Follow TV Tropes

Following

Context Videogame / Uplink

Go To

1[[quoteright:350:https://static.tvtropes.org/pmwiki/pub/images/uplink_wide.jpg]]
2->''Trust is a weakness''
3-->-- '''Tagline'''
4
5''Uplink'' is a 2001 video game by Creator/IntroversionSoftware. It can best be described as a HollywoodHacking [[SimulationGame simulation]]. The whole premise is that you, an unnamed agent of the Uplink Corporation (an underground hacker-for-hire service), have just joined up in the ranks. Using your PC, you move up the ranks of Uplink agents by hacking different companies' computers and servers.
6
7It's arguably one of the most realistic games out there, because you never see your character - in fact, the character is made out to simply be ''you'', operating under an alias. You never see your character because they're sitting in the same chair you are, typing in commands on your keyboard with your hands.
8
9Compare with ''TabletopGame/NetRunner''. There was a fan sequel called ''VideoGame/{{Codelink}}'', and there also exists a command prompt-based SpiritualSuccessor known as ''VideoGame/{{Hacknet}}''. Not to be confused with the SelfContainedDemo for the original ''VideoGame/HalfLife1'', ''Half-Life: Uplink''.
10----
11!!This game provides examples of:
12* FiveFiveFive:
13** The computers you hack into use nonsense [=IP=] addresses.
14** And the phonelines you ring for voice print [=IDs=] use nonsense phone numbers.
15** Your gateway is ''always'' 127.0.0.1. [[IncrediblyLamePun No place like home]]...
16* AllCrimesAreEqual: An unintentional example, but someone will go to jail just as readily for rape, murder, and arson as for jaywalking, spitting, and littering. Just so long as they've violated parole.
17* ApocalypseHow : Between Societal Disruption and Societal Collapse [[spoiler: if Revelation succeeds]].
18* ArsonMurderAndJaywalking: Also unintentional, but as a result of AllCrimesAreEqual above, you can indeed send someone to prison for, say, genocide, conspiracy to overthrow the government, and parking on a double yellow line. They also have to be violating parole, as you cannot authorize arrest without that particular crime. So you can turn someone into a genocidal, mass murdering jaywalker...who was successfully paroled and [[TooDumbToLive subsequently violated their parole.]]
19* BeefGate: Once you step up to hacking the International Social Security Database, you'll find it's a much tougher nut to crack than the Global Academic Database and the minor computer systems you've been trying to deal with before. You'll need a lot more links to bounce your connection, and you'll need to work quickly and with better hardware and software to get things done in a timely fashion. [[spoiler: And the Proxy Server will shut down any attempts to change information until you disable it.]]
20* BeepingComputers The Trace Tracker program.
21* TheBigBoard: The GameWithinAGame on Protovision's machine.
22* BoringButPractical: Read/Write access. If you're just looking to alter data and not crash the system, R/W access is all you need. It doesn't give you access to the console, but it's less likely to prompt a trace immediately the way admin access does, it's less likely to be revoked when you log out, and it's usually easier to break the password than admin access. Of course, "less likely" doesn't mean "completely unlikely", so if you're going to have to deal with a trace anyway, might as well go for admin access. Some systems also don't allow read/write access (though, hilariously, all government databases do).
23* ComputerVirus: ARC is attempting to develop a virus to destroy the Internet. The first version you recover doesn't spread across systems, but a speed run demonstrated that it can eliminate the global network by running it on enough computers.
24* CopyProtection: A glossy black-on-black code sheet that asks you to enter the two character sequence at a certain intersection. When the game came out, it was indeed intended as copy-protection, as the game didn't have any kind of DRM and it was Introversion's first game, though now, with the rise of Steam and digital distribution, it has become more a bit of nostalgia. [[spoiler: The codes themselves are also hexadecimal characters that allow you to access the game development bible hidden on the original CD if you convert them.]]
25* CosmeticAward: There are 12 "Special Awards" to achieve, [[spoiler:mostly]] tied to the completion of the storyline missions. However, since one can only take one branch of the storyline, it's impossible to earn all of them in a single playthrough.
