Difference between revisions of "User:Koddestia Kud Usoko"
m |
|||
Line 33: | Line 33: | ||
You'll have to hack into the containers first by playing the [[hacking|hacking minigame]]. In order to attempt a hack, you’ll need to lock on to the container and activate the corresponding hacking module. The module (Relic Analyzer in a Relic Site, Data Analyzer in a Data Site, or Integrated Aanalyzer for both) only works if the distance between the container and your ship is less or equal to the module's maximum activation range. Activating the module will open a new window containing the hacking minigame. Failing to hack a container twice will destroy it and its contents. | You'll have to hack into the containers first by playing the [[hacking|hacking minigame]]. In order to attempt a hack, you’ll need to lock on to the container and activate the corresponding hacking module. The module (Relic Analyzer in a Relic Site, Data Analyzer in a Data Site, or Integrated Aanalyzer for both) only works if the distance between the container and your ship is less or equal to the module's maximum activation range. Activating the module will open a new window containing the hacking minigame. Failing to hack a container twice will destroy it and its contents. | ||
+ | |||
+ | === End of Pirate site proposal === | ||
+ | |||
+ | === Start of List and data relic sites proposal (work in progress) === | ||
+ | |||
+ | =List of data and relic sites = |
Revision as of 18:51, 10 March 2022
Pirate sites
Pirate relic and data sites can be found in all normal space regions, in C1, C2 and C3 class wormhole systems, as well as in shattered wormhole systems. There are pockets of space populated with a variety of cosmic structures (i.e., wrecked stations, abandoned machines) and several containers that need to be hacked before the contents can be accessed. The sites do not have any triggers or NPC defenders. Pirate relic sites contain T1 and T2 salvage materials, skill books and blueprint copies. Pirate data sites contain decryptors, data cores, skill books, blueprint copies and manufacturing materials. The contents may vary by faction.
Data and relic sites use the following naming convention according to their location.
Data site names | Relic site names | Location |
---|---|---|
Local (Faction) (site) | Crumbling (Faction) (site) | High-security systems |
Regional (Faction) (site) | Decayed (Faction) (site) | Low-security systems |
Central (Faction) (site) | Ruined (Faction) (site) | Null-security and wormhole systems |
Data site containers have a physical appearance that resembles a gyroscope while relic site containers resemble ancient shipwrecks. The containers are named as follows.
Data site containers | Relic site containers | Difficulty |
---|---|---|
(Faction) Info Shard | (Faction) Debris | Very easy |
(Faction) Com Tower | (Faction) Rubble | Easy |
(Faction) Mainframe | (Faction) Remains | Medium |
(Faction) Databank | (Faction) Ruins | Hard |
The (Faction) in the above site and container names will be the local pirate group for each region. For a list of (site) names, see List of data and relic sites.
You'll have to hack into the containers first by playing the hacking minigame. In order to attempt a hack, you’ll need to lock on to the container and activate the corresponding hacking module. The module (Relic Analyzer in a Relic Site, Data Analyzer in a Data Site, or Integrated Aanalyzer for both) only works if the distance between the container and your ship is less or equal to the module's maximum activation range. Activating the module will open a new window containing the hacking minigame. Failing to hack a container twice will destroy it and its contents.