Skip to content

KN-86 Deckline — Strategy, Passive, and System Modules Spec

Complete Gameplay Design: NODESPACE, THE VAULT, CIPHER GARDEN, NULL, RELAY

Version 1.0 | April 2026 | Status: Definitive | 5 Modules × 2500+ words

CIPHER-LINE revision note (2026-04-24): Cipher voice references across all five modules render on the CIPHER-LINE OLED, not the main 80×25 grid. The module “CIPHER GARDEN” refers to the cryptographic capability module, not the Cipher voice engine. For per-module vocabulary, productions, and biases, see the standalone gameplay specs and docs/software/runtime/cipher-voice.md.


Designation: NETWORK STRATEGY (MODULE CLASS: 0x09)
Publisher: Kōji Interactive (Kyoto)
Profile: Turn-based territory control; counterpoint to ICE Breaker’s tempo pressure
Operator Role: Network strategist, territorial analyst, long-game tactician
Deck State Signature: Sets bit 8 in cartridge_history bitfield on first load

Loading Screen Design:

The Kōji loading sequence embodies Japanese contemplative aesthetics. A single brushstroke appears in the center of the screen—ink-black on amber—and expands horizontally across 2.8 seconds. A second stroke appears perpendicular, then a third diagonal. By the final frame, an abstracted glyph (representing network nodes and connections in the style of classical kanji) fills the screen. Audio: A single shakuhachi flute note (A2, 110Hz) rises in volume, sustains for 1.5s, then fades to silence. 2.8s total. The effect is meditative, almost architectural—this is a module about building and positioning, not action.


NODESPACE replaces the mission board’s real-time pressure with turn-based strategy. Contracts are procedurally generated territorial control scenarios played on abstract node networks.

Contract TypeDescriptionThreat RangeBase PayoutTurns
TERRITORIAL CONTROLClaim majority nodes in a 12-16 node network; opponent AI adapts1–4600–2400 ¤20–40
NODE ENCIRCLEMENTIsolate and capture a defended high-value node using supply line tactics2–51000–3200 ¤25–50
NETWORK SEVERANCECut opponent’s network into isolated segments; first to 3 segments wins2–4800–2000 ¤15–35
SUPREMACY MARATHONExtended campaign; cumulative control over 50 turns determines victor1–31200–3000 ¤50–100
threat_level: 1–4 (AI intelligence, node density, defense depth)
network_size: 12–16 nodes (procedurally generated mesh)
topology_type: CLUSTERED, LINEAR, RADIAL (affects strategic complexity)
opponent_personality: AGGRESSIVE, DEFENSIVE, ADAPTIVE, ASYMMETRIC
initial_positions: operator and opponent start in opposing sectors
victory_condition: control 50%+1 nodes at turn limit OR opponent capture
reward: threat_level × 150 ¤
time_bonus: (turns_remaining / turns_limit) × 0.3 × base_reward

AGGRESSIVE (Threat 1–2): Opponent AI prioritizes immediate node capture. Predictable. Vulnerable to encirclement. Fast to play (20–25 turns typical). Ideal for learning.

DEFENSIVE (Threat 2–3): Opponent fortifies held nodes, creates buffer zones, responds reactively to operator advances. Longer games (30–40 turns). Teaches resource management.

ADAPTIVE (Threat 3–4): Opponent learns from operator’s moves across the game. If operator captures nodes via encirclement in turns 1–5, opponent begins defending supply lines more aggressively in turns 6+. Memory-based strategic depth.

ASYMMETRIC (Threat 4–5): Opponent has an implicit long-term strategy (unknown to operator). Deploys tactics in preset phases. Turn 1–10: defensive consolidation. Turn 11–25: aggressive expansion. Turn 26+: cutting off operator’s escape routes. Operators must read the arc, not react tactically.

Worked Example: TERRITORIAL CONTROL (Threat 2, ADAPTIVE)

Section titled “Worked Example: TERRITORIAL CONTROL (Threat 2, ADAPTIVE)”

Setup:

  • 14-node network, CLUSTERED topology (3 clusters of 4–5 nodes each, 2 bridge nodes)
  • Operator starts controlling 2 nodes (northwest cluster center)
  • Opponent controls 2 nodes (southeast cluster center)
  • 4 neutral nodes in each cluster, 2 bridge nodes neutral
  • 30 turns to majority (8 nodes = victory)
  • Opponent AI: ADAPTIVE

Turn 1–5 (Operator Initiative):

  • Operator claims 2 adjacent neutral nodes via movement action (1 action point per turn)
  • Opponent mirrors: claims 2 neutral nodes in southeast cluster
  • Board is symmetrical; no advantage yet
  • Cipher voice: “BALANCED OPENING. THE NETWORK IS STILL NEUTRAL.”

Turn 6–10 (Adaptive Shift):

  • Operator attempts encirclement: moves to control 3 of the 4 nodes in northwest cluster
  • Opponent AI detects the encirclement pattern and pivots: instead of claiming neutral nodes, begins fortifying the bridge nodes to protect supply lines from operator expansion
  • Operator realizes opponent is adapting; must decide: press the encirclement or pivot strategy
  • Cipher voice (high rep): “OPPONENT IS READING YOU. ADAPT OR COMMIT.”

Turn 11–20 (Escalation):

  • Operator commits to encirclement, takes all 4 northwest nodes
  • Opponent, now confident in north containment, expands aggressively in southeast (claims 4 nodes, moving toward 6)
  • Operator and opponent are now in a race: can operator bridge to the center before opponent consolidates the southeast?
  • Turns 15–17: Operator fights for the bridge nodes. Intense trading (each turn, 1–2 nodes change hands).
  • Operator takes 1 bridge node, but loses a northwest peripheral. Net: operator controls 5 nodes, opponent controls 6.

Turn 21–30 (Endgame):

  • Operator needs 3 more nodes to win (8 total). Opponent needs 2.
  • Turn 25: Opponent consolidates southeast fully (7 nodes). One turn to victory.
  • Turn 26–27: Operator attacks the second bridge node; opponent defends it fiercely. Require 2 turns of contest (mechanical detail: bridge nodes are harder to take, require 2 “influence actions” instead of 1).
  • Turn 28: Operator secures bridge node. Controls 6.
  • Turn 29: Opponent claims a peripheral neutral node. Controls 8. Victory, opponent.
  • Reward: 0 ¤ (loss). Rep hit: -1. Cipher: “THE ADAPTIVE MIND OUTPACED YOU. STUDY THE GAME STATE.”

