Star Wars Roleplay: Chaos

Register a free account today to become a member! Once signed in, you'll be able to participate on this site by adding your own topics and posts, as well as connect with other members through your own private inbox!

Approved Tech Thieves Guild "ID card"

Status
Not open for further replies.
02c10ea849c6a4bbfa89e97300dda412.jpg


OUT OF CHARACTER INFORMATION

Intent: Identification cards for the Thieves Guild that double as a slicing multitool.
Image Source: Etsy
Canon Link: N/A
Permissions: Here.
Primary Source: N/A

PRODUCTION INFORMATION

Manufacturer: the Thieves Guild
Affiliation: Thieves Guild members
Model: N/A
Modularity: Some; can be configured to a specific user and it is possible to authorize multiple users.
Production: Limited
Material: Plasteel, Card key components

SPECIAL FEATURES

Configures to a user's specific ship and acts as the sole activation key. It can also activate most other ships if you can get to the controls, but a ship keyed to one of these things doesn't open for anyone else.

Multitool settings can slice many varieties of terminal. The drawback is that it can't teach you how to use those computer systems, so unless you know what you're looking for and how to get there...

STRENGTHS

Saves thousands on data spikes: reusable Slicing tool. Handy. Complex.

Hard to trace, harder to hack.

Handy key to your personal ride.


WEAKNESSES

Don't lose it: you thought identity theft was bad when you were legit? That's cute. Anyone can use this proverbial skeleton key to backdoor a system, and your face is on it.

Security protocols are a bi…: let's say you're trying to slice a terminal at a high profile company, and the computers are absolutely secured. Well- you're not that discreet, buddy. The system can find you and lock you out, though it might take some time if you catch them off guard. Obviously, it's all relative.

DESCRIPTION

The Thieves Guild.

Pretty interesting client. They say they only take hits on big, bad folks who do wrong by other people. Sounds like some kind of morality thing I still haven't figured my way around yet. Stealin's stealin, you do what you gotta do.

He didn't have to sell me to get me to set these things up for him. That said, here's the rundown. Closed network that runs as long as there's a clean HoloNet signal. Nigh untraceable from any terminal except the one its being accessed from.

Now, the caveat there is I'm not some big name cybersecurity guru, so if a terminal is on a secure network, they're probably going to Pinpoint and isolate the issue. Depending on how good a slicer you are, that may not be a problem for you. I just had to tell you about that so no one came to me saying I didn't warn you about standard security protocols.

There. That's the fine print. The fun part of the gizmo comes next.

Once you calibrate it and isolate your biorhythms, its yours. Unless you decide to remove them later for some other reason, no one can take your name off the thing. And you can authorize other users.

That said, don't lose the thing. Some whiz kid slicer ends up with this thing, they can do a ton of damage- and your cyber footprints are everywhere.

Oh yeah, and you can synch a single ship to it, so no one else can steal it. Handy thing about the network, most outside networks can't slice through.

Enjoy, and don't tell no one where you got it.
 
Status
Not open for further replies.

Users who are viewing this thread

Top Bottom