About: Shadow Step Technique   Sponge Permalink

An Entity of Type : dbkwik:resource/a6gZhNV8NtpTvydeLvLTHQ==, within Data Space : 134.155.108.49:8890 associated with source dataset(s)

Users of this technique state that they are able to from within specific points in the shadow, allowing this technique to be used as a costly way to spy upon others. As a result of prolonged training and experimentation with this technique it has become known that while the user's chakra signature is greatly suppressed while traveling in the shadows, it isn't masked completely. It is because of this that users are able to sneak by sensors who aren't specifically skilled in noticing reduced chakra signatures. Furthermore, this skill can be used to break the lock of sensors who are honing in on a user's location.

AttributesValues
rdf:type
rdfs:label
  • Shadow Step Technique
rdfs:comment
  • Users of this technique state that they are able to from within specific points in the shadow, allowing this technique to be used as a costly way to spy upon others. As a result of prolonged training and experimentation with this technique it has become known that while the user's chakra signature is greatly suppressed while traveling in the shadows, it isn't masked completely. It is because of this that users are able to sneak by sensors who aren't specifically skilled in noticing reduced chakra signatures. Furthermore, this skill can be used to break the lock of sensors who are honing in on a user's location.
dcterms:subject
debut shippuden
  • No
literal english
  • Shadow Step Technique
jutsu classification
  • Ninjutsu, Kinjutsu
unnamed jutsu
  • No
jutsu range
  • Short, Mid, Long
jutsu class type
  • Supplementary
jutsu media
  • Anime, Manga
dbkwik:narutofanon...iPageUsesTemplate
Users
  • Kaijin Fuyutama, Kaiya Fuyutama
Romaji
  • Kageho no Jutsu
Kanji
  • 影歩の術
Top
  • Property:KamiYomi
abstract
  • Users of this technique state that they are able to from within specific points in the shadow, allowing this technique to be used as a costly way to spy upon others. As a result of prolonged training and experimentation with this technique it has become known that while the user's chakra signature is greatly suppressed while traveling in the shadows, it isn't masked completely. It is because of this that users are able to sneak by sensors who aren't specifically skilled in noticing reduced chakra signatures. Furthermore, this skill can be used to break the lock of sensors who are honing in on a user's location. It should be noted that shadow merging requires a incredibly substantial amount of chakra in order to maintain, and thus this technique tends to utilize it in short bursts. As the result of running out of chakra while merged with a shadow is unknown, the risks of this technique have not been completely explored. Due to this aforementioned lack of information, whether or not the Shadow Step Technique should be considered forbidden is a topic of debate in Kyoukoku.
Alternative Linked Data Views: ODE     Raw Data in: CXML | CSV | RDF ( N-Triples N3/Turtle JSON XML ) | OData ( Atom JSON ) | Microdata ( JSON HTML) | JSON-LD    About   
This material is Open Knowledge   W3C Semantic Web Technology [RDF Data] Valid XHTML + RDFa
OpenLink Virtuoso version 07.20.3217, on Linux (x86_64-pc-linux-gnu), Standard Edition
Data on this page belongs to its respective rights holders.
Virtuoso Faceted Browser Copyright © 2009-2012 OpenLink Software