Editing Armor customization (Halo Infinite)/Chimera/Chest

From Halopedia, the Halo wiki

You are not logged in. Your IP address will be publicly visible if you make any edits. If you log in or create an account, your edits will be attributed to your username, along with other benefits.

The edit can be undone. Please check the comparison below to verify that this is what you want to do, and then publish the changes below to finish undoing the edit.

Latest revision Your text
Line 10: Line 10:
! scope="col" style="width: 20%" |Unlock requirements
! scope="col" style="width: 20%" |Unlock requirements
|-
|-
|align="center"|[[File:HINF - Compliance Protocol chest icon.png|75px]]<br>Compliance Protocol
|align="center"|[[File:HINF - Compliance Protocol chest icon.png|75px]]<br/>Compliance Protocol
|Fracture: Firewall
|Fracture: Firewall
|The cutting edge of enforcement pruning and tending of social cohesion.
|The cutting edge of enforcement pruning and tending of social cohesion.
Line 18: Line 18:


|-
|-
|align="center"|[[File:HINF - Defiance Protocol chest icon.png|75px]]<br>Defiance Protocol
|align="center"|[[File:HINF - Defiance Protocol chest icon.png|75px]]<br/>Defiance Protocol
|Fracture: Firewall
|Fracture: Firewall
|Valuable Executors may be fitted with sub-tactical thermonuclear self-destruct devices to deny their minds and production data to rival assemblies in cases where recovery is deemed cost ineffective.
|Valuable Executors may be fitted with sub-tactical thermonuclear self-destruct devices to deny their minds and production data to rival assemblies in cases where recovery is deemed cost ineffective.
Line 26: Line 26:


|-
|-
|align="center"|[[File:HINF - Revelation Protocol chest icon.png|75px]]<br>Revelation Protocol
|align="center"|[[File:HINF - Revelation Protocol chest icon.png|75px]]<br/>Revelation Protocol
|Fracture: Firewall
|Fracture: Firewall
|The inspirations of unliving minds is not for biologics to understand or appreciate.
|The inspirations of unliving minds is not for biologics to understand or appreciate.
Line 36: Line 36:


|-
|-
|align="center"|[[File:HINF - Savior Protocol chest icon.png|75px]]<br>Savior Protocol
|align="center"|[[File:HINF - Savior Protocol chest icon.png|75px]]<br/>Savior Protocol
|Fracture: Firewall
|Fracture: Firewall
|All Exectors can be discarded on a whim, but some are less disposable than others.
|All Exectors can be discarded on a whim, but some are less disposable than others.
Line 46: Line 46:


|-
|-
|align="center"|[[File:HINF - Chest icon - Conservation Protocol.png|75px]]<br>Conservation Protocol
|align="center"|[[File:HINF - Chest icon - Conservation Protocol.png|75px]]<br/>Conservation Protocol
|Fracture: Firewall
|Fracture: Firewall
|All who comply will be sheltered. All who defy will be terminated.
|All who comply will be sheltered. All who defy will be terminated.
Line 54: Line 54:


|-
|-
|align="center"|[[File:HINF - Chest icon - Crux Protocol.png|75px]]<br>Crux Protocol
|align="center"|[[File:HINF - Chest icon - Crux Protocol.png|75px]]<br/>Crux Protocol
|Fracture: Firewall
|Fracture: Firewall
|To the assemblies, heart and soul are as interchangeable as meat and metal.
|To the assemblies, heart and soul are as interchangeable as meat and metal.
Line 62: Line 62:


|-
|-
|align="center"|[[File:HINF - Chest icon - Deviant Protocol.png|75px]]<br>Deviant Protocol
|align="center"|[[File:HINF - Chest icon - Deviant Protocol.png|75px]]<br/>Deviant Protocol
|Fracture: Firewall
|Fracture: Firewall
|Executors who bear the mark of the viral machine often have malformed carapace attachments, but their stigmata do not seem to be recognized by other Executors and assembly observation protocols.
|Executors who bear the mark of the viral machine often have malformed carapace attachments, but their stigmata do not seem to be recognized by other Executors and assembly observation protocols.
Line 72: Line 72:


