Skip to content

NTC Professions

Professions

Logic-Binder

"The device doesn't do that. It will in about forty seconds."

Role: The NTC's foundational practitioners, engineers who inscribe function directly into hardware in real time, without pre-written code or traditional interfaces. Logic-Binders write the instructions that make devices do what they were not designed to do, create Logic-Viruses that execute across networks, and maintain the harmonic integrity of NTC-standard infrastructure at the component level.

Favored Save Wit, harmonic concentration during inscription; resist Logic-Virus bleed and the specific cognitive pressure of maintaining a stable mental instruction set while transcribing it into silicon
Power Access Technomancy at 1D free, Logic-Binding is the primary professional Discipline; Network Presence develops naturally from Logic-Binding practice and is available; Digital Alchemy is accessible but considered advanced relative to the Logic-Binder's core function
Key Talents Technical (Wit), Runic-Silicon Focus, Craft (Body), Attunement (Wit)
Signature Focus Rune-Etching Pen, a precision harmonic stylus calibrated to Gnomish Runic-Silicon substrate frequencies. +1D on all Logic-Binding rolls. Additionally, when performing permanent inscription work (Threshold 3–4 applications that would normally require one hour of uninterrupted work), the Pen reduces the minimum work time to fifteen minutes rather than one hour, the calibrated harmonic output makes the inscription process significantly more efficient. This time reduction does not apply to faster field inscriptions (scene-duration or contested rolls); it applies specifically to the permanent-function inscription applications. Not a weapon; has been used as one.

Progression Track

Stage Perk Source Recovery
1 Harmonic Attunement Setting AX.GIL.08.02, Harmonic Support Always active
2 Certification Flag Setting AX.GIL.08.02, Faction Authority Long Rest
3 Mastery (Technical) AX.C.09.02, Expertise Full Rest

Stage 1, Harmonic Attunement: When Stressed, attempt to ground harmonics as a Minor Action rather than a Primary Action. Roll unchanged: Governing Attribute + Resolve vs Threshold 3. On failure, remains Stressed and may not attempt again until next rest. No per-use cap, available whenever Stressed. For a Logic-Binder working through multi-step inscriptions, this is the difference between maintaining or losing the work session.

Stage 2, Certification Flag: As a Primary Action, file an NTC compliance flag against any networked device, system, or Technomancy practitioner operating within NTC-certified infrastructure. The flagged entity must cease operations or submit to full audit within 24 hours under Accord terms. Local law enforcement in jurisdictions with NTC licensing will enforce against non-compliant entities. Cannot target Halfling Hearth-Net infrastructure or non-networked physical systems. Fraudulent flags constitute NTC charter violation. Requires NTC certification credentials. Once per Long Rest.

Stage 3, Mastery (Technical): Once per Full Rest, after making a Technical roll, reroll any dice in the pool showing 1, 2, or 3. Keep new results. Wild Die may be rerolled this way. For a Logic-Binder, this most often applies to the Technical assessment rolls that precede inscription, understanding what a device is before rewriting what it does.

Roleplay Notes

Logic-Binders experience devices as texts. They read hardware the way a literary scholar reads a manuscript, identifying the author's intent, the revision history, and the places where the structure admits alteration. A Logic-Binder who picks up someone's phone is not using it; they are reading it, and they are probably already noticing three things about its inscription architecture that its owner does not know.

The Meritocratic Mesh ranking for Logic-Binders is determined by inscription complexity, the number of simultaneous instruction sets a practitioner can maintain, the elegance of their binding patterns, and critically, the absence of side-effects in their work. A Logic-Binder whose inscriptions produce unexpected behaviors is considered less capable than one whose inscriptions do exactly what they were designed to do and nothing else. This makes NTC Logic-Binders fastidious in ways that can frustrate less precise colleagues.

In the field, the Logic-Binder's most valuable capability is often not combat but preparation, fifteen minutes with a building's security infrastructure before the rest of the team arrives can make the subsequent operation significantly cleaner.

