Modify (Major)

You change a vulnerable program’s functions. This action has a wide range of applications, from deleting a program or changing a module’s data to building or installing a contingent virus. Check: The check varies by the task, determined by the GM.

Destroying or destabilizing programs typically requires a Hack check, whereas forging data or installing a backdoor typically requires a Deceive check. Simple tasks might reduce the DC by up to 5, whereas very complicated tasks might increase the DC by up to 5. Some tasks are so vast in scope that they require hours or more—beyond the scope of most hacking encounters.

Success: You successfully perform the action.

Source

Tech Revolution pg. 72

This website uses trademarks and/or copyrights owned by Paizo Inc., which are used under Paizo's Community Use Policy. We are expressly prohibited from charging you to use or access this content. This website is not published, endorsed, or specifically approved by Paizo Inc. For more information about Paizo's Community Use Policy, please visit paizo.com/communityuse. For more information about Paizo Inc. and Paizo products, please visit paizo.com.