Apps & ALIs
Software is not a tangible good, so it cannot be nanofabricated.
Apps
This software can be run on any computerized device.
APPS | Comp/ | Description |
---|---|---|
AR Illusion | Mod/2 | Create realistic entoptic illusions. |
Biometric Matcher | Min/1 | Match biometric patterns. |
Crypto | Min/1 | Encrypt/decrypt files and messages. |
Exploit | Mod/R/2 | Hacking library tool. |
Firewall | Min/1 | Protects devices from intrusion. |
Lockbox | Mod/R/2 | Imprisons infomorphs. |
Psychosurgery | Mod/2 | Edit minds. |
Sniffer | Mod/2 | Collect/view traffic between two systems. |
Spoofer | Mod/R/2 | Fake transmissions and mesh IDs. |
Tracker | Mod/2 | Trace connections. |
VPN | Min/1 | Creates virtual private network. |
XP | Min+/1+ | Clips of others’ recorded sensorium |
AR Illusion: A media library and editing suite you can use to create realistic entoptic illusions.
Biometric Matcher: This app takes any biometric pattern — face, gait, morph, voice, etc. — and runs a pattern-matching search (Tracking by Biometrics).
Crypto: This app generates key pairs, encrypts messages using public keys, and decrypts with secret keys (Encryption).
Exploit: A hacker library/tool for taking advantage of known software vulnerabilities. Required for hacking.
Firewall: This app protects a device from hostile intrusion. Every device comes with one by default.
Lockbox: This malware imprisons infomorphs (Trap Ego).
Psychosurgery: This app is used to edit minds (Psychosurgery).
Sniffer: Sniffer apps collect all of the traffic passing between or through targeted systems (Sniffing).
Spoofer: Use spoof apps to fake transmissions and mesh IDs (Spoofing).
Tracker: This app traces people’s connections online to their origin (Tracking).
VPN: This app enables you to communicate over a virtual private network (VPNs). VPNs provide a −30 modifier to sniffing attacks (Sniffing).
XP: Clips of someone else’s experiences. Depending on the content, some XP (porn, snuff, crime, etc.) is restricted in certain jurisdictions. XP clips are frequently modified so that their emotive tracks are more intense, giving the viewer a greater thrill.
ALIs and Muses
Everyone has a muse, and every device has a built-in ALI (AIs & Muses). All ALI infomorphs have Wound Threshold 4, Durability 20, and Death Rating 40 for mesh combat.
ALIs & MUSES | Comp/ | Skills |
---|---|---|
Bot/Vehicle ALI | Mod/2 | Fray 30, Guns 30, Hardware: [appropriate field] 20 (specific bot/vehicle 30), Infosec 20, Interface 30, Know: [bot/vehicle] Specs 80, Perceive 40, Pilot: [appropriate field] 60 (specific bot/vehicle 70), Research 20 |
Device ALI | Mod/2 | Hardware: Electronics 20 (specific device 30), Infosec 20, Interface 30 (specific device 40), Know: [device] Specs 80, Know: [device] Usage 80, Perceive 20, Program 30 (specific device 40), Research 20 |
Kaos ALI | Maj/R/3 | Guns 40, Hardware: Electronics 40, Infosec 60, Interface 40, Know: Security Systems 80, Perceive 30, Program 40, Research 30 |
Muse | Mod/2 | Hardware: Electronics 30, Infosec 30, Interface 60, Know: Accounting 60, Know: Psychology 60, Medicine: Psychosurgery 30, Perceive 30, Program 30, Research 30, plus one other Know skills at 40. Note: Muses have INT 15 and 10 in other aptitudes. |
Security ALI | Mod/2 | Guns 30, Hardware: Electronics 30, Infosec 60, Interface 40, Know: Security Systems 80, Perceive 30, Program 30, Research 20 |
Sentry ALI | Maj/R/3 | Fray 30, Guns 60, Hardware: [appropriate field] 30, Interface 30, Kinesics 40, Know: [bot/vehicle] Specs 80, Know: Security Ops 80, Perceive 40, Pilot: [appropriate field] 40, Provoke 30 |
Bot/Vehicle ALI: These AIs can pilot and control the bot/vehicle they are designed for without transhuman assistance.
Device ALI: These resident ALIs help transhumans operate a particular device or do it for them. They are included in most non-ware gear items.
Kaos ALI: KALIs are used by hackers and covert ops teams to create distractions and sabotage systems.
Muse: These are digital assistants and life-long companions.
Security ALI: Provide overwatch for electronic systems.
