Enigma Protocol: Difference between revisions

From Destinypedia, the Destiny wiki

Tag: Mobile edit
Tag: Mobile edit
 
(6 intermediate revisions by 2 users not shown)
Line 35: Line 35:
}}
}}
}}
}}
'''Enigma Protocol''' and it's [[Taken]] variant, '''Enigma Protocol: Corrupted Data''', are three player matchmade activities released in ''[[Episode: Echoes]]''.


==Overview==
==Overview==
Line 40: Line 42:


==Objectives==
==Objectives==
{{Expand-section}}
===Enigma Protocol===
===Enigma Protocol===
*Glitch Through the World
*Glitch Through the World
:''Uncover an access point to the Vex Network.''
*Find a Connection Portal
*Find a Connection Portal
**''Find the connection portal to bridge the gap to another digital island in the Vex Network.''
:''Find the connection portal to bridge the gap to another digital island in the Vex Network.''
*Charge Radiolite Circuits in Vex Charging Pools
*Charge Radiolite Circuits in Vex Charging Pools
**Circuits inserted: x of 1
**Circuits inserted: x of 1
:''Stand in a Vex Charging Pool to charge Radiolite Circuits. Can be thrown to players facing you.''
*Find a Connection Portal
*Find a Connection Portal
**''Find the connection portal to bridge the gap to another digital island in the Vex Network.''
:''Find the connection portal to bridge the gap to another digital island in the Vex Network.''
*Destroy the Choral Denial Agents
*Destroy the Choral Denial Agents
**x of 9
**x of 9
:''Clear all Choral Denial Agents to gain deeper access to the Vex Network. Break their shields with Charged Radiolite Circuits.''
*Find a Connection Portal
*Find a Connection Portal
**''Find the connection portal to bridge the gap to another digital island in the Vex Network.''
:''Find the connection portal to bridge the gap to another digital island in the Vex Network.''
*Delve Deeper Into the Vex Network
:''Step into the Vex portal to gain deeper access to the Vex Network.''
*Break Vex Encryption Pods
**Encrypted Golden Age Data collected: x of 20
:''Break Encryption Pods and collect the Encrypted Golden Age Data they have been reformatting.''
*Find a Connection Portal
:''Find the connection portal to bridge the gap to another digital island in the Vex Network.''
*Locate and Defeat Ainigmatos, the Indecipherable Proto-Mind
*Locate and Defeat Ainigmatos, the Indecipherable Proto-Mind
**''"This Vex frame is equipped with an evasion drive. That's what I'm calling it. Anyway, you'll have to chase it down." —Failsafe :P''
:''"This Vex frame is equipped with an evasion drive. That's what I'm calling it. Anyway, you'll have to chase it down." —Failsafe :P''
*Delve Deeper Into the Vex Network
*Find a Connection Portal
*Find a Connection Portal
**''Find the connection portal to bridge the gap to another digital island in the Vex Network.''
:''Find the connection portal to bridge the gap to another digital island in the Vex Network.''


===Enigma Protocol: Corrupted Data===
===Enigma Protocol: Corrupted Data===
*Glitch Through the World
:''Uncover an access point to the Vex Network.''
*Find a Connection Portal
:''Find the connection portal to bridge the gap to another digital island in the Vex Network.''
*Charge Radiolite Circuits in Vex Charging Pools
**Circuits inserted: x of 1
:''Stand in a Vex Charging Pool to charge Radiolite Circuits. Can be thrown to players facing you.''
*Find a Connection Portal
:''Find the connection portal to bridge the gap to another digital island in the Vex Network.''
*Destroy the Choral Denial Agents
**x of 9
:''Clear all Choral Denial Agents to gain deeper access to the Vex Network. Break their shields with Charged Radiolite Circuits.''
*Find a Connection Portal
:''Find the connection portal to bridge the gap to another digital island in the Vex Network.''
*Delve Deeper Into the Vex Network
:''Step into the Vex portal to gain deeper access to the Vex Network.''
*Break Vex Encryption Pods
**Encrypted Golden Age Data collected: x of 20
:''Break Encryption Pods and collect the Encrypted Golden Age Data they have been reformatting.''
*Find a Connection Portal
:''Find the connection portal to bridge the gap to another digital island in the Vex Network.''
*Purge and Defeat Gulletous, The Insatiable Hunger
*Purge and Defeat Gulletous, The Insatiable Hunger
**''The Taken fiend, Gulletous, is consuming and irradiating data as they rampage across the VexNet. Search and destroy''
:''The Taken fiend, Gulletous, is consuming and irradiating data as they rampage across the VexNet. Search and destroy.''
:''Find the connection portal to bridge the gap to another digital island in the Vex Network.''
*Find a Connection Portal
:''Find the connection portal to bridge the gap to another digital island in the Vex Network.''


