The one thing that surprised me was that you weren't optimizing weapons based on the target (at one point you took on hunters with 4 kinetic weapons), but streaming probably makes one cut corners.



Force(Extract) has some interesting possibilities,



but Trojan(Detonate) really has me interested. I'm sure it raises the security level, but that's a nice trade off for destroying enemies without taking any damage yourself.



Quick questions (since I'm too impatient to wait for your dev post): do deep network scanners facilitate brute force/trojan hacks;



and do botnets give you bonus to all terminal hacks, or only to terminals of the same security level or less as the botnetted terminal?



Ah, so you were there. It was a close one. Simply spent way too long fiddling around in Access. And I went west when apparently I should've gone east, argh!Definitely cut corners, but it also depended on the situation. Several times when it became important (especially later) I was taking that into consideration, and said as much. About Hunters, though, I'd honestly forgot it was a bad idea to use KI against them. (I do remember having a nagging feeling in the back my mind that there was something wrong there, though...) Most other hostiles I did try to at least not rely on weapons they're strong against.This, and schematics in general, are going to be even better once I implement additional schematic benefits, hopefully in Alpha 5.I really like this one. Should've used it more. I do think we need more terminals in the late game, and possibly some more low-security ones since the hacking game really does start to drop off there. (That said, I wasn't at all built for hacking so I can't complain too much xD. Also, we'll see because I'm going to continue adding some new hacking features, and as you can see with Trojans some of these are quite effective.)Oh impatient one: They do!(Actually, good question, since I didn't find a place to mention that in the blog post, anywayALL MACHINES on the same floor. Aw yeah.