Differences
This shows you the differences between two versions of the page.
| Both sides previous revisionPrevious revisionNext revision | Previous revision |
| daemons:echo [2020-06-06 14:29] – andrew | daemons:echo [2020-07-01 01:43] (current) – [Echo] andrew |
|---|
| [{{ echo.png|Echo icon}}] | [{{ echo.png|Echo icon}}] |
| |
| **Echo** is a [[:daemons:|daemon]] which [[:mainframe devices:#rebooting|reboots]] and recaptures a random hacked [[:mainframe devices:|mainframe device]]. | **Echo** is a [[:daemons:|daemon]] which [[:rebooting#recapturing|reboots and recaptures]] a random hacked [[:mainframe device]]. The recaptured device will [[:rebooting|reboot]] for 1 turn, and then return to the enemy's control with 1 [[:firewall]]. |
| |
| Echo can target most hacked devices, but some devices are specifically exempt. If Echo has no valid targets, then it has no effect. | Echo can target most hacked devices, but some devices --- [[:mainframe devices:Augment Grafters]], [[:mainframe devices:Augment Drills]], all [[:drones]], [[:guards:Barrier Guards]] and [[:guards:OMNI Protectors]], and the [[:mainframe devices:Security Hub]] and [[:mainframe devices:Mainframe Lock]] --- are specifically exempt. If Echo has no valid targets, then it has no effect. |
| | |
| | ===== Strategy ===== |
| | |
| | Echo is a relatively weak daemon; if it recaptures an important device like a [[:mainframe devices:Security Camera]] in a room you need to go through, then all you need to do is hack that device again. On the other hand, Echo often recaptures a device you don't need to hack: |
| | |
| | * Echo sometimes recaptures a [[:mainframe devices:Security Camera]] or [[:mainframe devices:Sound Bug]] in a room you don't need to go through or return to, or a [[:mainframe devices:Power Supply]] connected to something you don't need to get past again. |
| | * If it recaptures a [[:mainframe devices:Corporate Safe]] or similar, then you can still loot the device while it is rebooting. |
| | * If it recaptures a [[:mainframe devices:Database]] then you typically don't need to hack it again to get the same information; either the information remains revealed, or you can remember it. |
| | |
| | When Echo is triggered by hacking a device, that device itself may be the one recaptured by Echo. |
| |
| {{tag>incomplete}} | |