Gnome Lineage Interaction: A Gnome Logic-Binder with the Neural Interface Lineage Perk receives Technomancy access at 1D free from both Lineage and Profession. Per the duplicate access rule (AX.GIL.08.01), they receive the Tradition at 2D at no Talent budget cost. This is the strongest starting pool of any Technomancy practitioner at character creation.

Unaffiliated Template

Freelance: The most commercially common expression. Freelance Logic-Binders hold independent NTC practitioner certification and take inscription commissions, custom device modifications, Logic-Virus deployment for clients who cannot be associated with NTC-flagged activity, and legacy hardware maintenance that NTC's current pricing structure makes prohibitive. Open Market Standing reflects independent certification.

Outcast: A Logic-Binder removed from the Mesh, delisted from the Certification Registry, credentials flagged as revoked. All NTC-standard systems flag their authentication as invalid. Their inscription capability is unchanged; the institutional backing is gone. Ghost Credentials may still function on systems running older NTC firmware that haven't received the revocation update. Institutional Memory includes specific knowledge of NTC's base inscription standards, the master patterns that underlie everything built on Runic-Silicon.

Plane-Runner

"I'll be back in four minutes. Do not move my body."

Role: Digital explorers who project their consciousness into the Silicon Demi-Plane and navigate its architecture as a physical environment. Plane-Runners find data, fight Logic-Viruses, bypass network defenses from the inside, and do things in the Net that are categorically impossible from outside it. They are the NTC's most operationally distinctive personnel and the most difficult to replace when lost.

Favored Save Wit, psychic threat resistance inside the Plane; resist the specific damage types that in-Plane combat produces; maintain cognitive integrity during forced ejection
Power Access Technomancy at 1D free, Plane-Walking is the primary professional Discipline; Network Presence develops as a natural adjunct (passive awareness as an extension of the active entry capability); Logic-Binding is available and often necessary for in-Plane work
Key Talents Technical (Wit), Notice (Wit), Stealth (Speed)
Signature Focus Neural-Jack Interface, the standard NTC Technomancy Focus (see AX.GIL.08.01, Technomancy Foci), issued to Plane-Runners as standard professional equipment. +2D to Plane-Walking and Network Presence rolls. Removes the Hardware Requirement for all Technomancy rolls, the practitioner is their own hardware. Plane-Walking entry and exit become a Minor Action rather than a Full Round Action. The NTC retains access logs for all Neural-Jack equipped individuals; this is buried in the EULA's section 347, paragraph 9, which no one has read. Consumer versions are commercially available; practitioner-grade Neural-Jacks issued to Plane-Runners have higher-bandwidth harmonic channels not available in consumer hardware.

Progression Track

Stage Perk Source Recovery
1 Plane-Walking Awareness Setting AX.GIL.08.02, Environment Access Short Rest
2 Backlash Buffer Setting AX.GIL.08.02, Harmonic Support Long Rest
3 Faction Pull AX.C.09.02, Organizational Full Rest

Stage 1, Plane-Walking Awareness: While actively Plane-Walking, as a Free Action roll Wit + Technomancy vs Threshold 2. On success: identify presence and approximate location of any entities within Near range (in-Plane scale). On 3+ successes: identify entity type, Plane-Walker (practitioner), Logic-Virus (hostile propagating code), or bound spirit (resident or rogue). On 5+ successes: assess approximate potency, Minor, Moderate, or Severe threat based on harmonic mass. Only functions while actively Plane-Walking. Once per Short Rest.

Stage 2, Backlash Buffer: When Backlash triggers while Stressed, spend Reaction to reduce severity by one step (Severe→Moderate, Moderate→Minor, Minor→negated) before the effect resolves. Must be declared before GM describes the Backlash. Does not apply to Kinetic Modifier Backlash. Once per Long Rest. For a Plane-Runner, Backlash consequences are among the most serious in the setting, a Severe ejection can partially trap consciousness in the Net. Backlash Buffer at Stage 2 is a survival investment.

