Star Wars Roleplay: Chaos

Register a free account today to become a member! Once signed in, you'll be able to participate on this site by adding your own topics and posts, as well as connect with other members through your own private inbox!

Approved Tech .squib\\JINX

Status
Not open for further replies.
5kjEgZ5.gif

D79oqTw.png
hpRxP4y.png

rVtq9TW.png

fjIqppz.png

  • Classification: Vibroshiv, Computer Spike
  • Size: Small
  • Weight: Very Light
zkbFStw.png

pJcmyyK.png

  • Computer Spike plugs into any compatible scomp-link, computer terminal, or I/O jack. This allows physical delivery of the slicer virus or scomp-spiker.
  • Vibroblade. Cuts through many materials, including most common plastoid-based armor.
  • Electro-Mag Pulse Disruptor. Causes circuit overload in contact with computer or droid-based systems.
  • Shield Disruptor. Ion field can disrupt ray shielding, granting access to some shielded computer ports or door locks.
7ORAudF.png

  • Things that deflect vibroblades, such as spider-silk armor, deflect this one as well.
  • Physical connection required. For either the vibroblade or the computer spike to really do much of anything.
  • Don't Bring A Vibroblade To A Blaster Fight. This is simple melee.
  • You Call That A Knife? This is a dirk, not a machete.
  • Shield Disruptor won't bring down the shields of a ship or vehicle, but it might be enough to create an opening enough to access a computer port.
3dP9fvZ.png

Project JINX was the prototype for what became the Netrunner Vibroshank. Originally conceived as a versatile computer spike, it became a proof-of-concept for an ion-charged vibroblade that could disrupt a broad spectrum of computer-based electronic systems, including droids or ray shielding. The Netrunner kept the ion functionality but was a much-simplified design from this weapon, which was so complex as to have been only hand-crafted.

When used as a vibroblade, it functioned identically to the Netrunner, generating an ion charge that ran along the length of the blade in addition to the vibration of the edge. When used as a computer spike, the two sides of the blade folded down to 90 degrees, becoming something like a hand guard and revealing the long spike that was then inserted into a data port. Software stored in the memory core of the handle could then be uploaded, such as spyware, data breakers, or a slicer virus -- such as Darkwire's ransomware. In the alternative, the electro-mag pulse disrupter could be channeled in the spike, allowing it to function as a scomp-spiker. In practice, one or more of these were likely used in combination. Such as breaching security in order to download or transmit files, then using the scomp-spiker to destroy the evidence of the crime or how it was perpetrated.

As this was a unique model, the Squib simply called it Jinx, which became the weapon's name. Owing to how it operated, Jinx was a brute force approach to slicing, but extremists rarely have a luxury of time on their hands when in the field. It was best operated as a first strike against a computer's defenses, which was when followed up using another tool in tandem, such as a CryptLink to manipulate or control the resulting system infection.
 
Status
Not open for further replies.

Users who are viewing this thread

Top Bottom