Hello all, me again! Got another question from the local community that's causing some consternation, and it hits a little close to me because I've recently started playing the faction effected by it. The question is this: Can non-hackable Ariadna heavy infantry be effected by supportware from an EVO hacker? The confusion comes from the following places: 1) Non-hackable says "...the user of this special skill cannot be the target of hacking attacks..." 2) Hacking programs such as Carbonite, Oblivion, Trinity, etc. are all labeled as "Comms Attacks" whereas Supportware is all labeled as "Supportware" with no use of the word "attack". 3) Non-hackable is listed as a skill in the wiki, but in N4 it only exists as a characteristic on trooper profiles, identified by the lack of the "hackable" icon. 4) There has been some confusion as to if the wording of what supportware is targeting when it activates. Fairy Dust says "Fairy Dust allows the Player to choose a single Troop Type (HI, TAG, or REM) that will benefit from Firewall (-3). This seems to mean that, in choosing the Heavy Infantry type to be the target of Fairy Dust, the hackable or non-hackable status of each individual trooper is irrelevant. Conversely, if, in choosing by Heavy Infantry troop type, that means that each Heavy Infantry trooper is targeted by the supportware individually, that would seem to indicate that the hackable or non-hackable status of the trooper does matter. It seems pretty clear that the wording of Non-Hackable as written is a hold-over from N3, since it's called a skill and that's not how it works in N4, but I'd appreciate some help here. We have a fair number of Ariadna players locally, and I'd like to have an answer when it inevitably comes up at a tournament. It would also probably be a good idea to have the wording cleaned up in an errata at some point. Thanks in advance for the help, I appreciate it every time I come to the forums with a weird rules interaction and get a reasonable answer in a reasonable time.
https://infinitythewiki.com/Non-Hackable The first point is "no hacking attack whose Requirements require the target to have a specific Unit Type." This means that Total Control doesn't work on a TAG with "Non-Hackable Meanwhile, Carbonite and Oblivion requirements read like this and have their obvious way they work. Fairy Dust is not an Attack So it can be applied to Non-Hackable models.
That was my interpretation as well, @tox, but there were differing ideas within the local community, so I figured I would ask the wider Infinity world for some help.
The lines are worded in explicit different ways... And it seems intentional, reading HOW they are worded differently... You can be 99.9999% sure that the rules read as we both read them.
This clearly would only apply the Fairy Dust to Pheroware and Jammers and any other relevant Comms Attacks