Enigma Protocol: Difference between revisions

From Destinypedia, the Destiny wiki

(Going to work in this more later today.)
Tag: Mobile edit
 
mNo edit summary
Tag: Mobile edit
Line 1: Line 1:
{{Under construction}}
{{Tabbed infobox
{{Tabbed infobox
|title1=Standard
|title1=Standard

Revision as of 15:52, September 21, 2024

Destiny-GhostConstruct.png
Boons I grant you, oh bearer mine, but debts must be paid in time.
This section is currently under construction and needs to be improved. Please refer to the talk page for more info. You can help by editing the page.
Standard
Enigma Protocol

Game:

Episode: Echoes

Player(s):

1-3

Recommended Power Level:

2005

Location:

Vex Network

Enemy faction(s):

Nessian Schism

Hostile race(s):

Vex

Objective(s):

Journey into hidden recesses in the Vex network on Nessus and disrupt their search for Golden Age data.

 
Corrupted
Enigma Protocol

Game:

Episode: Echoes

Player(s):

1-3

Recommended Power Level:

2005

Location:

Vex Network

Hostile race(s):

Taken

 

Overview

The Hidden reported large quantities of data being uploaded to the Vex Network. They contacted Failsafe and the Guardian, who discovered a hole in the Well of Echoes, leading them to the Vex Net.[1]

Objectives

This section needs expansion. You can help Destinypedia by expanding it.
  • Glitch Through the World
  • Find a Connection Portal
    • Find the connection portal to bridge the gap to another digital island in the Vex Network.
  • Charge Radiolite Circuits in Vex Charging Pools
    • Circuits inserted: x of 1
  • Find a Connection Portal
    • Find the connection portal to bridge the gap to another digital island in the Vex Network.
  • Destroy the Choral Denial Agents
    • x of 9
  • Find a Connection Portal
    • Find the connection portal to bridge the gap to another digital island in the Vex Network.
  • Locate and Defeat Ainigmatos, the Indecipherable Proto-Mind
    • "This Vex frame is equipped with an evasion drive. That's what I'm calling it. Anyway, you'll have to chase it down." —Failsafe :P
  • Delve Deeper Into the Vex Network
  • Find a Connection Portal
    • Find the connection portal to bridge the gap to another digital island in the Vex Network.

Transcript

Destiny-GhostConstruct.png
"And my vanquisher will read that book, seeking the weapon, and they will come to understand me, where I have been and where I was going."
The following is a verbatim transcription of an official document for archival reasons. As the original content is transcribed word-for-word, any possible discrepancies and/or errors are included.

Enigma Protocol

{Mission begins}

The Guardian enters the Vex Network.

//VG-FTS CONNECTING… CONNECTED.

//AI-FS: Fireteam support patched in.

//IKO: Voice comms are being jammed.

//S14: Typing is exercise for the fingers.

Or

//VG-FTS CONNECTING… CONNECTED.

//OSI: You are entering the Vex Network.

//AI-FS: Vex security protocols jam our comms!

//IKO: Good luck, Guardian.

Or

//VG-FTS CONNECTING… CONNECTED.

//AI-FS: The Vex are locking our comms channels.

//OSI: The network is their territory, Guardian.

//OSI: Tread lightly.

Or

//VG-FTS CONNECTING… CONNECTED.

//AI-FS: You are entering the Vex Network.

//S14: The Vex interfere with our comms.

//S14: It is no matter. They will not stop us!

Or

//VG-FTS CONNECTING… CONNECTED.

//OSI: Initiating text-based communications.

//S14: Guardian! Hello!

//AI-FS: Welcome to the VexNet, Captain! :D

Or

//VG-FTS CONNECTING… CONNECTED.

//AI-FS: Hello! :D

//IKO: Welcome to the VexNet, Guardian.

//OSI: The Vex will greet you shortly.

Or

//VG-FTS CONNECTING… CONNECTED.

//OSI: Guardian. We will oversee your progress.

//S14: More! Their victory!

//AI-FS: I want to see you dismantle Vex. :P

Or

//VG-FTS CONNECTING… CONNECTED.

//S14: The Vex know not who is coming for them.

//AI-FS: Their jelly faces will look like this: :(

//OSI: Radiolaria has no face.

Or

//VG-FTS CONNECTING… CONNECTED.

//S14: Stay alert, Guardian. Danger lurks here.

//OSI: We will bring the Vex to light.

//S14: AND THEN PUT THEIR LIGHTS OUT.

Or

//VG-FTS CONNECTING… CONNECTED.

//IKO: Some parts of the VexNet we'll never see.

//OSI: Encrypted, or deleted. Deep and secret data.

//OSI: We look out at an ocean.

The Guardian travels further through the network, destroying the Choral Denial Agents that block their path.

//INITIATE D E L E T I O N P R O T O C O L

Or

//EXPEL (u n k n o w n v a r i a b le)

The Guardian arrives in a room where data on Golden Age artifacts is stored.
  • Vex Transmission: [indistinct Vex chatter]

//IKO: It takes a lot of effort to send Guardians here.

