More actions
Added note that changes are a-coming. |
Updated for December 2015 changes. |
||
| Line 1: | Line 1: | ||
[[File:GhostSite1b.jpg|thumb|right|400px|A Ghost Site in space]] | [[File:GhostSite1b.jpg|thumb|right|400px|A Ghost Site in space]] | ||
{{related class|Ghost sites 100}} | {{related class|Ghost sites 100}} | ||
'''Ghost Sites''' are pirate facilities which can be [[Hacking 101|hacked]] (like [[Exploration#Cosmic_Signatures|Data | '''Ghost Sites''' are pirate facilities which can be [[Hacking 101|hacked]] (like [[Exploration#Cosmic_Signatures|Data sites]]), but which have unique mechanics which set them apart. They were introduced in the [[Rubicon]] expansion in late 2013. They were tweaked in December 2015 per [https://forums.eveonline.com/default.aspx?g=posts&t=449199 this thread from CCP RedDawn]. | ||
== Finding a Ghost Site == | == Finding a Ghost Site == | ||
[[File:GhostSite2.jpg|thumb|right|400px|A Lesser Ghost Site]] | [[File:GhostSite2.jpg|thumb|right|400px|A Lesser Ghost Site]] | ||
Ghost Sites can be found using the | Ghost Sites can be found using the probe scanner, [[Scanning & Probing|using probes]]. They shows up as [[Cosmic Signatures|cosmic signatures]] (type: Data sites), and occur in all [[System Security|categories of space]] (hi-sec, low-sec, null-sec and wormhole). They show up in the anomaly list as "{{co|wheat|<size> <faction> Covert Research Facility}}". The {{co|wheat|<size>}} is solely dependent on the security rating of the system: | ||
* "Lesser" in high-sec | * "Lesser" in high-sec | ||
* "Standard" in low-sec | * "Standard" in low-sec | ||
| Line 16: | Line 16: | ||
When you enter warp to a Ghost Site, a pop-up message appears that warns the capsuleer that the site is dangerous. | When you enter warp to a Ghost Site, a pop-up message appears that warns the capsuleer that the site is dangerous. | ||
== Getting Loot == | == Getting Loot == | ||
When you enter the site a timer is started '''<span style="color:red">(unless you warp in cloaked)</span>'''. The time is random and not shown, but it seems that the more ships are in the site at once, the longer the timer (in practice, if running a site solo, you will generally have enough time to hack and loot 2 cans before the timer expires). Since time is of the essence, it is not generally recommended to scan the containers with a cargo scanner due to the limited time that is available before the rats warp in and make the cans explode, however if you're fast and have not fitted warp core stabilizers to your ship, you can. The stashes are opened by the hacking mini game known from [[Hacking 101|data | When you enter the site a timer is started '''<span style="color:red">(unless you warp in cloaked)</span>'''. The time is random and not shown, but it seems that the more ships are in the site at once, the longer the timer (in practice, if running a site solo, you will generally have enough time to hack and loot 2 cans before the timer expires). Since time is of the essence, it is not generally recommended to scan the containers with a cargo scanner due to the limited time that is available before the rats warp in and make the cans explode, however if you're fast and have not fitted warp core stabilizers to your ship, you can. The stashes are opened by the hacking mini game known from [[Hacking 101|data sites]]; once the hack is complete, you can loot the cans directly. The cans are normally in a square, equal distance from each other, with one having better loot than the rest. (There are reports of the can having the best loot is named differently than the rest.) The hacking difficulty is comparable to the difficulty of hacking a data or relic site in a system with the same security status. If you fail your hacking attempt, either all the containers in the site will explode immediately or just the container you were working on will explode (see also below), unlike with normal data sites. If just the single can explodes rather than all of them, you can continue hacking but the hidden timer is still running. Unlike regular data sites, when these cans explode, they do damage to your ship. | ||
All sites may contain Covert Research Tools. Hi-Sec and Low-Sec usually contain Shattered Villard Wheels, which are a required component to build the ‘Ascendancy’ implant set. | All sites may contain Covert Research Tools. Hi-Sec and Low-Sec usually contain Shattered Villard Wheels, which are a required component to build the ‘Ascendancy’ implant set. | ||
| Line 95: | Line 93: | ||
In order to hack the containers as quickly as possible, the following mid-slot modules are needed: | In order to hack the containers as quickly as possible, the following mid-slot modules are needed: | ||
* Microwarpdrive (to fly as quickly as possible between containers). | * Microwarpdrive (to fly as quickly as possible between containers). | ||
* Data | * Data Analyzer (to hack the site). (It used to be Data or Relic, but became Data-only in December 2015). It's always better to use the T2 version, if you can fit one - especially for ships without a bonus to the hacking minigame (T1 cruisers or certain T3 configurations). | ||
* Cargo Scanner (to determine which can/cans are worth hacking). Some pilots always cargo scan and cherry-pick. Others feel that because of the limited time before rats arrive, that it's not worth cargo scanning if you are using warp core stabilizers or anything that causes your targeting to take longer, as you do not want to waste precious time cherry-picking. (One option is to cargo scan other cans while hacking the first one, to choose the best can do to next.) | * Cargo Scanner (to determine which can/cans are worth hacking). Some pilots always cargo scan and cherry-pick. Others feel that because of the limited time before rats arrive, that it's not worth cargo scanning if you are using warp core stabilizers or anything that causes your targeting to take longer, as you do not want to waste precious time cherry-picking. (One option is to cargo scan other cans while hacking the first one, to choose the best can do to next.) | ||
| Line 128: | Line 126: | ||
=== Egg Thief fitting === | === Egg Thief fitting === | ||
Any rookie ship. Travel in a capsule to any station where you do not have a ship to get it. | Any rookie ship. Travel in a capsule to any station where you do not have a ship to get it. | ||
* Data | * Data analyzer | ||
* NPC dropped Micro Warp Drive | * NPC dropped Micro Warp Drive | ||
| Line 149: | Line 147: | ||
With one of the gang in squad command, gang aligns to Ghost site making sure they're further than 2 km apart from each other and cloak up. | With one of the gang in squad command, gang aligns to Ghost site making sure they're further than 2 km apart from each other and cloak up. | ||
Squad warp the gang into the ghost site. Assess and assign each gang member to a can; they slowboat to their respective cans. | Squad warp the gang into the ghost site. Assess and assign each gang member to a can; they slowboat to their respective cans. | ||
When each member is within 5 km (Data | When each member is within 5 km (Data analyzer range), pause, decloak together and begin hacking. Leave before the rats appear. | ||
== See also == | == See also == | ||