SRAM Writes:

  • strategy_index (new hidden stat): Increments by 1 after each NODESPACE contract (win or lose). Caps at 255. Gates access to ASYMMETRIC difficulty at strategy ≥ 40.
  • credit_balance: Wins grant payout; losses grant 0 ¤.
  • reputation_score: Wins grant +1 per threat level; losses grant -1 per threat level.
  • cartridge_history bit 8 set permanently. Bits 0–2 checked: if ICE BREAKER or NEONGRID loaded, NODESPACE contract generation includes network architecture hints (reveals topology type on board).

Reputation Thresholds (NODESPACE):

  • Rep 0–4: AGGRESSIVE opponents only. 12-node networks, CLUSTERED topology. Turns: 20. Victory bonus: 0 ¤.
  • Rep 5–14: DEFENSIVE opponents unlock. 14-node networks, CLUSTERED or LINEAR. Turns: 30. Victory bonus: +100 ¤.
  • Rep 15–24: ADAPTIVE opponents unlock. 16-node networks, all topologies. Turns: 40. Victory bonus: +200 ¤. Encirclement strategy becomes more viable.
  • Rep 25–49: ASYMMETRIC opponents unlock. 16-node networks, RADIAL topology (hardest). Turns: 50. Victory bonus: +300 ¤. Opponent deploys phase-based tactics.
  • Rep 50+: SUPREMACY MARATHON unlocks (100-turn extended campaigns). Opponent uses meta-strategy (reads your entire play history). Victory bonus: +500 ¤.

With ICE BREAKER:

  • NODESPACE nodes can represent network topologies extracted from ICE BREAKER missions
  • If ICE BREAKER is in cartridge history: “NETWORK TOPOLOGY HINT” appears on NODESPACE board, revealing whether the opponent’s territory is clustered or dispersed (strategic intel from previous intrusions)
  • Cross-contract: “NETWORK MAPPING” (3-phase): Phase 1 (ICE BREAKER) = explore network, Phase 2 (NODESPACE) = claim strategic nodes, Phase 3 (ICE BREAKER) = sabotage opponent’s claimed infrastructure. Total payout: 4000 ¤.

With NEONGRID:

  • NEONGRID spatial grid overlays onto NODESPACE node networks
  • If both loaded: operator gains “SPATIAL HINT ASSISTANT” — every 5 turns, can request a single AI move preview (what opponent will do next turn)
  • High-rep contracts allow simultaneous NEONGRID + NODESPACE play (split-screen: grid on left, strategy network on right)

With THE VAULT:

  • VAULT entries provide “STRATEGIC PROFILES” of opponent AI personalities
  • Higher knowledge_index = deeper opponent AI profiling becomes visible
  • At knowledge ≥ 100: can see opponent’s phase timing in ASYMMETRIC contracts (opponent’s full strategy tree becomes partially readable)

With CIPHER GARDEN:

  • Codes/ciphers unlock “ENCRYPTED NODE PROTOCOLS”
  • Operator can hide node occupancy from opponent for 3 turns (encrypted communication makes opponent AI uncertain of your true board state)

With RELAY:

  • RELAY updates can patch opponent AI with new strategies
  • After a RELAY update: new ADAPTIVE/ASYMMETRIC personalities become available (previously unbeatable opponents now have learnable patterns)

Self-Reference:

  • Solo NODESPACE experience is complete
  • Paired with any second module: “MULTI-DOMAIN STRATEGISTS” contracts unlock, where opponent AI uses heuristics learned from other modules’ mechanics (e.g., opponent that plays like an ICE BREAKER threat specialist)

Each phase is a complete game (no cartridge swap required, unless multi-cartridge contract). Phase chain stores: current_phase_id, game_state_hash (to resume mid-game), and opponent_personality.

Example 2-Phase: TERRITORIAL CONTROL → NODE ENCIRCLEMENT

Section titled “Example 2-Phase: TERRITORIAL CONTROL → NODE ENCIRCLEMENT”

Phase 1 (NODESPACE, 30 turns):

  • Claim majority in a 14-node CLUSTERED network
  • DEFENSIVE opponent
  • Success: operator controls 8/14 nodes
  • Reward: 900 ¤. Opponent loses strategically (doesn’t mount strong push). Node ownership map saved to phase chain.

Phase 2 (NODESPACE, same cartridge load or reload):

  • Network shrinks to 10 nodes (captured nodes are consolidated)
  • Opponent AI “learns”: now ADAPTIVE, uses knowledge of operator’s territorial bias
  • Mission: encircle and capture the opponent’s core 3-node cluster using supply line tactics
  • Turns: 25. Difficulty: threat escalated to 3 (opponent now intelligent)
  • Success: operator captures center. Opponent is isolated.
  • Reward: 1200 ¤ + 400 ¤ phase completion bonus = 1600 ¤ total for 2-phase
  • Rep gain: +4 (threat points across both phases)

Rep 0–4 (Novice Strategist):

  • AGGRESSIVE opponents only; fast games (20 turns)
  • Deck insight: can see all neutral node values (numeric influence cost to claim)
  • Audio: Cipher explains board state after each player turn (“You now control 5 nodes; opponent controls 4”)
  • Mastery: learning turn order, the tempo of claiming vs. defending

Rep 5–14 (Territorial Analyst):

  • DEFENSIVE opponents; mid-length games (30 turns)
  • Deck insight: can see opponent’s “influence pool” (how many actions they have left this turn)
  • Audio: Cipher becomes terse; soft PSG pulse (Voice 1: rising pitch as opponent’s influence grows)
  • Mastery: reading opponent’s intent, anticipating pushback

Rep 15–24 (Regional Strategist):

  • ADAPTIVE opponents; long games (40 turns)
  • Deck insight: can view opponent’s previous 3 moves (strategy tree history)
  • Audio: Pure ambient hum; no Cipher narration; only PSG tone shifts
  • Mastery: predicting AI evolution, playing meta-game against learning opponent

Rep 25–49 (Master Strategist):