//IKO: We use all our methods just to stay.

//IKO: We must hope it will be worth the risk.

Or
  • Vex Transmission: [indistinct Vex chatter]

//AI-FS: The data we're finding is encrypted.

//OSI: Breaking Vex encryption is my specialty.

//S14: That, and singing.

Or
  • Vex Transmission: [indistinct Vex chatter]

//OSI: There has to be a method to this. A point.

//AI-FS: Lots of data encryption and lasers.

//OSI: This is old data from Nessus. Why now?

Or
  • Vex Transmission: [indistinct Vex chatter]

//OSI: This data is old, and from the Sol system.

//S14: Is that strange?

//OSI: Perhaps. It predates the Collapse.

Or
  • Vex Transmission: [indistinct Vex chatter]

//OSI: There is more to be found.

//OSI: There is Golden Age technology here.

//OSI: Vex comms are frenzied.

Or
  • Vex Transmission: [indistinct Vex chatter]

//AI-FS: As Golden Age technology myself...

//AI-FS: I find this Vex activity very concerning! :C

//S14: We will not let them take you, Failsafe.

Or
  • Vex Transmission: [indistinct Vex chatter]

//S14: If only Misraaks were here.

//AI-FS: I will send Eido a report!

//S14: Thank you. Her father is busy. :(

Or
  • Vex Transmission: [indistinct Vex chatter]

//AI-FS: Look, it’s a Hydra! )x[o=-

//AI-FS: Wait, can I import fonts?

//OSI: We have more important matters.

Or
  • Vex Transmission: [indistinct Vex chatter]

//AI-FS: Here is a Vex Hobgoblin! ]:c x =

//AI-FS: And this is a Minotaur! O[ x ] =

//IKO: Very creative, Failsafe. But let's focus.

Or
  • Vex Transmission: [indistinct Vex chatter]

//S14: GUARDIAN, IS THIS EASIER TO READ?

//S14: I WILL USE THE BIG LETTERS.

//S14: VEX SIGNALS ON YOUR POSITION.

The Guardian interacts with the assert queries.

//COND: Assert Query: Soft toy, rabbit.

//COMMAND (r e j e c t)

//EXPEL (u n k n o w n v a r i a b le)

Or

//COND: Assert Query: Jollof rice.

//COMMAND (r e j e c t)

//INTEGRATE (r o g u e c o n s c i o u s n e s s)

Or

//COND: Assert Query: Port wine.

//COMMAND (r e j e c t)

//TRANSFER (v u l n e r a b l e d a t a)

The Guardian travels further, defeating Ainigmatos. They return to the room with the Golden Age artifacts.

//OSI: The Vex are searching in their own network.

//S14: The Vex? Lose something? Impossible.

//OSI: Each bit of data is a query.

Or

/AI-FS: The Vex are encrypting Golden Age data. :(

//OSI: And adding it to their network.

//S14: This is bad. It was wise to send the Guardian.

Or

//OSI: The Vex are amassing Golden Age tech.

//OSI: Decrypting, analyzing, and liquidating it.

//OSI: There is danger in this... and not just to us.

Or

//OSI: The Vex want Golden Age tech. Why?

//OSI: That is not the right question.

//OSI: What, or who, is asking it of them?

Or

//IKO: I see fingerprints present in the data here.

//OSI: Yes, I concur. Vex in nature.

//S14: A Vex fingerprint made w/o Vex fingers?

Or

//S14: All this Golden Age data...

//IKO: Most of it is arbitrary queries.

//AI-FS: I'm Golden Age tech! Me. Failsafe!

Or

//OSI: Some of these are simple objects.

//OSI: Golden Age, but of no strategic value.

//OSI: Only sentimental. Curious.

Or

//IKO: This can’t be an attack by a collective.

//AI-FS: This is the effort of an individual.

//OSI: Did someone infiltrate this place?

Or

//EID: Guardian, I greet you in the Light! ^^ ^^

//EID: Did I miss anything?

//S14: Eido, please! It is too dangerous here!

Or

//IKO: This subnet holds research from the Collapse.

//IKO: Extract everything into a secure, offsite server.

//AI-FS: I am a secure, offsite server! :D

The Guardian interacts with the assert queries.

//COND: Assert Query: Sunflowers.

//COMMAND (a c c e p t)

helianthus annuus

Or

//COND: Assert Query: Sunrise.

//COMMAND (a c c e p t)

Suryodaya

Or

//COND: Assert Query: Art, abstract.

//COMMAND (a c c e p t)

the swan

{Mission ends}

Enigma Protocol: Corrupted Data

This section needs expansion. You can help Destinypedia by expanding it.

Gameplay

This section needs expansion. You can help Destinypedia by expanding it.

Enemies

Appearance

References

  1. ^ Bungie (2024/11/4), Destiny 2: Episode: Echoes - Encoded Log