Difference between revisions of "Shade NB"

From RPGnet
Jump to: navigation, search
Line 2: Line 2:
  
 
SHADES’s a Corporate drone coder turned hacker when he was framed by a co-worker at Kamigawa Neurotechnics who wanted to cover up their tracks of stealing and selling data to the competition. SHADES had to leave overnight, not before taking a standard issue cubicle cyberdeck and valuable data to set him up for his new life as an operator. Now hiding in the urban maze of District 1, using his modded ‘deck for the occassional black op for former business acquaintances or system maintenance work for folk of his former home, an offhshore drift nation, he waits patiently for the opportunity to exact revenge…
 
SHADES’s a Corporate drone coder turned hacker when he was framed by a co-worker at Kamigawa Neurotechnics who wanted to cover up their tracks of stealing and selling data to the competition. SHADES had to leave overnight, not before taking a standard issue cubicle cyberdeck and valuable data to set him up for his new life as an operator. Now hiding in the urban maze of District 1, using his modded ‘deck for the occassional black op for former business acquaintances or system maintenance work for folk of his former home, an offhshore drift nation, he waits patiently for the opportunity to exact revenge…
 
 
 
Stats
 
Stats
 
Attributes Score Modifiers
 
Attributes Score Modifiers
Line 16: Line 14:
 
Administer-0 (Learning)
 
Administer-0 (Learning)
 
Connect-0 (Learning)
 
Connect-0 (Learning)
Program-1 (Hacker+bonus skill)
+
Program-1 (Coder+bonus skill)
 
Sneak-0 (Many Faces)
 
Sneak-0 (Many Faces)
 
HP: 5
 
HP: 5
Line 23: Line 21:
 
Masterful Expertise
 
Masterful Expertise
 
Foci: Many Faces
 
Foci: Many Faces
 +
You have multiple usable identities registered with corporate and governmental databases. These identities are so deeply embedded in the systems that they’re almost impossible to pry out unless you do something to compromise them. Level 1: Gain Sneak as a bonus skill. You can maintain one alternate identity at a time per three character levels, rounded up. These identities have their own names, backgrounds, criminal records, financial dealings, and bank accounts, and will register as authentic to all normal corporate and governmental checks. If an identity is compromised or you want a different one, you can replace it with a week’s work. False identities cannot be important people or involve corporations you don’t have a Contact in already.
 
Hacking setup (minimal mobile, modular, and utilitarian)
 
Hacking setup (minimal mobile, modular, and utilitarian)
 
Deck Costs Bonus Access Mem Shield CPU Enc
 
Deck Costs Bonus Access Mem Shield CPU Enc
Line 28: Line 27:
 
(Scrap deck) $500 1 8 5 2+1 1
 
(Scrap deck) $500 1 8 5 2+1 1
 
Mods:
 
Mods:
Bespoke Code Optimization: Pick one Verb and one Subject when installing this mod [Glitch+Cyber]; those utilities occupy no Memory and one instance of that Verb-Subject program doesn’t count against its CPU burden. 20% of deck cost (=$100)
+
Bespoke Code Optimization: Pick one Verb and one Subject when installing this mod [Delude +Device]; those utilities occupy no Memory and one instance of that Verb-Subject program doesn’t count against its CPU burden. 20% of deck cost (=$100)
 
CPU Overclocking: CPU+1. 30% of deck cost (=$150).
 
CPU Overclocking: CPU+1. 30% of deck cost (=$150).
 
Progams (local Fixer supplies programs in exchange for hack work)
 
Progams (local Fixer supplies programs in exchange for hack work)
 +
 
Subject Type
 
Subject Type
 
Cyber Cyber
 
Cyber Cyber
 
Door Device
 
Door Device
 
Program Program
 
Program Program
 +
Camera (bespoke) Device
 
Verb Target Types Access Cost Modifier Use
 
Verb Target Types Access Cost Modifier Use
 
Glitch Device/Cyber 0 +2 Briefly deactivate a device or cyber
 
Glitch Device/Cyber 0 +2 Briefly deactivate a device or cyber
Line 41: Line 42:
 
Sabotage Device/Cyber 1* -1 Make the target damage itself
 
Sabotage Device/Cyber 1* -1 Make the target damage itself
 
Terminate Program 1* +0 Forcibly end an unwanted program
 
Terminate Program 1* +0 Forcibly end an unwanted program
 +
Delude (bespoke) Device 1 -1 Spoof a device with false sensor input
 
*These verbs are self-terminating, and return their CPU slot immediately after the program is run.
 
