- Data Manipulation can alter the machine's internal coding
- Technological Possession
- May be vulnerable to electromagnetic pulses and electricity powers
- May need a reliable source of energy to stay active
- May run the risk or are prone to a computer virus
- Level of bionics could very
- Tech might negate the users emotions
- May be forced into this state by assimilation or Cyber Conversion |