Infaux sphere, basic
Technological

Level

8

Price

8,500

Bulk

2

Hands

-

Capacity

80

Usage

4/hour

This portable data drive contains an insidious program that broadcasts a fake infosphere, causing any computer in the area to access this infosphere’s misleading data rather than any legitimate network. This deception is automatic for any computer whose tier doesn’t exceed a certain value based on the infaux sphere’s model. When a computer of a higher tier accesses the infosphere, the infaux sphere attempts a Computers check against that computer, using the computer’s DC to hack. If the check succeeds, the computer accesses the fake infosphere. However, if the check fails, the computer accesses a real infosphere instead, and if the check fails by 10 or more, the computer’s user also identifies that something tried to interfere with their infosphere access. A creature using the fake infosphere can also discern the forgery with a successful Computers check (with a DC based on the infaux sphere’s model) attempted once per hour, or more frequently if presented with definitively contradictory information (such as a map displaying streets or traffic where the user clearly sees there is none). If the check succeeds, the user recognizes the fake infosphere but must still spend one minute and succeed at a DC 20 Computers check to access the real infosphere.

A new infaux sphere includes a wealth of casually misleading directories and sites that can reprogram themselves slightly to better camouflage as a local infosphere. The device’s owner can install specific misdirectionsÔÇösuch as maps that include specific detours to set up an ambush or news briefs that muddle a historical event in a particular wayÔÇöby creating and installing secure data modules (Core Rulebook page 215).

To function properly, an infaux sphere must be activated and remain immobile for 1 minute. If moved more than 5 feet, the device must spend an additional minute recalibrating and re-establishing control over the area.

The basic infaux sphere affects a 500-foot radius and automatically deceives computers of tier 1 or lower. Its Computers check modifier is +21, and the Computers check DC to identify the fake infosphere is 31.

Source

Tech Revolution pg. 48


Dragonscript

ID

a12bdf948c885d6d6017e4c5
This website uses trademarks and/or copyrights owned by Paizo Inc., which are used under Paizo's Community Use Policy. We are expressly prohibited from charging you to use or access this content. This website is not published, endorsed, or specifically approved by Paizo Inc. For more information about Paizo's Community Use Policy, please visit paizo.com/communityuse. For more information about Paizo Inc. and Paizo products, please visit paizo.com.