Custom Combination Discipline / Technique
Some chronicles allow for their players to develop customized powers for their characters. The following is a compilation of player created custom content in OWBN. At this time, custom content that is created and/or used by vampire PC's is required to be listed.
Discipline Name | Discipline Level |
---|---|
Auspex | 3 |
Dementation | 5 |
Obfuscate | 4 |
Description: A Kindred using Mindworm creates a series of increasingly sophisticated data algorithms (Firewalls) which weave a contagious madness into the mind of anyone attempting to hack through or interpret the code. Using Mindworm, Malkavians can make the target of their power insane and/or confused/forgetful of what happened when they encountered the code (Firewalls).
The Malkavian uses Mindworm to embed the specified Dementation power for each Firewall into computer coding. Normally this is Coding of computer security software algorithms but it may also be used on regular software such as a Microsoft Word documents, PowerPoint presentations, etc.. Once triggered, each Dementation power works the same as the Discipline in MET with the same requisite tests, retests, etc.
Unlike Madman's Quill, Mindworm has three consecutive levels or “Firewalls.” Below are the Dementation powers embedded in each:
Firewall 1: Dementation 2 (The Haunting)
Firewall 2: Dementation 4 (Voice of Madness)
Firewall 3: Dementation 5 (Total Insanity)
MET System: To introduce Mindworm into software, the user must have at least Computer Ability 4 and also have at least one dot of either Crafts: Coding/Programming (or similar name) or Crafts: Hacking. The process of actually writing/embedding the code takes a number of nights equal to the encoded power’s. This time is NOT cumulative. Taking 5 nights to apply Firewall 3 applies all three levels of Firewall. Note that each individual software application (computer system, individual program, laptop security file, etc.) is considered a SEPARATE application of Mindworm and requires the full time dedication for each application. The coder can choose which level of Firewall(s) they want to employ; they do not have to encode all three.
Once encoded, Mindworm Firewalls are permanent. Subsequent attacks by the same hacker or other hackers would still have to breach them as described. Destruction of the embedded code (such as completely scrubbing infected programs from the device and reinstalling from the original source) will get rid of Mindworm. The coder may also choose to remove the Firewall code at any time, thus ending the effect. Destroying the creator renders all Firewalls inert and ends any lingering effects. The duration of each Firewall’s Dementation effect is the same as the base Dementation power’s duration.
At the time of encoding, the item should be noted with the coder’s mental traits (adding Obfuscate levels) AND Social traits for use in the challenges outlined below.
When first encountering the Firewall, the target makes a Social challenge versus the coder’s traits (retest Empathy). If they fail, they are affected by the Firewall’s Dementation effect. It is perfectly possible to get through all 3 Firewalls, fail the Test against each suffering all the effects or a combination thereof and STILL actually access/get to the program/software that the Mindworm was protecting (though there would still remain any normal Computer defenses).
Anyone encountering the code who *resists* the power(s) can make a Mental challenge (difficulty is the coder’s traits + obfuscate; target may add Auspex levels to their traits) to notice there is something “off” about the code (retest Investigation or Awareness). This test is applicable for each level of Firewall. (If they fail to notice Firewall 1, they can still notice Firewall 2.) This gives the victim the option of stopping at each Firewall...or at least going forward knowing the risks. If the victim of the Firewalls does not have Auspex, they cannot test at all (since the code is embedded with Obfuscate). Exactly what they determine about the code is left to Storyteller Discretion.