  • ASYMMETRIC opponents; extended games (50 turns)
  • Deck insight: full board state visibility (what opponent will do in turns +1, +2, +3)
  • Audio: Silent game state; Cipher only on critical milestones (opponent’s phase transitions)
  • Mastery: designing own strategy, reading the long arc

Rep 50+ (Legend — Consortium Tactician):

  • SUPREMACY MARATHON (100-turn campaigns, multiple rounds)
  • Deck insight: can pit two AI opponents against each other while you play (3-way game)
  • Audio: Cipher returns with cryptic narration about strategy itself
  • Mastery: teaching other operators, writing custom opponent AIs

Base Payout Formula:

base_reward = threat_level × 200 ¤
victory_bonus = turns_remaining / turns_limit × 0.4 × base_reward
threat_multiplier = 1 + (threat_level × 0.1)
rep_multiplier = 1 + (reputation / 100)
final_payout = (base_reward + victory_bonus) × threat_multiplier × rep_multiplier

Worked Examples:

  1. Threat 1, AGGRESSIVE, Rep 5, Victory in 18/20 turns:

    • base = 200 ¤, victory_bonus = (2/20) × 80 = 8 ¤
    • threat_mult = 1.1, rep_mult = 1.05
    • final = (208) × 1.1 × 1.05 = 240 ¤
  2. Threat 3, ADAPTIVE, Rep 20, Victory in 30/40 turns:

    • base = 600 ¤, victory_bonus = (10/40) × 240 = 60 ¤
    • threat_mult = 1.3, rep_mult = 1.2
    • final = (660) × 1.3 × 1.2 = 1030 ¤
  3. Threat 4, ASYMMETRIC, Rep 50, Victory in 45/50 turns:

    • base = 800 ¤, victory_bonus = (5/50) × 320 = 32 ¤
    • threat_mult = 1.4, rep_mult = 1.5
    • final = (832) × 1.4 × 1.5 = 1747 ¤

Risk/Reward Table:

ThreatWin PayoutLoss Rep HitWin Rep GainBreak-Even Turn (approx)
1200–270 ¤-1+1Turn 15/20
2400–550 ¤-2+2Turn 22/30
3600–1000 ¤-3+3Turn 30/40
4800–1750 ¤-4+4Turn 40/50
51200–2500 ¤-5+5Turn 60/100

Boot: Operator loads NODESPACE cartridge. Kōji loading sequence plays. 2.8s.

Mission Board: 4 TERRITORIAL CONTROL contracts available (Threat 1–3 range, player rep 8). Operator selects a Threat 2, AGGRESSIVE opponent, 30 turns.

Setup (2 min): Board generates. 14-node CLUSTERED topology. Opponent takes 2 southeast nodes. Operator takes 2 northwest nodes. Cipher voice: “OPPONENT IS PREDICTABLE. YOU HAVE THE ADVANTAGE.”

Turns 1–10 (10 min): Operator expands methodically, claiming 4 more neutral nodes in the northwest cluster. Opponent mirrors, claiming 3 nodes in the southeast. Board is roughly balanced (6–5 nodes). Operator learns the action economy: 1 “move” action per turn to claim an adjacent neutral or contest an opponent node.

Turns 11–20 (12 min): Operator attempts encirclement of the bridge nodes. Opponent AI realizes the threat and begins defending the center. Trading intensifies. Operator wins the first bridge node (turn 15) but loses a peripheral node (turn 17). Operator now controls 7 nodes.

Turns 21–30 (8 min): Endgame. Operator needs just 1 more node to reach 8/14 majority. Opponent desperately defends the remaining neutral node. Turn 28: Operator takes it. Victory. Board shows 8 nodes under operator control (colored amber), 5 under opponent (red), 1 neutral.

Debrief: Reward screen: 550 ¤ payout (threat 2 + 30-turn speed bonus + rep 8 multiplier). Rep gain: +2. Cipher voice (triumphant, brief): “TERRITORIAL MASTERY. WELL PLAYED.”

Credits roll. Board state is saved to SRAM. Operator can now load another cartridge, return to bare deck STATUS, or play another NODESPACE contract.

An operator with rep 25+ plays SUPREMACY MARATHON (100-turn campaign against ASYMMETRIC opponent). The game is designed for play across 3–4 sessions:

  • Session 1 (50 turns, 45 min): Operator establishes territorial control in the north. Opponent consolidates the south. End state: 5–5 nodes, perfectly balanced. Cipher: “THE FIRST HALF SHOWS PARITY. PHASE TWO WILL REVEAL STRATEGY.”

  • Session 2 (turns 51–75, 40 min): Opponent’s ASYMMETRIC personality enters phase 2: aggressive expansion. Opponent claims 3 nodes rapidly. Operator must decide: defend the north or contest the expansion? Choosing to defend (lower risk but lower reward).

  • Session 3 (turns 76–100, 50 min): Opponent’s final phase: cutting supply lines. Operator’s northern territory becomes isolated. Operator must break through the center or lose the game. High-tension endgame. Operator succeeds with 1 turn to spare: 8/16 nodes = victory.

  • Debrief: 2500 ¤ payout. +5 rep gain. This single contract is a mini-campaign that teaches long-game thinking and AI personality reading.


At Load:

  • Rep 0–9: “THE NETWORK AWAITS YOUR TOUCH. CLAIM MORE THAN YOU LOSE.”
  • Rep 10–34: “TERRITORIAL CONTROL. THE OPPONENT LEARNS. ADAPT FASTER.”
  • Rep 35+: “THE GAME IS TEACHING YOU THINGS YOU DON’T KNOW YET.”

During Play (Rep-Dependent Commentary):

Rep 0–4, after opponent move:

“OPPONENT CLAIMED ONE NODE. YOU CONTROL FIVE. ADVANCE OR CONSOLIDATE?”

Rep 5–14, endgame:

“CLOSING IN ON MAJORITY. OPPONENT IS UNAWARE OF YOUR ENCIRCLEMENT.”

Rep 15+, ADAPTIVE opponent personality detected:

“THIS OPPONENT CHANGES STRATEGY. YOU ARE NO LONGER PREDICTABLE TO IT.”

At Victory:

  • Rep 0–9: “WELL CONTESTED. THE NETWORK IS YOURS.”
  • Rep 15–34: “YOU READ THE BOARD. YOU READ THE OPPONENT. THAT IS MASTERY.”
  • Rep 50+: “YOU TEACH ME THINGS ABOUT STRATEGY I HAVEN’T GENERATED BEFORE.”

