Guide to Nanites: Difference between revisions

Jump to navigation Jump to search
167 bytes added ,  15:20, 26 October 2023
Changed nanite consumption amounts and removed mind control nanites, fake death nanites, and paralysis nanites as per was changed PR #17858
m (Grammar)
(Changed nanite consumption amounts and removed mind control nanites, fake death nanites, and paralysis nanites as per was changed PR #17858)
 
(5 intermediate revisions by 3 users not shown)
Line 6: Line 6:




Nanites are tiny nanomachines that live in a host's bloodstream, providing different functionalities depending on how they're programmed. The mob where the nanites reside is usually defined as their host..
Nanites are tiny nanomachines that live in a host's bloodstream, providing different functionalities depending on how they're programmed. The mob where the nanites reside is usually defined as their host...
=Nanites=
=Nanites=
NANOMACHINES, SON! THEY HARDEN IN RESPONSE TO PHYSCIAL TRAUMA!
DERMAL HARDENING, SON! THEY HARDEN IN RESPONSE TO PHYSCIAL TRAUMA!
==Implanting==
==Implanting==
[[File:Nanite_chamber.gif|thumb|Nanite Chamber]]
[[File:Nanite_chamber.gif|thumb|Nanite Chamber]]
Line 24: Line 24:
Nanite swarms can be set with a Cloud ID. If so, they will, every 30 seconds, copy the programming of the Cloud Backup with the same ID, if it has been set.
Nanite swarms can be set with a Cloud ID. If so, they will, every 30 seconds, copy the programming of the Cloud Backup with the same ID, if it has been set.
Cloud backups are controlled by Cloud Control Consoles. They can create new backups (with codes from 1 to 100), as well as upload programs from a disk into the selected backup.
Cloud backups are controlled by Cloud Control Consoles. They can create new backups (with codes from 1 to 100), as well as upload programs from a disk into the selected backup.
Cloud control consoles also serve as storage, meaning that if they're disabled they will no longer sync with connected nanites, and that if all cloud consoles are destroyed, all backups will be lost.
Cloud control consoles also serve as storage, meaning that if they're disabled, they will no longer sync with connected nanites, and that if all cloud consoles are destroyed, all backups will be lost.


Cloud synchronization has several benefits over direct chamber programming: it can update programs without a second person to operate the chamber, it will reset programming in case of tampering or data corruption, and can be updated remotely by a second person. Of course, the last part also makes it very risky, since anyone could upload malicious programs at any time if they have a console to do it with.
Cloud synchronization has several benefits over direct chamber programming: it can update programs without a second person to operate the chamber, it will reset programming in case of tampering or data corruption and can be updated remotely by a second person. Of course, the last part also makes it very risky, since anyone could upload malicious programs at any time if they have a console to do it with.
=Nanite Programs =
=Nanite Programs =
Nanite programs determine what nanites do inside the host. They have different categories, and range from helpful to deadly.
Nanite programs determine what nanites do inside the host. They have different categories and range from helpful to deadly.
==Obtaining programs==
==Obtaining programs==
Programs are unlocked through techweb research. Once unlocked, they can be downloaded into Nanite Program Disks at any Nanite Program Hub.
Programs are unlocked through techweb research. Once unlocked, they can be downloaded into Nanite Program Disks at any Nanite Program Hub.
Line 69: Line 69:
Nanites are split in several categories.
Nanites are split in several categories.
===Utility Programs===
===Utility Programs===
Programs that interact with the nanites themselves, or have general utility purposes.
Programs that interact with the nanites themselves or have general utility purposes.
{| class="wikitable sortable" border="1" width="100%;" style="text-align: center;" ||
{| class="wikitable sortable" border="1" width="100%;" style="text-align: center;" ||
|-
|-
Line 87: Line 87:
|Smart
|Smart
|Toxin Buildup
|Toxin Buildup
|-
!Distributed Computing
|The nanites aid the research servers by performing a portion of its calculations, increasing research point generation.
|0.1
| --
| --
|Smart
|Toxin Buildup
|-
!Neural Network
|The nanites link the host's brains together forming a neural research network, that becomes more efficient with the amount of total hosts.
|0.2
| --
| --
|Harmonic
|Neuro-Necrosis
|-
|-
!Viral Replica
!Viral Replica
Line 215: Line 231:
!Rapid Coagulation
!Rapid Coagulation
|The nanites induce rapid coagulation when the host is wounded, dramatically reducing bleeding rate.
