Guide to Nanites: Difference between revisions
m (Grammar) |
|||
(6 intermediate revisions by 4 users not shown) | |||
Line 6: | Line 6: | ||
Nanites are tiny nanomachines that live in a host's bloodstream, providing different functionalities depending on how they're programmed. The mob where the nanites reside is usually defined as their host.. | Nanites are tiny nanomachines that live in a host's bloodstream, providing different functionalities depending on how they're programmed. The mob where the nanites reside is usually defined as their host... | ||
=Nanites= | =Nanites= | ||
DERMAL HARDENING, SON! THEY HARDEN IN RESPONSE TO PHYSCIAL TRAUMA! | |||
==Implanting== | ==Implanting== | ||
[[File:Nanite_chamber.gif|thumb|Nanite Chamber]] | [[File:Nanite_chamber.gif|thumb|Nanite Chamber]] | ||
Line 24: | Line 24: | ||
Nanite swarms can be set with a Cloud ID. If so, they will, every 30 seconds, copy the programming of the Cloud Backup with the same ID, if it has been set. | Nanite swarms can be set with a Cloud ID. If so, they will, every 30 seconds, copy the programming of the Cloud Backup with the same ID, if it has been set. | ||
Cloud backups are controlled by Cloud Control Consoles. They can create new backups (with codes from 1 to 100), as well as upload programs from a disk into the selected backup. | Cloud backups are controlled by Cloud Control Consoles. They can create new backups (with codes from 1 to 100), as well as upload programs from a disk into the selected backup. | ||
Cloud control consoles also serve as storage, meaning that if they're disabled they will no longer sync with connected nanites, and that if all cloud consoles are destroyed, all backups will be lost. | Cloud control consoles also serve as storage, meaning that if they're disabled, they will no longer sync with connected nanites, and that if all cloud consoles are destroyed, all backups will be lost. | ||
Cloud synchronization has several benefits over direct chamber programming: it can update programs without a second person to operate the chamber, it will reset programming in case of tampering or data corruption | Cloud synchronization has several benefits over direct chamber programming: it can update programs without a second person to operate the chamber, it will reset programming in case of tampering or data corruption and can be updated remotely by a second person. Of course, the last part also makes it very risky, since anyone could upload malicious programs at any time if they have a console to do it with. | ||
=Nanite Programs = | =Nanite Programs = | ||
Nanite programs determine what nanites do inside the host. They have different categories | Nanite programs determine what nanites do inside the host. They have different categories and range from helpful to deadly. | ||
==Obtaining programs== | ==Obtaining programs== | ||
Programs are unlocked through techweb research. Once unlocked, they can be downloaded into Nanite Program Disks at any Nanite Program Hub. | Programs are unlocked through techweb research. Once unlocked, they can be downloaded into Nanite Program Disks at any Nanite Program Hub. | ||
Line 69: | Line 69: | ||
Nanites are split in several categories. | Nanites are split in several categories. | ||
===Utility Programs=== | ===Utility Programs=== | ||
Programs that interact with the nanites themselves | Programs that interact with the nanites themselves or have general utility purposes. | ||
{| class="wikitable sortable" border="1" width="100%;" style="text-align: center;" || | {| class="wikitable sortable" border="1" width="100%;" style="text-align: center;" || | ||
|- | |- | ||
Line 87: | Line 87: | ||
|Smart | |Smart | ||
|Toxin Buildup | |Toxin Buildup | ||
|- | |||
!Distributed Computing | |||
|The nanites aid the research servers by performing a portion of its calculations, increasing research point generation. | |||
|0.1 | |||
| -- | |||
| -- | |||
|Smart | |||
|Toxin Buildup | |||
|- | |||
!Neural Network | |||
|The nanites link the host's brains together forming a neural research network, that becomes more efficient with the amount of total hosts. | |||
|0.2 | |||
| -- | |||
| -- | |||
|Harmonic | |||
|Neuro-Necrosis | |||
|- | |- | ||
!Viral Replica | !Viral Replica | ||
Line 190: | Line 206: | ||
|- | |- | ||
!Nerve Support | !Nerve Support | ||
| The nanites act as a secondary nervous system, reducing the amount of time the host is stunned | |The nanites act as a secondary nervous system, reducing stamina damage and the amount of time the host is stunned to 75%. | ||
| | |7 | ||
| -- | | -- | ||
| -- | | -- | ||
Line 215: | Line 231: | ||
!Rapid Coagulation | !Rapid Coagulation | ||
|The nanites induce rapid coagulation when the host is wounded, dramatically reducing bleeding rate. | |The nanites induce rapid coagulation when the host is wounded, dramatically reducing bleeding rate. | ||
|0. | |0.2 | ||
| -- | | -- | ||
| -- | | -- | ||
Line 237: | Line 253: | ||
|Neuro-Necrosis, Brain Misfire | |Neuro-Necrosis, Brain Misfire | ||
|} | |} | ||
===Healing Programs=== | ===Healing Programs=== | ||
Healing programs fix a variety of damage and ailments that affect the host. They generally consume a lot of nanites, so it's advisable to activate them manually when necessary. | Healing programs fix a variety of damage and ailments that affect the host. They generally consume a lot of nanites, so it's advisable to activate them manually when necessary. | ||
Line 251: | Line 268: | ||
!Accelerated Regeneration | !Accelerated Regeneration | ||
