Name: Dataknives Description: ‘Dataknife’ is the colloquial name given to a well known hacking device used by the galactic underground. The device typically resembles the hilt of a blade, with several buttons installed to operate it. They are very commonly built into an actual knife. Abilities: - Keygen: The primary function of a dataknife is to find the password of a given system. Typically, this process takes a maximum of four turns (or thirty seconds), while higher end security can increase this up to ten turns (or a minute and a half.) Conditional Abilities: - Converter: Dataknives are typically equipped with a variety of converters that allow them to plug in to the most common ports in the setting. - Keyblade: The blades of some dataknives are capable of interacting with systems that require a keycard, rather than a physical port. These blades are often exceptionally thin as such. - Memory Banks: Most dataknives will remember the password for a given system after cracking it once, allowing a user to bypass the wait unless the code has since been changed. Limitations: - Nonuniversal: There are a variety of reasons a dataknife may be incapable of interacting with a given system. These reasons include, but are not limited to: - - The system uses a niche written or coding language that the device can not understand. - - The only accessible ports are too old, new, or niche, and the device does not have a matching converter. - - The system does not use an entered password, and instead functions off using a physical key, or other non-code-based method of activation. - Conspicuous: It is incredibly noticeable when a dataknife is interacting with a system, both because of the physical item sticking out of the port and the rapid-fire failed guesses on the backend. If an observer is present, this trick will likely draw more attention than wanted. - Good but not Great: Very high end security, such as the kind typically present within government buildings, is impervious to the dataknife. - Doorman: A dataknife is only capable of granting a user access to a system through cracking the code. Once inside, the user must do the rest themself. Conditional Limitations: - EMPable: If a dataknife is to suffer the effects of an electro-magnetic pulse, it breaks. How does it work: Dataknives contain a small and relatively powerful computer designed with the singular purpose of cracking any code presented to it. To this end, it uses a variety of complex algorithms, though the heights of modern day cyber-security have already rendered the tool outmoded. Flavor text: Dataknives are easily procured by the criminal circles of the Fringe, and remain a favored tool by shipjackers, ruin delvers, hackers, and thieves alike. The device is easily reproduced, and as such has no clear origin, though most Grey like to claim it was the brainchild of their prodigious species. Attainability: Open Tags: [Civilian] Category: Tools