Star Wars Roleplay: Chaos

Register a free account today to become a member! Once signed in, you'll be able to participate on this site by adding your own topics and posts, as well as connect with other members through your own private inbox!

Work In Progress LO-HWB

sf2WQFw.jpeg

OUT OF CHARACTER INFORMATION
  • Intent: To create a hacking device for Lilaste Order Commandos
  • Image Source: x
  • Canon Link: N/A
  • Permissions: none
  • Primary Source: none
PRODUCTION INFORMATION
  • Manufacturer: Lilaste Order
  • Affiliation: Lilaste Order
  • Market Status: Closed
  • Model: LO-HWB
  • Modularity: No
  • Production: Limited
  • Material: Fyrirdogun
SPECIAL FEATURES

- AI incorporated into the device to increase the effectiveness of the hacking attempts

STRENGTHS
  • strong hacking due to incorporated AI
WEAKNESSES
  • Limited range of 25 meters
DESCRIPTION
During the days of the Lilaste Elghaseki, Aurora R&D had plans to aid the special forces in electronic warfare by creating a device capable of hacking into nearby digital infrastructure so the Elghaseki could open locked doors, shut down computer-controlled turrets, and more. However, R&D got overloaded with other, more pressing projects, and pushed pause on the construction of the LO-HWB.

Now that the Elghaseki have been reformed to become the Lilaste Commandos, and R&D isn't so cluttered, they have finally completed the LO-HWB. The hacking device is made out of fyrirdogun, and covers most of a soldier's forearm. The fyrirdogun frame and casing ensures that the wristband is highly resistant to EMPs, lightsabers, and blasters, among other things. Though, you might not want to wear the LO-HWB on an acidic world.

The LO-HWB operates by wirelessly interfacing with nearby digital systems using a built-in omnidirectional signal scanner and a suite of modular slicing protocols. When a system is detected within range — such as a door terminal, surveillance node, or turret controller — the device rapidly identifies its communication structure and launches a tailored cyber-attack to gain access. This process is heavily assisted by the onboard AI. Most devices are successfully hacked within ten seconds, though some cookies are tougher to crack.
 
Last edited:

Users who are viewing this thread

Top Bottom