|The nanites boost the host's natural regeneration, increasing their healing speed. <i>Does not consume nanites while the host is undamaged.</i> | |The nanites boost the host's natural regeneration, increasing their healing speed. <i>Does not consume nanites while the host is undamaged.</i> | ||
| | |1.5 | ||
| -- | | -- | ||
| -- | | -- | ||
Line 259: | Line 276: | ||
!Temperature Adjustment | !Temperature Adjustment | ||
|The nanites adjust the host's internal temperature to an ideal level. Does not consume nanites while the host is at an ideal temperature. | |The nanites adjust the host's internal temperature to an ideal level. Does not consume nanites while the host is at an ideal temperature. | ||
| | |2.5 | ||
| -- | | -- | ||
| -- | | -- | ||
Line 291: | Line 308: | ||
! Mechanical Repair | ! Mechanical Repair | ||
|The nanites fix damage in the host's mechanical limbs. Does not consume nanites if the limbs are undamaged. | |The nanites fix damage in the host's mechanical limbs. Does not consume nanites if the limbs are undamaged. | ||
| | |1 | ||
| | | -- | ||
| -- | | -- | ||
| Basic | |Basic | ||
|Necrosis | |Necrosis | ||
|- | |- | ||
!Selective Blood Purification | !Selective Blood Purification | ||
|The nanites purge toxins and dangerous chemicals from the host's bloodstream, while ignoring beneficial chemicals. The added processing power required to analyze the chemicals severely increases the nanite consumption rate. | |The nanites purge toxins and dangerous chemicals from the host's bloodstream, while ignoring beneficial chemicals. The added processing power required to analyze the chemicals severely increases the nanite consumption rate. Does not consume nanites if the host has no toxins damage. | ||
|2 | |2 | ||
| -- | | -- | ||
| -- | | -- | ||
|Harmonic | |Harmonic | ||
| Hypoxemia, Necrosis | |Hypoxemia, Necrosis | ||
|- | |- | ||
!Bio-Reconstruction | !Bio-Reconstruction | ||
| The nanites manually repair and replace organic cells, acting much faster than normal regeneration. However, this program cannot detect the difference between harmed and unharmed, causing it to consume nanites even if it has no effect. | |The nanites manually repair and replace organic cells, acting much faster than normal regeneration. However, this program cannot detect the difference between harmed and unharmed, causing it to consume nanites even if it has no effect. | ||
| | |7 | ||
| -- | | -- | ||
| -- | | -- | ||
| Harmonic | |Harmonic | ||
| Hypoxemia, Necrosis | |Hypoxemia, Necrosis | ||
|- | |- | ||
!Neural Reimaging | !Neural Reimaging | ||
|The nanites are able to backup and restore the host's neural connections, potentially replacing entire chunks of missing or damaged brain matter. | |The nanites are able to backup and restore the host's neural connections, potentially replacing entire chunks of missing or damaged brain matter. Does not consume nanites if the host has no brain damage. | ||
|3 | |3 | ||
| -- | | -- | ||
| -- | | -- | ||
|Harmonic | |Harmonic | ||
| Neuro-Necrosis, Brain Misfire | |Neuro-Necrosis, Brain Misfire | ||
|- | |- | ||
!Defibrillation | !Defibrillation | ||
Line 326: | Line 343: | ||
|25 | |25 | ||
|12s | |12s | ||
| Harmonic | |Harmonic | ||
|Shocking | |Shocking | ||
|- | |- | ||
|} | |} | ||
=== Glitch Programs=== | ===Glitch Programs=== | ||
Defective programs caused by data corruption, and not otherwise obtainable. Generally range from mildly to moderately dangerous. Can stack. | Defective programs caused by data corruption, and not otherwise obtainable. Generally, range from mildly to moderately dangerous. Can stack. | ||
{| class="wikitable sortable" border="1" width="100%;" style="text-align: center;" || | {| class="wikitable sortable" border="1" width="100%;" style="text-align: center;" || | ||
|- | |- | ||
! scope="col" width="10%" |Program | ! scope="col" width="10%" |Program | ||
! scope="col" class="unsortable" | Effect | ! scope="col" class="unsortable" |Effect | ||
! scope="col" width="5%" |Volume per second | ! scope="col" width="5%" |Volume per second | ||
! scope="col" width="5%" | Trigger Cost | ! scope="col" width="5%" |Trigger Cost | ||
! scope="col" width="5%" |Trigger Cooldown | ! scope="col" width="5%" |Trigger Cooldown | ||
! scope="col" width="7%" |Required Techweb | ! scope="col" width="7%" |Required Techweb | ||
Line 362: | Line 379: | ||
|0.25 | |0.25 | ||
| -- | | -- | ||
| | | -- | ||
| -- | | -- | ||
|Glitch | |Glitch | ||
|- | |- | ||
! Hypoxemia | !Hypoxemia | ||
| The nanites prevent the host's blood from absorbing oxygen efficiently. | |The nanites prevent the host's blood from absorbing oxygen efficiently. | ||
|0.75 | |0.75 | ||
| -- | | -- | ||
Line 376: | Line 393: | ||
!Neuro-Necrosis | !Neuro-Necrosis | ||
|The nanites seek and attack brain cells, causing extensive neural damage to the host. | |The nanites seek and attack brain cells, causing extensive neural damage to the host. | ||
| 0.75 | |0.75 | ||
| -- | | -- | ||
| -- | | -- | ||
Line 382: | Line 399: | ||
|Necrosis | |Necrosis | ||
|- | |- | ||
! Brain Misfire | !Brain Misfire | ||
|The nanites interfere with neural pathways, causing minor psychological disturbances. | |The nanites interfere with neural pathways, causing minor psychological disturbances. | ||
|0.5 | |0.5 | ||
Line 396: | Line 413: | ||
| -- | | -- | ||
| -- | | -- | ||
| Necrosis | |Necrosis | ||
|- | |- | ||
!Nerve Decay | !Nerve Decay | ||
Line 404: | Line 421: | ||
| -- | | -- | ||
| -- | | -- | ||
| Necrosis | |Necrosis | ||