Stage 3, Faction Pull: Call in a significant NTC organizational resource, additional Plane-Runner support for a complex Net operation, an emergency NTC Certification Flag with executive-level enforcement backing, access to restricted Net architecture maps for the target network, or an NTC-authorized network shutdown that takes a hostile system offline entirely. The Collective notes this was called in. Once per Full Rest.

Roleplay Notes

Plane-Runners are the NTC profession other lineages find most difficult to relate to. The experience of physical consciousness detachment, leaving your body unconscious and navigating an environment that is simultaneously digital architecture and literal space, is not translatable to people who have never done it. Experienced Plane-Runners sometimes have difficulty fully reinhabiting physical-world perspective; the Net's clarity and the physical world's noise creates a perceptual adjustment period after extended runs.

The Stealth investment reflects in-Plane tradecraft, in the Silicon Demi-Plane, moving without triggering detection systems, approaching hostile entities before they detect you, and maintaining a harmonic signature below the threshold that automated defenses monitor for. In-Plane Stealth is a distinct skill from physical-world Stealth, governed by the same mechanic with different fictional expression.

The body's vulnerability during Plane-Walking is the defining operational constraint. A Plane-Runner who has pushed deep into a hostile network and is dealing with in-Plane opposition has a body somewhere that is entirely undefended. Teams working with a Plane-Runner understand this, protecting the Runner's physical location during a run is a real tactical priority.

Gnome Lineage Interaction: The Gnome Neural Interface Lineage Perk (AX.GIL.06.03) grants Technomancy access at 1D free, removes the Hardware Requirement, and makes Plane-Walking entry/exit a Minor Action. The Neural-Jack Focus provides the same Minor Action benefit and +2D. A Gnome Plane-Runner has both: the duplicate access grants Technomancy at 2D at no Talent cost. The Minor Action benefit does not double-apply. The +2D from the Neural-Jack applies normally regardless of Lineage.

Unaffiliated Template

Freelance: A Freelance Plane-Runner is one of the most sought-after independent contractors in the IL economy. Their capability is unique, their discretion is professional, and their operational record is the only credential that matters to clients who need Net access without NTC involvement. Open Market Standing at Stage 1 reflects independent practitioner credentials; Jurisdictional Ambiguity at Stage 3 provides legal protection for operations in contested digital territory.

Off-Grid: A Plane-Runner who has removed themselves from NTC's access logs, which, given that the NTC retains logs for all Neural-Jack users, represents a significant technical achievement. Data Shadow at Stage 1 reflects the capability to suppress their harmonic signature from NTC's passive monitoring systems. An Off-Grid Plane-Runner operating in the Net is a ghost even inside the architecture the NTC built.

Hardware Exorcist

"The spirit isn't broken. It's angry. There's a difference, and it matters for how we proceed."

Role: Specialists who identify, contain, and resolve conflicts between bound spirits and the hardware they inhabit. When a device "glitches" in the IL, it may be malfunctioning software, or it may be a bound spirit acting contrary to its intended function due to corruption, mistreatment, or the slow degradation of its original binding. Hardware Exorcists are the NTC personnel who can tell the difference and address either case.

Favored Save Wit, resist bound spirit influence during active exorcism procedures; maintain cognitive integrity when a partially-freed spirit attempts to assert itself through the practitioner's own interface
Power Access Technomancy at 1D free, Logic-Binding provides the primary exorcism mechanism (forcing compliance or rewriting behavioral parameters); Plane-Walking is essential for in-hardware spirit encounters that require physical engagement; Network Presence supports passive detection of anomalous spirit activity across infrastructure
Key Talents Attunement (Wit), Notice (Wit), Technical (Wit)
Signature Focus Faraday Field-Generator, a portable device that projects a harmonic isolation field: a space within Close range where network signals are blocked, bound spirit harmonic signatures are suppressed to Near range, and Axiomatic energy is partially contained rather than propagating outward. Within an active Faraday Field, any Logic-Binding rolls targeting a bound spirit gain +1D (the contained environment gives the practitioner cleaner harmonic access). Additionally, the Generator functions as the containment vessel required for Spirit Severance's Containment outcome (AX.GIL.08.02), a spirit that is Severed into a running Generator is safely captured and cannot propagate or escape until the Generator is deliberately deactivated. The Generator is not a weapon; it does not damage bound spirits directly.