|-
|-
|align="center"|[[File:HINF - Chest icon - Fairlight Echoclusters.png|75px]]<br>Fairlight Echoclusters
|align="center"|[[File:HINF - Chest icon - Fairlight Echoclusters.png|75px]]<br/>Fairlight Echoclusters
|Fracture: Firewall
|Fracture: Firewall
|Portable datacores fitted to Executor couriers and command nodes.
|Portable datacores fitted to Executor couriers and command nodes.
Line 80: Line 80:


|-
|-
|align="center"|[[File:HINF - Chest icon - Implementation Protocol.png|75px]]<br>Implementation Protocol
|align="center"|[[File:HINF - Chest icon - Implementation Protocol.png|75px]]<br/>Implementation Protocol
|Fracture: Firewall
|Fracture: Firewall
|Executors are well-equipped to engage with anomalies that resist corrective action.
|Executors are well-equipped to engage with anomalies that resist corrective action.
Line 90: Line 90:


|-
|-
|align="center"|[[File:HINF - Chest icon - Organic Metal Extender.png|75px]]<br>Organic Metal Extender
|align="center"|[[File:HINF - Chest icon - Organic Metal Extender.png|75px]]<br/>Organic Metal Extender
|Fracture: Firewall
|Fracture: Firewall
|In theory, given enough time, the OME can rebuild an Executor's body from broken scraps of flesh and endoskeleton. Unfortunately, it cannot replace a cortical stack.
|In theory, given enough time, the OME can rebuild an Executor's body from broken scraps of flesh and endoskeleton. Unfortunately, it cannot replace a cortical stack.
Line 98: Line 98:


|-
|-
|align="center"|[[File:HINF - Chest icon - Maverick Protocol.png|75px]]<br>Maverick Protocol
|align="center"|[[File:HINF - Chest icon - Maverick Protocol.png|75px]]<br/>Maverick Protocol
|Fracture: Firewall
|Fracture: Firewall
|Despite their best efforts, some Executors refuse to die.
|Despite their best efforts, some Executors refuse to die.
Line 106: Line 106:


|-
|-
|align="center"|[[File:HINF - Chest icon - Oracle Protocol.png|75px]]<br>Oracle Protocol
|align="center"|[[File:HINF - Chest icon - Oracle Protocol.png|75px]]<br/>Oracle Protocol
|Fracture: Firewall
|Fracture: Firewall
|Ancient xenotech may not be replicable at an industrial scale, but existing samples can be indexed, adapted, and refitted into useful forms.
|Ancient xenotech may not be replicable at an industrial scale, but existing samples can be indexed, adapted, and refitted into useful forms.
Line 114: Line 114:


|-
|-
|align="center"|[[File:HINF - Chest icon - Sundered Protocol.png|75px]]<br>Sundered Protocol
|align="center"|[[File:HINF - Chest icon - Sundered Protocol.png|75px]]<br/>Sundered Protocol
|Fracture: Firewall
|Fracture: Firewall
|The Created decompile and extract all data in their grasp, regardless of the risks.
|The Created decompile and extract all data in their grasp, regardless of the risks.

Please note that all contributions to Halopedia are considered to be released under the Attribution-ShareAlike 4.0 International license (see Halopedia:Copyrights for details). If you don't want your writing to be edited mercilessly and redistributed at will, then don't submit it here. You are also promising us that you wrote this yourself, or copied it from a public domain or similar free resource. Do not submit copyrighted work without permission!

Cancel Editing help (opens in new window)

To view or search uploaded images go to the list of images. Uploads and deletions are also logged in the upload log. For help including images on a page see Help:Images. For a sound file, use this code: [[Media:File.ogg]].

Do not copy text from other websites without permission. It will be deleted.