|} | |} | ||
===Weaponized Programs=== | ===Weaponized Programs=== | ||
Line 413: | Line 430: | ||
! scope="col" class="unsortable" |Effect | ! scope="col" class="unsortable" |Effect | ||
! scope="col" width="5%" |Volume per second | ! scope="col" width="5%" |Volume per second | ||
! scope="col" width="5%" |Trigger Cost | ! scope="col" width="5%" |Trigger Cost | ||
! scope="col" width="5%" |Trigger Cooldown | ! scope="col" width="5%" |Trigger Cooldown | ||
! scope="col" width="7%" |Required Techweb | ! scope="col" width="7%" |Required Techweb | ||
! scope="col" class="unsortable" width="8%" |Corruptions | ! scope="col" class="unsortable" width="8%" |Corruptions | ||
|- | |- | ||
! Cellular Breakdown | !Cellular Breakdown | ||
|The nanites destroy cellular structures in the host's body, causing brute damage. | |The nanites destroy cellular structures in the host's body, causing brute damage. | ||
|1.5 | |1.5 | ||
| -- | | -- | ||
| | | -- | ||
|Biological | |Biological | ||
|Necrosis | |Necrosis | ||
Line 432: | Line 449: | ||
| -- | | -- | ||
|Biological | |Biological | ||
| Toxin Buildup | |Toxin Buildup | ||
|- | |- | ||
!Memory Leak | !Memory Leak | ||
|This program invades the memory space used by other programs, causing frequent corruptions and errors. | |This program invades the memory space used by other programs, causing frequent corruptions and errors. | ||
| 0 | |0 | ||
| -- | | -- | ||
| -- | | -- | ||
Line 443: | Line 460: | ||
|- | |- | ||
!Aggressive Replication | !Aggressive Replication | ||
| Nanites will consume organic matter to improve their replication rate, damaging the host. | |Nanites will consume organic matter to improve their replication rate, damaging the host. | ||
| -1 | | -1 | ||
| -- | | -- | ||
Line 451: | Line 468: | ||
|- | |- | ||
!Meltdown | !Meltdown | ||
| Causes an internal meltdown inside the nanites, causing internal burns inside the host as well as rapidly destroying the nanite population. Sets the nanites' safety threshold to 0 when activated. | |Causes an internal meltdown inside the nanites, causing internal burns inside the host as well as rapidly destroying the nanite population. Sets the nanites' safety threshold to 0 when activated. | ||
|10 | |10 | ||
| -- | | -- | ||
Line 460: | Line 477: | ||
!Chain Detonation | !Chain Detonation | ||
|Detonates all the nanites inside the host in a chain reaction when triggered. | |Detonates all the nanites inside the host in a chain reaction when triggered. | ||
| 0 | |0 | ||
|25 | | 25 | ||
|10s | |10s | ||
|Military | |Military | ||
Line 468: | Line 485: | ||
!Heart-Stopper | !Heart-Stopper | ||
|Stops the host's heart when triggered; restarts it if triggered again. | |Stops the host's heart when triggered; restarts it if triggered again. | ||
| 0 | |0 | ||
|12 | | 12 | ||
|1s | |1s | ||
| Military | |Military | ||
|Nerve Decay | |Nerve Decay | ||
|- | |- | ||
!Cryogenic Treatment | !Cryogenic Treatment | ||
| The nanites rapidly sink heat through the host's skin, lowering their temperature. | |The nanites rapidly sink heat through the host's skin, lowering their temperature. | ||
| 1 | |1 | ||
| -- | | -- | ||
| -- | | -- | ||
Line 483: | Line 500: | ||
|- | |- | ||
!Sub-Dermal Combustion | !Sub-Dermal Combustion | ||
| The nanites cause buildup of flammable fluids under the host's skin, then ignites them | |The nanites cause buildup of flammable fluids under the host's skin, then ignites them. | ||
|3 | |3 | ||
| -- | | -- | ||
| -- | | -- | ||
| | |Military | ||
| | |Dermalysis, Cryogenic Treatment | ||
|- | |- | ||
|} | |} | ||
=== Suppression Programs=== | ===Suppression Programs=== | ||
Programs with the goal of acting as a deterrent against the host. Generally nonlethal. | Programs with the goal of acting as a deterrent against the host. Generally nonlethal. | ||
{| class="wikitable sortable" border="1" width="100%;" style="text-align: center;" || | {| class="wikitable sortable" border="1" width="100%;" style="text-align: center;" || | ||
Line 506: | Line 515: | ||
! scope="col" class="unsortable" |Effect | ! scope="col" class="unsortable" |Effect | ||
! scope="col" width="5%" |Volume per second | ! scope="col" width="5%" |Volume per second | ||
! scope="col" width="5%" | Trigger Cost | ! scope="col" width="5%" |Trigger Cost | ||
! scope="col" width="5%" |Trigger Cooldown | ! scope="col" width="5%" |Trigger Cooldown | ||
! scope="col" width="7%" |Required Techweb | ! scope="col" width="7%" |Required Techweb | ||
Line 512: | Line 521: | ||
|- | |- | ||
!Electric Shock | !Electric Shock | ||
| The nanites shock the host when triggered. Destroys a large amount of nanites! | |The nanites shock the host when triggered. Destroys a large amount of nanites! | ||
| -- | | -- | ||
|10 | |10 | ||
Line 519: | Line 528: | ||
|Toxin Buildup | |Toxin Buildup | ||
|- | |- | ||
! Neural Shock | !Neural Shock | ||
|The nanites pulse the host's nerves when triggered, inapacitating them for a short period. | |The nanites pulse the host's nerves when triggered, inapacitating them for a short period. | ||
| | | -- | ||
|4 | |4 | ||
|30s | |30s | ||
Line 534: | Line 543: | ||
|Synaptic | |Synaptic | ||
|Neuro-Necrosis, Brain Misfire | |Neuro-Necrosis, Brain Misfire | ||
|- | |- | ||
!Pacification | !Pacification | ||
Line 556: | Line 549: | ||
| -- | | -- | ||
| -- | | -- | ||
| Synaptic | |Synaptic | ||
|Neuro-Necrosis, Brain Misfire | |Neuro-Necrosis, Brain Misfire | ||
|- | |- | ||
Line 565: | Line 558: | ||
| -- | | -- | ||
|Synaptic | |Synaptic | ||
