Cards

Data Tree

Information gathering, defense, and data processing cards.

Data Tree Overview

The Data tree focuses on intelligence, defense, and utility. It’s the most well-rounded tree, offering card generation, malware removal, PvP scouting, and counterattack capabilities.

Constructs (Permanent Infrastructure)

Data Lake

The foundation of the Data tree. Required for Pattern Mining.

PropertyValue
HDD Cost1,275
Tagspermanent, software
EnablesPattern Mining factory

Knowledge Substrate

Level 2+ Data construct for advanced processes.

Memory Core

Required for Query Resolution factory process.

PropertyValue
HDD Cost3,400
Tagspermanent, software
EnablesQuery Resolution factory

Factory Processes

Pattern Mining

Primary card generation for the Data tree. Auto-runs every 48 hours, producing random data cards.

PropertyValue
Duration48h
Auto-RunYes
HDD Cost40
RAM Cost128
Money Cost900
RequiresData Lake (permanents)
OutputRandom data card

Additional factories include Index Compilation, Query Resolution, Canonicalization Pass, State Consolidation, and Dataset Ingestion.

Shards

Shards are consumable arguments for spells. HDD costs vary by tier: Basic (51), Core (255), Advanced (1,275).

ShardUsed By
Basic Data ShardEntropy Wipe (x2), Memory Leak Exploit
Core Data ShardNetwork Scan, Memory Leak Exploit
Advanced Data ShardData Harvest, Counterhack (x2)

Spells

Backtrace (Level 1)

Identifies sources of all active incoming network threads and adds them as contacts. No arguments required — always keep one handy.

PropertyValue
Duration6h
HDD Cost68
RAM Cost48
RequiresNone

Network Scan (Level 2)

Scans the world and adds top 10 stamp holders as contacts. Essential for PvP scouting.

PropertyValue
Duration24h
HDD Cost340
RAM Cost119
Requires1 Core Data Shard

Entropy Wipe

The most important defensive spell in the game. Removes ALL malware permanents from your game in one cast.

PropertyValue
Duration12h
HDD Cost153
RAM Cost77
Requires2 Basic Data Shards

Data Harvest

Steals one random card from a target player’s HDD.

PropertyValue
Duration36h
HDD Cost680
RAM Cost153
RequiresContact (player) + 1 Advanced Data Shard

Memory Leak Exploit

Injects net_memory_leak malware (170 HDD + 510 RAM drain) into target.

PropertyValue
Duration24h
HDD Cost468
RAM Cost289
RequiresContact + 1 Core Data Shard

Counterhack (Level 3)

Mirrors all active incoming network threads back at their attackers.

PropertyValue
Duration1h
HDD Cost2,550
RAM Cost510
Requires2 Advanced Data Shards

Network Reset (Level 2)

Cancels all active incoming network threads — erases all pending attacks on you.

PropertyValue
Duration1h
HDD Cost765
RAM Cost340
Requires2 Core Data Shards

Defensive Permanents

Airgapped Architecture (Level 3)

The strongest defensive permanent. Blocks ALL Targeted Attack and Contracted Support attacks permanently. Not consumed on use.

PropertyValue
HDD Cost3,400
RAM Cost187
Money Cost25,000
Requires3 Advanced + 2 Core + 1 Basic Data Shard
EffectPermanently blocks Targeted Attack / Contracted Support

Intrusion Control Environment (ICE) (Level 2)

Intercepts Targeted Attack or Contracted Support — ICE is destroyed instead of the target. Single-use protection.

PropertyValue
HDD Cost119
RAM Cost51
Money Cost8,000
Requires2 Core + 1 Basic Data Shard
EffectSacrifices itself to block one Targeted Attack / Contracted Support

Magellan Protocol (Level 1)

Links to a specific card. When that card would be destroyed by Targeted Attack or Contracted Support, Magellan Protocol is consumed instead.

PropertyValue
HDD Cost102
RAM Cost15
Money Cost600
Link Slots1
Requires2 Basic Data Shards
EffectSacrifices itself to protect linked card

Compression Algo (Level 1)

Utility permanent. Placeholder for future HDD reduction mechanic.

PropertyValue
HDD Cost50
RAM Cost4
Requires1 Basic Data Shard

Distributed Computing (Level 1)

Utility permanent. Placeholder for future compute-sharing mechanic.

PropertyValue
HDD Cost85
RAM Cost4
Requires3 Basic Data Shards

Utility Cards

Packet Sniffer (Level 1)

Targeted malware removal — destroys one Net Malformed Packet permanent.

PropertyValue
Duration24h
HDD Cost51
RAM Cost3
Requires1 Basic Data Shard
EffectRemoves 1 net_malformed_packet

Open Source Dataset

Produces a Basic Data Shard. The cheapest way to acquire data shards.

PropertyValue
Duration42h
HDD Cost9
RAM Cost4
Rewards1 Basic Data Shard

Web Trolling (Auto-Run)

Auto-run card that produces random data cards without needing a construct.

PropertyValue
Duration30h
Auto-RunYes
HDD Cost3
RAM Cost4
OutputRandom data card

Defense Priority Chain

When a Targeted Attack or Contracted Support hits you, defenses activate in this order:

  1. Airgapped Architecture — blocks entirely (NOT consumed)
  2. ICE — destroyed instead of target
  3. Magellan Protocol — consumed instead of linked card
  4. If none: attack resolves normally

Strategy Notes

  • Build Data Lake first — Pattern Mining is your primary card source
  • Always have Entropy Wipe ready — it’s your only way to clear all malware
  • Airgapped Architecture is endgame defense — expensive (6 shards + 25K money) but permanent protection
  • ICE is great mid-game — cheaper single-use protection while you build toward Airgapped
  • Backtrace has no shard cost — use it freely when you detect incoming attacks
  • Network Reset vs Counterhack — Reset cancels attacks (defensive), Counterhack mirrors them (offensive)
  • Packet Sniffer vs Entropy Wipe — Sniffer removes 1 malformed packet cheaply; Entropy Wipe removes ALL malware but costs 2 shards
  • Web Trolling is free value — only 3 HDD + 4 RAM for auto-run card generation
  • Network Scan before any PvP campaign — know your targets