Relic and data sites

From EVE University Wiki
Revision as of 18:59, 3 April 2017 by Hirmuolio Pine (talk | contribs) (Started working on page for relic/data sites)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to: navigation, search

Relic and data sites are types of cosmic signatures that can be found with probing. Data and relic sites can be divided to 4 categories: Pirate data and relic sites, drone data sites, ghost sites, sleeper caches and sleeper sites.

Pirate sites

A Data Site container
A Relic Site container

Pirate relic and Data Sites are set up very simply. They are pockets of space populated with a variety of cosmetic structures (i.e., wrecked stations, abandoned machines) and several containers that need to be hacked before the contents can be accessed. The sites do not have any triggers or defenders.

Data Site containers look a bit like an gyroscope, and typically have names like [Faction] Info Shard or [Faction] Com Tower. Relic Site containers look like ancient shipwrecks and have names like [Faction] Debris or [Faction] Rubble.

These containers hold all of the site’s valuables. You’ll have to hack into the containers first by playing the Hacking minigame. In order to attempt a hack, you’ll need to lock on to the container, fly within your hacking module range of it, and then use the correct module on it (Relic Analyzer in a Relic Site, Data Analyzer in a Data Site or integrated analyzer for both). This will pop open a new window containing the hacking minigame.

Drone data sites

Drone data sites are slightly different from pirate data sites. Drone data sites spawn in drone regions only.

Sleeper caches

Sleeper caches are data sites with various triggers and dangers. Sleeper caches spawn in normal space and not in wormholes.

Ghost sites

Main article: Ghost Site

Ghost sites are data sites with limited time and riskier failures.

Sleeper sites

In wormholes the sleeper data and relic sites are not empty. Instead they have strong sleepers defending the site that need to be defeated before hacking. For list of sleeper data and relic sites and details on individual sites see Wormhole Sites.