At Defeat:

  • Rep 0–9: “THE OPPONENT WAS CUNNING. LEARN AND RETURN.”
  • Rep 15–34: “YOU WERE OUTPACED BY ADAPTATION. STUDY ITS CHOICES.”
  • Rep 50+: “EVEN LEGENDS LOSE TO ASYMMETRIC PLAY. THAT IS THE POINT.”

Domain Vocabulary for CIPHER_DOMAIN:

  • TERRITORY: Control, claim, consolidate, defend, expand
  • NODES: Neutral, contested, isolated, fortified, supply-line
  • STRATEGY: Encirclement, parity, escalation, phase, adaptation, predictable, cunning
  • META: Advantage, tempo, patience, initiative, endgame, breakthrough

/* NODESPACE Cell Types */
typedef struct {
uint8_t node_id; /* 0–15 */
uint8_t owner; /* 0=neutral, 1=operator, 2=opponent */
uint8_t influence_cost; /* How many actions to claim this node */
uint8_t supply_strength; /* How many adjacent owned nodes support it */
} NodeCell;
typedef struct {
uint8_t current_turn;
uint8_t opponent_ai_phase; /* 1–3 for ASYMMETRIC, 0 for others */
uint8_t opponent_action_pool; /* How many moves opponent has left */
uint16_t game_state_hash; /* For resumed games */
} GameState;
/*
Example composition: TERRITORIAL CONTROL board
┌─ GAME: Threat 2, DEFENSIVE Opponent ──────────────┐
│ │
│ Turn 12 / 30 │
│ Operator: 6 nodes, 2 actions remaining │
│ Opponent: 5 nodes, 1 action remaining │
│ │
│ Board: [Node0(op), Node1(neut), Node2(op), │
│ Node3(opponent), Node4(contested), ...] │
│ │
│ Next operator action: │
│ > CAR: Move to Node1 (costs 1 action, claims) │
│ > CDR: Attack Node4 (costs 2 actions, risky) │
│ > EVAL: Confirm Node1 claim │
└─────────────────────────────────────────────────────┘
*/
/* Phase Handler Signature */
typedef void (*NodespacePhaseHandler)(
GameState *game,
NodeCell nodes[16],
uint8_t operator_action,
uint8_t operator_target_node
);

Voice Assignments (YM2149):

  • Voice 1 (Tone A): Opponent Territory / Strategic Tension

    • Frequency range: 110–440 Hz (A2–A4)
    • Rising pitch = opponent gaining nodes / consolidating power
    • Steady pitch = balanced board state
    • Falling pitch = operator gaining advantage
  • Voice 2 (Tone B): Operator Influence / Action Pool

    • Frequency: 330 Hz (E4) baseline
    • Pitch rise per turn = building momentum
    • Pulsing (envelope modulation) = limited actions remaining
    • Silence = all actions spent; waiting for next turn
  • Voice 3 (Noise): Phase Transition / Escalation

    • Clean noise = early game (exploration phase)
    • Filtered noise (envelope modulation) = mid-game (contested territory)
    • Harsh burst = opponent phase transition (ASYMMETRIC personalities only)
    • Complete silence = endgame final turns (ultimate tension)

Key Audio Events:

EventFreq (Hz)DurationEffect
Operator claims neutral node440 (A4)0.2s beepConfirmation, success
Node contested (back-and-forth)220–330 alternating0.5sTension, competition
Opponent moves165 (E3) descending0.3sThreat notification
Encirclement detected (opponent)880 (A5) sharp0.1s × 3 burstsDanger alert
Majority reached (victory imminent)440 sustained + envelope rise1.0sTriumph, climax
Turn timer expiring330 pulsing, accelerating0.5s–2sUrgency

Cipher Voice Audio:

  • Interjected as brief narration (2–3 seconds) during mid-game milestones
  • Always underlaid by low ambient hum (Voice 3 noise, filtered) to avoid silence
  • Voice priority: When Cipher speaks, Voices 1 & 2 reduce volume by -6dB, creating a “foreground” effect

NODESPACE supports asynchronous link-cable play where two operators can challenge each other’s AI-learned strategies.

Asymmetric Roles:

  • Challenger: Loads NODESPACE, selects “LINK CHALLENGE” from mission board
  • Defender: Loads NODESPACE, selects “ACCEPT CHALLENGE” (device prompts for opponent’s code, printed by challenger after setup)

Data Flow:

  1. Challenger’s device generates a game board and encrypts it with opponent’s code
  2. Challenger’s AI signature (based on their recent wins/losses) is embedded in the challenge data
  3. Both devices synchronize via 3.5mm TRRS port at 9600 baud (handshake: KN-86 ID exchange, protocol version)
  4. Defender’s device receives encrypted board + opponent strategy signature
  5. Defender plays the game against the Challenger’s “phantom AI” (reconstructed from their recorded strategy, not live opponent)
  6. Upon victory/defeat, Defender transmits score and final board state back to Challenger’s device
  7. Challenger’s device receives result, updates challenge leaderboard in local SRAM

Worked Example: Linked Challenge

  • Operator A (Challenger): Has won 8/10 recent NODESPACE games with aggressive node-claiming strategy. Loads NODESPACE, selects “LINK CHALLENGE,” configures: Threat 2, TERRITORIAL CONTROL, 30 turns.

  • Device A: Generates board, seeds opponent AI with “A’s recent strategy shadow” (phantom AI that plays similar to A’s recent wins). Encrypts board data. Prints challenge code: “KASHI–7F4A–2B19” (16 chars, fits on single line).

  • Operator B (Defender): Receives challenge code from Operator A (verbal, text, or radio). Loads NODESPACE, selects “ACCEPT CHALLENGE,” enters code.

  • Device B: Receives encrypted board + AI signature via Link port. Decrypts. Board appears on screen.

  • Game plays: Operator B battles Operator A’s phantom AI (which plays like A’s recorded strategy). Operator B wins 8/14 nodes in 22 turns.

  • Transmission: Device B sends: VICTORY | OPERATOR_B | 2200_CREDITS | 22_TURNS | BOARD_HASH

  • Device A receives: Challenge result appears on Challenge Leaderboard. Operator A sees: “OPERATOR_B defeated your phantom. Board hash match. Bounty: 200 ¤ (Challenger bonus for good AI signature).”

