Open alexanderson1993 opened 7 years ago
Where the devil did you get those images?
— You are receiving this because you are subscribed to this thread. Reply to this email directly, view it on GitHub, or mute the thread.
In looking forward to some day having the ships interact more I had the though this morning to consider specific commands being accessible to hacking (and possibly other stations) that allow for interactions.
Examples: Jamming - It adds a low layer of static to sensors or targeting LRM - Accessing actual LRMS from their ships database Sending LRMS as if they were the ship Power adjustment - Attempting to lower power in a specific system. So if you were running away you could try to reduce power to the chasing ships engines or other systems. It's quickly fixed by your opponent if they are paying attention and it would have taken a long time for them to have attempted the hack. False Targets for tactical for decoy probes as well. Adding users to computer core when they are attempting to infiltrate the ship. Weak signal or a "strange icon" amongst the communications satellites in LRM when a hack is in progress.
Some of these could be subtle clues the other ship gets to show hacking is occurring or has happened. The deeper they get through the firewall levels or more secure the system the more clues and opportunities for the real crew to shut down their efforts.
@sassyspock, take a look at this, and tell me what you think
Hacking follows a process:
The Galileo hacking controls operate this way:
In addition, there can be traces activated which must be masked with the signal jammer.
Nefarious things you could do with Hacking: