This page is currently in English. Please translate into Indonesian.
Articles are constantly being updated.
Please copy contents from the source page before beginning translations.
Source provided for guidelines only.
Please feel free to rephrase the article to suit the needs of the language.
Articles are constantly being updated.
Please copy contents from the source page before beginning translations.
Source provided for guidelines only.
Please feel free to rephrase the article to suit the needs of the language.
Summary[]
Wraith is a Stealth Program which, once installed in a node, permanently disables the node's functionality for the rest of the hack. The Access program needs to be installed on a neighbouring node before Wraith can be installed.
Wraithed Security Nodes:
- Turrets and Black ICE nodes will no longer attack.
- Code Gate filters will be removed
- Scanners will no longer detect subsequent programs
- Guardians will no longer apply shields
All Nodes:
- Disabled nodes are unable to spread a Sentry's antivirus
- Disabled nodes are prevented from regenerating their firewall.
Statistics[]
- Notes: While the Wraith is technically allowed to upgrade at the Evolver levels displayed, the Capacity of B-coins that can be held at those levels may not be sufficient to purchase the upgrade.
More Info here: Max amount of B-coins at Core Level.
Program Level |
Visibility (per second) |
Harga Kompilasi |
1 | 135 / Detik | B100 |
2 | 130 / Detik | B200 |
3 | 125 / Detik | B300 |
4 | 120 / Detik | B400 |
5 | 115 / Detik | B500 |
6 | 110 / Detik | B600 |
7 | 105 / Detik | B700 |
8 | 100 / Detik | B800 |
9 | 95 / Detik | B900 |
10 | 90 / Detik | B1,000 |
11 | 85 / Detik | B1,100 |
12 | 80 / Detik | B1,200 |
13 | 75 / Detik | B1,300 |
14 | 70 / Detik | B1,400 |
15 | 65 / Detik | B1,500 |
16 | 60 / Detik | B1,600 |
17 | 55 / Detik | B1,700 |
18 | 50 / Detik | B1,800 |
19 | 45 / Detik | B1,900 |
20 | 40 / Detik | B2,000 |
21 | 35 / Detik | B2,100 |
Program Level |
Harga Upgrade |
Exp Didapat |
Waktu Riset |
Membutuhkan Evolver Level |
1 | B8,000 | 475 | 18 Jam | 5 |
2 | B16,000 | 500 | 24 Jam | 5 |
3 | B32,000 | 600 | 32 Jam | 6 |
4 | B48,000 | 700 | 40 Jam | 6 |
5 | B60,000 | 800 | 48 Jam | 7 |
6 | B80,000 | 830 | 56 Jam | 7 |
7 | B100,000 | 860 | 64 Jam | 8 |
8 | B120,000 | 900 | 72 Jam | 8 |
9 | B140,000 | 930 | 80 Jam | 9 |
10 | B160,000 | 960 | 88 Jam | 9 |
11 | B180,000 | 1,000 | 96 Jam | 9 |
12 | B200,000 | 1,080 | 104 Jam | 10 |
13 | B220,000 | 1,160 | 112 Jam | 10 |
14 | B260,000 | 1,250 | 120 Jam | 10 |
15 | B300,000 | 1,330 | 128 Jam | 11 |
16 | B340,000 | 1,410 | 136 Jam | 11 |
17 | B380,000 | 1,500 | 144 Jam | 11 |
18 | B420,000 | 1,625 | 156 Jam | 11 |
19 | B440,000 | 1,750 | 168 Jam | 12 |
20 | B460,000 | 1,875 | 180 Jam | 12 |
21 | B480,000 | 2,000 | 192 Jam | 12 |
Total | B4,444,000 | 23,535 | 2,058 Jam | 12 |
Tips[]
- Unlike Access, the Filter statistic of a Code Gate doesn't apply to Wraiths, so they always take 2 seconds to install.
- When dealing with Code Gates, it is generally advisable to install a Wraith to disable the Gate's Filter before installing an Access, as the Visibility cost will be less than if one installed an Access under the effect of the Filter. The exception is when the Gate and Wraith are low level, but the Access is high level.
- Since nodes under the Wraith effect do not spread antivirus, it can sometimes be beneficial to wraith a chokepoint deep in the network. This could save a lot of programs near the start of the hack, depending on the number, level, and positioning of sentries.
- This video shows an example of a successful hack using the Wraith program.
Hackers Wikia - Programs | ||
---|---|---|
Beranda | ||
Program | Node | Permainan |
Program Penyerangan |
Pemukul Dinding
Meriam Laser
Blaster
Kraken | |
Program Pertahanan | ||
Program Sembunyi |
Akses Lintah Data Portal Roh |