// Your Role
You are an operator — a ghost in high-security networks.
You choose targets, manage your tools, and go in.
Extract the data before your trace reaches 100. Leave nothing behind.
// How It Works
[ PREPARE ]
Select target, rig, and tools. Build your loadout around the job.
[ INFILTRATE ]
Navigate nodes. Every choice costs trace or bandwidth. There is no undo.
[ EXTRACT ]
Secure your payload and get out. Push deeper for more — if you can afford the risk.
// The World Moves Without You
- Targets accumulate pressure from every operator that hits them
- Other operators leave traces — you can see who went in and what happened
- Market prices shift with collective extraction activity
- Hot targets pay more. They're also harder to survive.
// Faction Affiliations
Cyber Syndicate
Volume extraction. High risk, high return. The network rewards aggression.
Corporate Security
Precision work. Low trace, clean exits. Some clients pay for discretion above everything.
Rogue AI
Disruption. Sabotage. The network does not need to make sense — it needs to burn.