Follow TV Tropes

Following

History VideoGame / Hacknet

Go To

OR

Added: 1000

Changed: 3

Is there an issue? Send a MessageReason:
Added a segment to Bonus Boss detailing the secret node, The Gibson, as well as fixing a typo.


**There's an even harder one, which is also very well hidden. Accessible only after the ''Labyrinths'' DLC is completed, [[spoiler: The Gibson is a secret node, accessible only by creating a memory dump on the Head of the Polar Star node, something that isn't suggested anywhere in the game. While its trace isn't instant like CCC Hacksquad, it's the hardest node to break into in the entire game, having ''all nine ports in the game required'', on top of a proxy that ''takes longer than the trace's duration to complete'' and a firewall for good measure. The timing on the trace is ''ridiculously'' tight at 95 seconds, and neither Tracekill nor SignalScramble can stop it once its activated. It can be considered the final test for everything you've learned in both the main game and ''Labyrinths'', and what's the reward for breaking in? ClockV2, an second version of the original Clock program, as well as a link to an elusive Discord server for fans of the game who have beaten the challenge.]]



** [[spoiler: At the end of ''Labrynths'' you can potentially fight Kaguya's endgame by preventing the plane crash.]]

to:

** [[spoiler: At the end of ''Labrynths'' ''Labyrinths'' you can potentially fight Kaguya's endgame by preventing the plane crash.]]

Added: 276

Changed: 145

Is there an issue? Send a MessageReason:
None


** [[spoiler: If you react quickly enough when they attack you, you can actively thwart both Naix and Striker's hacking by shell'ing and setting a trap on your own terminal and thereby shut their terminals down when it executes.]]

to:

** [[spoiler: If you react quickly enough when they attack you, you can actively thwart both Naix and Striker's hacking by shell'ing and setting a trap on your own terminal and thereby shut their terminals down when it executes. You can also avoid Striker altogether by wiping all the logs and forkbombing his system after you steal from him, leaving him no logs to trace.]]


Added DiffLines:

** The player can inflict this on another hacker. [[spoiler: If the player is careless and gets hacked by Striker during ''Labyrinths'' they can retaliate by hacking Striker's personal system and deleting their university project, earning the player a ''very'' angry email.]]
Is there an issue? Send a MessageReason:
None


* JerkassHasAPoint: Naix refers to the player as a 'script kiddie' after you delete the data off their proxy. Which is correct, since you either steal or get given all your exploit tools from or by other people. [[spoiler:Even [=PortHack=] and [=HackNet=]. The endgame is all about how dangerous it is to have tools so simple even a novice like you can go around hacking pretty much anything you want to with just a little bit of training and dangerously powerful tools.]]

to:

* JerkassHasAPoint: Naix refers to the player as a 'script kiddie' after you delete the data off their proxy. Which is correct, since you either steal or get given all your exploit tools from or by other people. [[spoiler:Even [=PortHack=] and [=HackNet=]. The endgame is all about how dangerous it is to have tools so simple powerful that even a novice like you can go around hacking pretty much anything you want to with just a little bit of training and dangerously powerful tools.basic terminal knowledge.]]
Is there an issue? Send a MessageReason:
I know it's really being pedantic and more people recognize the term but "mainframe" computers aren't really used anymore. They've been phased out in favor of servers almost completely.


* JerkassHasAPoint: Naix refers to the player as a 'script kiddie' after you delete the data off their proxy. Which is correct, since you either steal or get given all your exploit tools from or by other people. [[spoiler:Even [=PortHack=] and [=HackNet=]. The endgame is all about how dangerous it is to have tools so simple even a novice like you can go around hacking mainframes.]]

to:

* JerkassHasAPoint: Naix refers to the player as a 'script kiddie' after you delete the data off their proxy. Which is correct, since you either steal or get given all your exploit tools from or by other people. [[spoiler:Even [=PortHack=] and [=HackNet=]. The endgame is all about how dangerous it is to have tools so simple even a novice like you can go around hacking mainframes.pretty much anything you want to with just a little bit of training and dangerously powerful tools.]]