26* TheCracker: The player. You can destroy a company's servers ''completely'' - at least datawise - and doing so will net you a nice little news article about how a mysterious hacker has cost the company ''millions''. They don't seem to ever actually go bankrupt, although their stock will tank. You can hack into a bank and funnel money into your account - possibly even bouncing it around several times and keeping it in accounts on other bank websites, rather than storing it all on the Uplink Corporation Bank.
27* CreatorCameo: Introversion Software is one of the companies that hires you from time to time, and they have a website in-game about possible ideas for a sequel. [[spoiler: Their IP has to be manually looked up first, as it is initially hidden from the list [=InterNIC=] has]].
28* CripplingOverspecialization: The high-end Gateways tend to do one thing very well, to the detriment of their other abilities. The UNITY High-Security Platform has multiple redundant security options (but see UselessUsefulSpell), and can hold 1 more CPU that most other Gateways, but has very little memory. The AM-CORE File Server has the most memory storage (256 [=Gq=]) and the fastest available bandwidth (10 [=Gqs=]), but can only hold three [=CPUs=], which means the actual hacking process will be slow. The OMEGA Parallel Supercomputer can hold a whopping ''sixteen'' [=CPUs=], which will allow it to crack ''any'' system extremely fast, but it has only 48 [=Gq=] memory, a slow 4 [=Gqs=] bandwidth, and only one security slot (which is bad, see UselessUsefulSpell, again). The [=TRINITY-1686a=] Gateway is, however, the MasterOfNone gateway: able to use 8 [=CPUs=], with 128 [=Gq=] of storage and the second-fastest bandwidth (8 [=Gqs=]), it will nonetheless have difficulty completing more specialized missions, such as "Copy a Large Database".
29* CriticalAnnoyance:
30** The Trace Tracker. The lack of any other significant sound in the game except a quiet music soundtrack can make the slow but subtle beep rate increase into NightmareFuel, particularly if you've only got about five seconds left.
31** The motion detector will flash red regardless of who is near the computer, as long as there is more than one person (one person only makes it flash yellow; any computer upgrades you order are carried out by one person per upgrade). This could either be the FBI coming with your game over, or those 5 new processors you just ordered.
32* DevelopersForesight:
33** Anything that can be done on a computer can likely be done in ''Uplink''. For example, if you need to delete a load of files on a server, you could either go into the console then access the registry and purge it, or delete them manually.
34** Also, when you connect to the Uplink Public Access Server and Gateway for the first time in the intro, the logo on your computer screen changes based on whether you're playing the Windows, Mac or Linux version.
35* DifficultButAwesome: Robbing a bank to get a 6 digit payoff. Getting a mission that points you to a target account is relatively quick: they start showing up as "Trace a recent bank transfer" missions around rank 7, which is the rank after you start getting missions to hack into the Global Criminal Database, a particularly tough nut to crack. Banks, by comparison, are pretty easy. You only need a proxy disabler, a password breaker, and a voice analysis recorder, all of which are relatively inexpensive. But banks ''hate'' getting hacked: your trace time will be ridiculously short unless you bounce your connection through dozens of links, and if you leave ''any'' record, you're going to get caught. It's not enough to transfer the money and delete your connection log: you also have to [[spoiler: delete the actual transfer log from the sending account AND your receiving account]]. And the passive trace is the fastest you're ever going to see: from time of transfer to completion of passive trace is less than ''five minutes'', where other passive traces can take ''hours or days''. It's very possible to complete the hack without all the tools, rush back to Uplink Services and buy all the software you need to cover your tracks, but it's ''very difficult''. If you manage to pull it off, though, you'll easily jump up 4-5 ranks in Uplink, and have enough money to buy the best of, well, everything, trivializing hacks until you decide to start working on LAN hacks. There is an extremely easy way to get away with it that requires some preparation, however: [[spoiler: hack the bank, transfer the funds, delete the transfer logs, and blow up your gateway. You don't have to worry about any passive trace, and this is much cheaper to do as it only requires Proxy Disable (because banks for some reason never have firewalls), Password Breaker and Log Deleter software. The preparation, however, requires a gateway with a security option, and installation of the gateway nuke.]]
