Jump to content
Main menu
Main menu
move to sidebar
hide
Navigation
Main page
Recent changes
Random page
Help about MediaWiki
Chucks 1E Eclipse Phase Wiki
Search
Search
Create account
Log in
Personal tools
Create account
Log in
Pages for logged out editors
learn more
Contributions
Talk
Editing
Software
(section)
Page
Discussion
English
Read
Edit
Edit source
View history
Tools
Tools
move to sidebar
hide
Actions
Read
Edit
Edit source
View history
General
What links here
Related changes
Special pages
Page information
Warning:
You are not logged in. Your IP address will be publicly visible if you make any edits. If you
log in
or
create an account
, your edits will be attributed to your username, along with other benefits.
Anti-spam check. Do
not
fill this in!
== Programs == These programs can be run on any computerized device. '''AR Illusions:''' These databases of AR clips can be used to create realistic illusions in someone’s entoptic display. '''[Moderate]''' '''Cartography Package:''' This software is used to build detailed, high-resolution maps. It is ideally employed by flight-capable morphs with the mnemonic augmentation or life recorder augmentations. Whenever airborne at an altitude of 30 meters or more, the cartography package automatically maps the morph’s surroundings out to the limits of their vision. Map resolution is 1 meter, but this is improved to 10 cm if the character also has enhanced vision or lidar and is actively focused on performing recon (equivalent to a Task Action lasting the duration of the flight, though no test is needed). Input from other sensory systems is also included; e.g., radioactive hotspots noticed with radiation sense would be marked. '''[Moderate]''' '''Encryption:''' Crypto software generates key pairs, encrypts messages using public keys, and decrypts with secret keys. See Encryption. '''[Low]''' '''Exploit:''' Exploits are hacker tools that take advantage of known vulnerabilities in other software. They are required for intrusion attempts. '''[High]''' '''Facial/Image Recognition:''' This program can be used to take an image and run a pattern-matching search among public archives. Similar version of this program exist for other biometrics: gait recognition, vocal recognition, etc. '''[Low]''' '''Firewall:''' This program protects a device from hostile intrusion. Every system comes with a standard version of this software by default. '''[Low]''' '''Sniffer:''' Sniffer programs collect all of the transmission that pass to, from, or through the device they are running on. '''[Moderate]''' '''Spoof:''' Spoof is a hacker tool used to fake commands and transmissions, making them seem as if they came from another source. '''[Moderate]''' '''Tactical Networks:''' These programs allow people in the same squad to share tactical data in real-time. '''[Moderate]''' '''Tracking:''' This software is used to track people by their presence online. '''[Moderate]''' '''XP:''' Experience playback recordings are clips of someone else’s experiences. Depending on the content, some XP (porn, snuff, crime, etc.) may be restricted in certain jurisdictions. Some XP clips are intentionally modified so that their emotive tracks are more intense, giving the viewer a greater thrill. '''[Low to High]''' '''Behavioral Psych:''' When provided with data on a particular person and their activities, this software can build a psychological profile. The larger the data set—sensor scans, mesh activity, public profile, relationship maps, location tracking, medical history, lifelogs—the deeper and more accurate the analysis. Treat this as an Academics: Psychology skill of 80 or apply a +20 modifier to a character using this software to aid a psychology or behavior-related analysis test. '''[High]''' '''Event Reconstruction Software:''' The latest forensic method used by crime scene investigators, event reconstruction software takes sensor data and applies predictive algorithms to build a reconstruction of a past event. This combined data can be used to run a simulspace scenario of the event and its possible permutations. Apply a +20 modifier to Investigation Tests. '''[High]''' '''Fake Brainprint Plug-in:''' This software plug-in can be used by infomorphs or characters with cyberbrains to attempt to deceive brainprint scanners. Make a Variable Opposed Test between the Interfacing skill of the person or AI running the scan with a −30 modifier and the Infosec skill of the subject (or their muse). If the character being checked succeeds and the scanner fails, the fake brainprint passes. If both succeed, an anomaly has been detected, though the nature of the anomaly will be unclear. Further scans can be made to try and identify the problem (repeat the test). If the scanner succeeds and the fake brainprint user fails, the deception is detected. Another test can be made to identify the real print (without the −30 modifier this time), and the scanner will likely have some uncomfortable questions to ask. This software is considered contraband in most law-abiding habitats. '''[Expensive]''' '''Kinesics software:''' Kinesics software measures voice stress patterns or analyzes other sensory input to monitor for deception, hostile intent, and other emotional states. It functions with a Kinesics skill of 40 or provides a +10 modifier to a Kinesics Test made by someone using it. '''[Moderate]''' '''Probability Mapping:''' Though most effective with massive data sets and quantum computers, a standard user and their muse can still benefit from using probability mapping software to predict things like traffic, peak travel times, crime rates, and other periodic and habitual events. When supplied with data on a particular person, this software can make a guess as to their likely current whereabouts, activities, and possibly even moods and other factors. '''[High]''' '''Radio Motion Detection:''' Technically known as variance-based radio tomographic imaging, this sensing technique can be used with any wireless radio devices. It is especially useful in urban areas, where wireless devices are everywhere. Because this system is passive, using existing signals, it does not alert the target. To detect motion in a target area, the software measures and analyzes the transmission and reception of radio signals originating on opposing sides of the target area. Variations in these signals detect movement in the area, which can be overlaid on a map of the area to pinpoint target locations. Since wireless radio signals penetrate walls and other obstructions, this can be used to identify unseen movement inside a structure, without giving away the scanning as t-rays or radar would. This method is roughly accurate to within 5 meters, −1 meter per 10 points of MoS on an Interfacing Test. Resolution is poor, with few details on the target provided. '''[Low]''' '''Relationship Mapping:''' This software uses publicly available data, as well as any other information supplied, to build a relationship map marking a specific target’s known and likely associates and interactions. Aside from analyzing public profiles and online interactions, it also accesses mesh tracking logs to pinpoint incidents of physical proximity. It is useful for identifying a person’s social relationships, including friends, relatives, lovers, co-workers, conspirators, and so on. At the gamemaster’s discretion, this may provide a modifier for Investigation or Networking Tests. '''[Moderate]'''
Summary:
Please note that all contributions to Chucks 1E Eclipse Phase Wiki may be edited, altered, or removed by other contributors. If you do not want your writing to be edited mercilessly, then do not submit it here.
You are also promising us that you wrote this yourself, or copied it from a public domain or similar free resource (see
Chucks 1E Eclipse Phase Wiki:Copyrights
for details).
Do not submit copyrighted work without permission!
Cancel
Editing help
(opens in new window)
Toggle limited content width