** When Bit [[spoiler:hacked into Entech's mainframe one night and discovered their plan, he]] had a change of heart.

to:

** When Bit [[spoiler:hacked into Entech's mainframe servers one night and discovered their plan, he]] had a change of heart.
Is there an issue? Send a MessageReason:
None

Added DiffLines:

* EqualOpportunityEvil: One of the systems you have to hack into during the endgame reveals Entech to be this, as they've taken significant expense to allow one of their employees who suffers from a severe heart disease to work safely by constantly monitoring their pacemaker from their desktop.
Is there an issue? Send a MessageReason:
None


* SuperPrototype: [[spoiler: PortHack. The reason why the player is so easily able to hack isn't because they're good, but because PortHack is an absurdly powerful tool. As a metaphor, most in-lore hacking devices can be considered akin to lockpicking tools, while PortHack is like a battering ram.]]

to:

* SuperPrototype: [[spoiler: PortHack. The reason why the player is so easily able to hack isn't because they're good, but because PortHack is an absurdly powerful tool. As a metaphor, most in-lore hacking devices can be considered akin to lockpicking tools, while PortHack is like a battering ram. PortHack is Bit's contribution to Entech's Hacknet project and is, in his words, the skills of a master hacker condensed into a program. The player's copy is the only one which ever had the complete program compiled into it.]]
Is there an issue? Send a MessageReason:
None


** The [[ShmuckBait CCCHacksquad server]] also starts with a predetermined password. [[spoiler: The password is "honeypot", but attempting to hack it causes the password to change and, due to updates preventing certain exploits from working, renders the server's contents inaccessible forever.]]

to:

** The [[ShmuckBait CCCHacksquad server]] also starts with a predetermined password. [[spoiler: The password is "honeypot", but attempting to hack it causes the password to change and, due to updates preventing certain exploits from working, renders the server's contents inaccessible forever.until the postgame.]]
Is there an issue? Send a MessageReason:
None


* BonusBoss: One server, the CCC Hacksquad Filedump, traces any hacking attempts in mere seconds, making it even harder to hack than the final boss! There actually was a way to get through it, [[spoiler: by means of repeatedly letting the passive trace trigger active traces while you open the ports one at a time]]. This got removed in an update. There is an actual password, though if you even attempt to hack it, the password cycles, rendering the contents effectively [[PermanentlyMissableContent Lost Forever]]. [[spoiler: It's "honeypot", fitting given the server's purpose.]]

to:

* BonusBoss: One server, the CCC Hacksquad Filedump, traces any hacking attempts in mere seconds, making it even harder to hack than the final boss! There actually was a There's no way to get through it, into it until the postgame, and the intended method is pretty quirky- you need to [[spoiler: by means of repeatedly letting go to the passive credits server and download the Security Trace.exe program that the dev has put in the bin. Then, you need to run it while hacking each port, since only one trace trigger active traces while you open the ports one can be on your system at a time]]. This got removed in an update.time, and killing the process before time runs out]]. There is an actual password, though if you even attempt to hack it, the password cycles, rendering the contents effectively [[PermanentlyMissableContent Lost Forever]]. [[spoiler: It's "honeypot", fitting given the server's purpose.]] The reward for breaking in is [[spoiler: an exclusive honey-themed X-server.]]
Is there an issue? Send a MessageReason:
None


* WellIntentionedExtremist: In the DLC, [[spoiler: Kaguya]] ultimately uses this to defend their actions in the endgame. [[spoiler:It's a front, their actions are self-motivated and unquestionably unethical. See EvilPlan.]]

to:

* WellIntentionedExtremist: In the DLC, [[spoiler: Kaguya]] ultimately uses this to defend their actions in the endgame. [[spoiler:It's a front, their actions are self-motivated and unquestionably unethical. See EvilPlan.]]]]
----
Is there an issue? Send a MessageReason:
None

Added DiffLines:

* SuperPrototype: [[spoiler: PortHack. The reason why the player is so easily able to hack isn't because they're good, but because PortHack is an absurdly powerful tool. As a metaphor, most in-lore hacking devices can be considered akin to lockpicking tools, while PortHack is like a battering ram.]]
Is there an issue? Send a MessageReason:
None

Added DiffLines:

* ArtificialStupidity: When Naix attacks the player's in-game computer, he'll delete x-server.sys - but not anything else, including any theme files the player may have in their /sys directory at that point.


Added DiffLines:

* HoistByHisOwnPetard: When Kaguya [[spoiler:puts the plan to crash a plane into action, they drop links to two planes in the IRC chatroom. This enables the player to fix the crashing plane by uploading a new copy of the deleted .dll file and reloading the firmware.]]