36* DiscOneNuke: If you know how, it's fairly easy[[note]]Transferring the funds to your account is easy. [[SchmuckBait Covering your tracks requires several tricks you may not have figured out yet.]][[/note]] to rob a bank and funnel a couple million dollars into your bank account, thereby allowing you to buy all the best hardware and software early on. The game even baits you with this early on; after a few safe missions to modify data in the International Academic Database, you'll find a mission to trace a recent funds transfer - in the order of ''900,000'' credits...
37* EasterEgg:
38** There are supposedly encrypted easter eggs hidden in the game's code. No, the game doesn't find and decrypt them for you when you do something, it's up to you to find and decrypt the right pieces of code.
39** At the beginning of the game, you're asked for a two-character code as part of the game's copy protection. The ''code sheet'' is written in hexadecimal coding, and it does say something.
40%%* EverythingIsOnline: Almost everything.
41* ExactProgressBar: Almost every program the player can utilize logs progress in this way. The v3 and below Trace Tracker will sometimes jump around a little, but still stays fairly consistent. V4 shows your ExactTimeToFailure. The [=MapTrace=] HUD upgrade, despite costing more than the best Trace Tracker, does ''not'' show how much time you have until the trace is complete, only many bounces your hack has been traced through.
42* ExtremeGraphicalRepresentation: Justified, because it ''is'' a representation of HollywoodHacking.
43* FanSequel: ''VideoGame/{{Codelink}}'', currently in open beta. [[http://codelinkv2.com/web/ Here's their dev blog.]]
44* FeaturelessProtagonist: You have no photo in your school records, Social Security file, or criminal record. During the secret mission to [[spoiler:steal the agent roster from the Uplink Internal Services machine, there's always one of the ten files missing - the one containing your own record.]]
45* ForcedTutorial: While the tutorial itself is optional, the player is still required to complete the tutorial mission of breaking into the test server. Abandoning the tutorial mission will not give the player enough experience required to start other missions.
46* TheGuardsMustBeCrazy: The [=InterNIC=] server is infamous for having ''no security measures whatsoever'' (not even a Monitor to trace you with) and never even changing the admin password. As such, it's frequently cited as the perfect place to start your connection-bouncing from, as after a hack you can easily break into the server within seconds and delete the logs to foil a passive trace.
47* GuideDangIt: There are a number of things that you can only learn through trial and error, as the tutorial is designed to get you up and running and not much else. Specifically:
48** If you manage to hack a computer and log out ''without'' getting your fake credentials revoked, then when you bounce your link through that computer, it's much harder to trace through, giving you more time.
49** Government-owned computers are harder to ''passively'' trace through, as the government doesn't like people asking for their access records, politely or otherwise. Bouncing your signal through a government database, even the notoriously easy-to-hack International Academic Database, will give you more time to cover your tracks.
50** ''Never'' buy the Dictionary Breaker: see UselessUsefulSpell.
51** The Connection Analyzer itself is useless, but allows you to purchase Bypass programs. By far the most important Bypass program is the ''Monitor'' Bypass, which can delay a trace from starting. Buying the Proxy and Firewall Bypass is eventually extremely helpful, but you'll likely have equivalent Disable programs that work just as well until you have enough money to upgrade to the Bypass program. But there's no Monitor Disable program, making the Monitor Bypass program extremely helpful.
52** Robbing a bank is a quick way to make a ''lot'' of money, but the first (few) time(s) you do it, you'll get caught by the passive trace. The GuideDangIt here is two fold: 1) transferring the funds is easy, but covering your tracks is hard, and 2) after you ''think'' you've covered your tracks, ''do not advance time on the fastest speed'': if you've missed something, you will have only seconds to blow up your Gateway and keep your ill-gotten wealth when the police show up, and if you advance time, you'll miss that opportunity completely.
53* HackerCollective: The Uplink corporation. Since it was one of the first games, many followed their example.
