What qualifies as a "Hacking Attack"

Discussion in '[Archived]: N3 Rules' started by Triumph, Nov 9, 2018.

  1. Triumph

    Triumph Well-Known Member

    Joined:
    Nov 23, 2017
    Messages:
    5,750
    Likes Received:
    6,521
    Brought up from a discussion about Fairy Dust on a Liu Xing vs Hack Transport Aircraft.

    There are many references in the wiki to models targeted by a "Hacking Attack" however clicking on that term only redirects me to the general Advanced Combat: Hacking page. In fact "Hacking Attacks" are mentioned on that page too and it redirects to the same page.

    Is a "Hacking Attack" any program listed on that page that causes a F2F roll.

    or

    Is a "Hacking Attack" any program with the attack label.
     
  2. inane.imp

    inane.imp Well-Known Member

    Joined:
    Jan 28, 2018
    Messages:
    6,040
    Likes Received:
    7,179
    Second. Any Hacking program with the Attack label.

    So Shield programs almost universally are not Hacking attacks (except Exorcism, which is).
     
    DukeofEarl and ijw like this.
  • About Us

    We are a company founded in 2001 in Cangas (Spain), and devoted to design and manufacture games and figures. Our main product, Infinity the Game, was born with the ambition to satisfy the most demanding audience, offering the best quality.

     

    Why are we here?

     

    Because we are, first and foremost, players.

  • Quick Navigation

    Open the Quick Navigation