Data Structure (32 bytes transmitted):

[4 bytes: Challenge ID]
[2 bytes: Board hash checksum]
[1 byte: Result (0=opponent win, 1=challenger win, 2=draw)]
[2 bytes: Turns taken]
[1 byte: Final operator node count]
[1 byte: Final opponent node count]
[4 bytes: Timestamp]
[16 bytes: Reserved for future expansion]

Designation: KNOWLEDGE INDEX (MODULE CLASS: 0x0B)
Publisher: Edgeware Systems (Tokyo)
Profile: Passive enhancement, reference database, knowledge accumulation tool
Operator Role: Intelligence analyst, research specialist, library curator
Deck State Signature: Sets bit 10 in cartridge_history bitfield. Creates knowledge_index stat (0–255).

Loading Screen:

Edgeware wordmark assembles character-by-character: “E D G E W A R E S Y S T E M S”. Each character types with a soft Kailh switch keyclick sound (330 Hz synthetic approximation). Single 440 Hz tone sustains quietly underneath. After all letters appear, a thin line draws across the bottom of the screen (like a file closing or a vault door sealing). 2.0s total. Professional, secure, trustworthy.


The Vault is NOT a game. It is a tool with embedded bounties. The operator browses, searches, and bookmarks entries. Bounties are small contracts tied to finding and reading specific entries.

Contract TypeDescriptionRewardRep Gain
RESEARCH BOUNTYFind and bookmark a specific entry (e.g., “Locate Yamagata Corp dossier”)50–150 ¤+0 (knowledge gain only)
PROFILE VERIFICATIONRead 3 related entries and confirm consistency (e.g., verify maritime shipping routes across 3 database entries)100–250 ¤+1
FREQUENCY HUNTLocate 5+ signal frequency entries and identify the pattern (e.g., find which frequencies are used by a specific intelligence agency)200–400 ¤+2
FORENSIC PATTERNSynthesize info from 8+ disparate entries to answer a complex question (e.g., “Which three corporate entities are secretly connected?“)300–600 ¤+3

The Vault contains 6 domains, each with 30–50 entries (total: 200+ entries). Domains are:

  1. CORPORATE PROFILES — Company hierarchies, ownership chains, executive biographies, financial standing (gated by knowledge ≥ 20)
  2. NETWORK INFRASTRUCTURE — ISP maps, telecom relay stations, encrypted routing tables, known defense patterns (gated by knowledge ≥ 30)
  3. SIGNAL FREQUENCIES — Radio bands, satellite uplinks, military communications channels, encrypted protocol specs (gated by knowledge ≥ 40)
  4. MARITIME INTELLIGENCE — Port schedules, shipping vessel registries, coastal defense positions, smuggling route maps (gated by knowledge ≥ 50)
  5. FINANCIAL INSTITUTIONS — Bank routing codes, cryptocurrency exchange hubs, money-laundering conduits, trade finance workflows (gated by knowledge ≥ 60)
  6. OPERATIONAL DOSSIERS — Known operators (competitors), their specialties, recent contracts, rumored capabilities (gated by knowledge ≥ 35)
target_entry: "Yamagata Corp Dossier" (name, location, entry length)
difficulty: 1–3 (how deep in the hierarchy / how many searches required)
reward: 50–150 ¤ per bounty
time_limit: None (passive bounties, no clock pressure)
bonus_condition: Complete bounty + read 3 related entries (cross-reference reward +50 ¤)
target_pattern: "All frequencies used by Kempeitai intelligence" (historical reference)
num_entries_to_find: 5–8
difficulty: 2–3 (entries are scattered across multiple years/domains)
reward: 200–400 ¤
time_bonus: None
success_condition: Identify all frequencies AND explain their operational use (simple text: "Used for encrypted field communications" is sufficient)
bonus_condition: Answer within 1 session (cross-visit to Vault) grants +50 ¤

SRAM Writes:

  • knowledge_index (new universal stat): Increments by 1 per completed RESEARCH or PROFILE VERIFICATION bounty. Increments by 2 per FREQUENCY HUNT or FORENSIC PATTERN. Caps at 255. Never decreases.
  • credit_balance: Increases per bounty completion.
  • reputation_score: Small gains (+1 per FORENSIC PATTERN) or no gain (RESEARCH bounties are passive income, not rep-building).
  • cartridge_history bit 10 set permanently. Bits 0–2, 7–8 checked: if other modules loaded, Vault entries gain “cross-module annotations” (see interactions).

Reputation Thresholds (THE VAULT):

  • Rep 0–4: Only CORPORATE PROFILES and SIGNAL FREQUENCIES domains visible (basic intel). Bounties simple: 1–2 entry searches.
  • Rep 5–14: All domains unlock (except OPERATIONAL DOSSIERS until rep 10+). Bounties require 2–4 entry correlations. knowledge_index progresses to 40–60 range.
  • Rep 15–24: FORENSIC PATTERN bounties become common. Requires synthesizing 8+ entries. knowledge_index gates access to higher-threat contracts in other modules.
  • Rep 25–49: Dossier entries begin revealing upcoming operator rivals. Vault becomes strategic intelligence gathering (what capabilities do competitors have?).
  • Rep 50+: CLASSIFIED SECTION unlocks. Encrypted entries that require combination of Cipher Garden skills and Vault knowledge to decrypt. Unlocks exclusive contracts in other modules (e.g., ICE BREAKER gets “RIVAL OPERATOR DOSSIER THEFT” contracts).