| Nerve Decay | |Nerve Decay | ||
|- | |- | ||
!Mute | !Mute | ||
Line 571: | Line 564: | ||
|0.75 | |0.75 | ||
| -- | | -- | ||
| | | -- | ||
|Synaptic | |Synaptic | ||
|Neuro-Necrosis, Brain Misfire | |Neuro-Necrosis, Brain Misfire | ||
Line 579: | Line 572: | ||
| -- | | -- | ||
|3 | |3 | ||
| 2s | |2s | ||
|Synaptic | |Synaptic | ||
|Neuro-Necrosis, Brain Misfire | |Neuro-Necrosis, Brain Misfire | ||
|- | |- | ||
!Skull Echo | !Skull Echo | ||
| The nanites echo a synthesized message inside the host's skull. | |The nanites echo a synthesized message inside the host's skull. | ||
| -- | | -- | ||
|1 | |1 | ||
Line 600: | Line 593: | ||
|- | |- | ||
|} | |} | ||
===Sensor Programs === | ===Sensor Programs=== | ||
Programs that will self-pulse a given code when their condition is met. | Programs that will self-pulse a given code when their condition is met. | ||
{| class="wikitable sortable" border="1" width="100%;" style="text-align: center;" || | {| class="wikitable sortable" border="1" width="100%;" style="text-align: center;" || | ||
Line 607: | Line 600: | ||
! scope="col" class="unsortable" |Effect | ! scope="col" class="unsortable" |Effect | ||
! scope="col" width="5%" |Volume per second | ! scope="col" width="5%" |Volume per second | ||
! scope="col" width="5%" |Trigger Cost | ! scope="col" width="5%" |Trigger Cost | ||
! scope="col" width="5%" | Trigger Cooldown | ! scope="col" width="5%" |Trigger Cooldown | ||
! scope="col" width="7%" |Required Techweb | ! scope="col" width="7%" |Required Techweb | ||
! scope="col" class="unsortable" width="8%" |Corruptions | ! scope="col" class="unsortable" width="8%" |Corruptions | ||
Line 617: | Line 610: | ||
| -- | | -- | ||
| -- | | -- | ||
| Biological | |Biological | ||
| Glitch | |Glitch | ||
|- | |- | ||
! Critical Health Sensor | !Critical Health Sensor | ||
|The nanites receive a signal when the host first reaches critical health. | |The nanites receive a signal when the host first reaches critical health. | ||
|0 | |0 | ||
| -- | | -- | ||
| -- | | -- | ||
| Biological | |Biological | ||
|Glitch | |Glitch | ||
|- | |- | ||
!Death Sensor | !Death Sensor | ||
| The nanites receive a signal when they detect the host is dead. | |The nanites receive a signal when they detect the host is dead. | ||
|0 | |0 | ||
| -- | | -- | ||
Line 637: | Line 630: | ||
|- | |- | ||
!Nanite Volume Sensor | !Nanite Volume Sensor | ||
|The nanites receive a signal when the nanite supply is above/below a certain percentage, with the safety threshold being 0%. If safety threshold is higher, it will skew the percentage. For example, with threshold 50, 100 volume will count as 50 available volume, which means 10% instead of 20%, and the full 500 volume will count as 90%. | |The nanites receive a signal when the nanite supply is above/below a certain percentage, with the safety threshold being 0%. If safety threshold is higher, it will skew the percentage. For example, with threshold 50, 100 volume will count as 50 available volume, which means 10% instead of 20%, and the full 500 volume will count as 90%. | ||
|0 | |0 | ||
| -- | | -- | ||
| -- | | -- | ||
| Basic | |Basic | ||
|Glitch | |Glitch | ||
|- | |- | ||
!Damage Sensor | !Damage Sensor | ||
| The nanites receive a signal when a host's specific damage type is above/below a target value. | |The nanites receive a signal when a host's specific damage type is above/below a target value. | ||
|0 | |0 | ||
| -- | | -- | ||
Line 654: | Line 647: | ||
!Voice Sensor | !Voice Sensor | ||
|Sends a signal when the nanites hear a determined word or sentence. | |Sends a signal when the nanites hear a determined word or sentence. | ||
| 0 | |0 | ||
| -- | | -- | ||
| -- | | -- | ||
Line 668: | Line 661: | ||
*Sensor Programs are the key towards making programs work when you want them to or when it would only make sense. Don't let programs run all the time because it can drain volume drastically. | *Sensor Programs are the key towards making programs work when you want them to or when it would only make sense. Don't let programs run all the time because it can drain volume drastically. | ||
*The cloud allows you to have more deviation in your nanites. On cloud 1 you could have something for the public. On cloud 2 you could have nanites dedicated to security. | *The cloud allows you to have more deviation in your nanites. On cloud 1 you could have something for the public. On cloud 2 you could have nanites dedicated to security. | ||
* It's a good idea to keep tight wraps on who messes with the cloud. Make sure to shutdown <s>Mcgreytiderthe3rd</s> Unauthorized Crew from approaching it at all cost. If they were to upload something malicious it could mean a shuttle call. | *It's a good idea to keep tight wraps on who messes with the cloud. Make sure to shutdown <s>Mcgreytiderthe3rd</s> Unauthorized Crew from approaching it at all cost. If they were to upload something malicious it could mean a shuttle call. | ||
*Unless you are an antagonist with hijack, or your captain has his eyes towards a special way to use the weaponized programs, it's best you stay far clear of them. These programs can cause harm and death to a lot of people at once. | *Unless you are an antagonist with hijack, or your captain has his eyes towards a special way to use the weaponized programs, it's best you stay far clear of them. These programs can cause harm and death to a lot of people at once. | ||
