Enigma Protocol

From Destinypedia, the Destiny wiki

Revision as of 10:15, September 21, 2024 by WizardWolf (talk | contribs) (Going to work in this more later today.)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Standard
Enigma Protocol

Game:

Episode: Echoes

Player(s):

1-3

Recommended Power Level:

2005

Location:

Vex Network

Enemy faction(s):

Nessian Schism

Hostile race(s):

Vex

Objective(s):

Journey into hidden recesses in the Vex network on Nessus and disrupt their search for Golden Age data.

 
Corrupted
Enigma Protocol

Game:

Episode: Echoes

Player(s):

1-3

Recommended Power Level:

2005

Location:

Vex Network

Hostile race(s):

Taken

 

Overview

The Hidden reported large quantities of data being uploaded to the Vex Network. They contacted Failsafe and the Guardian, who discovered a hole in the Well of Echoes, leading them to the Vex Net.[1]

Objectives

This section needs expansion. You can help Destinypedia by expanding it.
  • Glitch Through the World
  • Find a Connection Portal
    • Find the connection portal to bridge the gap to another digital island in the Vex Network.
  • Charge Radiolite Circuits in Vex Charging Pools
    • Circuits inserted: x of 1
  • Find a Connection Portal
    • Find the connection portal to bridge the gap to another digital island in the Vex Network.
  • Destroy the Choral Denial Agents
    • x of 9
  • Find a Connection Portal
    • Find the connection portal to bridge the gap to another digital island in the Vex Network.
  • Locate and Defeat Ainigmatos, the Indecipherable Proto-Mind
    • "This Vex frame is equipped with an evasion drive. That's what I'm calling it. Anyway, you'll have to chase it down." —Failsafe :P
  • Delve Deeper Into the Vex Network
  • Find a Connection Portal
    • Find the connection portal to bridge the gap to another digital island in the Vex Network.

Transcript

Destiny-GhostConstruct.png
"And my vanquisher will read that book, seeking the weapon, and they will come to understand me, where I have been and where I was going."
The following is a verbatim transcription of an official document for archival reasons. As the original content is transcribed word-for-word, any possible discrepancies and/or errors are included.

Enigma Protocol

{Mission begins}

The Guardian enters the Vex Network.

//VG-FTS CONNECTING… CONNECTED.

//AI-FS: Fireteam support patched in.

//IKO: Voice comms are being jammed.

//S14: Typing is exercise for the fingers.

Or

//VG-FTS CONNECTING… CONNECTED.

//OSI: You are entering the Vex Network.

//AI-FS: Vex security protocols jam our comms!

//IKO: Good luck, Guardian.

Or

//VG-FTS CONNECTING… CONNECTED.

//AI-FS: The Vex are locking our comms channels.

//OSI: The network is their territory, Guardian.

//OSI: Tread lightly.

Or

//VG-FTS CONNECTING… CONNECTED.

//AI-FS: You are entering the Vex Network.

//S14: The Vex interfere with our comms.

//S14: It is no matter. They will not stop us!

Or

//VG-FTS CONNECTING… CONNECTED.

//OSI: Initiating text-based communications.

//S14: Guardian! Hello!

//AI-FS: Welcome to the VexNet, Captain! :D

Or

//VG-FTS CONNECTING… CONNECTED.

//AI-FS: Hello! :D

//IKO: Welcome to the VexNet, Guardian.

//OSI: The Vex will greet you shortly.

Or

//VG-FTS CONNECTING… CONNECTED.

//OSI: Guardian. We will oversee your progress.

//S14: More! Their victory!

//AI-FS: I want to see you dismantle Vex. :P

Or

//VG-FTS CONNECTING… CONNECTED.

//S14: The Vex know not who is coming for them.

//AI-FS: Their jelly faces will look like this: :(

//OSI: Radiolaria has no face.

Or

//VG-FTS CONNECTING… CONNECTED.

//S14: Stay alert, Guardian. Danger lurks here.

//OSI: We will bring the Vex to light.

//S14: AND THEN PUT THEIR LIGHTS OUT.

Or

//VG-FTS CONNECTING… CONNECTED.

//IKO: Some parts of the VexNet we'll never see.

//OSI: Encrypted, or deleted. Deep and secret data.

//OSI: We look out at an ocean.

The Guardian travels further through the network, destroying the Choral Denial Agents that block their path.

//INITIATE D E L E T I O N P R O T O C O L

Or

//EXPEL (u n k n o w n v a r i a b le)

The Guardian arrives in a room where data on Golden Age artifacts is stored.
  • Vex Transmission: [indistinct Vex chatter]

//IKO: It takes a lot of effort to send Guardians here.

//IKO: We use all our methods just to stay.

//IKO: We must hope it will be worth the risk.

