MEATJACKED

MEATJACKED: A Post-Orwellian retrofuturistic cyber-crawling alt-historical hack*-n-slash

"If you die in the game, you don't die in real life. It's much, much higher stakes than that."

The year is 199X.
The phone are flip.
The kids are hip.
Everything's just about gone to shit.

Name: Randomly generated (embarrassing)
Online Handle: Chosen by player (likely to also be embarrassing)

Talents
  1. L33t Sk1llz - You have a reaction time of approximately 0 seconds, especially when you are waiting for something to happen
  2. Paranoid Android - Whenever you think to check, you can tell if something is "dangerous" (no details, just yes or no)
  3. Gone Phishing - You're really good at small talk and maintaining eye-contact without it being creepy
  4. Reverse The Polarity - You can make programs and equipment do the exact opposite of what they are designed to do
  5. Lucky Devil - Just one time, you can avoid a major consequence or stumble upon an amazing opportunity
  6. Expert Driver
  7. DIY Master - You can replace a missing part with enough duct tape, spit and prayers
  8. Eye for Detail - You can take a mental snapshot of a scene and peruse it later. One snapshot at a time
  9. Percussive Maintenance - If something is broken, you can make it work for a bit longer but break twice as bad after that
  10. Just Tinkering - You're really exceptionally good at taking things apart, and pretty good at putting them back together
  11. Top Sneaky - You always, no matter what, have a USB drive (or other tiny object) on your person
  12. Nose for Trouble - You can always tell which direction has the most danger
  13. Thrifty - Whenever you dig through a pile of interesting trash, you find something useful
  14. Sees Things

Background Benefit
  1. My dad is loaded (and doesn't approve of my life choices)
  2. Kind of in a gang?
  3. Sort of in a cult?
  4. Close friends with a nutty computer scientist
  5. Got an actual job relating to computers
  6. Got a whole bunch of bizarre part-time jobs
  7. Internet famous, a bit of a weird fanclub
  8. Child of a famous celebrity

Everyone has a full setup in their main location (by default, their parents basement) with haptic feedback gauntlets, Omni-VR interface and a fast internet connection.

Extra Equipment
  1. Laptop - Slower than a desktop, but comes in a slick carry case
  2. High-end Phone - Connects to the internet, badly
  3. Boxes and boxes of junk and spare parts
  4. Vehicle: car, van, motorbike, boat
  5. Gun, three bullets
  6. Backup server
  7. Wads of questionable cash
  8. Extremely rare and valuable (?) collectibles
  9. Drugs

Avatar Stats
  • 4 HP (Hardware Protection), protects you from viruses, attacks and traps
  • 2 MP (Memory & Processing), used to power programs, MP can be shared
  • 1 ATK (Attack)
  • 1 DEF (Defence)
  • 0 SPD (Speed)
  • 0 AUT (Auto-assist), programming on the fly, lucky breaks


An Avatar has eight total slots of Bandwidth. One Config, Program or large file will fill one Bandwith. You start with the four Default Configs, a random Config, a random Program, and one Config or Program of your own choice/design. If a Config or Program of yours is found a the scene of a crime, it might get registered in an official database as illegal code. If someone "copies your homework" (duplicates your Config or Program) and gets caught with it, you might be locked out of using it as well.

If you run out of HP, you are forcibly disconnected and suffer a Terrible Fate. You can pull the plug at any time, but you'll have left behind copies of your Configs and Programs, and you won't have any of the loot you got.

You can run a duplicate of a Config, but it has halved effectiveness. After that more duplicates don't give any benefit.