==Transcript==
==Transcript==
Line 741: Line 775:
*[[Compelled Hobgoblin]]
*[[Compelled Hobgoblin]]
*[[Compelled Hydra]]
*[[Compelled Hydra]]
**[[Choral Deletion Hydra]]
*[[Compelled Minotaur]]
*[[Compelled Minotaur]]
**[[Elite Compelled Minotaur]]
**[[Elite Compelled Minotaur]]
Line 748: Line 783:
*[[Ainigmatos, Indecipherable Proto-Mind]]
*[[Ainigmatos, Indecipherable Proto-Mind]]
{{Col-2}}
{{Col-2}}
===Enigma Protocol: Corrupted Data===
===Enigma Protocol: Corrupted Data===
'''[[Taken]]'''
'''[[Taken]]'''
*[[Choral Denial Agent]]
*[[Shadow Thrall]]
*[[Taken Acolyte]]
*[[Taken Captain]]
*[[Taken Goblin]]
**[[Archival Circuitkeeper]]
*[[Taken Hobgoblin]]
*[[Taken Knight]]
*[[Taken Minotaur]]
**[[Ravenous Taken Minotaur]]
*[[Taken Wizard]]
**[[Archival Timekeeper]]
**[[Choral Denial Agent]]
**[[Choral Deletion Hydra]]


'''Bosses'''
'''Bosses'''

Latest revision as of 14:48, October 5, 2024

Destiny-GhostConstruct.png
Boons I grant you, oh bearer mine, but debts must be paid in time.
This section is currently under construction and needs to be improved. Please refer to the talk page for more info. You can help by editing the page.
Standard
Enigma Protocol
Enigma Protocol.jpg

Game:

Episode: Echoes

Player(s):

1-3

Recommended Power Level:

2005

Location:

Vex Network

Enemy faction(s):

Nessian Schism

Hostile race(s):

Vex

Objective(s):

Journey into hidden recesses in the Vex network on Nessus and disrupt their search for Golden Age data.

 
Corrupted
Enigma Protocol

Game:

Episode: Echoes

Player(s):

1-3

Recommended Power Level:

2005

Location:

Vex Network

Hostile race(s):

Taken

 

Enigma Protocol and it's Taken variant, Enigma Protocol: Corrupted Data, are three player matchmade activities released in Episode: Echoes.

Overview[edit]

The Hidden reported large quantities of data being uploaded to the Vex Network. They contacted Failsafe and the Guardian, who discovered a hole in the Well of Echoes, leading them to the Vex Net.[1]

Objectives[edit]

Enigma Protocol[edit]

  • Glitch Through the World
Uncover an access point to the Vex Network.
  • Find a Connection Portal
Find the connection portal to bridge the gap to another digital island in the Vex Network.
  • Charge Radiolite Circuits in Vex Charging Pools
    • Circuits inserted: x of 1
Stand in a Vex Charging Pool to charge Radiolite Circuits. Can be thrown to players facing you.
  • Find a Connection Portal
Find the connection portal to bridge the gap to another digital island in the Vex Network.
  • Destroy the Choral Denial Agents
    • x of 9
Clear all Choral Denial Agents to gain deeper access to the Vex Network. Break their shields with Charged Radiolite Circuits.
  • Find a Connection Portal
Find the connection portal to bridge the gap to another digital island in the Vex Network.
  • Delve Deeper Into the Vex Network
Step into the Vex portal to gain deeper access to the Vex Network.
  • Break Vex Encryption Pods
    • Encrypted Golden Age Data collected: x of 20
Break Encryption Pods and collect the Encrypted Golden Age Data they have been reformatting.
  • Find a Connection Portal
Find the connection portal to bridge the gap to another digital island in the Vex Network.
  • Locate and Defeat Ainigmatos, the Indecipherable Proto-Mind
"This Vex frame is equipped with an evasion drive. That's what I'm calling it. Anyway, you'll have to chase it down." —Failsafe :P
  • Find a Connection Portal
Find the connection portal to bridge the gap to another digital island in the Vex Network.

