Talk:Mobile Invulnerability/@comment-4839446-20171112163755

Does this allow one to break through anything or just push most things that try to stop the user back?