54* HoistByHisOwnPetard: If you're [[spoiler: working for Arunmor]], this can happen in the final mission - [[spoiler: you can destroy ARC's central mainframe with their own virus]]. The exact sequence of events: [[spoiler: Be sure to hang on to the Revelation 1.0 virus file - you have two opportunities to get your hands on it. When the final mission starts, immediately infiltrate the ARC mainframe. Copy Revelation to their fileserver, use the console to delete the contents of /sys, then run Revelation. Don't forget to clear the transfer logs after that, and then you can start fighting the virus everywhere else. Since the version you've unleashed is 1.0, it won't spread.]]
55* HollywoodHacking: The entire game can basically be described as a simulation based off Hollywood's portrayal of hacking.
56* HyperspaceArsenal: Not ''per se'', but by the end of the game you'll probably have a rather respectable collection of hacking tools at your disposal - from a simple password cracker, to software designed to help you map out and then abuse the hell out of a LAN.
57* KarmaMeter: Your Neuromancer rating is this, and tracks whether you're a PlayfulHacker or TheCracker. If you steal data, adjust files for the gain of others, and trace hacking attempts, then you'll be considered a PlayfulHacker. Conversely, if you delete data, crash systems, and ruin lives, you'll be considered TheCracker. While your reputation doesn't count for much, reaching the extremes of the scale will make it hard to take jobs that run counter to your reputation: companies don't want to hire a PlayfulHacker to destroy a system, and they sure as hell don't want to let TheCracker into their system to trace someone else. There's only one action that is guaranteed to change your reputation immediately, however: if you [[spoiler: sell the list of Uplink agents,]] your reputation will be ''locked'' into a completely amoral sociopath.
58* LastChanceHitPoint: Of a sort. The Gateway Nuke and Motion Sensor will give you a ''very'' short time to blow up your Gateway if an unauthorized person approaches it. Obviously, this is detrimental to the hardware (and any software you didn't back up somewhere), but as the alternative results in your agent being completely disavowed and forcing you to start a new game, it's a last opportunity to keep going with your current agent if you ''really'' messed up somewhere.
59* MakeItLookLikeAnAccident: The main story starts when [[spoiler: ARC decides that Uplink's most proficient agent, who was working for them in a secret project, [[IncrediblyLamePun needed to take a nap]].]]
60* GameMod: A very impressive one was released October 1, 2016, called Uplink OS which completely overhauled the graphics of the game so it looks more like mid-to-late TheNewTens common GUI design and less like a late [[TheNineties 90s]] GUI design. Even the developers were impressed. Though [[GameBreakingBug it does have quite a few bugs still being worked out.]]
61* TheMole: [[spoiler:[[VideoGameCrueltyPotential You]], if you manage to steal the whole list of agents of your very own company and sell it to a third party. Cue "[[MakeItLookLikeAnAccident suicide]]" spree among Uplink employees. To top it off, [[CosmeticAward you'll receive a Special Award for doing so.]]]]
62* NonStandardGameOver: The normal game over is the feds getting their hands on your gateway. There is basically only one non-standard game over and two ways to acquire it. [[spoiler: You can run any version of Revelation on your own system which, unsurprisingly, completely breaks it. When you follow the ARC missions, getting Revelation on your system is impossible to avoid and the end of the game.]]
63* NoPlansNoPrototypeNoBackup: After you complete a mission to hack into a server and delete key files, a news story will note how the company has lost years of work. Apparently none of them have considered backing up their precious data on removable, offline media.
64** Notably, your mission descriptions in this case will generally require you to delete the files and ''any backups'', which presumably would require you to go through and find backups, but none exist. Instead, it's intended to prevent you from copying the data to your own system before deleting it, so that you can't "return" it after getting paid.
65* NothingIsScarier: The blank screen when your account is suspended.
66* OneGenderRace: Not acknowledged in story but you will only see adult men in the databases. Well, it was made in 2000, back when [[ThereAreNoGirlsOnTheInternet there were no girls on the internet]].
67* OneHundredPercentCompletion: Subverted - you can't get all 12 special badges in a single playthrough.
