that is running it becomes Isolated or enters a Null State.


Example of Supportware Use and Cancellation

During their Active Turn, a Player that has two Troopers with EVO Hacking Devices on the table, declares Fairy Dust with one of them and chooses REMs as the Troop Type that will benefit from this Supportware.

For tactical reasons, they decide to spend the last Order on the other Trooper with an EVO Hacking Device to declare Enhanced Reaction on a REM located in the vanguard.

By designating a REM that was already benefitting from Fairy Dust, the new Supportware Program deactivates the Fairy Dust Program and the corresponding Token is removed from the table.

Firewall

See Firewall


Hacking Devices and Hacking Programs: Characteristics

Hacking Devices and Hacking Programs have the following characteristics:

  • They act in the user's Hacking Area.
  • They do not require LoF to act, unless the Hacking Program's own description states otherwise.

Update PDF 2.1, July 2023

  • Only Troopers in Model form may be targeted by Hacking Programs.

Show original text.

Original

  • Only Troopers or Peripherals in Model form may be targeted by Hacking Programs.
  • They benefit, if applicable, from the target's Targeted State.

Hacking Area

This term refers to the Area of Effect of Hacking Programs. [continued...]


Hacking Programs Chart

See Hacking Programs Chart


Hacking Devices

See Hacking Devices


Example

Example of Quantronic Combat (Hacking)

Step 1:

The Active Player declares Move with their Jujak from point A to B.

The Reactive Player declares the use of the Carbonite Hacking Program with their Shrouded Hacker.

Facing the possibility that the Jujak had passed within the Hacker’s ZoC, the Active Player declares Reset. They do not declare BS Attack to face the Hacker because it is clear that during their entire path they lack LoF to the Shrouded Hacker.

eng-hacking-example-1.jpg


Step 2:

It is determined that, during their Movement, the Jujak indeed entered the Hacker’s ZoC and the Face to Face Rolls are performed.

Face to Face Roll:

Active Player, Reset (WIP Roll, in this case there are no MODs to be applied): 1 d20 with Success Value (SV) = 13.

Reactive Player, Carbonite (WIP Roll, in this case there are no MODs to be applied): 1 d20 with SV = 13.

They both succeed, but the 7 cancels the 3.

eng-hacking-example-2.jpg


Step 3:

Therefore, after the Shrouded Hacker won the Face to Face Roll, the Jujak must perform 2 Saving Rolls due to the DA Ammunition against Damage 13.

Attack Damage = 10 (13 - 3 for BTS).

Due to the 6, the Jujak places an Immobilized-B Token next to him.

eng-hacking-example-3.jpg


FAQs & Errata

N4 FAQ
Version: Updated 1.1.1, Dec 2021

Q: How does Isolated State interact with Hacking Programs that are not granted by a Hacking Device?

A: While in Isolated State all the Trooper’s Hacking Programs, Skills and pieces of Equipment with the Comms Attack or Comms Equipment Labels or Traits (Hacking Device, Repeater...) are disabled.

A: While in Isolated State all the Trooper's Skills and pieces of Equipment with the Comms Attack or Comms Equipment Labels or Traits (Hacking Device, Repeater...) are disabled. In addition, all their Hacking Programs are disabled.

Related Pages: Hacker, Isolated State, Quantronic Combat (Hacking)