Hack into advanced security systems to disrupt their functioning or plant malware. Not as specialised as Open Locks or Spyware Design, but more universally applicable.
Roll d100 + skill bonus vs. DR 100
Only 1 hacking attempt can be made against each target.
You bypass software security and gain access to controlling or disrupting a protected software service. You may hack a personal computer or DigiPad, bypassing the code or biometrics. Or hack into an AR tech module to overflow it with confusing images.
You can also use the Hacking skill to set up software defences. Normally this will lead to an opposed roll if someone tries to break them.
If you succeed in hacking a tech module the targeted module receives a -5 penalty per rank you have in this skill. Lasts until repaired.
+10 DR for complex or advanced systems
+20 DR if under time pressure (counts as a main attack, costing 2 AP to use in battle)
+30 DR if security includes biometric or failsafe mechanisms
-10 DR against friendly or unsuspecting targets
–10 DR with access to quantum computing (or an expert AI)
If used to hack tech modules the DR is modified by targets total bonus in the relevant tech module.
Using your quantum DigiPad you hack into the mainframe of an advanced whaling ship and disrupt its reading of GPS data - effective sending it off course. DR 90 (100 -10 for powerful computing).
You send off a prepared virus against a target's AR tech module causing it to read info from you favorite bar in the Mud Isles instead of from the battle field in front of you. DR 100 + targets total bonus in the AR module (a very difficult move).
You set up protective measures on your allies tech module effectively adding your Success Rate to their hacking DR.
The Hacking skill embodies a character’s ability to bypass, manipulate, or dismantle digital security systems, granting them unauthorized access to protected software, devices, and networks. This skill is not just about brute-forcing passwords or exploiting weak encryption—it’s a blend of technical prowess, creativity, and adaptability, allowing characters to outmaneuver even the most sophisticated digital defenses.
A skilled hacker can infiltrate personal computers, DigiPads, or augmented reality (AR) tech modules, bypassing everything from simple passcodes to advanced biometric locks. They might flood an AR module with disorienting visuals, overload a security system to trigger false alarms, or silently extract sensitive data without leaving a trace. Beyond offensive capabilities, hackers can also fortify systems, setting up layered defenses that deter or thwart intruders. When someone attempts to breach these defenses, it often becomes a battle of wits, resolved through opposed skill rolls.
May be sequenced with Computer Science to redirect or give new orders to hacked software.
May be countered by (reversed) hacking or similar skill.