Actual Initial writeup with the most important points |
Defined terms and added more details |
||
| Line 6: | Line 6: | ||
Outside of Operation: Epiphany, Jovian Symbolic Navigators can be used to create [[safe spots]] that are mostly not based on the locations of celestials or signatures in the system. If set up correctly, they can be impossible to access without an attacker using combat probes or navigators of their own. | Outside of Operation: Epiphany, Jovian Symbolic Navigators can be used to create [[safe spots]] that are mostly not based on the locations of celestials or signatures in the system. If set up correctly, they can be impossible to access without an attacker using combat probes or navigators of their own. | ||
Terms/Concepts: | |||
* A sequence of one or more navigators is called a "combination" | |||
* The grid where you are prior to activating a combination is called the "origin point" | |||
* The grid where you land after activating a combination is called the "end point" | |||
* When activating a number of navigators in a combination, changing the sequence of activation does not result in a different end point. | |||
* Very rarely, certain combinations will result in the end point being the same as the origin point. These combinations are "circular combinations" | |||
* Four specific navigators do not warp an even number of meters in all 3 axes. These are called "tuning navigators" | |||
How To Create Safe Spot With Navigators | How To Create Safe Spot With Navigators | ||
| Line 11: | Line 20: | ||
* Put directions here with colorful pictures! | * Put directions here with colorful pictures! | ||
Regarding security, | Regarding security, navigators are effectively [https://en.wikipedia.org/wiki/One-way_function one-way functions], meaning movements are easy to replicate in one direction and hard/impossible to replicate in the reverse direction (except in the case of circular combinations). This means that the origin point should never be on grid with a celestial, signature, and any bookmark used to as an origin point should be deleted as soon as possible. This helps avoid an attacker with access to the correct navigators from reaching the end point by retracing your steps. However, if you make 2 different end points based on the same origin point (using different combinations to create each), an attacker with access to one of those end points will not be able to derive the origin point from it and, therefore, the second end point remains secure. | ||