*The Nanite remote controller can be used to activate said nanites depending on the code. It can activate one person, a group or only local and relay. Also handy in testing out your nanites to activate them and make sure they work. | *The Nanite remote controller can be used to activate said nanites depending on the code. It can activate one person, a group or only local and relay. Also handy in testing out your nanites to activate them and make sure they work. | ||
*Suppression Programs are very useful to give to the public and give security a nanite remote controller. This can allow security to stop criminals without even laying a hand on them. If the criminal has the nanites that is. | *Suppression Programs are very useful to give to the public and give security a nanite remote controller. This can allow security to stop criminals without even laying a hand on them. If the criminal has the nanites that is. | ||
*Your nanite scanner is your best friend. It can help you see who has nanites, what the nanites do and how much volume said person has. This is key in rooting out glitches or subverted nanites. Also useful for checking if nanites are activate or not. | *Your nanite scanner is your best friend. It can help you see who has nanites, what the nanites do and how much volume said person has. This is key in rooting out glitches or subverted nanites. Also useful for checking if nanites are activate or not. | ||
*The nanite heart will increase replication by 1. Viruses with nano-symbiosis will increase replication by 0.5 at stage speeds 1-6, and by 1 at stage speeds 7 and above. | |||
* | * |
Latest revision as of 09:23, 25 July 2024
Reynard Parker, the Roboticist says: "Move over Geneticist, there's a better way of making super humans these days. What is this method, you may ask? Nanite Machines son. It's not without it's risks to the user, but it's not like anybody is going to detonate anybody from the inside out with these things, right...?" |
Nanites are tiny nanomachines that live in a host's bloodstream, providing different functionalities depending on how they're programmed. The mob where the nanites reside is usually defined as their host...
Nanites
DERMAL HARDENING, SON! THEY HARDEN IN RESPONSE TO PHYSCIAL TRAUMA!
Implanting
Nanite implantation can be done through the Nanite Chamber. A second person must operate the chamber from outside and begin the implanting process, at the end of which a new swarm will take root in the host.
Another method is to build a Public Nanite Chamber. Use a multitool on the Public Nanite Chamber circuit board first to choose which backup cloud you want it synched to. If you don't multitool the board it will default to cloud 1. Build the chamber using a machine frame. The public nanite chamber will automatically implant nanites into anyone who enters it, without the need for a second person.
Volume
Nanites generally expend a part of their volume while their programs are active. Luckily, modern technology allows them to integrate with the host's metabolism to replicate without interfering with biological processes, causing them to have a slow but steady growth rate. Nanites by default have a safety threshold where they'll stop using nanite-consuming programs; it can be customized using a Nanite Chamber. If the swarm reaches a population of 0, there's none left to replicate, and the host will have to implant nanites and programming from scratch.
Programming
Nanite swarms can contain nanite programs. These programs can have a huge variety of effects, and are loaded into a nanite swarm in two main ways: uploading them manually with a Nanite Chamber or by syncing them with a Cloud Backup. Once loaded programs cannot be directly modified; instead, a copy of the same program with the desired programming must be uploaded again to overwrite the previous one. There is no limit to the amount of loaded programs, but using too many at once will usually rapidly deplete the nanite population.
Cloud
Nanite swarms can be set with a Cloud ID. If so, they will, every 30 seconds, copy the programming of the Cloud Backup with the same ID, if it has been set. Cloud backups are controlled by Cloud Control Consoles. They can create new backups (with codes from 1 to 100), as well as upload programs from a disk into the selected backup. Cloud control consoles also serve as storage, meaning that if they're disabled, they will no longer sync with connected nanites, and that if all cloud consoles are destroyed, all backups will be lost.
Cloud synchronization has several benefits over direct chamber programming: it can update programs without a second person to operate the chamber, it will reset programming in case of tampering or data corruption and can be updated remotely by a second person. Of course, the last part also makes it very risky, since anyone could upload malicious programs at any time if they have a console to do it with.
Nanite Programs
Nanite programs determine what nanites do inside the host. They have different categories and range from helpful to deadly.
Obtaining programs
Programs are unlocked through techweb research. Once unlocked, they can be downloaded into Nanite Program Disks at any Nanite Program Hub.
Customizing Programs
Programs have sevral parameters that can be customized with the use of a Nanite Programmer. Simply insert a program disk in the machine and set the parameters you prefer. Note that codes set to 0 are inactive and cannot be signaled.
- Activated: Determines if the program starts activated or not.
- Activation Delay: Determines, in seconds, how long until the program self-activates.
