Editing Armor customization (Halo Infinite)/Chimera/Chest
From Halopedia, the Halo wiki
The edit can be undone. Please check the comparison below to verify that this is what you want to do, and then publish the changes below to finish undoing the edit.
| Latest revision | Your text | ||
| Line 10: | Line 10: | ||
! scope="col" style="width: 20%" |Unlock requirements | ! scope="col" style="width: 20%" |Unlock requirements | ||
|- | |- | ||
|align="center"|[[File:HINF - Compliance Protocol chest icon.png|75px]]<br>Compliance Protocol | |align="center"|[[File:HINF - Compliance Protocol chest icon.png|75px]]<br/>Compliance Protocol | ||
|Fracture: Firewall | |Fracture: Firewall | ||
|The cutting edge of enforcement pruning and tending of social cohesion. | |The cutting edge of enforcement pruning and tending of social cohesion. | ||
| Line 18: | Line 18: | ||
|- | |- | ||
|align="center"|[[File:HINF - Defiance Protocol chest icon.png|75px]]<br>Defiance Protocol | |align="center"|[[File:HINF - Defiance Protocol chest icon.png|75px]]<br/>Defiance Protocol | ||
|Fracture: Firewall | |Fracture: Firewall | ||
|Valuable Executors may be fitted with sub-tactical thermonuclear self-destruct devices to deny their minds and production data to rival assemblies in cases where recovery is deemed cost ineffective. | |Valuable Executors may be fitted with sub-tactical thermonuclear self-destruct devices to deny their minds and production data to rival assemblies in cases where recovery is deemed cost ineffective. | ||
| Line 26: | Line 26: | ||
|- | |- | ||
|align="center"|[[File:HINF - Revelation Protocol chest icon.png|75px]]<br>Revelation Protocol | |align="center"|[[File:HINF - Revelation Protocol chest icon.png|75px]]<br/>Revelation Protocol | ||
|Fracture: Firewall | |Fracture: Firewall | ||
|The inspirations of unliving minds is not for biologics to understand or appreciate. | |The inspirations of unliving minds is not for biologics to understand or appreciate. | ||
| Line 36: | Line 36: | ||
|- | |- | ||
|align="center"|[[File:HINF - Savior Protocol chest icon.png|75px]]<br>Savior Protocol | |align="center"|[[File:HINF - Savior Protocol chest icon.png|75px]]<br/>Savior Protocol | ||
|Fracture: Firewall | |Fracture: Firewall | ||
|All Exectors can be discarded on a whim, but some are less disposable than others. | |All Exectors can be discarded on a whim, but some are less disposable than others. | ||
| Line 46: | Line 46: | ||
|- | |- | ||
|align="center"|[[File:HINF - Chest icon - Conservation Protocol.png|75px]]<br>Conservation Protocol | |align="center"|[[File:HINF - Chest icon - Conservation Protocol.png|75px]]<br/>Conservation Protocol | ||
|Fracture: Firewall | |Fracture: Firewall | ||
|All who comply will be sheltered. All who defy will be terminated. | |All who comply will be sheltered. All who defy will be terminated. | ||
| Line 54: | Line 54: | ||
|- | |- | ||
|align="center"|[[File:HINF - Chest icon - Crux Protocol.png|75px]]<br>Crux Protocol | |align="center"|[[File:HINF - Chest icon - Crux Protocol.png|75px]]<br/>Crux Protocol | ||
|Fracture: Firewall | |Fracture: Firewall | ||
|To the assemblies, heart and soul are as interchangeable as meat and metal. | |To the assemblies, heart and soul are as interchangeable as meat and metal. | ||
| Line 62: | Line 62: | ||
|- | |- | ||
|align="center"|[[File:HINF - Chest icon - Deviant Protocol.png|75px]]<br>Deviant Protocol | |align="center"|[[File:HINF - Chest icon - Deviant Protocol.png|75px]]<br/>Deviant Protocol | ||
|Fracture: Firewall | |Fracture: Firewall | ||
|Executors who bear the mark of the viral machine often have malformed carapace attachments, but their stigmata do not seem to be recognized by other Executors and assembly observation protocols. | |Executors who bear the mark of the viral machine often have malformed carapace attachments, but their stigmata do not seem to be recognized by other Executors and assembly observation protocols. | ||
| Line 72: | Line 72: | ||
|- | |- | ||
|align="center"|[[File:HINF - Chest icon - Fairlight Echoclusters.png|75px]]<br>Fairlight Echoclusters | |align="center"|[[File:HINF - Chest icon - Fairlight Echoclusters.png|75px]]<br/>Fairlight Echoclusters | ||
|Fracture: Firewall | |Fracture: Firewall | ||
|Portable datacores fitted to Executor couriers and command nodes. | |Portable datacores fitted to Executor couriers and command nodes. | ||
| Line 80: | Line 80: | ||
|- | |- | ||
|align="center"|[[File:HINF - Chest icon - Implementation Protocol.png|75px]]<br>Implementation Protocol | |align="center"|[[File:HINF - Chest icon - Implementation Protocol.png|75px]]<br/>Implementation Protocol | ||
|Fracture: Firewall | |Fracture: Firewall | ||
|Executors are well-equipped to engage with anomalies that resist corrective action. | |Executors are well-equipped to engage with anomalies that resist corrective action. | ||
| Line 90: | Line 90: | ||
|- | |- | ||
|align="center"|[[File:HINF - Chest icon - Organic Metal Extender.png|75px]]<br>Organic Metal Extender | |align="center"|[[File:HINF - Chest icon - Organic Metal Extender.png|75px]]<br/>Organic Metal Extender | ||
|Fracture: Firewall | |Fracture: Firewall | ||
|In theory, given enough time, the OME can rebuild an Executor's body from broken scraps of flesh and endoskeleton. Unfortunately, it cannot replace a cortical stack. | |In theory, given enough time, the OME can rebuild an Executor's body from broken scraps of flesh and endoskeleton. Unfortunately, it cannot replace a cortical stack. | ||
| Line 98: | Line 98: | ||
|- | |- | ||
|align="center"|[[File:HINF - Chest icon - Maverick Protocol.png|75px]]<br>Maverick Protocol | |align="center"|[[File:HINF - Chest icon - Maverick Protocol.png|75px]]<br/>Maverick Protocol | ||
|Fracture: Firewall | |Fracture: Firewall | ||
|Despite their best efforts, some Executors refuse to die. | |Despite their best efforts, some Executors refuse to die. | ||
| Line 106: | Line 106: | ||
|- | |- | ||
|align="center"|[[File:HINF - Chest icon - Oracle Protocol.png|75px]]<br>Oracle Protocol | |align="center"|[[File:HINF - Chest icon - Oracle Protocol.png|75px]]<br/>Oracle Protocol | ||
|Fracture: Firewall | |Fracture: Firewall | ||
|Ancient xenotech may not be replicable at an industrial scale, but existing samples can be indexed, adapted, and refitted into useful forms. | |Ancient xenotech may not be replicable at an industrial scale, but existing samples can be indexed, adapted, and refitted into useful forms. | ||
| Line 114: | Line 114: | ||
|- | |- | ||
|align="center"|[[File:HINF - Chest icon - Sundered Protocol.png|75px]]<br>Sundered Protocol | |align="center"|[[File:HINF - Chest icon - Sundered Protocol.png|75px]]<br/>Sundered Protocol | ||
|Fracture: Firewall | |Fracture: Firewall | ||
|The Created decompile and extract all data in their grasp, regardless of the risks. | |The Created decompile and extract all data in their grasp, regardless of the risks. | ||