Image | Description |
![]() |
A Hacking system used to override electronic security systems, potentially providing access to valuable data or items. Note: Due to recently discovered branch prediction vulnerabilities in certain Upwell Consortium Recursive Computing Modules this analyzer may also be used to collect sensitive information concerning reinforcement periods of Upwell Structures. |
|
|
|
|
Group | Name | Access Difficulty | Range | CPU | Powergrid |
Tech I |
Data Analyzer I | 5 % | 5,000 m | 20 tf | 1 MW |
Tech II |
Data Analyzer II | 7 % | 6,000 m | 25 tf | 1 MW |
Storyline |
Ligature Integrated Analyzer | 5 % | 5,000 m | 25 tf | 1 MW |
Storyline |
Purloined Sansha Data Analyzer | 5 % | 10,000 m | - | - |
Storyline |
Zeugma Integrated Analyzer | 7 % | 6,000 m | 30 tf | 1 MW |
Limited Time |
Frostline 'Clavicula' Integrated Analyzer | 6 % | 6,000 m | 25 tf | 1 MW |
Manufacturing
|
Recycling Output
|
Manufacturing |
|
Item | Quantity |
Zeugma Integrated Analyzer Blueprint | 1 |
Other |
||
Attribute Name | Display Name | Value |
radius | 500 |