- Timer: Determines the length of the timer. Disables the timer if set to 0.
- Timer Type: Determines what happens when the timer counts down. Has four settings:
- Deactivate: Deactivates the program.
- Self-Delete: Deletes the program.
- Trigger: Triggers the program, if possible.
- Reset Activation Timer: If there is an activation timer, it's reset to 0, deactivating the program until it counts down again.
- Activation Code: The code that must be signaled to activate the program.
- Deactivation Code: The code that must be signaled to deactivate the program.
- Trigger Code: If the program can be triggered, the code that must be signaled to trigger the program.
- Kill Code: The code that must be signaled to delete the program.
Some programs have an extra setting available for customization, like relay channels or signal codes.
Signaling Programs
Nanite Remotes can send coded signals to nanites. When a nanite swarm receives a signal, all its programs react if they recognize the code.
Nanite Remotes can be set to four modes:
- Self targets the person who is holding the remote.
- Targeted targets only the mob that is being clicked on.
- Area targets all mobs in sight.
- Relay allows the user to choose a relay channel; the signal is then sent globally to all hosts which have a relay program set to that channel.
Triggered Programs
Some programs do not have an effect over time, and instead must be triggered. To do so they can either receive a Trigger Code or set a Trigger Timer. Triggering a program generally has a cooldown as well as a cost in volume; if those requirements are not met the program won't trigger. If the program is not activated, it will also be unable to trigger, but activating the program is not the same as triggering it.
Data Corruption
Events like EMPs or shocks might result in data corruption in nanite programs, which can result in one of several different effects: - Toggles the program, deactivating it if active and viceversa. - Triggers the program, if it can be triggered - Deletes the program completely - Resets all the codes, preventing it from being signaled by remotes or signal programs. - Converts the program into a corrupted version. The glitch program depends on the program that got corrupted.
Nanite Types
Nanites are split in several categories.
Utility Programs
Programs that interact with the nanites themselves or have general utility purposes.
Program | Effect | Volume per second | Trigger Cost | Trigger Cooldown | Required Techweb | Corruptions |
---|---|---|---|---|---|---|
Metabolic Synthesis | The nanites use the metabolic cycle of the host to speed up their replication rate, using their extra nutrition as fuel. The host must be at least well fed. | +0.5 | -- | -- | Smart | Toxin Buildup |
Distributed Computing | The nanites aid the research servers by performing a portion of its calculations, increasing research point generation. | 0.1 | -- | -- | Smart | Toxin Buildup |
Neural Network | The nanites link the host's brains together forming a neural research network, that becomes more efficient with the amount of total hosts. | 0.2 | -- | -- | Harmonic | Neuro-Necrosis |
Viral Replica | The nanites constantly send encrypted signals attempting to forcefully copy their own programming into other nanite clusters. | 0.5 | -- | -- | Military | Toxin Buildup |
Monitoring | The nanites monitor the host's vitals and location, sending them to the suit sensor network. | 0 | -- | -- | Basic | Toxin Buildup |
Host Scan | The nanites display a detailed readout of a body scan to the host. Can pick between medical, chemical, or nanite scan. | -- | 3 | 5s | Neural | Toxin Buildup |
Stealth | The nanites hide their activity and programming from superficial scans. | 0.2 | -- | -- | Smart | Toxin Buildup |
Subdermal ID | The nanites store the host's ID access rights in a subdermal magnetic strip. Updates when triggered, copying the host's current access. | -- | 0 | 5s | Basic | Dermalysis |
Relay | The nanites receive and relay long-range nanite signals. Must be set with a relay channel beforehand. | -- | -- | -- | Basic | Toxin Buildup |
Signal Repeater | When triggered, sends another signal to the host, optionally with a delay. Useful to set up multiple codes for the same program. | -- | -- | -- | Basic | Toxin Buildup |
Relay Signal Repeater | When triggered, sends a signal via relay, optionally with a delay. | -- | -- | -- | Basic | Toxin Buildup |
Infective Exo-Locomotion | The nanites gain the ability to survive for brief periods outside of the human body, as well as the ability to start new colonies without an integration process; resulting in an extremely infective strain of nanites. | 5.5 | -- | -- | Hazard | Hypoxemia, Necrosis |
Mitosis | The nanites gain the ability to self-replicate, using bluespace to power the process, instead of using the host's metabolism. This rapidly speeds up the replication rate, but it causes occasional software errors due to faulty copies. Will not activate if the nanites are synced to a cloud backup. | +0.5 to +5 | -- | -- | Hazard | Toxic |
Electromagnetic Resonance | The nanites cause an elctromagnetic pulse around the host when triggered. Will corrupt other nanite programs! | 0 | 10 | 5s | Mesh | Toxin Buildup |
Augmentation Programs
Augmentation programs offer boosts and bonuses to the host.
Program | Effect | Volume per second | Trigger Cost | Trigger Cooldown | Required Techweb | Corruptions |
---|---|---|---|---|---|---|
Nerve Support | The nanites act as a secondary nervous system, reducing stamina damage and the amount of time the host is stunned to 75%. | 7 | -- | -- | Neural | Nerve Decay |
Dermal Hardening | The nanites form a mesh under the host's skin, protecting them from melee and bullet impacts. | 0.5 | -- | -- | Mesh | Dermalysis |
Dermal Refractive Surface | The nanites form a membrane above the host's skin, reducing the effect of laser and energy impacts. | 0.5 | -- | -- | Mesh | Dermalysis |
Rapid Coagulation | The nanites induce rapid coagulation when the host is wounded, dramatically reducing bleeding rate. | 0.2 | -- | -- | Biological | Hypoxemia |
Electric Conduction | The nanites act as a grounding rod for electric shocks, protecting the host. Shocks can still damage the nanites themselves. | 0.2 | -- | -- | Mesh | Nerve Decay |
Mental Barrier | The nanites form a protective membrane around the host's brain, shielding them from abnormal influences like a mindshield implant while they're active. | 0.4 | -- | -- | Synaptic | Neuro-Necrosis, Brain Misfire |
Healing Programs
Healing programs fix a variety of damage and ailments that affect the host. They generally consume a lot of nanites, so it's advisable to activate them manually when necessary.