Added: 1120

Changed: 1134

Is there an issue? Send a MessageReason:
None


* LastChanceHitPoint: Unlike VideoGame/{{Uplink}}, getting traced does not mean immediate Game Over. [[spoiler: It does, however, start a "Trace Aversion Sequence" that the player must complete by getting a new [=IP=] address before the trace truly completes.]] [[spoiler:The Hacknet [=OS=] does this by triggering a self-induced crash at the very moment when the ping from the hostile server arrives, giving it no return, so that the hostile server assumes the ping never arrived.]]

to:

* LastChanceHitPoint: Unlike VideoGame/{{Uplink}}, ''VideoGame/{{Uplink}}'', getting traced does not mean immediate Game Over. [[spoiler: It does, however, start a "Trace Aversion Sequence" that the player must complete by getting a new [=IP=] address before the trace truly completes.]] [[spoiler:The Hacknet [=OS=] does this by triggering a self-induced crash at the very moment when the ping from the hostile server arrives, giving it no return, so that the hostile server assumes the ping never arrived.]]



* MultipleEndings: At the end of ''Labyrinths'', you are given the SadisticChoice to either [[spoiler:upload a working firmware to a crashing plane and save everyone involved while letting potentially catastrophic chemical weapons data reach its target; do nothing and let everyone on the plane die, more or less ensuring the data is gone forever; or help crash a second plane with the backups too, eliminating the data forever.]] Since there's no real "good" choice, only the final dialogue changes - the endgame is the same in all cases.

to:

* MultipleEndings: MultipleEndings:
**
At the end of ''Labyrinths'', you are given the SadisticChoice to either [[spoiler:upload a working firmware to a crashing plane and save everyone involved while letting potentially catastrophic chemical weapons data reach its target; do nothing and let everyone on the plane die, more or less ensuring the data is gone forever; or help crash a second plane with the backups too, eliminating the data forever.]] Since there's no real "good" choice, only the final dialogue changes - the endgame is the same in all cases.



* NotWhatISignedOnFor: When Bit [[spoiler:hacked into Entech's mainframe one night and discovered their plan, he]] had a change of heart.

to:

* NotWhatISignedOnFor: NotWhatISignedOnFor:
**
When Bit [[spoiler:hacked into Entech's mainframe one night and discovered their plan, he]] had a change of heart.



* ThePasswordIsAlwaysSwordfish: All [=eOS=] devices use "alpine" as the admin password[[note]]This actually was the default iOS device password for several years running[[/note]]. Justified as the end users don't have access to the console of their devices and can't change the default password. [[spoiler:Averted in Labyrinths in one particular device, as it was jailbroken [[ProperlyParanoid and the default password changed]], making the player have to root around for the password via other methods.]]

to:

* ThePasswordIsAlwaysSwordfish: ThePasswordIsAlwaysSwordfish:
**
All [=eOS=] devices use "alpine" as the admin password[[note]]This actually was the default iOS device password for several years running[[/note]]. Justified as the end users don't have access to the console of their devices and can't change the default password. [[spoiler:Averted in Labyrinths ''Labyrinths'' in one particular device, as it was jailbroken [[ProperlyParanoid and the default password changed]], making the player have to root around for the password via other methods.]]



* ShownTheirWork: Even though the executables in the game itself are purely a case of HollywoodHacking, the descriptions for them, the various systems, and the internet are remarkably well written and based in real life. Also the command console actually uses real life Linux commands to navigate with and several of the missions in the game are based on real life events such as the giant Neopets data breach in May 2016.

to:

* ShownTheirWork: Even though the executables in the game itself are purely a case of HollywoodHacking, the descriptions for them, the various systems, and the internet are remarkably well written and based in real life. Also the command console actually uses real life Linux commands to navigate with and several of the missions in the game are based on real life events such as the giant Neopets ''Website/{{Neopets}}'' data breach in May 2016.



* SpiritualSuccessor: To VideoGame/{{Uplink}}.

to:

* SpiritualSuccessor: To VideoGame/{{Uplink}}.''VideoGame/{{Uplink}}''.

Added: 1162

Changed: 1637

Removed: 436

Is there an issue? Send a MessageReason:
None


* AlternateRealityGame: [[spoiler:It is one. The very last line in the game confirms you're using the very [[TitleDrop HackNet]] software mentioned in the story.]]

to:

* AlternateRealityGame: AlternateRealityGame:
**
[[spoiler:It is one. The very last line in the game confirms you're using the very [[TitleDrop HackNet]] software mentioned in the story.]]



