Editing Case
Warning: You are not logged in. Your IP address will be publicly visible if you make any edits. If you log in or create an account, your edits will be attributed to your username, along with other benefits.
The edit can be undone.
Please check the comparison below to verify that this is what you want to do, and then save the changes below to finish undoing the edit.
Latest revision | Your text | ||
Line 10: | Line 10: | ||
===Skills=== | ===Skills=== | ||
*''Artificial Intelligence:'' You have the loyalty of a digital, artificial intelligence NPC. Give it a name and a 2-4 word description of its personality. It can enter, unlock and activate systems at your Command. Your AI can only be in one system at a time. | *''Artificial Intelligence:'' You have the loyalty of a digital, artificial intelligence NPC. Give it a name and a 2-4 word description of its personality. It can enter, unlock and activate systems at your Command. Your AI can only be in one system at a time. | ||
− | *''Mediate:'' | + | *''Mediate:'' (See Special Moves, below.) |
− | |||
− | |||
− | |||
− | |||
*''Network:'' You can simultaneously track the location and health of a dozen willing subjects through a console or HUD. You are able to remotely Get Involved or issue Commands. | *''Network:'' You can simultaneously track the location and health of a dozen willing subjects through a console or HUD. You are able to remotely Get Involved or issue Commands. | ||
*''Surveillance:'' After you Access someone’s personal systems, you can track that person’s public movements from then on (general location, interactions, transactions, etc). You can only have one surveillance subject at a time. | *''Surveillance:'' After you Access someone’s personal systems, you can track that person’s public movements from then on (general location, interactions, transactions, etc). You can only have one surveillance subject at a time. | ||
Line 22: | Line 18: | ||
*An abuse of power is resisted (Consul) | *An abuse of power is resisted (Consul) | ||
*A system’s security is breached (Technocrat) | *A system’s security is breached (Technocrat) | ||
− | |||
− | |||
===Workspace=== | ===Workspace=== |