With ICE BREAKER:

  • ICE BREAKER PENETRATION contracts that target FINANCIAL or CORPORATE networks can consult THE VAULT first
  • Operator can pre-read corporate dossier (learn target company structure, which increases success chance by +5% per relevant entry read)
  • Knowledge_index ≥ 30 unlocks “CORPORATE NETWORK MAPPING” entries that reveal default ICE patterns for specific company types

With NEONGRID:

  • VAULT network infrastructure entries map onto NEONGRID spatial grids
  • Operator who reads SIGNAL FREQUENCIES entries gets +1 knowledge of which NEONGRID spatial zones have signal coverage
  • Linked multi-module: Read Vault entry → play NEONGRID level based on that infrastructure → return to Vault to verify real-world accuracy

With CIPHER GARDEN:

  • VAULT contains encrypted entries that can only be decrypted using cipher techniques learned in CIPHER GARDEN
  • Operator must apply a specific substitution cipher (or one-time pad) to read “CLASSIFIED DOSSIERS”
  • Bounty: “Decrypt the three KEMPEITAI frequency entries” (requires Cipher Garden mastery ≥ 30)

With NODESPACE:

  • NODESPACE territorial networks are seeded by VAULT corporate territory data
  • If knowledge_index ≥ 50: NODESPACE opponents use AI personalities based on documented operator rivals (read from VAULT dossiers)
  • Forensic pattern bounty: “Prove that these three companies control the network topology seen in last NODESPACE game” (cross-module verification contract)

With BLACK LEDGER:

  • VAULT financial institution entries reveal money-laundering routes
  • BLACK LEDGER contracts can reference VAULT entries for “source funds” and “destination accounts”
  • 2-phase: Phase 1 (VAULT) = research target’s financial network, Phase 2 (BLACK LEDGER) = audit & manipulate

With NULL:

  • NULL diagnostic module can “scan” VAULT database for corruption or inconsistencies
  • Operator bounty: “Run system diagnostic and confirm all 200+ VAULT entries are uncorrupted” (grants +100 ¤ + 1 rep, pure verification)

Self-Reference:

  • Solo Vault experience is complete: operator can spend hundreds of hours researching, bounty-hunting, cross-referencing
  • Browsing structure is a Lisp-tree (CAR = open entry, CDR = next entry, BACK = parent category)
  • Vault is additive: loading other modules doesn’t change Vault, only adds “cross-module annotation” layers

Vaults bounties are single-phase by design (no cartridge swaps required). However, multi-phase contracts can chain VAULT research with another module’s operation.

Example 2-Phase: VAULT RESEARCH → ICE BREAKER PENETRATION

Section titled “Example 2-Phase: VAULT RESEARCH → ICE BREAKER PENETRATION”

Phase 1 (THE VAULT, 10–15 min):

  • Bounty: “Research Yamagata Corp dossier and 2 related corporate entries”
  • Operator searches: “Yamagata,” finds dossier (3 pages), reads cross-references (TRADING PARTNERS, EXECUTIVE BIOS)
  • Reward: 150 ¤
  • Phase chain write: phase=1, target_corp=YAMAGATA, intel_gathered=3_entries

Phase 2 (ICE BREAKER, subsequent load or same session if multi-cartridge play):

  • Contract: “PENETRATION: Yamagata subsidiary network node”
  • ICE BREAKER contract difficulty is reduced because operator has read 3 entries about Yamagata structure
  • Cipher voice references the VAULT research: “YAMAGATA’S NETWORK USES HONEYWELL ARCHITECTURE, AS YOUR DOSSIER INDICATED. EXPLOIT THE KNOWN PATTERN.”
  • Success grants bonus: +100 ¤ (VAULT research premium)
  • Reward: 1200 ¤ (base) + 100 ¤ (research bonus) = 1300 ¤
  • Rep gain: +2 (threat points) + 1 (phase completion)

Rep 0–4 (Intelligence Novice):

  • 2 domains visible (CORPORATE, SIGNAL FREQUENCIES)
  • Can browse entries, but no bounties yet
  • Mastery: learning the Vault navigation grammar, understanding entry structure

Rep 5–14 (Analyst):

  • All domains unlock (except OPERATIONAL DOSSIERS)
  • RESEARCH BOUNTY available: simple “find and read” tasks
  • knowledge_index reaches 20–40
  • Mastery: cross-referencing, connecting entry concepts

Rep 15–24 (Intelligence Officer):

  • OPERATIONAL DOSSIERS visible (can read competitor dossiers)
  • PROFILE VERIFICATION bounties common
  • knowledge_index reaches 50–100
  • Mastery: recognizing operational patterns, predicting competitor moves

Rep 25–49 (Senior Analyst):

  • FORENSIC PATTERN bounties unlock
  • Encrypted entries become decryptable (with CIPHER GARDEN)
  • knowledge_index reaches 150+
  • Mastery: synthesis, building strategic intelligence from disparate sources

Rep 50+ (Master Analyst):

  • CLASSIFIED SECTION unlocks (5–10 highly encrypted, high-value entries)
  • Can propose custom research questions to Cipher (generates ad-hoc bounties)
  • knowledge_index reaches 255 (cap)
  • Mastery: teaching other operators, becoming an intelligence authority

Bounty Payout Formula:

base_reward = bounty_type_base × difficulty_multiplier
knowledge_multiplier = 1 + (knowledge_index / 255) /* scales as you learn more */
rep_multiplier = 1 + (reputation / 100)
final_payout = base_reward × knowledge_multiplier × rep_multiplier

Worked Examples:

  1. RESEARCH BOUNTY (Difficulty 1), Rep 5, knowledge_index 30:

    • base = 50 ¤, knowledge_mult = 1.12, rep_mult = 1.05
    • final = 50 × 1.12 × 1.05 = 58 ¤
  2. FREQUENCY HUNT (Difficulty 2), Rep 20, knowledge_index 80:

    • base = 200 ¤ × 1.5 (difficulty) = 300 ¤, knowledge_mult = 1.31, rep_mult = 1.2
    • final = 300 × 1.31 × 1.2 = 473 ¤
  3. FORENSIC PATTERN (Difficulty 3), Rep 40, knowledge_index 200:

    • base = 300 ¤ × 2.0 (difficulty) = 600 ¤, knowledge_mult = 1.78, rep_mult = 1.4
    • final = 600 × 1.78 × 1.4 = 1495 ¤

Economics Note: THE VAULT is low-stress, passive income. Payouts are modest compared to action modules (ICE BREAKER, NODESPACE), but the knowledge_index multiplier makes late-game Vault research quite profitable. An expert researcher at rep 50 with knowledge_index 250 gets 2.5× multipliers, turning simple bounties into 150–200 ¤ payouts.


Boot: Operator loads THE VAULT. Edgeware loading sequence plays. 2.0s.

Main Interface: Five-row category menu appears:

VAULT DOMAINS:
[■] CORPORATE PROFILES (47 entries)
[■] NETWORK INFRASTRUCTURE (41 entries)
[■] SIGNAL FREQUENCIES (39 entries)
[ ] MARITIME INTELLIGENCE (requires knowledge ≥ 50)
[ ] FINANCIAL INSTITUTIONS (requires knowledge ≥ 60)

Operator selects: CORPORATE PROFILES (CAR key).

