Skip to content

Commit 699adb6

Browse files
Merge pull request #8 from renatomassaro/missions
Add primer on Mission types
2 parents 27e2e3a + db7dfaa commit 699adb6

File tree

2 files changed

+151
-2
lines changed

2 files changed

+151
-2
lines changed

en/missions.txt

Lines changed: 151 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,151 @@
1+
# Mission modes
2+
3+
## PvE
4+
5+
PvE missions use Player's real IP. It includes Trace, Heat and Police as usual. Bounces can be used.
6+
7+
Trace should be shaped: more aggressive on mission targets, and non-existent when interacting with mission source (e.g. steal).
8+
9+
### Delete
10+
11+
1 team (Player). 1 generated server.
12+
13+
Player must delete a file at the given server.
14+
15+
### Steal
16+
17+
1 team (Player). 2 generated servers.
18+
19+
Player must download a file from a server and upload it to another.
20+
21+
### Destroy
22+
23+
1 team (Player). 1 generated server.
24+
25+
Player must DDoS a server until it's taken out of service.
26+
27+
## PvP
28+
29+
Missions are controlled environments in which Player's IP address is hidden/protected.
30+
31+
In order to do so, members of the mission get a temporary IP address on their gateway for the duration of the mission. Attacking unrelated servers will leak player's real IP.
32+
33+
Bounces can't be used (for now at least). There's no Trace, Heat or Police.
34+
35+
Players not participating in the mission do not have access to mission-related servers (including Players).
36+
37+
For all, or most modes, there's a "Preparation" time before IPs are made public. During this time, players can prepare themselves and elaborate a strategy.
38+
39+
### Hostage
40+
41+
2 teams; 1 server for each team. max 10 players
42+
43+
Team Counter must recover a big file from Terrors's servers, while team Terror must protect this file.
44+
45+
Once recovered, team Counter must upload the file to its servers, and Terror should stop it.
46+
47+
File can't be deleted. Can be hidden/encrypted.
48+
49+
Team IPs are public.
50+
51+
### Bomb
52+
53+
2 teams; 2 servers for each team. max 10 players
54+
55+
Team Terror must access its servers, download the Bomb file, attack Counter's servers and upload the bomb.
56+
57+
Team Counter must protect its servers, or attack Terror and delete Bomb file.
58+
59+
Bomb file can be deleted. If all copies are deleted, Counter wins. Members of Terror can have a copy of Bomb, which is equally valid.
60+
61+
Team IPs are public.
62+
63+
### Last Man Standing
64+
65+
N teams; no team servers. Max 10 players
66+
67+
Each Player is a team. Each Player receives a file, which they must hold on to. If the file is deleted, Player "dies". Last player to survive wins.
68+
69+
Yet to be solved: ways to stop camping, ensure players attack each other.
70+
71+
Members' IP are public.
72+
73+
### Team Deathmatch
74+
75+
2 teams; no team servers. Max 10 players.
76+
77+
Players must kill members of other teams, and protect themselves. Killing happens by uploading a file to someone else, and having that file live remotely for a period of time.
78+
79+
No friendly fire. Respawn can be an optional feature.
80+
81+
Members' IP are public.
82+
83+
### Capture the Flag
84+
85+
2 teams; 1 server for each team. Max 10 players.
86+
87+
Each team server holds a Flag file. Teams must 1) protect their flag and 2) steal other team's flag.
88+
89+
Protection happens in several layers: stopping remote attacks, encrypting and hiding flag, counter-attacking to cancel uploads/downloads, etc.
90+
91+
Flag must not be deleted. It can't be downloaded by own members, nor have copies created.
92+
93+
Team IPs are public.
94+
95+
### Hunted (Wanted List)
96+
97+
N teams (Player). REAL IP.
98+
99+
Hunter may select a player from the Wanted List to trace down, receiving a bounty. Several players may try to hunt the same Wanted at the same time, hence multiple teams may be formed.
100+
101+
IP of Hunters is not shared. Hunters have access to last known locations from the Wanted, when the original trace happened.
102+
103+
Hunter must follow the bounce logs until he believes he has reached the Wanted player, in which case he notifies the police. If that's indeed the Wanted player, mission ends and he receives the bounty.
104+
105+
Improvement: in case of multiple Hunters, detect which of them first logged on each bounced hop, and have the reward split according to "numbers of hop discovered". This eliminates the possibility of someone getting (n-1) hops so someone else comes and claims the last hop (gateway).
106+
107+
Last Known Addresses are public to members of the mission only. Extreme heat and trace should be applied if Hunters behave in unexpected ways within these addresses (even after the mission has ended).
108+
109+
###
110+
111+
## CvC (Clan vs Clan)
112+
113+
### Conquest
114+
115+
2 clans; REAL IPs. Unlimited members.
116+
117+
3 or 5 NPCs are generated. During Preparation time, Defending Clan has access to them and can set up a defense/strategy.
118+
119+
Once Prep. time is out, Attacking Clan has a limited time to attack & conquer majority of NPCs.
120+
121+
Conquering an NPC is done by uploading and installing 3 different files (which all members have access). Clan who owns at least 2 of these 3 files have control over the NPC.
122+
123+
Once Mission time is up, clan with majority of NPCs wins, having the dispute territory rewarded to him.
124+
125+
### Clan Deathmatch
126+
127+
Identical to Team Deathmatch, except that exclusive to clan members. Fake IP. Unlimited members. Potentially uneven teams.
128+
129+
This mission is created when one of the clan requests to fight against another one.
130+
131+
### Clan Raid
132+
133+
Clan Raid is a specific type of attack targeted against a Clan's bank, where one Clan (if successful) can steal other clan's money.
134+
135+
It's not a mission. Members aren't notified that their clan will be attacked.
136+
137+
## CvE
138+
139+
### Expansion
140+
141+
1 to N teams; REAL IPs. Potentially CvC
142+
143+
Similar to Conquest, but Clan is expanding to a territory that has no owner. In that case, 2 to 5 NPCs are generated and clan must attack those servers, same as Conquest.
144+
145+
After conquered, those NPCs (all of them) must remain conquered until the end of the mission.
146+
147+
However, this mission is public (everyone can see), and of special interest to the Resistance or nearby clans. As such, other players can join the mission as it is happening, raid the NPCs and prevent the expansion.
148+
149+
Expansion may not only be prevented but actually "stolen". If another group "counter-attacks" the original expansion, and manages to conquer all NPCs at the end of the mission, then it will attach the disputed territory to itself.
150+
151+
More than one group may join the expansion mission after it has started.

en/sidebar.txt

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -32,8 +32,6 @@
3232
- [[en:clan:War]]
3333
- [[en:clan:police|Private Police]]
3434
- [[en:Missions]]
35-
- [[en:missions:PvE]]
36-
- [[en:missions:PvP]]
3735
- [[en:police|Police / Law Enforcement]]
3836
- [[en:police:publicvsprivate|Public vs Private police]]
3937
- [[en:Finance]]

0 commit comments

Comments
 (0)