Or
  • Vex Transmission: [indistinct Vex chatter]

//AI-FS: The data we're finding is encrypted.

//OSI: Breaking Vex encryption is my specialty.

//S14: That, and singing.

Or
  • Vex Transmission: [indistinct Vex chatter]

//OSI: There has to be a method to this. A point.

//AI-FS: Lots of data encryption and lasers.

//OSI: This is old data from Nessus. Why now?

Or
  • Vex Transmission: [indistinct Vex chatter]

//OSI: This data is old, and from the Sol system.

//S14: Is that strange?

//OSI: Perhaps. It predates the Collapse.

Or
  • Vex Transmission: [indistinct Vex chatter]

//OSI: There is more to be found.

//OSI: There is Golden Age technology here.

//OSI: Vex comms are frenzied.

Or
  • Vex Transmission: [indistinct Vex chatter]

//AI-FS: As Golden Age technology myself...

//AI-FS: I find this Vex activity very concerning! :C

//S14: We will not let them take you, Failsafe.

Or
  • Vex Transmission: [indistinct Vex chatter]

//S14: If only Misraaks were here.

//AI-FS: I will send Eido a report!

//S14: Thank you. Her father is busy. :(

Or
  • Vex Transmission: [indistinct Vex chatter]

//AI-FS: Look, it’s a Hydra! )x[o=-

//AI-FS: Wait, can I import fonts?

//OSI: We have more important matters.

Or
  • Vex Transmission: [indistinct Vex chatter]

//AI-FS: Here is a Vex Hobgoblin! ]:c x =

//AI-FS: And this is a Minotaur! O[ x ] =

//IKO: Very creative, Failsafe. But let's focus.

Or
  • Vex Transmission: [indistinct Vex chatter]

//S14: GUARDIAN, IS THIS EASIER TO READ?

//S14: I WILL USE THE BIG LETTERS.

//S14: VEX SIGNALS ON YOUR POSITION.

The Guardian interacts with the assert queries.

//COND: Assert Query: Soft toy, rabbit.

//COMMAND (r e j e c t)

//EXPEL (u n k n o w n v a r i a b le)

Or

//COND: Assert Query: Jollof rice.

//COMMAND (r e j e c t)

//INTEGRATE (r o g u e c o n s c i o u s n e s s)

Or

//COND: Assert Query: Port wine.

//COMMAND (r e j e c t)

//TRANSFER (v u l n e r a b l e d a t a)

The Guardian travels further, defeating Ainigmatos. They return to the room with the Golden Age artifacts.

//OSI: The Vex are searching in their own network.

//S14: The Vex? Lose something? Impossible.

//OSI: Each bit of data is a query.

Or

/AI-FS: The Vex are encrypting Golden Age data. :(

//OSI: And adding it to their network.

//S14: This is bad. It was wise to send the Guardian.

Or

//OSI: The Vex are amassing Golden Age tech.

//OSI: Decrypting, analyzing, and liquidating it.

//OSI: There is danger in this... and not just to us.

Or

//OSI: The Vex want Golden Age tech. Why?

//OSI: That is not the right question.

//OSI: What, or who, is asking it of them?

Or

//IKO: I see fingerprints present in the data here.

//OSI: Yes, I concur. Vex in nature.

//S14: A Vex fingerprint made w/o Vex fingers?

Or

//S14: All this Golden Age data...

//IKO: Most of it is arbitrary queries.

//AI-FS: I'm Golden Age tech! Me. Failsafe!

Or

//OSI: Some of these are simple objects.

//OSI: Golden Age, but of no strategic value.

//OSI: Only sentimental. Curious.

Or

//IKO: This can’t be an attack by a collective.

//AI-FS: This is the effort of an individual.

//OSI: Did someone infiltrate this place?

Or

//EID: Guardian, I greet you in the Light! ^^ ^^

//EID: Did I miss anything?

//S14: Eido, please! It is too dangerous here!

Or

//IKO: This subnet holds research from the Collapse.

//IKO: Extract everything into a secure, offsite server.

//AI-FS: I am a secure, offsite server! :D

The Guardian interacts with the assert queries.

//COND: Assert Query: Sunflowers.

//COMMAND (a c c e p t)

helianthus annuus

Or

//COND: Assert Query: Sunrise.

//COMMAND (a c c e p t)

Suryodaya

Or

//COND: Assert Query: Art, abstract.

//COMMAND (a c c e p t)

the swan

{Mission ends}

Enigma Protocol: Corrupted Data

This section needs expansion. You can help Destinypedia by expanding it.

Gameplay

This section needs expansion. You can help Destinypedia by expanding it.

Enemies

Appearance

References

  1. ^ Bungie (2024/11/4), Destiny 2: Episode: Echoes - Encoded Log