68* OneStatToRuleThemAll: Processing power. Storage can be worked around with offsite computers[[note]]the Uplink test computer can be used as extra storage without any consequences at all[[/note]], and unless you're copying a large database for a mission[[note]]And sometimes even then: all the employer wants is all files uploaded to the FTP server. You don't have to upload it all at the same time[[/note]], 96 gigaquads is enough for most things. Upload/Download speed affects file copying and deleting, which is already pretty fast anyway with the basic 1GQ/s modem, and most systems support at least the 4GQ/s modem, which is fast enough for most things. Security is a category on it's own. But raw, unbridled processing power cannot be substituted: a faster modem and more storage will not affect how quickly you break into systems or how well your trace tracker works. You can get through the whole game without upgrading your modem or your storage. You cannot do the same with processing power.
69* OneWorldOrder: There is only one government, which makes hacking their databases very convenient.
70* OnlySmartPeopleMayPass: The Protovision game server. It's the only server in the game that's immune to the Password Breaker: to even get in, you have to understand the ''Film/WarGames'' reference.
71* ThePasswordIsAlwaysSwordfish:
72** Downplayed - admins will normally use random strings of letters and numbers, but give their [[RedShirt co-workers]] passwords from a list of common words shared by every company. Presumably, [[spoiler: God]] won a survey of easily remembered words, closely followed by [[spoiler: admin]] and then [[spoiler: password]]
73** [[StealthPun The password to the practice machine]] is always [[spoiler: [[Film/CitizenKane rosebud]] ]].
74** Although the password changes with each game, the Inter NIC passcode will always remain the same on that savegame.
75** Initially, even admins use highly insecure passwords, but as the game goes on and your notoriety rises, the cheap and cheerful ''Dictionary Cracker'' is about as much use as... well, a ''cream'' cracker. With the spate of hackings, massive amounts of data theft, data loss, server wipes, etc. etc., it's actually a nice touch that they do appear to wise up.
76* PasswordSlotMachine: The Password Breaker decrypts passwords in this way.
77* {{Permadeath}}: Get caught during a hack or passive traced, and your account will be suspended. To all intents and purposes, that game file is dead (justified in that Uplink disavows all knowledge of your actions, prevents you from ever reconnecting your gateway computer, and generally pulls the plug on your actions, while also implying that your gateway contains the only information that can lead directly back to you). You can go a bit meta and back up your saves, however.
78* PhoneTraceRace: As a variation, applies to network connections. A targetted company can trace unauthorized inbound connections in a way similar of the trope, closing in one node at a time. However, killing the connection at the last minute isn't enough, because companies still track down the hacker by examining passive logs that were used at a gateway (taking a few days to complete), requiring the player to cover their tracks later.
79* PiecemealFundsTransfer: Averted; delete the logs stating a millionaire transfer and the disappearance of thousands of credits from dozens of angry customers will be forever shrouded in mystery.
80* PlayfulHacker: ''You'', [[WideOpenSandbox if you so choose, anyway]]. Gain access to someone's academic record and give them a qualification as a Registered Sex Worker! Change someone's government records from reading 'Single' to 'Married' (or vice versa)! Plant a Bestiality charge on some poor random bastard's criminal record for the lulz! Give them a qualification in Mathsology, Archeomatics or [[Creator/StephenColbert Truthiness]]! Given that this is a British game, the most appropriate crime to pin on people is probably [[spoiler: buggery]].
81* PostModern: A borderline example, as rather than having a distinct character that the player acts as, the player ''is'' the character.
82* PressXToDie: After the Evil Corporation hands you TheVirus. [[spoiler:DO NOT ATTEMPT TO RUN REVELATION LOCALLY.]]
83** Although creative players can use it as a cheap (free!) alternative to a Self Destruct Device (which otherwise costs a significant amount of money and a hardware slot).
84* RealTime: Time moves in real time, even though people reply to messages instantly. You can speed up time though.
85* SaveScumming: Most clever players will back up their files, like any smart hacker should do. It's the only way to use a certain cheat code after the patch. [[spoiler:[=TooManySecrets=] no longer works as a cheat]]
86* ScareChord: While not a literal chord, any first time LAN hacker will jump at [[spoiler:the shrill sound when the System Administrator logs on.]]
