Breach

#hacking #Rules

Breach (Single-Execution)
Default: Computer Hacking-2.
Base Complexity: 3.

Penetrate a target ICE program to gain unauthorized access to the network, computer, program, or data it protects.

Breach must win a Quick Contest against the ICE; victory grants the Blackhat access to the target, allowing him to execute other programs on it. A target protected by multiple layers of ICE (see Layered ICE) can only be accessed after all instances are defeated.

This is one of the Hacking Programs.

skill_defaults:: "Computer Hacking-2"
complexity:: 3