Default Config ("body")
  • Encrypted connection ("Speak softly", otherwise you have to knock loudly on the front door. DEF +1)
  • Omnisensory feedback codec ("Eyes and ears". SPD +1)
  • Autonomic response driver ("Hands". ATK +1)
  • System resource manager ("Crafting", create and run programs on-site. AUT +1)

You don't have to use the Default Config, you can replace anything you don't think you'll need,

Config ("equipment")
  1. Reinforced hardware protocols (HP +4)
  2. System overclock buffer (MP +4)
  3. Distributed contact interface (ATK +2)
  4. Redundant pre-processing layers (DEF +2)
  5. Streamlined connection cache (SPD +2)
  6. Neural network assistant (AUT +2)
  7. Authorised antivirus (Defends you against viruses, but also prevents you releasing them. DEF +1)
  8. On-site backup and restore (Recover a previously stored avatar state. Lose 1 max HP, restore all HP)
  9. Virtual private network (Attach a server of your own to the system, create a "lair". AUT +1)
  10. Ultralight defensive profile (While at 0 MP, block all 1 DMG attacks. ATK +1)
  11. Unstable peer-to-peer approach (Deal x2 DMG, take x2 DMG from next attack. SPD +1)
  12. Dedicated firmware pattern (Chosen program has MP cost reduced by 1. +1 MP)
  13. Sacrificial component setup (1 HP: Block an attack. DEF +1)
  14. Cyclic trojan array (If you destroy a program or avatar, make another attack. ATK +1)
  15. Subcomponent transducer (X HP, 1 MP: Make a second avatar with X of your HP. AUT +1)
  16. Fully-active sleep status (You can leave your avatar on stand-by and have it respond instantly to threats. SPD +1, HP +1)
  17. Autonomic file adaptor (You can use any programs you find immediately without having to modify them first. MP +2)
  18. Processor protection override (X HP: Make X attacks, can be used at any time. ATK +1)
  19. Cache conflict distribution (Share any amount of HP between two willing targets. HP +2)
  20. Hostile custom interface (Anything directly interacting with you takes 1 DMG. You can prevent this for one program or avatar if you specifically designate it. HP +2)
  21. Glitched unique assistant (Weirdly prescient, some kind of botched AI? Give it 1 HP or MP for a random reward: 1. Knowledge, 2. Power, 3. Pain, 4. Secrets, 5. Loot, 6. Pleasure. AUT +1)
  22. Secure file archive (Stores up to three slots of data, very slow to pack and unpack. DEF +1)
  23. Destructive partition response (Lose a Config, block all attacks this round. ATK +1)

Custom Configs are side-grades, granting bigger bonuses but also penalties:
  • Triple-scanned connection layer (DEF +3, SPD -1)
  • Hardware support redirection (HP +6, MP -2)
  • Gratuitous destruction relay (Make two attacks per round. DEF -1)


Programs ("spells")
  1. cleanSweep.exe (1 MP: Trashes all evidence on current server, but leaves a mess. Alternatively, guarantees that a destroyed program or avatar cannot be used to propagate viruses)
  2. SegFaultBomb.exe (1 MP: Crash a program)
  3. roflmao.exe (1 MP: Random effect each time)
  4. breakpointProtocol34.exe (1 MP: Freeze a program, leaving it intact, it can be manually restarted by anyone)
  5. boot_hatch_cache.exe (1 MP: Place a pointer in the server you are currently in, travel back to it instantly at a later time)
  6. scoutsCode.exe (1 MP: Scan an adjacent server)
  7. SNAKE2.exe (1 MP: Polymorphic virus, hard to pin down using antivirus software, impossible to control)
  8. Wabbit.exe (1 MP: Fork virus, multiplies itself exponentially, slows down machines and servers)
  9. lumberjacK.exe (1 MP: Keylogger virus, records all hardware inputs while active)
  10. FloodStacker.exe (1 MP: DDOS, prevents a particular server from being accessible)
  11. scalpel.exe (1 MP: 1 DMG, unblockable)
  12. crowbar.exe (1 MP, ATK: 2 DMG)
  13. buffer_exploit_WIP.exe (1 MP: Target must repeat an action they have previously taken)
  14. acidwash.exe (1 MP: Target chooses a config or program to lose, or take 2 DMG)
  15. powerMail.exe (1 MP: Send a message to any target)
  16. fishbait.exe (1 MP: 2 DMG if the target clicks on it)
  17. relocate.exe (1 MP: Swap the avatar locations of two willing targets, or shift a currently moving avatar to a random other server)
  18. access_remote.exe (1 MP: Manipulate something in an adjacent server)
  19. permissionLock.exe (1 MP: Declare a specific action, anything that takes it takes 1 DMG)
  20. priority-rewrite.exe (1 MP: Instead of a program being destroyed, it belongs to you instead)
  21. undelete.exe (1 MP: Scan for any deleted files or destroyed programs. Be careful of what you find)
  22. falseFlag.exe (1 MP: Create a false replica of anything. Multiple falseFlags can be combined to form a more complete copy)
  23. smartscan.exe (1 MP: Spots something hidden, important, unique or unusual)
  24. mine_swept.exe (1 MP: Attach a destructive payload to a location or file, anything that is nearby when it goes off takes 1 DMG
  25. link_traversal.exe (1 MP: Random ally has +2 ATK against a random enemy)
  26. multiplyTasker.exe (1 MP: Take an additional minor action, making an attack or using a program costs 3 MP)

