Create a free account or Log in.
The best part of hacking in the game is Quickhacks during combat, which can be used to assist with stealth, take control of cameras and turrets, shut down such security measures altogether, or ...
IP can no longer be developed and verified outside of the context of the system in which it is expected to operate — unless we develop new verification methodologies.