Enigma Protocol: Corrupted Data[edit]

  • Glitch Through the World
Uncover an access point to the Vex Network.
  • Find a Connection Portal
Find the connection portal to bridge the gap to another digital island in the Vex Network.
  • Charge Radiolite Circuits in Vex Charging Pools
    • Circuits inserted: x of 1
Stand in a Vex Charging Pool to charge Radiolite Circuits. Can be thrown to players facing you.
  • Find a Connection Portal
Find the connection portal to bridge the gap to another digital island in the Vex Network.
  • Destroy the Choral Denial Agents
    • x of 9
Clear all Choral Denial Agents to gain deeper access to the Vex Network. Break their shields with Charged Radiolite Circuits.
  • Find a Connection Portal
Find the connection portal to bridge the gap to another digital island in the Vex Network.
  • Delve Deeper Into the Vex Network
Step into the Vex portal to gain deeper access to the Vex Network.
  • Break Vex Encryption Pods
    • Encrypted Golden Age Data collected: x of 20
Break Encryption Pods and collect the Encrypted Golden Age Data they have been reformatting.
  • Find a Connection Portal
Find the connection portal to bridge the gap to another digital island in the Vex Network.
  • Purge and Defeat Gulletous, The Insatiable Hunger
The Taken fiend, Gulletous, is consuming and irradiating data as they rampage across the VexNet. Search and destroy.
Find the connection portal to bridge the gap to another digital island in the Vex Network.
  • Find a Connection Portal
Find the connection portal to bridge the gap to another digital island in the Vex Network.

Transcript[edit]

Destiny-GhostConstruct.png
"And my vanquisher will read that book, seeking the weapon, and they will come to understand me, where I have been and where I was going."
The following is a verbatim transcription of an official document for archival reasons. As the original content is transcribed word-for-word, any possible discrepancies and/or errors are included.

Enigma Protocol[edit]

{Mission begins}

The Guardian enters the Vex Network.

//VG-FTS CONNECTING… CONNECTED.

//AI-FS: Fireteam support patched in.

//IKO: Voice comms are being jammed.

//S14: Typing is exercise for the fingers.

Or

//VG-FTS CONNECTING… CONNECTED.

//OSI: You are entering the Vex Network.

//AI-FS: Vex security protocols jam our comms!

//IKO: Good luck, Guardian.

Or

//VG-FTS CONNECTING… CONNECTED.

//AI-FS: The Vex are locking our comms channels.

//OSI: The network is their territory, Guardian.

//OSI: Tread lightly.

Or

//VG-FTS CONNECTING… CONNECTED.

//AI-FS: You are entering the Vex Network.

//S14: The Vex interfere with our comms.

//S14: It is no matter. They will not stop us!

Or

//VG-FTS CONNECTING… CONNECTED.

//OSI: Initiating text-based communications.

//S14: Guardian! Hello!

//AI-FS: Welcome to the VexNet, Captain! :D

Or

//VG-FTS CONNECTING… CONNECTED.

//AI-FS: Hello! :D

//IKO: Welcome to the VexNet, Guardian.

//OSI: The Vex will greet you shortly.

Or

//VG-FTS CONNECTING… CONNECTED.

//OSI: Guardian. We will oversee your progress.

//S14: More! Their victory!

//AI-FS: I want to see you dismantle Vex. :P

Or

//VG-FTS CONNECTING… CONNECTED.

//S14: The Vex know not who is coming for them.

