Cards
Data Tree
Information gathering, defense, and data processing cards.
Data Tree Overview
The Data tree focuses on intelligence, defense, and utility. It’s the most well-rounded tree, offering card generation, malware removal, PvP scouting, and counterattack capabilities.
Constructs (Permanent Infrastructure)
Data Lake
The foundation of the Data tree. Required for Pattern Mining.
| Property | Value |
|---|---|
| HDD Cost | 1,275 |
| Tags | permanent, software |
| Enables | Pattern Mining factory |
Knowledge Substrate
Level 2+ Data construct for advanced processes.
Memory Core
Required for Query Resolution factory process.
| Property | Value |
|---|---|
| HDD Cost | 3,400 |
| Tags | permanent, software |
| Enables | Query Resolution factory |
Factory Processes
Pattern Mining
Primary card generation for the Data tree. Auto-runs every 48 hours, producing random data cards.
| Property | Value |
|---|---|
| Duration | 48h |
| Auto-Run | Yes |
| HDD Cost | 40 |
| RAM Cost | 128 |
| Money Cost | 900 |
| Requires | Data Lake (permanents) |
| Output | Random data card |
Additional factories include Index Compilation, Query Resolution, Canonicalization Pass, State Consolidation, and Dataset Ingestion.
Shards
Shards are consumable arguments for spells. HDD costs vary by tier: Basic (51), Core (255), Advanced (1,275).
| Shard | Used By |
|---|---|
| Basic Data Shard | Entropy Wipe (x2), Memory Leak Exploit |
| Core Data Shard | Network Scan, Memory Leak Exploit |
| Advanced Data Shard | Data Harvest, Counterhack (x2) |
Spells
Backtrace (Level 1)
Identifies sources of all active incoming network threads and adds them as contacts. No arguments required — always keep one handy.
| Property | Value |
|---|---|
| Duration | 6h |
| HDD Cost | 68 |
| RAM Cost | 48 |
| Requires | None |
Network Scan (Level 2)
Scans the world and adds top 10 stamp holders as contacts. Essential for PvP scouting.
| Property | Value |
|---|---|
| Duration | 24h |
| HDD Cost | 340 |
| RAM Cost | 119 |
| Requires | 1 Core Data Shard |
Entropy Wipe
The most important defensive spell in the game. Removes ALL malware permanents from your game in one cast.
| Property | Value |
|---|---|
| Duration | 12h |
| HDD Cost | 153 |
| RAM Cost | 77 |
| Requires | 2 Basic Data Shards |
Data Harvest
Steals one random card from a target player’s HDD.
| Property | Value |
|---|---|
| Duration | 36h |
| HDD Cost | 680 |
| RAM Cost | 153 |
| Requires | Contact (player) + 1 Advanced Data Shard |
Memory Leak Exploit
Injects net_memory_leak malware (170 HDD + 510 RAM drain) into target.
| Property | Value |
|---|---|
| Duration | 24h |
| HDD Cost | 468 |
| RAM Cost | 289 |
| Requires | Contact + 1 Core Data Shard |
Counterhack (Level 3)
Mirrors all active incoming network threads back at their attackers.
| Property | Value |
|---|---|
| Duration | 1h |
| HDD Cost | 2,550 |
| RAM Cost | 510 |
| Requires | 2 Advanced Data Shards |
Network Reset (Level 2)
Cancels all active incoming network threads — erases all pending attacks on you.
| Property | Value |
|---|---|
| Duration | 1h |
| HDD Cost | 765 |
| RAM Cost | 340 |
| Requires | 2 Core Data Shards |
Defensive Permanents
Airgapped Architecture (Level 3)
The strongest defensive permanent. Blocks ALL Targeted Attack and Contracted Support attacks permanently. Not consumed on use.
| Property | Value |
|---|---|
| HDD Cost | 3,400 |
| RAM Cost | 187 |
| Money Cost | 25,000 |
| Requires | 3 Advanced + 2 Core + 1 Basic Data Shard |
| Effect | Permanently blocks Targeted Attack / Contracted Support |
Intrusion Control Environment (ICE) (Level 2)
Intercepts Targeted Attack or Contracted Support — ICE is destroyed instead of the target. Single-use protection.
| Property | Value |
|---|---|
| HDD Cost | 119 |
| RAM Cost | 51 |
| Money Cost | 8,000 |
| Requires | 2 Core + 1 Basic Data Shard |
| Effect | Sacrifices itself to block one Targeted Attack / Contracted Support |
Magellan Protocol (Level 1)
Links to a specific card. When that card would be destroyed by Targeted Attack or Contracted Support, Magellan Protocol is consumed instead.
| Property | Value |
|---|---|
| HDD Cost | 102 |
| RAM Cost | 15 |
| Money Cost | 600 |
| Link Slots | 1 |
| Requires | 2 Basic Data Shards |
| Effect | Sacrifices itself to protect linked card |
Compression Algo (Level 1)
Utility permanent. Placeholder for future HDD reduction mechanic.
| Property | Value |
|---|---|
| HDD Cost | 50 |
| RAM Cost | 4 |
| Requires | 1 Basic Data Shard |
Distributed Computing (Level 1)
Utility permanent. Placeholder for future compute-sharing mechanic.
| Property | Value |
|---|---|
| HDD Cost | 85 |
| RAM Cost | 4 |
| Requires | 3 Basic Data Shards |
Utility Cards
Packet Sniffer (Level 1)
Targeted malware removal — destroys one Net Malformed Packet permanent.
| Property | Value |
|---|---|
| Duration | 24h |
| HDD Cost | 51 |
| RAM Cost | 3 |
| Requires | 1 Basic Data Shard |
| Effect | Removes 1 net_malformed_packet |
Open Source Dataset
Produces a Basic Data Shard. The cheapest way to acquire data shards.
| Property | Value |
|---|---|
| Duration | 42h |
| HDD Cost | 9 |
| RAM Cost | 4 |
| Rewards | 1 Basic Data Shard |
Web Trolling (Auto-Run)
Auto-run card that produces random data cards without needing a construct.
| Property | Value |
|---|---|
| Duration | 30h |
| Auto-Run | Yes |
| HDD Cost | 3 |
| RAM Cost | 4 |
| Output | Random data card |
Defense Priority Chain
When a Targeted Attack or Contracted Support hits you, defenses activate in this order:
- Airgapped Architecture — blocks entirely (NOT consumed)
- ICE — destroyed instead of target
- Magellan Protocol — consumed instead of linked card
- If none: attack resolves normally
Strategy Notes
- Build Data Lake first — Pattern Mining is your primary card source
- Always have Entropy Wipe ready — it’s your only way to clear all malware
- Airgapped Architecture is endgame defense — expensive (6 shards + 25K money) but permanent protection
- ICE is great mid-game — cheaper single-use protection while you build toward Airgapped
- Backtrace has no shard cost — use it freely when you detect incoming attacks
- Network Reset vs Counterhack — Reset cancels attacks (defensive), Counterhack mirrors them (offensive)
- Packet Sniffer vs Entropy Wipe — Sniffer removes 1 malformed packet cheaply; Entropy Wipe removes ALL malware but costs 2 shards
- Web Trolling is free value — only 3 HDD + 4 RAM for auto-run card generation
- Network Scan before any PvP campaign — know your targets