|The nanites induce rapid coagulation when the host is wounded, dramatically reducing bleeding rate.
|0.1
|0.2
| --
| --
| --
| --
Line 251: Line 267:
!Accelerated Regeneration
!Accelerated Regeneration
|The nanites boost the host's natural regeneration, increasing their healing speed. <i>Does not consume nanites while the host is undamaged.</i>
|The nanites boost the host's natural regeneration, increasing their healing speed. <i>Does not consume nanites while the host is undamaged.</i>
|2.5
|1.5
| --
| --
| --
| --
Line 259: Line 275:
!Temperature Adjustment
!Temperature Adjustment
|The nanites adjust the host's internal temperature to an ideal level. Does not consume nanites while the host is at an ideal temperature.
|The nanites adjust the host's internal temperature to an ideal level. Does not consume nanites while the host is at an ideal temperature.
|3.5
|2.5
| --
| --
| --
| --
Line 291: Line 307:
! Mechanical Repair
! Mechanical Repair
|The nanites fix damage in the host's mechanical limbs. Does not consume nanites if the limbs are undamaged.
|The nanites fix damage in the host's mechanical limbs. Does not consume nanites if the limbs are undamaged.
|0.5
|1
| --
| --
| --
| --
| Basic
|Basic
|Necrosis
|Necrosis
|-
|-
!Selective Blood Purification
!Selective Blood Purification
|The nanites purge toxins and dangerous chemicals from the host's bloodstream, while ignoring beneficial chemicals. The added processing power required to analyze the chemicals severely increases the nanite consumption rate.
|The nanites purge toxins and dangerous chemicals from the host's bloodstream, while ignoring beneficial chemicals. The added processing power required to analyze the chemicals severely increases the nanite consumption rate. Does not consume nanites if the host has no toxins damage.
|2
|2
| --
| --
| --
| --
|Harmonic
|Harmonic
| Hypoxemia, Necrosis
|Hypoxemia, Necrosis
|-
|-
!Bio-Reconstruction
!Bio-Reconstruction
| The nanites manually repair and replace organic cells, acting much faster than normal regeneration. However, this program cannot detect the difference between harmed and unharmed, causing it to consume nanites even if it has no effect.
|The nanites manually repair and replace organic cells, acting much faster than normal regeneration. However, this program cannot detect the difference between harmed and unharmed, causing it to consume nanites even if it has no effect.
|5.5
|7
| --
| --
| --
| --
| Harmonic
|Harmonic
| Hypoxemia, Necrosis
|Hypoxemia, Necrosis
|-
|-
!Neural Reimaging
!Neural Reimaging
|The nanites are able to backup and restore the host's neural connections, potentially replacing entire chunks of missing or damaged brain matter.
|The nanites are able to backup and restore the host's neural connections, potentially replacing entire chunks of missing or damaged brain matter. Does not consume nanites if the host has no brain damage.
|3
|3
| --
| --
| --
| --
|Harmonic
|Harmonic
| Neuro-Necrosis, Brain Misfire
|Neuro-Necrosis, Brain Misfire
|-
|-
!Defibrillation
!Defibrillation
Line 326: Line 342:
|25
|25
|12s
|12s
| Harmonic
|Harmonic
|Shocking
|Shocking
|-
|-
|}
|}
=== Glitch Programs===
===Glitch Programs===
Defective programs caused by data corruption, and not otherwise obtainable. Generally range from mildly to moderately dangerous. Can stack.
Defective programs caused by data corruption, and not otherwise obtainable. Generally, range from mildly to moderately dangerous. Can stack.
{| class="wikitable sortable" border="1" width="100%;" style="text-align: center;" ||
{| class="wikitable sortable" border="1" width="100%;" style="text-align: center;" ||
|-
|-
! scope="col" width="10%" |Program
! scope="col" width="10%" |Program
! scope="col" class="unsortable" | Effect
! scope="col" class="unsortable" |Effect
! scope="col" width="5%" |Volume per second
! scope="col" width="5%" |Volume per second
! scope="col" width="5%" | Trigger Cost
! scope="col" width="5%" |Trigger Cost
! scope="col" width="5%" |Trigger Cooldown
! scope="col" width="5%" |Trigger Cooldown
! scope="col" width="7%" |Required Techweb
! scope="col" width="7%" |Required Techweb
Line 362: Line 378:
|0.25
|0.25
| --
| --
| --
| --
| --
| --
|Glitch
|Glitch
|-
|-
! Hypoxemia
!Hypoxemia
| The nanites prevent the host's blood from absorbing oxygen efficiently.