* BonusBoss: One server, the CCC Hacksquad Filedump, traces any hacking attempts in mere seconds, making it even harder to hack than the final boss!
** There actually was a way to get through it, [[spoiler: by means of repeatedly letting the passive trace trigger active traces while you open the ports one at a time]]. This got removed in an update. There is an actual password, though if you even attempt to hack it, the password cycles, rendering the contents effectively [[PermanentlyMissableContent Lost Forever]]. [[spoiler: It's "honeypot", fitting given the server's purpose.]]

to:

* BonusBoss: One server, the CCC Hacksquad Filedump, traces any hacking attempts in mere seconds, making it even harder to hack than the final boss!
**
boss! There actually was a way to get through it, [[spoiler: by means of repeatedly letting the passive trace trigger active traces while you open the ports one at a time]]. This got removed in an update. There is an actual password, though if you even attempt to hack it, the password cycles, rendering the contents effectively [[PermanentlyMissableContent Lost Forever]]. [[spoiler: It's "honeypot", fitting given the server's purpose.]]



* BlandNameProduct: Macrosoft, [=eOS=], CFC... where to start? Although Windows and Linux are namedropped.

to:

* BlandNameProduct: BlandNameProduct:
**
Macrosoft, [=eOS=], CFC... where to start? Although Windows and Linux are namedropped.



* ButThouMust: The mission "Project Junebug" (see NightmareFuel on the YMMV subpage) must be followed until a certain point,[[spoiler: as it is the only legitimate way to get [=KBT_PortTester.exe=], which is necessary to open port 104.]]

to:

* ButThouMust: ButThouMust:
**
The mission "Project Junebug" (see NightmareFuel on the YMMV subpage) must be followed until a certain point,[[spoiler: as it is the only legitimate way to get [=KBT_PortTester.exe=], which is necessary to open port 104.]]



* DeadManWriting: Hacknet is one giant example from Bit, set to email 14 days after he goes dark (and is presumably dead). There's a bit of humor as Bit struggles with what tense he should be writing in. The program is set to guide you through the program and do a few introductory tasks and housekeeping for Bit before it sends you to Entropy to learn more and figure things out yourself. [[spoiler: At the end of the game, after [=EnTech's=] copies of Hacknet are deleted, you're sent one last message directing you to [=PortHack's=] "heart" in order to terminate it, which to one last message, this time a recording, thanking the player before your own copy of Hacknet gets deleted.]]

to:

* DeadManWriting: Hacknet ''Hacknet'' is one giant example from Bit, set to email 14 days after he goes dark (and is presumably dead). There's a bit of humor as Bit struggles with what tense he should be writing in. The program is set to guide you through the program and do a few introductory tasks and housekeeping for Bit before it sends you to Entropy to learn more and figure things out yourself. [[spoiler: At the end of the game, after [=EnTech's=] copies of Hacknet are deleted, you're sent one last message directing you to [=PortHack's=] "heart" in order to terminate it, which to one last message, this time a recording, thanking the player before your own copy of Hacknet gets deleted.]]



* DuelingHackers: During a certain mission, [[spoiler:Naix will trace you, delete a file on your in-game PC and then execute a forkbomb to force a reboot.]] Don't worry, you can certainly retaliate.

to:

* DuelingHackers: DuelingHackers:
**
During a certain mission, [[spoiler:Naix will trace you, delete a file on your in-game PC and then execute a forkbomb to force a reboot.]] Don't worry, you can certainly retaliate.



* EvilPlan: [[spoiler: The purpose of Hacknet is to kickstart a massive cybercrime spree by leaking it out to the public so that [=EnTech=] can sell their own Hacknet-proof software.]]

to:

* EvilPlan: EvilPlan:
**
[[spoiler: The purpose of Hacknet is to kickstart a massive cybercrime spree by leaking it out to the public so that [=EnTech=] can sell their own Hacknet-proof software.]]



* FeaturelessProtagonist: You.

to:

* FeaturelessProtagonist: You.You, since the game's interface is the software itself.



* FiveFiveFive: Averted. The servers use realistic, if randomized, IP adresses.

to:

* FiveFiveFive: Averted. Averted.
**
The servers use realistic, if randomized, IP adresses.