87* SchmuckBait: ARC's email spells it out very, very clearly: [[spoiler:"DO NOT ATTEMPT TO RUN REVELATION LOCALLY."]] And yet there are still reports of people who have destroyed their own gateways in that very manner...
88* SchoolGradeHacking: Hacking the International Academic Database is an early game mission.
89* SequenceBreaking: Instead of following ARC's instructions, [[spoiler:you can destroy the whole Internet by yourself as soon as they send you the first version of Revelation. In fact is easier than sticking to the storyline since nobody else knows about the existence of the virus, therefore Faith hasn't even been conceived. The only difficulty added to this shortcut is that one must infect about twice the amount of computers that Revelation 3.0 would need, as well as amassing loads of money early to build a decent rig for the task (usually via [[GameBreaker bank hacking]]).[[https://www.youtube.com/watch?v=wiZp9CUwGhg This speedrun demonstrates it.]]]]
90* SelfDestructingSecurity: One security measure you can purchase for your gateway is a SelfDestructMechanism, intended as a last resort if the Feds are closing in on you. You lose all the hardware, but at least you avoid getting GameOver'd; if you have extra bank accounts set up you can use them to rebuild.
91* SensorSuspense: The Trace Tracker is an absolute necessity, since it shows you how close you are to being backhacked and identified. Much of the strategy in the game consists of finding ways to increase the amount of time you can spend on a system before they start getting too close.
92* ShoutOut:
93** Protovision's machine is a homage to ''Film/WarGames'' (it's the only machine you can't crack with the Password Breaker - you need to recognise the shout out to get the password ([[spoiler:JOSHUA]], of course), and Introversion (the developers) have an in-game website which mentions ''Film/JohnnyMnemonic'' and ''Film/MissionImpossible''. And then there's the Creator/SteveJacksonGames server, which has of course been pinched by the US Secret Service.
94** Also, the use of "Quads" as a measurement of data storage could be a ShoutOut to ''Franchise/StarTrek'', as [[http://memory-alpha.org/en/wiki/Quad quads]] are what the Federation computers use.
95** "Hello. I am the System Administrator. [[Film/{{Sneakers}} My voice is my passport. Verify me.]]"
96* SpiritualSuccessor:
97** ''Subversion'', which was explicitly declared a successor to ''Uplink'', and was supposed to be more physical, with a more [[{{Cyberpunk}} Cyberpunk]] look and feel. Sadly, in late 2011 the game officially descended into DevelopmentHell, and was finally and definitely cancelled soon after.
98** The Protovision machine's depiction of TheBigBoard is like a foreshadowing of the their following game ''VideoGame/{{DEFCON}}''.
99** ''VideoGame/{{Hacknet}}'' was conceived of as a spiritual successor to ''Uplink''
100* TakeThat: "Once again, the Global Criminal Database has been hacked. The system appears to have more security holes than the popular 'Micro Software' written in the late 20th Century". '''OUCH'''.
101* TechMarchesOn: Inverted - the developers apparently assumed that technology would progress much, much, ''much'' faster than it did in real life. In the Uplink universe a 60 [=GHz=] processor is considered ''slow''.
102* ThePasswordIsAlwaysSwordfish: Played with: administrators have random sequences of characters for passwords, which furthermore tend to change just after the player hacks the system. Civilians, however, use regular words for their bank account passwords. Another note is that there are two password-breaking programs available to buy in the game. One is the Dictionary Hack, and the other is simply called Password Breaker. Nobody actually uses the dictionary program as it won't always get you into a system, whereas the simple brute-force Password Breaker will get you in 99.99% of the time.
103* TwentyMinutesIntoTheFuture: It's set in 2010. [[http://forums.introversion.co.uk/introversion/viewtopic.php?t=2354 Now officially recognized as being set in the past.]]
104* UnintentionallyUnwinnable: It's possible to render some of the data retrieval missions unwinnable by purposefully vandalizing and wiping everything on the servers you hack.
105* UnreadablyFastText: Take a closer look at the output of the gateway installation program. You can read fast...