//AI-FS: Their jelly faces will look like this: :(

//OSI: Radiolaria has no face.

Or

//VG-FTS CONNECTING… CONNECTED.

//S14: Stay alert, Guardian. Danger lurks here.

//OSI: We will bring the Vex to light.

//S14: AND THEN PUT THEIR LIGHTS OUT.

Or

//VG-FTS CONNECTING… CONNECTED.

//IKO: Some parts of the VexNet we'll never see.

//OSI: Encrypted, or deleted. Deep and secret data.

//OSI: We look out at an ocean.

The Guardian travels further through the network, destroying the Choral Denial Agents that block their path.

//INITIATE D E L E T I O N P R O T O C O L

Or

//EXPEL (u n k n o w n v a r i a b le)

The Guardian arrives in a room where data on Golden Age artifacts is stored.
  • Vex Transmission: [indistinct Vex chatter]

//IKO: It takes a lot of effort to send Guardians here.

//IKO: We use all our methods just to stay.

//IKO: We must hope it will be worth the risk.

Or
  • Vex Transmission: [indistinct Vex chatter]

//AI-FS: The data we're finding is encrypted.

//OSI: Breaking Vex encryption is my specialty.

//S14: That, and singing.

Or
  • Vex Transmission: [indistinct Vex chatter]

//OSI: There has to be a method to this. A point.

//AI-FS: Lots of data encryption and lasers.

//OSI: This is old data from Nessus. Why now?

Or
  • Vex Transmission: [indistinct Vex chatter]

//OSI: This data is old, and from the Sol system.

//S14: Is that strange?

//OSI: Perhaps. It predates the Collapse.

Or
  • Vex Transmission: [indistinct Vex chatter]

//OSI: There is more to be found.

//OSI: There is Golden Age technology here.

//OSI: Vex comms are frenzied.

Or
  • Vex Transmission: [indistinct Vex chatter]

//AI-FS: As Golden Age technology myself...

//AI-FS: I find this Vex activity very concerning! :C

//S14: We will not let them take you, Failsafe.

Or
  • Vex Transmission: [indistinct Vex chatter]

//S14: If only Misraaks were here.

//AI-FS: I will send Eido a report!

//S14: Thank you. Her father is busy. :(

Or
  • Vex Transmission: [indistinct Vex chatter]

//AI-FS: Look, it’s a Hydra! )x[o=-

//AI-FS: Wait, can I import fonts?

//OSI: We have more important matters.

Or
  • Vex Transmission: [indistinct Vex chatter]

//AI-FS: Here is a Vex Hobgoblin! ]:c x =

//AI-FS: And this is a Minotaur! O[ x ] =

//IKO: Very creative, Failsafe. But let's focus.

Or
  • Vex Transmission: [indistinct Vex chatter]

//S14: GUARDIAN, IS THIS EASIER TO READ?

//S14: I WILL USE THE BIG LETTERS.

//S14: VEX SIGNALS ON YOUR POSITION.

The Guardian interacts with the assert queries.

//COND: Assert Query: Soft toy, rabbit.

//COMMAND (r e j e c t)

//EXPEL (u n k n o w n v a r i a b le)

Or

//COND: Assert Query: Jollof rice.

//COMMAND (r e j e c t)

//INTEGRATE (r o g u e c o n s c i o u s n e s s)

Or

//COND: Assert Query: Port wine.

//COMMAND (r e j e c t)

//TRANSFER (v u l n e r a b l e d a t a)

The Guardian travels further, defeating Ainigmatos. They return to the room with the Golden Age artifacts.

//OSI: The Vex are searching in their own network.

//S14: The Vex? Lose something? Impossible.

//OSI: Each bit of data is a query.

Or

/AI-FS: The Vex are encrypting Golden Age data. :(

//OSI: And adding it to their network.

//S14: This is bad. It was wise to send the Guardian.

Or

//OSI: The Vex are amassing Golden Age tech.

//OSI: Decrypting, analyzing, and liquidating it.

//OSI: There is danger in this... and not just to us.

Or

//OSI: The Vex want Golden Age tech. Why?