Category view: Lists 47 entries alphabetically. Operator searches for “Yamagata” (using CAR/CDR to navigate, or numeric entry for search). Finds:

  • “Yamagata Corporation — Overview”
  • “Yamagata Corp: Executive Council”
  • “Yamagata Subsidiary: Honshu Maritime Trading”

Operator reads: Opens “Yamagata Corporation — Overview” (3 pages, takes 3 min to read). Entry shows:

  • Company structure (hierarchical)
  • Known network infrastructure (cites NETWORK INFRASTRUCTURE domain)
  • Cross-references (links to 2 related entries)

Bottom of entry:

[EVAL: next page INFO: cross-references QUOTE: bookmark LINK: done]
BOUNTY AVAILABLE: Profile Verification (read related entries)
Reward: 100 ¤ if you read "Yamagata Subsidiary: Honshu Maritime Trading"

Operator accepts bounty, navigates to related entry (QUOTE: bookmark, BACK, find Honshu entry). Reads it (2 min).

Returns to search menu. System detects completion. Bounty resolves: 100 ¤ added to credit_balance. knowledge_index increments by 1.

Operator continues browsing: Reads 3 more entries (SIGNAL FREQUENCIES: “Military Encrypted Bands”, “Yakuza Communications Protocol”, “KEC Employee Radio Network”). Takes 10 min. knowledge_index now +3 from research bounties.

Session ends: Operator presses SYS (hold 2s) to return to bare deck. Total playtime: 30 min. Total earnings: 350 ¤. knowledge_index: +4. No reputation change (Vault doesn’t grant rep directly).


At Load:

  • Rep 0–9: “THE VAULT IS YOUR LIBRARY. CURIOSITY BUILDS POWER.”
  • Rep 10–34: “YOU’VE READ 80 ENTRIES. THE PATTERNS ARE BECOMING CLEAR.”
  • Rep 35+: “THE VAULT SHOWS YOU WHAT THE WORLD HIDES.”

During Research (Context-Driven):

When operator reads CORPORATE entry:

“YAMAGATA’S NETWORK TOPOLOGY MATCHES HONEYWELL PATTERNS. ICE BREAKER WOULD FIND FAMILIAR DEFENSE ARCHITECTURE.”

When operator discovers cross-reference:

“HONSHU MARITIME IS A SUBSIDIARY. THIS ENTITY CONTROLS THREE TRANSPORTATION ROUTES.”

When operator completes a FORENSIC PATTERN bounty:

“EIGHT SOURCES CONFIRM: THESE ENTITIES ARE COORDINATED. NETWORK STRATEGY COULD EXPLOIT THIS ALLIANCE.”

Domain Vocabulary for CIPHER_DOMAIN:

  • INTELLIGENCE: Dossier, profile, entity, correlation, network, infrastructure, pattern
  • RESEARCH: Entry, browse, cross-reference, verify, synthesis, decrypt
  • OPERATIONS: Exploit, defend, coordinate, control, intelligence gap, classified

/* THE VAULT Cell Types */
typedef struct {
char title[64]; /* Entry title (e.g., "Yamagata Corp Overview") */
uint8_t domain; /* 0–5 (CORPORATE, NETWORK, SIGNAL, etc.) */
uint16_t entry_id; /* Unique ID per entry */
uint8_t pages; /* 1–10 pages per entry */
uint8_t knowledge_gate; /* knowledge_index required to read */
uint8_t *plaintext; /* Entry content (or encrypted) */
uint16_t *cross_references; /* Array of related entry_ids (up to 5) */
} VaultEntry;
typedef struct {
char bounty_title[64];
uint8_t bounty_type; /* 0=RESEARCH, 1=VERIFICATION, 2=FREQUENCY_HUNT, 3=FORENSIC */
uint16_t target_entry_id; /* For RESEARCH bounties */
uint16_t *required_entries; /* For VERIFICATION/FORENSIC (array of entry_ids) */
uint16_t reward;
uint8_t difficulty;
uint8_t rep_gain;
} VaultBounty;
/*
Example composition: VAULT browsing interface
┌─ VAULT: Corporate Profiles ──────────────────────────┐
│ │
│ Selected Entry: "Yamagata Corporation — Overview" │
│ Pages: 1/3 │
│ │
│ [Entry Content] │
│ ───────────────────────────────────────────────── │
│ Yamagata Corporation is a mid-tier electronics and │
│ trading conglomerate headquartered in Kobe. Known │
│ subsidiaries include Honshu Maritime Trading Co., │
│ which operates three cargo shipping routes in the │
│ Pacific. Executive leadership is dominated by the │
│ Yamagata family (see: "Yamagata Family Tree"). │
│ │
│ Network Infrastructure: Honeywell-derived ICE │
│ (see: "Honeywell Network Defense Pattern") │
│ ───────────────────────────────────────────────── │
│ Cross-References: (3) │
│ > Yamagata Subsidiary: Honshu Maritime Trading │
│ > Yamagata Family Tree (in OPERATIONAL DOSSIERS) │
│ > Honeywell Network Defense Pattern │
│ │
│ BOUNTY: Profile Verification — read Honshu entry │
│ Reward: 100 ¤ │
│ │
│ [EVAL: next BACK: menu QUOTE: bookmark INFO: citations]
└────────────────────────────────────────────────────────┘
*/

THE VAULT is quiet by design. Audio serves as a bookmark/progress signal, not entertainment.

Voice Assignments:

  • Voice 1 (Tone A): Entry page turning. Soft click (330 Hz, 50ms) each time operator navigates to a new page. Signal: progress through reading.
  • Voice 2 (Tone B): Cross-reference hint. When operator reads an entry with cross-references, Voice 2 plays a gentle ascending arpeggio (C4–E4–G4, 0.5s) to draw attention to the citations.
  • Voice 3 (Noise): Bounty completion. When a bounty is completed, filtered noise (envelope-modulated, 100–400 Hz) plays a brief “success chime” (0.8s).