|The nanites prevent the host's blood from absorbing oxygen efficiently.
|0.75
|0.75
| --
| --
Line 376: Line 392:
!Neuro-Necrosis
!Neuro-Necrosis
|The nanites seek and attack brain cells, causing extensive neural damage to the host.
|The nanites seek and attack brain cells, causing extensive neural damage to the host.
| 0.75
|0.75
| --
| --
| --
| --
Line 382: Line 398:
|Necrosis
|Necrosis
|-
|-
! Brain Misfire
!Brain Misfire
|The nanites interfere with neural pathways, causing minor psychological disturbances.
|The nanites interfere with neural pathways, causing minor psychological disturbances.
|0.5
|0.5
Line 396: Line 412:
| --
| --
| --
| --
| Necrosis
|Necrosis
|-
|-
!Nerve Decay
!Nerve Decay
Line 404: Line 420:
| --
| --
| --
| --
| Necrosis
|Necrosis
|}
|}
===Weaponized Programs===
===Weaponized Programs===
Line 413: Line 429:
! scope="col" class="unsortable" |Effect
! scope="col" class="unsortable" |Effect
! scope="col" width="5%" |Volume per second
! scope="col" width="5%" |Volume per second
! scope="col" width="5%" |Trigger Cost
! scope="col" width="5%" |Trigger Cost  
! scope="col" width="5%" |Trigger Cooldown
! scope="col" width="5%" |Trigger Cooldown
! scope="col" width="7%" |Required Techweb
! scope="col" width="7%" |Required Techweb
! scope="col" class="unsortable" width="8%" |Corruptions
! scope="col" class="unsortable" width="8%" |Corruptions
|-
|-
! Cellular Breakdown
!Cellular Breakdown
|The nanites destroy cellular structures in the host's body, causing brute damage.
|The nanites destroy cellular structures in the host's body, causing brute damage.
|1.5
|1.5
| --
| --
| --
| --
|Biological
|Biological
|Necrosis
|Necrosis
Line 432: Line 448:
| --
| --
|Biological
|Biological
| Toxin Buildup
|Toxin Buildup
|-
|-
!Memory Leak
!Memory Leak  
|This program invades the memory space used by other programs, causing frequent corruptions and errors.
|This program invades the memory space used by other programs, causing frequent corruptions and errors.
| 0
|0
| --
| --
| --
| --
Line 443: Line 459:
|-
|-
!Aggressive Replication
!Aggressive Replication
| Nanites will consume organic matter to improve their replication rate, damaging the host.
|Nanites will consume organic matter to improve their replication rate, damaging the host.
| -1
| -1
| --
| --
Line 451: Line 467:
|-
|-
!Meltdown
!Meltdown
| Causes an internal meltdown inside the nanites, causing internal burns inside the host as well as rapidly destroying the nanite population. Sets the nanites' safety threshold to 0 when activated.
|Causes an internal meltdown inside the nanites, causing internal burns inside the host as well as rapidly destroying the nanite population. Sets the nanites' safety threshold to 0 when activated.
|10
|10
| --
| --
Line 460: Line 476:
!Chain Detonation
!Chain Detonation
|Detonates all the nanites inside the host in a chain reaction when triggered.
|Detonates all the nanites inside the host in a chain reaction when triggered.
| 0
|0
|25
| 25
|10s
|10s
|Military
|Military
Line 468: Line 484:
!Heart-Stopper
!Heart-Stopper
|Stops the host's heart when triggered; restarts it if triggered again.
|Stops the host's heart when triggered; restarts it if triggered again.
| 0
|0
|12
| 12
|1s
|1s
| Military
|Military
|Nerve Decay
|Nerve Decay
|-
|-
!Cryogenic Treatment
!Cryogenic Treatment
| The nanites rapidly sink heat through the host's skin, lowering their temperature.
|The nanites rapidly sink heat through the host's skin, lowering their temperature.
| 1
|1
| --
| --
| --
| --
Line 483: Line 499:
|-
|-
!Sub-Dermal Combustion
!Sub-Dermal Combustion
| The nanites cause buildup of flammable fluids under the host's skin, then ignites them.
|The nanites cause buildup of flammable fluids under the host's skin, then ignites them.
|4
| --
| --
| Military
| Dermalysis, Cryogenic Treatment
|-
!Mind Control
|The nanites imprint an absolute directive onto the host's brain while they're active.
|3
|3
| --
| --
| --
| --
| Hazard
|Military
|Neuro-Necrosis, Brain Misfire
|Dermalysis, Cryogenic Treatment
|-
|-
|}
|}
=== Suppression Programs===
===Suppression Programs===
Programs with the goal of acting as a deterrent against the host. Generally nonlethal.