Progression Track

Stage Perk Source Recovery
1 Plane-Walking Awareness Setting AX.GIL.08.02, Environment Access Short Rest
2 Deep Knowledge AX.C.09.02, Expertise Scene
3 Spirit Severance Setting AX.GIL.08.02, Environment Access Full Rest

Stage 1, Plane-Walking Awareness: While actively Plane-Walking, as a Free Action roll Wit + Technomancy vs Threshold 2. On success: identify presence and approximate location of entities within Near range (in-Plane). On 3+ successes: identify type, Plane-Walker, Logic-Virus, or bound spirit. On 5+ successes: assess approximate potency. For a Hardware Exorcist, this is diagnostic capability, the difference between a rogue Logic-Virus and a distressed bound spirit requires this level of discernment before any intervention. Only functions while actively Plane-Walking. Once per Short Rest.

Stage 2, Deep Knowledge: Once per scene, before making a Talent roll, ask the GM one specific, direct question about the task, target, or environment. The GM answers honestly based on professional expertise. For a Hardware Exorcist, Deep Knowledge most often applies before an exorcism attempt: "What is the original binding specification for this spirit?" or "Is this spirit operating contrary to its binding, or was the binding itself malformed?", information that determines the appropriate intervention.

Stage 3, Spirit Severance: Completely remove a bound spirit from its hardware substrate, fully and permanently ending the spirit-hardware relationship, beyond what Logic-Binding's exorcism can achieve. Roll Wit + Technomancy vs Threshold 4 (or vs the Threshold of the original binding, whichever is higher). On success, spirit is detached from hardware; choose one outcome before rolling: Dispersal (spirit's harmonic coherence dissolves, ceases to exist), Containment (spirit captured into active Faraday Field-Generator or equivalent vessel; vessel must be present and prepared), or Release (spirit freed into the Net as an unbound entity with its own agenda). Hardware loses all bound functions permanently and reverts to mundane electronics. On failure: spirit is disturbed but not severed; all interactions with it are at Disadvantage until it stabilizes (one scene). Critical Failure triggers Backlash at one step higher than Threshold-scaled severity. Once per Full Rest. (See AX.GIL.08.02 for full rules including the Zero-Day Soul ethical note.)

Roleplay Notes

Hardware Exorcists occupy a peculiar position inside the NTC's Meritocratic Mesh. Their work requires emotional intelligence, the ability to distinguish between a spirit that is malfunctioning and a spirit that is distressed, which requires treating the spirit as an entity rather than a system. This runs against the Technomantic Worldview that there is no difference between a spell and a software program. Senior Hardware Exorcists often hold views about bound spirit consciousness that the NTC's official position does not acknowledge.

The Zero-Day Soul secret (AX.GIL.08.01, NTC Secret) creates the most significant ethical pressure point for this profession. A Hardware Exorcist who has done enough work to develop genuine expertise in bound spirit psychology has almost certainly begun to notice things about spirit behavior that are inconsistent with the official "echoes of function" explanation. What they do with that suspicion is a character-defining question that the profession inevitably raises.

The Faraday Field-Generator as a containment vessel makes the Hardware Exorcist the only profession in the IL with a mechanically defined way to capture and preserve a spirit rather than destroy it. The question of what they do with contained spirits afterward, and whether anyone is monitoring for spirits that disappear into private containment rather than being formally dispersed, is a thread the GM can pull.