Program | Effect | Volume per second | Trigger Cost | Trigger Cooldown | Required Techweb | Corruptions |
---|---|---|---|---|---|---|
Accelerated Regeneration | The nanites boost the host's natural regeneration, increasing their healing speed. Does not consume nanites while the host is undamaged. | 1.5 | -- | -- | Biological | Necrosis |
Temperature Adjustment | The nanites adjust the host's internal temperature to an ideal level. Does not consume nanites while the host is at an ideal temperature. | 2.5 | -- | -- | Mesh | Dermalysis |
Blood Purification | The nanites purge toxins and chemicals from the host's bloodstream. Does not consume nanites if the host has no chemicals nor toxin damage. | 1 | -- | -- | Smart | Hypoxemia, Necrosis |
Neural Regeneration | The nanites fix neural connections in the host's brain, reversing brain damage and minor traumas. Does not consume nanites if the host has no brain damage. | 1.5 | -- | -- | Neural | Neuro-Necrosis |
Blood Regeneration | The nanites stimulate and boost blood cell production in the host. Does not consume nanites if the host has enough blood. | 1 | -- | -- | Biological | Hypoxemia |
Mechanical Repair | The nanites fix damage in the host's mechanical limbs. Does not consume nanites if the limbs are undamaged. | 1 | -- | -- | Basic | Necrosis |
Selective Blood Purification | The nanites purge toxins and dangerous chemicals from the host's bloodstream, while ignoring beneficial chemicals. The added processing power required to analyze the chemicals severely increases the nanite consumption rate. Does not consume nanites if the host has no toxins damage. | 2 | -- | -- | Harmonic | Hypoxemia, Necrosis |
Bio-Reconstruction | The nanites manually repair and replace organic cells, acting much faster than normal regeneration. However, this program cannot detect the difference between harmed and unharmed, causing it to consume nanites even if it has no effect. | 7 | -- | -- | Harmonic | Hypoxemia, Necrosis |
Neural Reimaging | The nanites are able to backup and restore the host's neural connections, potentially replacing entire chunks of missing or damaged brain matter. Does not consume nanites if the host has no brain damage. | 3 | -- | -- | Harmonic | Neuro-Necrosis, Brain Misfire |
Defibrillation | The nanites shock the host's heart when triggered, bringing them back to life if the body can sustain it. Ghost has 8 seconds to re-enter their body after the trigger. The host can not have 200 or more total damage (including toxin and oxyloss damage) or the revive will fail. Unlike with ordinary defibrillators (just need less than 180 brute and burn) the revive will not heal or cause any oxyloss or other damage, which means it's possible to stand up instantly if hurt less than crit threshold. | -- | 25 | 12s | Harmonic | Shocking |
Glitch Programs
Defective programs caused by data corruption, and not otherwise obtainable. Generally, range from mildly to moderately dangerous. Can stack.
Program | Effect | Volume per second | Trigger Cost | Trigger Cooldown | Required Techweb | Corruptions |
---|---|---|---|---|---|---|
Glitch | A heavy software corruption that causes nanites to gradually break down. | 1.5 | -- | -- | -- | None |
Necrosis | The nanites attack internal tissues indiscriminately, causing widespread damage. | 0.75 | -- | -- | -- | Glitch |
Toxin Buildup | The nanites cause a slow but constant toxin buildup inside the host. | 0.25 | -- | -- | -- | Glitch |
Hypoxemia | The nanites prevent the host's blood from absorbing oxygen efficiently. | 0.75 | -- | -- | -- | Glitch |
Neuro-Necrosis | The nanites seek and attack brain cells, causing extensive neural damage to the host. | 0.75 | -- | -- | -- | Necrosis |
Brain Misfire | The nanites interfere with neural pathways, causing minor psychological disturbances. | 0.5 | -- | -- | -- | Neuro-Necrosis |
Dermalysis | The nanites attack skin cells, causing irritation, rashes, and minor damage. | 0.25 | -- | -- | -- | Necrosis |
Nerve Decay | The nanites attack the host's nerves, causing lack of coordination and short bursts of paralysis. | 1 | -- | -- | -- | Necrosis |
Weaponized Programs
Aggressive programs which use nanites as a military-grade weapon. Moderately to extremely dangerous to the host and/or their surroundings.
