Differences
This shows you the differences between two versions of the page.
Both sides previous revision Previous revision | |||
en:guide:exploration [2022/09/13 20:48] – Ledeanio | en:guide:exploration [2022/09/13 21:09] (current) – Ledeanio | ||
---|---|---|---|
Line 9: | Line 9: | ||
* Scanning for Signatures | * Scanning for Signatures | ||
- | * Types of Relic Sites | + | * Pirate |
- | + | ||
- | * Types of Data Sites | + | |
===== Coalition Rules for Exploration ===== | ===== Coalition Rules for Exploration ===== | ||
Line 23: | Line 21: | ||
Lorem Ipsum Dolor Sit Amet etc | Lorem Ipsum Dolor Sit Amet etc | ||
- | ===== Types of Relic Sites ===== | + | ===== Pirate |
- | Lorem Ipsum Dolor Sit Amet etc | + | Pirate relic and data sites can be found in all Known Space, in C1, C2 and C3 class Wormhole Space, as well as in shattered wormhole systems. There are pockets of space populated with a variety of cosmic structures (i.e., wrecked stations, abandoned machines) and several containers that need to be hacked before the contents can be accessed. The sites do not have any triggers or NPC defenders. Pirate relic sites contain T1 and T2 salvage materials, skill books and blueprint copies. Pirate data sites contain decryptors, data cores, skill books, blueprint copies and manufacturing materials. The contents may vary by faction. |
- | ===== Types of Data Sites ===== | + | Data and relic sites use the following naming convention according to their location. |
+ | {| class=" | ||
+ | |- | ||
+ | ! Data site name !! Relic site name !! Location | ||
+ | |- | ||
+ | | Local || Crumbling || High-security systems | ||
+ | |- | ||
+ | | Regional || Decayed || Low-security systems | ||
+ | |- | ||
+ | | Central || Ruined || Null-security and wormhole systems | ||
+ | |} | ||
+ | |||
+ | Data site containers have a physical appearance that resembles a gyroscope while relic site containers resemble ancient shipwrecks. | ||
+ | {| class=" | ||
+ | |- | ||
+ | ! Data site containers !! Relic site containers !! Difficulty | ||
+ | |- | ||
+ | | Info Shard || Debris || Very easy | ||
+ | |- | ||
+ | | Com Tower || Rubble || Easy | ||
+ | |- | ||
+ | | Mainframe || Remains || Medium | ||
+ | |- | ||
+ | | Databank || Ruins || Hard | ||
+ | |} | ||
+ | |||
+ | The Faction in the above site and container names will be the local pirate group for each region. | ||
+ | |||
+ | You'll have to hack into the containers first by playing the hacking minigame. In order to attempt a hack, you’ll need to lock on to the container and activate the corresponding hacking module. The module (Relic Analyzer in a Relic Site, Data Analyzer in a Data Site, or Integrated Aanalyzer for both) only works if the distance between the container and your ship is less or equal to the module' | ||
- | Lorem Ipsum Dolor Sit Amet etc |