Wraith is a Stealth Program which, once installed in a node, permanently disables the node's functionality and firewall regeneration for the rest of the hack. The Access program needs to be installed on a neighbouring node before Wraith can be installed.
Wraithed Security Nodes:
- Turrets and Black ICE nodes will no longer attack.
- Code Gate filters will be removed.
- Scanners will no longer detect subsequent programs.
- Guardians will no longer apply shields.
All Wraithed Nodes:
- Disabled nodes are unable to spread a Sentry's antivirus.
- Disabled nodes are prevented from regenerating their firewall.
- Notes: While the Wraith is technically allowed to upgrade at the Evolver levels displayed, the Capacity of B-coins that can be held at those levels may not be sufficient to purchase the upgrade.
More Info here: Max amount of B-coins at Core Level.
|1||135 / second||B100|
|2||130 / second||B200|
|3||125 / second||B300|
|4||120 / second||B400|
|5||115 / second||B500|
|6||110 / second||B600|
|7||105 / second||B700|
|8||100 / second||B800|
|9||95 / second||B900|
|10||90 / second||B1,000|
|11||85 / second||B1,100|
|12||80 / second||B1,200|
|13||75 / second||B1,300|
|14||70 / second||B1,400|
|15||65 / second||B1,500|
|16||60 / second||B1,600|
|17||55 / second||B1,700|
|18||50 / second||B1,800|
|19||45 / second||B1,900|
|20||40 / second||B2,000|
|21||35 / second||B2,100|
- Unlike Access, the Filter statistic of a Code Gate doesn't apply to Wraiths, so they always take 2 seconds to install.
- When dealing with Code Gates, it is generally advisable to install a Wraith to disable the Gate's Filter before installing an Access, as the Visibility cost will be less than if one installed an Access under the effect of the Filter. The exception is when the Gate and Wraith are low level, but the Access is high level.
- Since nodes under the Wraith effect do not spread antivirus, it can sometimes be beneficial to wraith a chokepoint deep in the network. This could save a lot of programs near the start of the hack, depending on the number, level, and positioning of sentries.
- This video shows an example of a successful hack using the Wraith program.
|Hackers Wikia - Programs List|