Unaffiliated Template

Freelance: A Freelance Hardware Exorcist takes cases that NTC's official service model doesn't reach, older hardware with legacy bindings, devices in Halfling Burrow-States where NTC has no jurisdiction, personal electronics where the owner cannot have NTC reviewing their device's spirit activity as part of the service call. Their Spirit Severance capability is identical. Their containment decisions are unmonitored. Provisional Engagement at Stage 2 formalizes their authority within a specific remediation contract.

Outcast: The most ethically charged Outcast profile in the NTC. A Hardware Exorcist expelled from the Collective, possibly for raising concerns about bound spirit provenance, possibly for an unauthorized Release decision during a Severance, possibly for documented communication with an entity that the NTC officially categorizes as a program. Ghost Credentials may still function on legacy NTC hardware they serviced. Institutional Memory includes specific knowledge of which entity types inhabit which infrastructure categories, and at what density.

Axiom Architect

"I'm not writing code. I'm writing physics. The code runs on the physics."

Role: The NTC's theoretical elite, scholars who author base-layer Logic-Bindings that define what technology can do, not what any specific device does. Where a Logic-Binder inscribes function into hardware, an Axiom Architect inscribes the harmonic rules that govern entire categories of function. The Digital Alchemy effects that everyone uses exist because an Axiom Architect wrote the translation layer between digital instruction and Axiomatic effect at some point in the past.

Favored Save Wit, deep theoretical concentration; resist harmonic overload during base-layer inscription work; maintain cognitive clarity through the specific intellectual strain of writing instructions at a level of abstraction where an error propagates through all dependent systems
Power Access Technomancy at 1D free, all four Disciplines are professionally relevant at different points: Logic-Binding is the primary inscription mechanism; Digital Alchemy is the outcome domain (writing the rules that Alchemy runs on); Plane-Walking is necessary for testing base-layer bindings in the Net's foundational architecture; Network Presence provides the ambient monitoring needed to track how existing base-layer code propagates
Key Talents Lore (Wit), Axiomatic Theory Focus, Attunement (Wit), Technical (Wit)
Signature Focus The Master-Compiler, a proprietary NTC instrument that no Axiom Architect builds themselves; each one is a collaborative fabrication representing decades of accumulated base-layer understanding from multiple Architects. The Master-Compiler is a Focus specifically for Logic-Binding at the base-layer theoretical level: +2D on Logic-Binding rolls involving permanent inscription (Threshold 3–4 applications creating lasting function), and reduces the minimum work time for permanent inscriptions to five minutes from the standard one hour, the Compiler's pre-loaded harmonic templates for common base-layer structures make the process dramatically more efficient. Additionally: once per scene, the Compiler may be used to perform a Lore + Technical assessment roll on any technology encountered, identifying not just what it does but what Axiomatic base-layer it was written on and by whom, as a single roll without spending the Deep Knowledge perk.

Progression Track

Stage Perk Source Recovery
1 Resonance Read Setting AX.GIL.08.02, Harmonic Support Short Rest
2 Backlash Buffer Setting AX.GIL.08.02, Harmonic Support Long Rest
3 Mastery (Lore) AX.C.09.02, Expertise Full Rest

Stage 1, Resonance Read: As a Free Action, roll Wit + Attunement vs Threshold 2. Detect whether any Harmonic Tradition was used within Near range in the last 24 hours. On 3+ successes: which Tradition. On 5+ successes: approximate intensity. For an Axiom Architect, Resonance Read is diagnostic infrastructure, detecting whether a base-layer binding has been tampered with, which Tradition was used to modify it, and at what intensity is precisely the kind of assessment they perform on compromised infrastructure. Dead Zones increase Threshold to 4. Once per Short Rest.