Application ("major spells")
  1. Drive_Clone.exe (3 MP: Copies the entire contents of the current server, exactly. Needs a location to store the copy)
  2. Barbequeue.exe (3 MP: 1 DMG to everything in server)
  3. Disk_Repair_Utility_prototype.exe (3 MP: Heal 2 HP and end one effect)
  4. KILLBOT.exe (3 MP: 2 DMG, unblockable, +2 MP for +1 DMG)
  5. AltranetForm.exe (3 MP: Change your avatar into the form of a virus or program you've absorbed)
  6. Fractal_Sim[CORRUPTED].exe (3 MP: Deal 2 DMG to any avatars that interact with Fractal_Sim)
  7. Recombinatrix.exe (3 MP: Fuse two programs or avatars into one. They must be willing, immobile or at 0 HP)
  8. Firewall.exe (3 MP: Anything unauthorised that tries to cross it takes 2 DMG)
  9. HaxBorrow.exe (3 MP: Turn a defeated avatar or complex program into your puppet)
  10. NetGuardian.exe (3 MP: Attach to an avatar, anything that attacks them is targeted by NetGuardian)
  11. Banhammer.exe (3 MP: A program you've seen used cannot be used again)

Terrible Fates
  1. Bzzt! The magic smoke comes out of your machine, you'll have to replace several parts
  2. Zap! Hard-drive wiped, hope you've kept backups
  3. Glitched! After you restart, everything is just buggy and awful
  4. Fire! Shits on fire, yo'
  5. Yoink! The password to your machine has been changed from under you
  6. Spammed! All your contacts are at risk and/or think you are a total moron
  7. Doxxed! Everyone knows where you live and that embarrassing thing you did that one time
  8. Hijacked! Your credentials have been used for something nefarious
  9. Scammed! Your bank accounts have been drained
  10. Busted! Knocking at the door, you've been caught red-handed
  11. Banned! Net access permanently revoked
  12. Recruited! This was all just a test. They know who you are, you can either sign on with them, or go to jail
  13. Totally Pwned! You're a laughing stock, and you know it
  14. Getting Old! You've lost your touch. Maybe its time to retire?
  15. RAGE QUIT! You punch a hole through your screen and never quite calm down
  16. No More! The mere sight of a computer sends you into trembling
  17. SCREECH! Eardrums ruptured
  18. Flash-flash-flash! Visual overload, eyes damaged, maybe even blind
  19. Feedback Loop! Your nerves are fried and hands are juddery, no more fly-by-wire for you
  20. Meatjacked! They control your body and voice, they can make you do or say whatever they want...




No comments:

Post a Comment