* GuideDangIt: The third faction [[spoiler:/el]] is this. [[spoiler: To get to them, the player needs to delete x-server.sys on Naix' root gateway and then following his missions. However, this [[PermanentlyMissableContent is not possible anymore]] if "Aggression must be punished" has been completed.]]

to:

* GuideDangIt: GuideDangIt:
**
The third faction [[spoiler:/el]] is this. [[spoiler: To get to them, the player needs to delete x-server.sys on Naix' root gateway and then following his missions. However, this [[PermanentlyMissableContent is not possible anymore]] if "Aggression must be punished" has been completed.]]
Is there an issue? Send a MessageReason:
None


** The services on the servers are also running on the correct ports ([=FTP=] on port 21, [=SSH=] on port 22, [=SMTP=] on port 25, [=HTTP=] on port 80, Medical Services on port 104 and [=SQL=] on port 1433.)

to:

** The services on the servers are also running on the correct ports ([=FTP=] on port 21, [=SSH=] on port 22, [=SMTP=] on port 25, [=HTTP=] on port 80, [=DICOM=] Medical Services on port 104 and [=SQL=] on port 1433.)
Is there an issue? Send a MessageReason:
None

Added DiffLines:

* CrazyPrepared: Coel in ''Labyrinths''. When Kaguya reveals their plan to [[spoiler:crash a plane]] and [=D3f4ult=] agrees with this plan, Coel [[spoiler:activates a .bat file that kicks and bans Kaguya and [=D3f4ult=] from the IRC server]].
Is there an issue? Send a MessageReason:
None

Added DiffLines:

* DiscOneNuke: Kaguya's missions can be taken on just before the player takes on Naix. In this case, [=SignalScramble.exe=] becomes this, as it allows the player to become immune to traces far earlier than the game expects. While it needs admin privileges to run and takes up a whopping 600 MB of your in-game RAM, it can be started while Porthack is running, slowing down traces even before it's completely loaded.
Is there an issue? Send a MessageReason:
Kaguya pronouns switched to "They" in compliance with deliberately ambigious gender confirmed by devs


** [[spoiler: Kaguya has one too, and hers include hundreds of fatalities. Step 1: Stage a very public computer attack using a group of hackers she assembled and trained. Crashing two passenger jets into the ocean would do nicely. Step 2: Introduce an untraceable back door into the security fix. Step 3: Have full access into all servers running the patched software.]]

to:

** [[spoiler: Kaguya has one too, and hers include theirs includes hundreds of fatalities. Step 1: Stage a very public computer attack using a group of hackers she they assembled and trained. Crashing two passenger jets into the ocean would do nicely. Step 2: Introduce an untraceable back door into the security fix. Step 3: Have full access into all servers running the patched software.]]



** Explore Kaguya's server after the above events - [[spoiler: She is lying through her teeth about everything. See EvilPlan.]]

to:

** Explore Kaguya's server after the above events - [[spoiler: She is They are lying through her their teeth about everything. See EvilPlan.]]
Is there an issue? Send a MessageReason:
None


* DeadlyEuphemism:[[spoiler: Entech's [=CEO=]]] wanted Bit "to be discouraged". [[spoiler:He meant "Smash up his computers and have him arrested". Unfortunately, the person who was given the task interpreted it as "Have Bit killed".]]

to:

* DeadlyEuphemism:[[spoiler: Entech's [=CEO=]]] wanted Bit "to to be discouraged"."discouraged". [[spoiler:He meant "Smash up his computers and have him arrested". Unfortunately, the person who was given the task interpreted it as "Have Bit killed".]]
Is there an issue? Send a MessageReason:
None

Added DiffLines:

* AccidentalMurder: [[spoiler:Bit. [=EnTech's=] CEO only wanted his goon to intimidate Bit into silence about Project Hacknet. Unfortunately, a miscommunication led the goon to believe he wanted Bit dead which he carried out before the CEO could stop him.]]
Is there an issue? Send a MessageReason:
minor grammar edit


* ChekhovsGun: [[spoiler: [=Sequencer.exe=], a program in the [=CSEC=] Asset Server that doesn't seem to have any use, is used at the end of the game signal Vapor to start the attack on [=EnTech's=] backup servers.]]

to:

* ChekhovsGun: [[spoiler: [=Sequencer.exe=], a program in the [=CSEC=] Asset Server that doesn't seem to have any use, is used at the end of the game to signal Vapor to start the attack on [=EnTech's=] backup servers.]]
Is there an issue? Send a MessageReason:
None