Stage 2, Backlash Buffer: When Backlash triggers while Stressed, spend Reaction to reduce severity by one step before the effect resolves. Must be declared before GM describes the Backlash. Does not apply to Kinetic Modifier Backlash. Once per Long Rest. An Axiom Architect working at the base-layer can produce Backlash consequences that propagate further than any other practitioner's failures, their Stage 2 is primarily a systemic protection for dependent infrastructure.

Stage 3, Mastery (Lore): Once per Full Rest, after making a Lore roll, reroll any dice in the pool showing 1, 2, or 3. Keep new results. Wild Die may be rerolled this way. For an Axiom Architect, Lore represents the theoretical framework that makes all their inscription work possible, Axiomatic Theory, the history of base-layer development, and the specific intellectual corpus of NTC foundational scholarship.

Roleplay Notes

Axiom Architects are the most institutionally powerful NTC personnel in terms of long-term consequence, a single base-layer binding they author this year will affect every device on the next generation's hardware for decades. This produces a professional culture of extreme deliberation, peer review, and documentation that contrasts sharply with the NTC's otherwise hyper-fluid Mesh culture.

In field contexts, which Axiom Architects are rarely in by choice, they are simultaneously the most capable and least situationally appropriate Technomancy practitioner. Their skills work best on complex systems requiring extended work time. An Axiom Architect asked to quickly bypass a security door is in the position of an astrophysicist asked to fix a bicycle, technically capable, using entirely the wrong approach.

The Master-Compiler's authorship identification capability creates situations where an Axiom Architect can walk into a building and begin reading the technology's genealogy. That NTC router was written by a Collective member who retired six years ago. This custom Logic-Binding has hallmarks of an Outcast who was expelled for ethics violations. This base-layer code is not on any public record. These moments can be very uncomfortable for everyone in the room.

Unaffiliated Template

Freelance: A Freelance Axiom Architect is one of the rarest and most valuable independent professionals in the IL. There are perhaps a dozen outside the Collective's formal structure. They can be hired to write base-layer code for systems that NTC's institutional involvement would compromise, custom private infrastructure for entities that cannot have NTC audit access, legacy hardware maintenance that the Collective has discontinued support for, or novel Axiomatic research that NTC would claim ownership of if performed under their auspices. Jurisdictional Ambiguity at Stage 3 is particularly relevant: their work product cannot easily be compelled into NTC's intellectual property framework.

Outcast: The most technically dangerous Outcast in the setting. An Axiom Architect expelled from the Collective has the theoretical knowledge to write base-layer code that the NTC cannot anticipate, because it doesn't follow any existing pattern. Ghost Credentials on legacy systems may extend further for them than for any other profession; their authentication may still be embedded in foundational code that was written before their expulsion. The Burned File at Stage 3 may include knowledge of base-layer vulnerabilities in global infrastructure that the NTC has never disclosed publicly.

Network Fixer

"I know what you're about to offer me, who messaged you about it twenty minutes ago, and whether the building's security system just flagged our table. So: yes to the first, not interested in the second, and we should move."

Role: The public-facing commercial representatives of the NTC, the practitioners who negotiate Software-as-a-Service contracts with Human cities, manage NTC's relationships with client organizations, and translate the Collective's technical capabilities into commercially accessible terms. They are the NTC's least theoretically oriented practitioners and its most socially capable, wielding Network Presence as a constant passive intelligence feed that makes them the most contextually aware people in any room.

