Toggle menu
Toggle preferences menu
Toggle personal menu
Not logged in
Your IP address will be publicly visible if you make any edits.

Triglavian Invasion (Chapter 3): Difference between revisions

From EVE University Wiki
No edit summary
Sivaira Chen (talk | contribs)
No edit summary
Line 172: Line 172:
== Final Liminality ==
== Final Liminality ==
[[File:Final Lim.png|thumb|right|Final Liminality reached in Raravoss. ]]
[[File:Final Lim.png|thumb|right|Final Liminality reached in Raravoss. ]]
''The Triglavian stellar harvesting and manipulation efforts have reached their peak, and the Triglavian Collective has conquered the system. EDENCOM considers this system lost to the Triglavian Colelctive and will redeploy defensive efforts to systems that can still be saved.''
''The Triglavian stellar harvesting and manipulation efforts have reached their peak, and the Triglavian Collective has conquered the system. EDENCOM considers this system lost to the Triglavian Collective and will redeploy defensive efforts to systems that can still be saved.''


When the Triglavian forces has managed to push a system through the First and Second Liminality phases, it escalate into the Final Liminality phase. This is a complete victory for the Triglavian forces in the system and is irreversable. The Triglavian [[Triglavian Invasion special NPCs#Triglavian Transmuters|stellar manipulator]] has continues, but is also joined by Triglavian mining operations in the system. The EDENCOM and CONCORD has abandoned the system and it effectivly works as a null-security system.   
When the Triglavian forces has managed to push a system through the First and Second Liminality phases, it escalate into the Final Liminality phase. This is a complete victory for the Triglavian forces in the system and is irreversable. The Triglavian [[Triglavian Invasion special NPCs#Triglavian Transmuters|stellar manipulator]] has continues, but is also joined by Triglavian mining operations in the system. The EDENCOM and CONCORD has abandoned the system and it effectivly works as a null-security system.