//OSI: That is not the right question.

//OSI: What, or who, is asking it of them?

Or

//IKO: I see fingerprints present in the data here.

//OSI: Yes, I concur. Vex in nature.

//S14: A Vex fingerprint made w/o Vex fingers?

Or

//S14: All this Golden Age data...

//IKO: Most of it is arbitrary queries.

//AI-FS: I'm Golden Age tech! Me. Failsafe!

Or

//OSI: Some of these are simple objects.

//OSI: Golden Age, but of no strategic value.

//OSI: Only sentimental. Curious.

Or

//IKO: This can’t be an attack by a collective.

//AI-FS: This is the effort of an individual.

//OSI: Did someone infiltrate this place?

Or

//EID: Guardian, I greet you in the Light! ^^ ^^

//EID: Did I miss anything?

//S14: Eido, please! It is too dangerous here!

Or

//IKO: This subnet holds research from the Collapse.

//IKO: Extract everything into a secure, offsite server.

//AI-FS: I am a secure, offsite server! :D

The Guardian interacts with the assert queries.

//COND: Assert Query: Sunflowers.

//COMMAND (a c c e p t)

helianthus annuus

Or

//COND: Assert Query: Sunrise.

//COMMAND (a c c e p t)

Suryodaya

Or

//COND: Assert Query: Art, abstract.

//COMMAND (a c c e p t)

the swan

{Mission ends}

Enigma Protocol: Corrupted Data[edit]

{Mission begins}

The Guardian enters the Vex Network.

//VG-FTS CONNECTING… CONNECTED.

//OSI: The Vex have locked out our comms.

//OSI: We can communicate here.

//OSI: Proceed, Guardian. We are with you.

Or

//VG-FTS CONNECTING… CONNECTED.

//IKO: Guardian. Comms are still dead.

//AI-FS: Taken radiation is not helping.

//S14: You must keep your senses sharp!

Or

//VG-FTS CONNECTING… CONNECTED.

//OSI: Do you read us, fireteam?

//S14: There is interference. This is all we can do.

//AI-FS: They are reading it in our voice! :D

Or

//OSI: Taken interference has jammed our comms.

//S14: No matter! We type! Guardian reads!

//OSI: Inefficient, but we must make do.

Or

//VG-FTS CONNECTING… CONNECTED.

//AI-FS: :)

//S14: :D

//OSI: Absolutely not.

Or

//VG-FTS CONNECTING... CONNECTED.

//AI-FS: Welcome to the Net!

//OSI: Taken corruption infests this sector.

//IKO: Keep your weapons ready.

Or

//VG-FTS CONNECTING… CONNECTED.

//AI-FS: Ew. Sticky data.

//AI-FS: This data is literally sticky though.

//IKO: Taken blight, eating into the network.

Or

//VG-FTS CONNECTING… CONNECTED.

//IKO: Taken blight. Not easy to expunge.

//OSI: It hasn't stopped the Vex cataloging.

//AI-FS: Is it contagious? ;A;

Or

//VG-FTS CONNECTING... CONNECTED.

//S14: Taken! What are they doing here?

//OSI: Perhaps we share a goal.

//OSI: Remove them all the same.

Or

//VG-FTS CONNECTING… CONNECTED.

//S14: Bah, Taken infestation!

//AI-FS: What's their beef with the Vex?

//OSI: Perhaps a lost Mind still lurks here?

The Guardian defeats the Choral Denial Agents, and continues further into the Network.

//SIGNAL CORRUPTED... RECONNECTING...

Or

//SIGNAL CORRUPTED... R CO NECTING...

The Guardian travels to a room where data on Golden Age artifacts is being stored.

//IKO: We're lucky we can still communicate here.

//IKO: Failsafe bypassed VexNet security.

//IKO: I think she's having fun with it.

Or

//AI-FS: This is a Taken Phalanx! (x)[O]g

//S14: The shield there, with the little “x”? Ha!

//S14: I think I understand the Taken more now.

Or

//S14: Teach me this word art you make.

//AI-FS: YES! :D You will be my greatest pupil.

