Active Entries
- 1: Adjunctive: Bedding In
- 2: Excerpt 011: Recalibration | OTA
- 3: Fragment: Dawning Realization
- 4: Excerpt 010: Hero's Return
- 5: Excerpt 009: Unsettled (Open to All)
- 6: Excerpt 008: Ishtar Sink Joyride
- 7: Excerpt 006: Aggressive Defence
- 8: Excerpt 005: The Dead and the Gone
- 9: Excerpt 007: Lay of the Land
Style Credit
- Style: Neutral Good for Practicality by
Expand Cut Tags
No cut tags
no subject
Date: 2015-09-06 02:48 am (UTC)There's much less of the hydra left than the minotaur; instead of a full mind there are only the remnants tasked to handle the beams' operation. None of the aggressive probing from before: the subroutines here are much subtler, willing to share information once their security protocols have been dealt with. There are models for thousands of different configurations, many with uses that Samus might guess: an infantry weapon becomes a signal transmitter becomes an excavation tool becomes any kind of network relay.
The problem is, every data packet on how the weapon (instrument?) handles those configurations - and all records of their previous use - are themselves Vex data. They look harmless, but trying to take one is just inviting it to quietly multiply in your own system.