106* UnwinnableByDesign:
107** Abandoning the tutorial mission means the player doesn't have enough experience to accept missions, and also the player wouldn't have enough funds required to purchase software to break into any bank.
108** Once you make your decision in the first storyline mission, you've joined the associated faction. If you try changing your mind later (e.g. improve Faith when you first worked for ARC), your opponent in the climax will be overpowered compared to your own software.
109* UselessUsefulSpell: The Dictionary Breaker ''technically'' works faster than the Password Breaker program. However, because it only uses normal words, it quickly becomes entirely useless: the more systems you hack, the more passwords will be replaced with essentially gibberish that the Dictionary Breaker can't break at all, and trying it will still initiate a trace, wasting valuable time if it doesn't work. The Password Breaker is slower, but guaranteed to work eventually.
110** The Gateway Nuke, at least on its own: it ''will'' destroy your Gateway computer without fail if you set it off, but you have no way of knowing if you ''need'' to without the Motion Sensor package, which notifies you if someone is approaching you Gateway (yellow = 1 person, red = 2 people, and more than 1 person is usually bad). Without the Motion Sensor to know when the feds are about to grab your highly incriminating computer, the Gateway Nuke is useless. This ''also'' makes the KRONOS Corp 80-860 and the OMEGA Parallel Supercomputer Gateways have functionally no security slots at all, as they can only have one security option (either the Nuke or the Motion Sensor, not both).
111*** The UNITY High-Security Platform gateway is relatively decent, allowing for 4 [=CPUs=] (but only 64 [=Gq=] of data, generally not enough), but the main selling point is that it has 4 security slots. Unfortunately, there's only two security options, and multiple Motion Sensors are no more helpful than having just one (to say nothing of having multiple redundant Gateway Nukes). It's generally advised to ignore it and save up for the [=TRINITY-1686a=] Gateway, which is superior all around (though it still has a redundant security slot).
112* ViewerFriendlyInterface: Standardized login screens, massive loading bars and tasty IP-dialling visualizations.
113* ViolationOfCommonSense: Did you just complete a bank robbery for hundreds of thousands of credits and want to get away scot-free? Blow up your Gateway. Sure, you'll lose the hardware, but it means that you'll be completely untraceable: even if the police manage to trace your connection, the computer they'll find ''blew up'', and you've got hundreds of thousands of credits to build an entirely new one, so what do you care? [[spoiler: If you didn't delete the bank transfer records first, then you're still going to be arrested, though.]]
114* VirusAndCureNames: [[spoiler: Revelation can only be stopped with Faith]]
115* WakeUpCallBoss: The Global Criminal Database. There are more secure systems requiring voice print identification, but the GCD is very well protected, capable of completing an active trace faster than most other systems in the game, meaning you'll need dozens of bounces. Password breaking will take a surprising amount of time, and this is likely the first time you've seen the Quantum Cypher Key security system. In addition, the GCD uses a level 3 Firewall and a level 3 Proxy, a big step up from the Level 1 Proxy you've been seeing around (and possibly your first exposure to a firewall). Finally, the GCD is the first government database that will aggressively work on a passive trace, meaning you'd better be ready to cover your tracks. Your previous tricks won't work here, [[spoiler: but if you can save up the money to get a Connection Analyser HUD upgrade, along with a Monitor Bypass, the GCD becomes an easy source of money, as you'll almost never be traced actively, and passive traces are much slower when you don't set off the alarm.]]
116* WellIntentionedExtremist: [[spoiler:ARC seem like straight-up villains at first, but it's eventually revealed that they're a group of radical hacktivists who are appalled at the overly commercialized, corrupt state of the Internet and the danger to privacy and insecurity posed by the global governmental databases and wish to destroy it so they can start again from scratch.]]
117* WeWillSpendCreditsInTheFuture
118* WideOpenSandbox: There's nothing to stop you from ignoring the storyline entirely and focus on freelance hacking.
119* YouAllLookFamiliar: The game has a fair amount of portraits to populate its various databases with, but not enough to stop them from being full of dopplegangers on any given playthrough. But at least it's better than the voice clips, of which every single person in the game has one of a pool of about 3 or 4.

Top