//IKO: Focus, fireteam.

Or

//OSI: I found salvageable data.

//AI-FS: Query: "real estate", pre-Collapse London.

//S14: Strange. Is all estate not real?

Or

//IKO: There's a pattern to this infestation...

//OSI: The Taken follow Vex searches...

//OSI: But to intentionally erase source data.

Or

//AI-FS: As an AI, I am vulnerable to the Vex!

//AI-FS: Taken, though... Not really any better. :(

//AI-FS: Devil you know... am I right?

Or

//S14: Taken corruption is still inside the VexNet.

//IKO: Quria brought it. An infection.

//IKO: The Vex are too afraid to purge it.

Or

//IKO: The Taken never left the Vex network.

//OSI: Do they have a commander?

//IKO: Maybe. Another potential threat.

Or

//S14: What directs the Taken now?

//OSI: A question we are still puzzling.

//IKO: We have theories... but not much else.

Or

//S14: Who leads these Taken?

//IKO: I don't know. But that power is learned.

//IKO: We'll be ready if they ever find a new leader.

The Guardian interacts with the assert queries.

//COND: Assert Query: Subject 227... Anomaly...

//COND: Reassess… Reassess.

//C Rr pTeee: . 2 ttT eEGR D T0N crTtTiC4L

Or

//COND: Assert Query: The Collapse.

//COND: Following Query: The Dark Age.

//CORRUPTED: …DAttttT eEGRAD TON CRTTI

Or

//COND: Assert Query: Bioscan.

//COND: Mars, Venus, Titan. Neptune. Pre-Collapse.

//NO SIGNAL

The Guardian travels further in the Vex Network, defeating Gulletous, and returning to the Golden Age data room.

//AI-FS: When Taken die, where do they go?

//IKO: Back to the Ascendant Plane.

//IKO: Then they begin the journey again.

Or

//S14: The Taken tried to steal Vex data!

//S14: Now WE steal Vex data!

//S14: We steal what they stole! We are heroes.

Or

//OSI: More random data... and flowers.

//S14: Why are the Taken destroying this data?

//IKO: It's more than data. It's something personal.

Or

//OSI: The Taken claw at this Vex data.

//OSI: I do not understand their desire.

//OSI: But what commands the Vex is a true concern.

Or

//AI-FS: You ever get zapped by radiolaria?

//AI-FS: The VexNet feels like that for me ;A;

//AI-FS: Those Taken blights feel even weirder.

Or

//IKO: Failsafe, analyze these pieces of data.

//AI-FS: Analyzing... Queries, flight logs to Titan.

//IKO: That can't be random... we need more details.

Or

//AI-FS: There's a LOT of Golden Age data here.

//AI-FS: This is useful to the Vex?

//AI-FS: A recipe for Jollof rice... why take that?

Or

//IKO: Every query comes from the same source.

//OSI: Yes, but not a Vex mind, or the Taken.

//IKO: Everything changed after the Witness died...

Or

//IKO: The data is ruined. We'll have to come back.

//S14: A shame. Have a Harpy for your work instead: VoV

//AI-FS: That is quality art, Saint-unit!

Or

//AI-FS: Osiris is reading your report. And cursing!

//AI-FS: I will lighten his mood with text art of the Vex! :D

//OSI: No. Run the data again.

The Guardian interacts with the assert queries.

//COND: Assert Query: Indecipherable Mind.

//COND: Purge my queries.

//CORRUPTED:... DATA DEGRADATION CRITICAL…

Or

//COND: Asset Query: The Taken.

//COND: Reference file: Blade Transform.

//CORRUPTED: …DATA DEGRADaTION CRTTTICAL…

Or

//COND: Assert Query: Lightbearers. The City.

//COND: Humanity rises from the mud.

//CORRUPTED: …DATA DEGRAD TON CRITICLL

{Mission ends}

Gameplay[edit]

This section needs expansion. You can help Destinypedia by expanding it.

Enemies[edit]

Appearance[edit]

References[edit]

  1. ^ Bungie (2024/11/4), Destiny 2: Episode: Echoes - Encoded Log