WHAT CAN DO
- Signature
- Erase
- Impersonate/Mask
- Trace
- Content
- Copy
- Delete
- Edit
- Read
- Create
- Encrypt
- Decrypt
- Security
- Redefine permission entry
- Redefine permission category
- Lockdown
- System (All apply firsthand as well as through connected systems)
- Link
- Unlink
- Connect
- Operate
Local Hacking
Partition - Storage device for programs and data. May be a handheld device, part of a stationary system, or in a cyberware thingy.
System Aspects
- Storage
- Processor
- Passives
- Power
- Electrical
- Bioelectrical
- Cryptic
Shapeshift
Storage 2
Power 2
Processing 3
Continually alters major aspects of the system's base-level configuration, genuinely changing its signature. However, it's power-intensive as this requires reshuffling nearly all the data in the system.