Programs with the goal of acting as a deterrent against the host. Generally nonlethal.
{| class="wikitable sortable" border="1" width="100%;" style="text-align: center;" ||
{| class="wikitable sortable" border="1" width="100%;" style="text-align: center;" ||
Line 506: Line 514:
! scope="col" class="unsortable" |Effect
! scope="col" class="unsortable" |Effect
! scope="col" width="5%" |Volume per second
! scope="col" width="5%" |Volume per second
! scope="col" width="5%" | Trigger Cost
! scope="col" width="5%" |Trigger Cost
! scope="col" width="5%" |Trigger Cooldown
! scope="col" width="5%" |Trigger Cooldown
! scope="col" width="7%" |Required Techweb
! scope="col" width="7%" |Required Techweb
Line 512: Line 520:
|-
|-
!Electric Shock
!Electric Shock
| The nanites shock the host when triggered. Destroys a large amount of nanites!
|The nanites shock the host when triggered. Destroys a large amount of nanites!
| --
| --
|10
|10
Line 519: Line 527:
|Toxin Buildup
|Toxin Buildup
|-
|-
! Neural Shock
!Neural Shock
|The nanites pulse the host's nerves when triggered, inapacitating them for a short period.
|The nanites pulse the host's nerves when triggered, inapacitating them for a short period.
| --
| --
|4
|4
|30s
|30s
Line 534: Line 542:
|Synaptic
|Synaptic
|Neuro-Necrosis, Brain Misfire
|Neuro-Necrosis, Brain Misfire
|-
!Paralysis
|The nanites actively suppress nervous pulses, effectively paralyzing the host.
|3
| --
|  --
|Neural
|Nerve Decay
|-
!Death Simulation
|The nanites induce a death-like coma into the host, able to fool most medical scans.
|3.5
| --
|  --
|Harmonic
|Necrosis, Nerve Decay, Neuro-Necrosis
|-
|-
!Pacification
!Pacification
Line 556: Line 548:
| --
| --
| --
| --
| Synaptic
|Synaptic
|Neuro-Necrosis, Brain Misfire
|Neuro-Necrosis, Brain Misfire
|-
|-
Line 565: Line 557:
| --
| --
|Synaptic
|Synaptic
| Nerve Decay
|Nerve Decay
|-
|-
!Mute
!Mute
Line 571: Line 563:
|0.75
|0.75
| --
| --
| --
| --
|Synaptic
|Synaptic
|Neuro-Necrosis, Brain Misfire
|Neuro-Necrosis, Brain Misfire
Line 579: Line 571:
| --
| --
|3
|3
| 2s
|2s
|Synaptic
|Synaptic
|Neuro-Necrosis, Brain Misfire
|Neuro-Necrosis, Brain Misfire
|-
|-
!Skull Echo
!Skull Echo  
| The nanites echo a synthesized message inside the host's skull.
|The nanites echo a synthesized message inside the host's skull.
| --
| --
|1
|1
Line 600: Line 592:
|-
|-
|}
|}
===Sensor Programs ===
===Sensor Programs===
Programs that will self-pulse a given code when their condition is met.
Programs that will self-pulse a given code when their condition is met.
{| class="wikitable sortable" border="1" width="100%;" style="text-align: center;" ||
{| class="wikitable sortable" border="1" width="100%;" style="text-align: center;" ||
Line 607: Line 599:
! scope="col" class="unsortable" |Effect
! scope="col" class="unsortable" |Effect
! scope="col" width="5%" |Volume per second
! scope="col" width="5%" |Volume per second
! scope="col" width="5%" |Trigger Cost
! scope="col" width="5%" |Trigger Cost  
! scope="col" width="5%" | Trigger Cooldown
! scope="col" width="5%" |Trigger Cooldown
! scope="col" width="7%" |Required Techweb
! scope="col" width="7%" |Required Techweb
! scope="col" class="unsortable" width="8%" |Corruptions
! scope="col" class="unsortable" width="8%" |Corruptions
Line 617: Line 609:
| --
| --
| --
| --
| Biological
|Biological
| Glitch
|Glitch
|-
|-
! Critical Health Sensor
!Critical Health Sensor
|The nanites receive a signal when the host first reaches critical health.