*These verbs are self-terminating, and return their CPU slot immediately after the program is run.
 +
 
Gear
 
Gear
 
Knife (switchblade)
 
Knife (switchblade)
 
Reinforced Clothing
 
Reinforced Clothing
 
Smartphone, basic
 
Smartphone, basic
 +
Goggles, IR (big ticket item, modded to display simple messages)
 
$90in cash
 
$90in cash
 
Contact: TBD
 
Contact: TBD
Apperance: late 20s; lean and lanky, winning smile (sometimes twitching), wears way too large mirrorshades, hiding twitching eyes; bulky backpack, 2nd hand punkwear to blend in (had to ditch corpo uniform quickly)
+
Apperance: late 20s; lean and lanky, winning smile (sometimes twitching), wears way too large goggles, hiding twitching eyes; bulky backpack, 2nd hand punkwear to blend in (had to ditch corpo uniform quickly)
 
Goal:
 
Goal:
 
Wants revenge against coworker (Set them up for a crime or other transgression they didn't commit, sth worse than if the corp found out they stole from them)
 
Wants revenge against coworker (Set them up for a crime or other transgression they didn't commit, sth worse than if the corp found out they stole from them)
Line 61: Line 65:
 
Learned to depend on his own, other people seem untrustworthy
 
Learned to depend on his own, other people seem untrustworthy
 
Eats too much kibble.
 
Eats too much kibble.
Most valued possessions: ‘shades, vintage synthesizer
+
Most valued possessions: modded goggles, vintage synthesizer

Revision as of 14:57, 12 March 2024

< < < Back To Main Page

SHADES’s a Corporate drone coder turned hacker when he was framed by a co-worker at Kamigawa Neurotechnics who wanted to cover up their tracks of stealing and selling data to the competition. SHADES had to leave overnight, not before taking a standard issue cubicle cyberdeck and valuable data to set him up for his new life as an operator. Now hiding in the urban maze of District 1, using his modded ‘deck for the occassional black op for former business acquaintances or system maintenance work for folk of his former home, an offhshore drift nation, he waits patiently for the opportunity to exact revenge… Stats Attributes Score Modifiers Strength 11 +0 Dexterity 10 +0 Constitution 9 +0 Intelligence 6 14 +1 Wisdom 6+2 (Growth) +0 Charisma 14 +1 Attack Bonus +0 Skills: Administer-0 (Learning) Connect-0 (Learning) Program-1 (Coder+bonus skill) Sneak-0 (Many Faces) HP: 5 Edges Hacker Masterful Expertise Foci: Many Faces You have multiple usable identities registered with corporate and governmental databases. These identities are so deeply embedded in the systems that they’re almost impossible to pry out unless you do something to compromise them. Level 1: Gain Sneak as a bonus skill. You can maintain one alternate identity at a time per three character levels, rounded up. These identities have their own names, backgrounds, criminal records, financial dealings, and bank accounts, and will register as authentic to all normal corporate and governmental checks. If an identity is compromised or you want a different one, you can replace it with a week’s work. False identities cannot be important people or involve corporations you don’t have a Contact in already. Hacking setup (minimal mobile, modular, and utilitarian) Deck Costs Bonus Access Mem Shield CPU Enc PanadyneQD40 (Scrap deck) $500 1 8 5 2+1 1 Mods: Bespoke Code Optimization: Pick one Verb and one Subject when installing this mod [Delude +Device]; those utilities occupy no Memory and one instance of that Verb-Subject program doesn’t count against its CPU burden. 20% of deck cost (=$100) CPU Overclocking: CPU+1. 30% of deck cost (=$150). Progams (local Fixer supplies programs in exchange for hack work)

Subject Type Cyber Cyber Door Device Program Program Camera (bespoke) Device Verb Target Types Access Cost Modifier Use Glitch Device/Cyber 0 +2 Briefly deactivate a device or cyber Analyze Device/Data 0* +1 Identify a target device or a file’s topic Decrypt Data 1* +0 Decrypt a file or radio transmission Sabotage Device/Cyber 1* -1 Make the target damage itself Terminate Program 1* +0 Forcibly end an unwanted program Delude (bespoke) Device 1 -1 Spoof a device with false sensor input

  • These verbs are self-terminating, and return their CPU slot immediately after the program is run.

Gear Knife (switchblade) Reinforced Clothing Smartphone, basic Goggles, IR (big ticket item, modded to display simple messages) $90in cash Contact: TBD Apperance: late 20s; lean and lanky, winning smile (sometimes twitching), wears way too large goggles, hiding twitching eyes; bulky backpack, 2nd hand punkwear to blend in (had to ditch corpo uniform quickly) Goal: Wants revenge against coworker (Set them up for a crime or other transgression they didn't commit, sth worse than if the corp found out they stole from them) Background: Origin: A drift nation (a floating offshore city) somewhere in the Atlantic of poor sea nomad upbringing, worked his ass off to get a job in the corp inheritor of a family debt Personality: Values most: his integrity Most valued person: himself and his coding skills When calm, overconfident. When stressed, becomes calculating. Learned to depend on his own, other people seem untrustworthy Eats too much kibble. Most valued possessions: modded goggles, vintage synthesizer