Program | Effect | Volume per second | Trigger Cost | Trigger Cooldown | Required Techweb | Corruptions |
---|---|---|---|---|---|---|
Cellular Breakdown | The nanites destroy cellular structures in the host's body, causing brute damage. | 1.5 | -- | -- | Biological | Necrosis |
Poisoning | The nanites deliver poisonous chemicals to the host's internal organs, causing toxin damage and vomiting. | 1.5 | -- | -- | Biological | Toxin Buildup |
Memory Leak | This program invades the memory space used by other programs, causing frequent corruptions and errors. | 0 | -- | -- | Smart | Toxin Buildup |
Aggressive Replication | Nanites will consume organic matter to improve their replication rate, damaging the host. | -1 | -- | -- | Harmonic | Necrosis |
Meltdown | Causes an internal meltdown inside the nanites, causing internal burns inside the host as well as rapidly destroying the nanite population. Sets the nanites' safety threshold to 0 when activated. | 10 | -- | -- | Military | Glitch |
Chain Detonation | Detonates all the nanites inside the host in a chain reaction when triggered. | 0 | 25 | 10s | Military | Toxin Buildup |
Heart-Stopper | Stops the host's heart when triggered; restarts it if triggered again. | 0 | 12 | 1s | Military | Nerve Decay |
Cryogenic Treatment | The nanites rapidly sink heat through the host's skin, lowering their temperature. | 1 | -- | -- | Mesh | Dermalysis, Sub-Dermal Combustion |
Sub-Dermal Combustion | The nanites cause buildup of flammable fluids under the host's skin, then ignites them. | 3 | -- | -- | Military | Dermalysis, Cryogenic Treatment |
Suppression Programs
Programs with the goal of acting as a deterrent against the host. Generally nonlethal.
Program | Effect | Volume per second | Trigger Cost | Trigger Cooldown | Required Techweb | Corruptions |
---|---|---|---|---|---|---|
Electric Shock | The nanites shock the host when triggered. Destroys a large amount of nanites! | -- | 10 | 30s | Mesh | Toxin Buildup |
Neural Shock | The nanites pulse the host's nerves when triggered, inapacitating them for a short period. | -- | 4 | 30s | Neural | Electric Shock, Nerve Decay |
Sleep Induction | The nanites cause rapid (but not instant) narcolepsy when triggered. | -- | 15 | 120s | Synaptic | Neuro-Necrosis, Brain Misfire |
Pacification | The nanites suppress the aggression center of the brain, preventing the host from causing direct harm to others. | 1 | -- | -- | Synaptic | Neuro-Necrosis, Brain Misfire |
Blindness | The nanites suppress the host's ocular nerves, blinding them while they're active. | 1.5 | -- | -- | Synaptic | Nerve Decay |
Mute | The nanites suppress the host's speech, making them mute while they're active. | 0.75 | -- | -- | Synaptic | Neuro-Necrosis, Brain Misfire |
Forced Speech | The nanites force the host to say a pre-programmed sentence when triggered. | -- | 3 | 2s | Synaptic | Neuro-Necrosis, Brain Misfire |
Skull Echo | The nanites echo a synthesized message inside the host's skull. | -- | 1 | 2s | Smart | Neuro-Necrosis, Brain Misfire |
Hallucination | The nanites make the host hallucinate something when triggered. | -- | 4 | 8s | Synaptic | Brain Misfire |
Sensor Programs
Programs that will self-pulse a given code when their condition is met.
Program | Effect | Volume per second | Trigger Cost | Trigger Cooldown | Required Techweb | Corruptions |
---|---|---|---|---|---|---|
Health Sensor | The nanites receive a signal when the host is above/below a certain percentage of health, with crit being 0. | 0 | -- | -- | Biological | Glitch |
Critical Health Sensor | The nanites receive a signal when the host first reaches critical health. | 0 | -- | -- | Biological | Glitch |
Death Sensor | The nanites receive a signal when they detect the host is dead. | 0 | -- | -- | Biological | Glitch |
Nanite Volume Sensor | The nanites receive a signal when the nanite supply is above/below a certain percentage, with the safety threshold being 0%. If safety threshold is higher, it will skew the percentage. For example, with threshold 50, 100 volume will count as 50 available volume, which means 10% instead of 20%, and the full 500 volume will count as 90%. | 0 | -- | -- | Basic | Glitch |
Damage Sensor | The nanites receive a signal when a host's specific damage type is above/below a target value. | 0 | -- | -- | Biological | Glitch |
Voice Sensor | Sends a signal when the nanites hear a determined word or sentence. | 0 | -- | -- | Smart | Glitch |
Tips
- Certain programs will take nanite volume even if it's activated or not.
- Some programs need a trigger to work at all even if it is set to activated in the programming hub. For example, you will have to add Death sensors towards Defibrillation for the program to activate.
- Nanites volume speed can be increased with programs but each come with their own pros and cons.
- If anyone is hit with an EMP with nanites inside them, the Nanite chamber in your workplace can remove the glitches if the person is in the chamber and another person works the console.
- Sensor Programs are the key towards making programs work when you want them to or when it would only make sense. Don't let programs run all the time because it can drain volume drastically.
- The cloud allows you to have more deviation in your nanites. On cloud 1 you could have something for the public. On cloud 2 you could have nanites dedicated to security.
- It's a good idea to keep tight wraps on who messes with the cloud. Make sure to shutdown
Mcgreytiderthe3rdUnauthorized Crew from approaching it at all cost. If they were to upload something malicious it could mean a shuttle call. - Unless you are an antagonist with hijack, or your captain has his eyes towards a special way to use the weaponized programs, it's best you stay far clear of them. These programs can cause harm and death to a lot of people at once.
- The Nanite remote controller can be used to activate said nanites depending on the code. It can activate one person, a group or only local and relay. Also handy in testing out your nanites to activate them and make sure they work.
- Suppression Programs are very useful to give to the public and give security a nanite remote controller. This can allow security to stop criminals without even laying a hand on them. If the criminal has the nanites that is.
- Your nanite scanner is your best friend. It can help you see who has nanites, what the nanites do and how much volume said person has. This is key in rooting out glitches or subverted nanites. Also useful for checking if nanites are activate or not.
- The nanite heart will increase replication by 1. Viruses with nano-symbiosis will increase replication by 0.5 at stage speeds 1-6, and by 1 at stage speeds 7 and above.