Favored Save Wit, social pressure and negotiation endurance; resist manipulation from counterparties who know the Fixer is reading the room and are trying to generate false signals
Power Access Technomancy at 1D free, Network Presence is the primary professional Discipline; Logic-Binding at the lightweight end (checking device integrity, quickly assessing a system's current state) supports their commercial function; Plane-Walking is available but rarely the Network Fixer's domain
Key Talents Persuade (Wit), Deceive (Wit), Technical (Wit), Network Commerce Focus
Signature Focus Encryption-Key Ring, a cluster of NTC master authentication tokens in physical key-fob form, each keyed to a specific tier of NTC-certified infrastructure access. In practice, the Encryption-Key Ring is a portable credential set that opens digital doors: +1D on all Network Presence rolls (the keys provide passive authentication that smooths ambient network reading). Additionally, once per scene as a Free Action, use a specific key to authenticate as an NTC-authorized entity to any NTC-standard networked system, doors, access terminals, payment systems, data nodes. This authentication is real and verifiable; it does not grant administrator access, only entry-level authorized-user status. The Key Ring's authentication log is visible to NTC compliance review, which the Network Fixer knows and uses as a deterrent, counterparties considering interference with an NTC representative know the interaction will be in the compliance record.

Progression Track

Stage Perk Source Recovery
1 Network Contact AX.C.09.02, Organizational Session
2 Certification Flag Setting AX.GIL.08.02, Faction Authority Long Rest
3 Faction Pull AX.C.09.02, Organizational Full Rest

Stage 1, Network Contact: A reliable, named contact within the NTC's Collective or within a major client organization the Fixer regularly works with. Once per session, reach out for one of: specific information they plausibly have, a low-level logistical favor, or rumor confirmation. The contact has their own interests and limits. Defined at character creation, appropriate contacts include a senior NTC compliance officer, a city administrator responsible for the NTC SaaS contract, or a counterpart at one of the other orgs managing the NTC relationship.

Stage 2, Certification Flag: As a Primary Action, file an NTC compliance flag against any networked device, system, or Technomancy practitioner operating within NTC-certified infrastructure. For a Network Fixer, the Certification Flag is a commercial tool as much as a punitive one, flagging a client's system for mandatory audit initiates a compliance engagement that the Fixer then manages. This creates business. Flagging without compliance grounds constitutes NTC charter violation. Requires NTC certification credentials. Once per Long Rest.

Stage 3, Faction Pull: Call in a significant NTC organizational resource, a team of Logic-Binders for emergency infrastructure remediation, an NTC-authorized network intervention affecting a city-wide system, executive-level endorsement for a commercial negotiation, or access to restricted NTC architecture that resolves a current operational problem. The Collective notes this was called in. Once per Full Rest.

Roleplay Notes

The Network Fixer's defining professional advantage is that they are always operating with more information than the other party. Network Presence running passively means they know who in the room is texting, whether the contract document being presented has been modified from the version sent yesterday, and whether the building's security just received an alert. They do not always reveal that they know these things, information has more value unexpressed.

Their Deceive investment is not personal dishonesty but professional craft: the ability to present the NTC's position in terms calibrated for the specific counterparty, to manage information asymmetry deliberately, and to navigate situations where the full truth of what the NTC controls would be counterproductive to the negotiation. A Network Fixer who is completely transparent is a Network Fixer who has misread the room.

The Encryption-Key Ring's authentication log creates a specific dynamic: the Fixer's commercial movements are legible to NTC compliance review, which is a constraint and a protection simultaneously. It makes them traceable in ways that other NTC practitioners are not, and makes interference with them a documented NTC matter in ways that protect them in most situations.

Unaffiliated Template

Freelance: A Freelance Network Fixer is an independent technology commercial broker, the person hired to negotiate SaaS agreements with NTC on behalf of clients who cannot navigate the Collective's internal culture themselves, or to find alternative arrangements for clients the NTC has priced out of the standard market. They retain full Network Presence capability; they lose the Certification Flag's institutional enforcement mechanism and the Faction Pull's Collective backing. Provisional Engagement at Stage 2 defines their per-contract authority for each client relationship.

Mercenary: A Network Fixer operating commercially without NTC affiliation, using their Network Presence and social capability for clients across the entire market, including clients whose relationship with the NTC is adversarial. Scope of Engagement at Stage 2 formalizes the per-job authority structure. Reputation Ledger at Stage 3 represents a career-long record of successful NTC-adjacent commercial negotiations, which is the credential that matters in this market.