Sentry ALI: Combat ALIs for physical security.
Scorchers
Scorchers are damaging neurofeedback apps used against infomorphs and cyberbrains.
SCORCHERS | Comp/ | Description |
---|---|---|
Bedlam | Mod/R/2 | Horrifying inputs, SV 1d10 [6], +1d6 per superior success. |
Cauterizer | Mod/R/2 | Destructive neurofeedback, DV 1d10 + 5 [11], +1d6 per superior success. |
Nightmare | Mod/R/2 | Trigger anxiety/panic, WIL Check or SV 1d6 [4] and acute stress response for 1d6 minutes. |
Spasm | Mod/R/2 | Excruciating pain, WIL Check or incapacitated for 1 action turn, stunned 3 minutes. |
Bedlam: Bedlam assaults the ego with traumatic mental input, inflicting mental stress. Victims are overwhelmed with horrific, monstrous, sanity-ripping sensory and emotional tracks. Each attack inflicts SV 1d10, +1d6 per superior success.
Cauterizer: This scorch app rips into the ego with destructive neurofeedback routines. Against a cyberbrained ego, the cauterizer inflicts DV 1d10 + 5, +1d6 per superior success, to the target’s morph (this is physical damage, not mesh damage). Against an infomorph, the cauterizer inflicts a DV 3d10 mesh attack of digitized neurological damage.
Nightmare: Nightmares trigger anxiety and panic attacks within the victim by stimulating the neural circuitry representing the amygdala and hippocampus. The target ego must make a WIL Check. If they succeed, they are shaken, suffering a −10 impairment modifier to all actions until the end of the next action turn. If they fail, they suffer SV 1d6 and suffer an acute stress response lasting for 1d6 minutes, +1 per superior failure.
Spasm: Spasm scorchers incapacitate the ego with excruciating pain. Affected targets must immediately make a WIL Check. If they fail, they fall down and are incapacitated for 1 action turn (+2 turns per superior failure) and stunned for 3 minutes. Success means they are stunned for 3 action turns. Due to the nature of the delivery, pain tolerance of any sort has no effect.
Tactical Networks
Tacnets allow a group and their muses/gear to share real-time tactical situational and sensory data over encrypted mesh channels. They are used by sports teams, security/military units, gamers, and anyone else that needs to coordinate actions.
TACNETS | Comp/ | Description |
---|---|---|
TacNet | Mod/2 | Share tactical data in real-time. |
Tacnets provide the following functions:
- Maps: Tacnets present maps from a bird’s eye, three-dimensional interactive, or first-person entoptic view, tagging notable features and marking distances. They can also plot maps based on sensory input, positioning systems, and other data.
- Positioning: Tacnets indicate the position of known people, bots, vehicles, and other features according to sensory input or their calculated trajectories. Friend-or-foe tags highlight allies and opponents, noting their lines of sight and fields of fire and alerting the user to areas of potential cover or danger.
- Sensory Input: Tacnets share all sensory input available from members and linked devices. This includes data from physical senses, portable sensors, smartlink guncams, XP feeds, etc. Users can immediately call up and access the sensor feeds of others as needed.
- Communications Management: Tacnets maintain an encrypted VPN between users. They actively monitor for dropped signals and hacking/sniffing/jamming attempts. Treat as a system defender with Infosec 40 and Interface 40.
- Smartlink/Weapon Data: Tacnets monitor the status of weapons, accessories, and other gear, bringing damage, shortages, ammo counts, and other issues to the user’s attention.
- Medical Data: Tacnets monitor the health of their users via medichines, implants, and other sensors. Users can call up health reports on their allies.
- Overwatch: Tacnets keep an eye out for potential threats. They provide a +10 modifier to Perceive Tests against surprise.
- Indirect Fire: Members of a tacnet can provide targeting data to each other for purposes of indirect fire.
- Analysis: Tacnets can analyze real-time situations to provide suggestions and warnings. The app’s god’s-eye view of a situation helps it to identify facts and details that individuals overlook. For example, a tacnet can analyze an opposing team’s weapons, shots fired, and potential injuries and suggest tactical maneuvers. Querying a tacnet for advice is a quick action; treat as Know: Tactics 80.
Many tacnet features are immediately accessible to the user via their AR display; other data can be accessed with a quick action. The GM determines when the tacnet provides important alerts to the user. At the GM’s discretion, some of these features may apply modifiers to the character’s tests. Tacnets are designed to be overseers, not to take action. They will not hack opponents, pilot vehicles, or interface with weapon systems.