Added DiffLines:

** [[spoiler: At the end of ''Labrynths'' you can potentially fight Kaguya's endgame by preventing the plane crash.]]
Is there an issue? Send a MessageReason:
None


* ShownTheirWork: Even though the executables in the game itself are purely a case of HollywoodHacking, the descriptions for them, the various systems, and the internet are remarkably well written and based in real life. Also the command console actually uses real life Linux commands to navigate with.

to:

* ShownTheirWork: Even though the executables in the game itself are purely a case of HollywoodHacking, the descriptions for them, the various systems, and the internet are remarkably well written and based in real life. Also the command console actually uses real life Linux commands to navigate with.with and several of the missions in the game are based on real life events such as the giant Neopets data breach in May 2016.
Is there an issue? Send a MessageReason:
None


** And going through the game the normal way, you'll get dumped into what looks like a NonStandardGameOver with your system crippled. [[spoiler:You actually have all the tools you need to swipe a replacement file from the practice machine the tutorial pointed you at, but it requires using text commands that even the tutorial let you use a GUI for, and has to be done on the intimidatingly sparse terminal interface.]]

to:

** And going through the game the normal way, you'll get dumped into what looks like a NonStandardGameOver with your system crippled. [[spoiler:You actually have all the tools you need to swipe a replacement file from the practice practically any machine (including the tutorial pointed system Naix just hacked you at, from), but it requires using text commands that even the tutorial let you use a GUI for, and has to be done on the intimidatingly sparse terminal interface.]]
Is there an issue? Send a MessageReason:
None


* CorruptCorporateExecutive: The Entech CEO. [[spoiler:Even if Bit's death was a miscommunication, Project [=HackNet=] is a horrifying breach of antitrust laws.]]

to:

* CorruptCorporateExecutive: The Entech CEO. [[spoiler:Even if Bit's death was a miscommunication, Project [=HackNet=] is a horrifying breach of antitrust and cyber security laws.]]
Is there an issue? Send a MessageReason:
None


* ShownTheirWork: Even though the executables in the game itself are purely a case of HollywoodHacking, the descriptions for them are remarkably well written and based in sound practice. Also the command console actually uses real life Linux commands to navigate with.

to:

* ShownTheirWork: Even though the executables in the game itself are purely a case of HollywoodHacking, the descriptions for them them, the various systems, and the internet are remarkably well written and based in sound practice.real life. Also the command console actually uses real life Linux commands to navigate with.
Is there an issue? Send a MessageReason:
None


** [[spoiler: If you react quickly enough when they attack you, you can actively thwart both Naix and Striker's hacking by setting a trap on your own terminal and thereby shut theirs down when it executes.]]

to:

** [[spoiler: If you react quickly enough when they attack you, you can actively thwart both Naix and Striker's hacking by shell'ing and setting a trap on your own terminal and thereby shut theirs their terminals down when it executes.]]
Is there an issue? Send a MessageReason:
None

Added DiffLines:

* ShownTheirWork: Even though the executables in the game itself are purely a case of HollywoodHacking, the descriptions for them are remarkably well written and based in sound practice. Also the command console actually uses real life Linux commands to navigate with.
Is there an issue? Send a MessageReason:
None


** [[spoiler: If you react quickly enough (or are careful enough to avoid detection), you can actively thwart both Naix and Striker's hacking by setting a trap on your own terminal and thereby shutting theirs down.]]

to:

** [[spoiler: If you react quickly enough (or are careful enough to avoid detection), when they attack you, you can actively thwart both Naix and Striker's hacking by setting a trap on your own terminal and thereby shutting shut theirs down.down when it executes.]]
Is there an issue? Send a MessageReason:
None


** [[spoilers: If you react quickly enough (or are careful enough to avoid detection), you can actively thwart both Naix and Striker's hacking by setting a trap on your own terminal and thereby shutting theirs down.]]

to:

** [[spoilers: [[spoiler: If you react quickly enough (or are careful enough to avoid detection), you can actively thwart both Naix and Striker's hacking by setting a trap on your own terminal and thereby shutting theirs down.]]
Is there an issue? Send a MessageReason:
None

Added DiffLines:

** [[spoilers: If you react quickly enough (or are careful enough to avoid detection), you can actively thwart both Naix and Striker's hacking by setting a trap on your own terminal and thereby shutting theirs down.]]

Top