I'd like to know about this too. Both the spanish and english PDF list this program as a B1 weapon on the reference table, but B2 on its ruling. The army also shows it as B1. Is it a typo or is it really B1?
Given the description in the rules (it clearly states B2), you should consider the table a typo UNTIL FURTHER NOTICE
Should we then report it as an Army 7 bug? Because it shows there too. I don't know if it's already been reported.
@HellLois this one could use an answer before I have to make my own ruling on the weekend for a tournament, which given my luck will be wrong.
This one really needs an answer, I don’t get the radio silence on it. My gut says B1, just because B3 Mary Problems would be “fun”. I guess it would make her an “Uberhacker” though.
I feel like the fact the rules list it as multiple rolls means the chart is incorrect. applicable portions bolded. It is a lot of rules that make no sense if the chart was intended to be correct. I would be running this as 2 burst. OBLIVION SHORT SKILL / ARO Comms Attack, Non-Lethal. REQUIREMENTS ► The target must be an enemy with the Hackable Characteristic (HI, TAG, REM...) or an enemy Hacker. EFFECTS ► In the Active Turn, this Program’s Burst of 2 allows the user to perform two WIP Rolls, which can be distributed among one or more targets as usual. ► Each successful Roll, due to AP Ammunition, forces the target to make Saving Roll against their halved BTS, with Damage 16. ► Any failed Saving Roll will cause the target to enter Isolated State, placing an Isolated State Token (ISOLATED) by them. ► A Critical with Oblivion forces its target to perform an additional Saving Roll, applying their halved BTS value. ► The range of this Program is the Hacker’s Hacking Area
Maybe I split the difference and we simulate B1.5 by every alternating Oblivion between 1 and 2 burst every use.
In my Army 7 (mobile) Oblivion is correct: burst 2. However,no matter what hacker device I choose I see every program available,they are not filtered. (I tried this bug with PanO vanilla and Hexa hackers)