=Cyberbrain Hacking= 
Pods and synthmorphs (including some bots and vehicles) are equipped with cybernetic brains. While this technology allows a transhuman ego to sleeve into and control these forms, they carry the disadvantage of being vulnerable to hacking, like any other electronic device.
Cyberbrains are not wireless-enabled for security reasons, but they do have access jacks and are directly linked to mesh inserts. This means that in order to hack a cyberbrain, the hacker either must have direct physical access to the morph’s body in order to jack in, or they must first hack into the mesh inserts and then break into the cyberbrain from there.
Due to their importance, cyberbrains are equipped with numerous hard-coded security features that make intrusion very difficult. Apply a –30 modifier to all attempts to hack into and subvert a cyberbrain. (Note that the –30 modifier for hacking an admin account does not apply to cyberbrains.)
Cyberbrains are treated just like other systems for intrusion and subversion purposes, but since they house the morph’s controlling ego they present several unique hacking opportunities.
==Entrapment== 
An intruding character can attempt to lock in an ego, preventing it from evacuating the cyberbrain. The hacker (with the –30 modifier noted above) must beat the defending character or muse in an Opposed [[Infosec]] Test. If successful, the ego is prevented from transferring itself to another system.
To fully pen the ego in, the ego character and its protecting muse must also be locked out from controlling the cyberbrain’s system, otherwise the ego could potentially be freed.
Trapped egos are quite vulnerable. They could, for example, be subject to enforced uploading, enforced forking, or psychosurgery.
==Memory Hacking== 
All cyberbrains incorporate mnemonic augmentation, or digitally recorded memories. A hacker who has accessed the cyberbrain can read, alter, or delete these memories with a successful Research or Interfacing Test (the –30 modifier applies).
==Puppeteering== 
Most cyberbrains also incorporate a puppet sock, enabling remote users to take over the pod or synthmorph body and control it via teleoperation or jamming. This allows a hacker to seize control of the body and manipulate it remotely. To do so, the hacker must take a Complex Action and beat the defending character or muse in an Opposed Infosec Test; the hacker suffers the –30 modifier noted above.
A defender who is not locked out may continue to fight for control of the morph, using a Complex Action. In this case, another Opposed Infosec Test is called for. This can result in a situation where the morph repeatedly slips control from the hacker to the defender, or perhaps slips into a catatonic state as the two sides battle it out.
==Scorching== 
Having direct access to a cyberbrain opens the possibility for certain kinds of attacks that are normally infeasible due to the strict content filtering that occurs on the link between the cyberbrain and mesh inserts. One of these possibilities is scorching—the use of damaging neurofeedback algorithms to harm the victim’s mind.
In order to make a scorching attack, the cyberbrain intruder must deploy a scorch program. To utilize a scorch program, the intruder must beat the defending Ego in an Opposed Infosec Test. The –30 modifier for cyberbrain hacking applies to the attacker. Several types of scorch programs exist, with different effects: cauterizers (damage), bedlams (stress), spasms (pain), nightmares (fear), and shutters (sensory deprivation). These are described in [[Software#Software|Gear]].
==Shutdown== 
If a cyberbrain is shut down, the morph immediately ceases activity, perhaps collapsing or rolling to a stop. Pods will appear to be in a coma. The ego, however, will be rebooted along with the cyberbrain.
==Terminate Cortical Stack Feed== 
The cyberbrain feeds backup data to the cortical stack. This is a one-way connection, so the cortical stack may not be hacked, but the transfer of data may be cut off. This termination action requires an Opposed Infosec Test between the hacker (with the –30 modifier) and the defender. The ego’s backup will not be updated for as long as the connection remains off.

[ [[Home]] | [[Game Rules]] | [[The Mesh]] ]