|The nanites receive a signal when the host first reaches critical health.
|0
|0
| --
| --
| --
| --
| Biological
|Biological
|Glitch
|Glitch
|-
|-
!Death Sensor
!Death Sensor
| The nanites receive a signal when they detect the host is dead.
|The nanites receive a signal when they detect the host is dead.
|0
|0
| --
| --
Line 637: Line 629:
|-
|-
!Nanite Volume Sensor
!Nanite Volume Sensor
|The nanites receive a signal when the nanite supply is above/below a certain percentage, with the safety threshold being 0%. If safety threshold is higher, it will skew the percentage. For example, with threshold 50, 100 volume will count as 50 available volume, which means 10% instead of 20%, and the full 500 volume will count as 90%.
|The nanites receive a signal when the nanite supply is above/below a certain percentage, with the safety threshold being 0%. If safety threshold is higher, it will skew the percentage. For example, with threshold 50, 100 volume will count as 50 available volume, which means 10% instead of 20%, and the full 500 volume will count as 90%.  
|0
|0
| --
| --
| --
| --
| Basic
|Basic
|Glitch
|Glitch
|-
|-
!Damage Sensor
!Damage Sensor
| The nanites receive a signal when a host's specific damage type is above/below a target value.
|The nanites receive a signal when a host's specific damage type is above/below a target value.
|0
|0
| --
| --
Line 654: Line 646:
!Voice Sensor
!Voice Sensor
|Sends a signal when the nanites hear a determined word or sentence.
|Sends a signal when the nanites hear a determined word or sentence.
| 0
|0
| --
| --
| --
| --
Line 668: Line 660:
*Sensor Programs are the key towards making programs work when you want them to or when it would only make sense. Don't let programs run all the time because it can drain volume drastically.
*Sensor Programs are the key towards making programs work when you want them to or when it would only make sense. Don't let programs run all the time because it can drain volume drastically.
*The cloud allows you to have more deviation in your nanites. On cloud 1 you could have something for the public. On cloud 2 you could have nanites dedicated to security.
*The cloud allows you to have more deviation in your nanites. On cloud 1 you could have something for the public. On cloud 2 you could have nanites dedicated to security.
* It's a good idea to keep tight wraps on who messes with the cloud. Make sure to shutdown <s>Mcgreytiderthe3rd</s> Unauthorized Crew from approaching it at all cost. If they were to upload something malicious it could mean a shuttle call.
*It's a good idea to keep tight wraps on who messes with the cloud. Make sure to shutdown <s>Mcgreytiderthe3rd</s> Unauthorized Crew from approaching it at all cost. If they were to upload something malicious it could mean a shuttle call.
*Unless you are an antagonist with hijack, or your captain has his eyes towards a special way to use the weaponized programs, it's best you stay far clear of them. These programs can cause harm and death to a lot of people at once.
*Unless you are an antagonist with hijack, or your captain has his eyes towards a special way to use the weaponized programs, it's best you stay far clear of them. These programs can cause harm and death to a lot of people at once.
*The Nanite remote controller can be used to activate said nanites depending on the code. It can activate one person, a group or only local and relay. Also handy in testing out your nanites to activate them and make sure they work.
*The Nanite remote controller can be used to activate said nanites depending on the code. It can activate one person, a group or only local and relay. Also handy in testing out your nanites to activate them and make sure they work.
*Suppression Programs are very useful to give to the public and give security a nanite remote controller. This can allow security to stop criminals without even laying a hand on them. If the criminal has the nanites that is.
*Suppression Programs are very useful to give to the public and give security a nanite remote controller. This can allow security to stop criminals without even laying a hand on them. If the criminal has the nanites that is.
*Your nanite scanner is your best friend. It can help you see who has nanites, what the nanites do and how much volume said person has. This is key in rooting out glitches or subverted nanites. Also useful for checking if nanites are activate or not.
*Your nanite scanner is your best friend. It can help you see who has nanites, what the nanites do and how much volume said person has. This is key in rooting out glitches or subverted nanites. Also useful for checking if nanites are activate or not.
*The nanite heart will increase replication by 1. Viruses with nano-symbiosis will increase replication by 0.5 at stage speeds 1-6, and by 1 at stage speeds 7 and above.
*
*
2

edits

Navigation menu