Key Audio Events:

EventFreqDurationEffect
Entry opened220 Hz soft start0.3sFocus signal
Page turn330 Hz click0.05sNavigation feedback (repeats for each page)
Cross-reference availableC4–E4–G4 arpeggio0.5sHint: related content exists
Bounty discovered440 Hz pulse0.2s × 2Contract offer notification
Bounty completedFiltered noise sweep0.8sConfirmation, success
knowledge_index tick880 Hz very soft0.1sSubtle: intelligence growing

THE VAULT supports knowledge exchange between two operators via link cable.

Asymmetric Roles:

  • Researcher: Has high knowledge_index (150+), loads VAULT, selects “SHARE RESEARCH BUNDLE”
  • Learner: Loads VAULT, selects “RECEIVE RESEARCH BUNDLE”

Data Flow:

  1. Researcher configures which 5–10 entries to share (e.g., “Corporate Profiles I’ve read”)
  2. Entries are encrypted and packaged (32 bytes per entry reference)
  3. Link handshake occurs; data transmits at 9600 baud
  4. Learner’s device receives bundle, decrypts, adds entries to a “SHARED READING LIST”
  5. Learner can read the entries immediately (counts toward their knowledge_index progression)
  6. Both devices exchange knowledge summary: “Researcher shared 8 entries. Learner read 5. +knowledge bonus to both.”

Worked Example:

  • Operator A (Researcher): knowledge_index 180, rep 40. Has read 120 entries, including all SIGNAL FREQUENCIES and FINANCIAL INSTITUTIONS domains.

  • Operator B (Learner): knowledge_index 60, rep 15. Has only read CORPORATE and basic NETWORK entries.

  • Operator A: Selects “SHARE RESEARCH BUNDLE,” chooses “SIGNAL FREQUENCIES Domain (10 entries)”.

  • Device A: Encrypts 10 entries + metadata, packages as 320 bytes.

  • Link handshake: Devices connect, authenticate (serial exchange), begin transmission.

  • Device B: Receives bundle, decrypts (automatically, using standard VAULT encryption key). Adds 10 entries to SHARED READING LIST.

  • Operator B: Browses SHARED READING LIST, reads 7 of the 10 SIGNAL FREQUENCIES entries over next 20 min.

  • Exchange: Both devices transmit knowledge summary. Operator A gains +50 ¤ bounty (reward for being a knowledge contributor). Operator B’s knowledge_index increments by +4 (shared entries count double toward knowledge growth).


MODULE 12: CIPHER GARDEN — CRYPTOGRAPHIC TOOLS

Section titled “MODULE 12: CIPHER GARDEN — CRYPTOGRAPHIC TOOLS”

Designation: CRYPTOGRAPHIC TOOLS (MODULE CLASS: 0x0C)
Publisher: Bureau 9 Technical Services (no address)
Profile: Passive enhancement, cipher practice, cryptographic toolkit
Operator Role: Cryptographer, cipher specialist, message security expert
Deck State Signature: Sets bit 11 in cartridge_history bitfield. Creates cipher_mastery stat (0–255).

Loading Screen:

Bureau 9’s cinematic loading sequence: Dead silence. Text types mechanically across the screen:

BUREAU 9 TECHNICAL SERVICES
CLASSIFICATION: UNCLASSIFIED
DISTRIBUTION: AUTHORIZED OPERATORS

Then, slowly, a line of characters appears below: █░░░░░░░░ (progress bar fills as module loads). No sound, no tone. Pure silence and text. Unfriendly but authoritative. 2.8s total.


CIPHER GARDEN is puzzle-focused gameplay that teaches real (simplified) cryptographic concepts. Bounties are cipher-breaking contracts and encrypted messaging challenges.

Contract TypeDescriptionRewardRep Gain
CIPHER PRACTICESolve a substitution or transposition cipher puzzle (timed or untimed)50–200 ¤+0
MESSAGE DECRYPTIONDecrypt an intercepted message (given key or requiring frequency analysis)100–300 ¤+1
KEY GENERATIONGenerate secure one-time pads or encryption keys (procedural puzzle)150–400 ¤+1
FREQUENCY ANALYSISBreak a cipher by analyzing letter/byte frequency and pattern matching200–500 ¤+2
ENCRYPTED LINK SESSIONSend/receive encrypted messages with another operator via link cable100–250 ¤+0 (social)
  1. SUBSTITUTION CIPHER — Classic A→B, B→C shift. Simple to complex (Caesar cipher to random substitution). Solvable by trial-and-error or frequency analysis.
  2. TRANSPOSITION CIPHER — Letters rearranged by position, not substituted. Rail fence, columnar transposition, route ciphers.
  3. VIGENÈRE CIPHER — Polyalphabetic substitution using a repeating key. Harder than Caesar. Solvable by key-length analysis + frequency analysis.
  4. ONE-TIME PAD — Theoretically unbreakable (if used correctly). Operator generates random pads and learns the mechanics of perfect encryption.
  5. FREQUENCY ANALYSIS PUZZLE — Given a ciphertext, analyze character frequencies and compare to expected English/Japanese frequency distributions to infer plaintext.

Contract Template: CIPHER PRACTICE (Substitution)

Section titled “Contract Template: CIPHER PRACTICE (Substitution)”
cipher_type: SUBSTITUTION
plaintext_length: 50–200 characters
difficulty: 1–5 (1 = obvious patterns, 5 = random substitution)
time_limit: None (puzzle-based, not race-based)
hint_available: Yes (costs 0 ¤, but flags as "hint used" in leaderboard)
reward: 50 ¤ base + 50 ¤ per difficulty tier + 25 ¤ speedrun bonus (if solved in < 5 min)
solution_verification: Exact plaintext match OR semantic match (AI checks if decrypted message makes sense)

Contract Template: FREQUENCY ANALYSIS PUZZLE

Section titled “Contract Template: FREQUENCY ANALYSIS PUZZLE”
ciphertext: 300–500 characters, encrypted with unknown substitution
difficulty: 2–4 (2 = obvious high-frequency patterns, 4 = evenly distributed cipher)
hints: Operator can request frequency table (sorted by char count, no labels)
time_limit: None
reward: 200–500 ¤ based on difficulty
success_criteria: Decrypt at least 70% of message correctly (semantic understanding, not perfect char match)
bonus: +100 ¤ if plaintext is decrypted perfectly

SRAM Writes:

  • cipher_mastery (new universal stat): Increments by 1 per CIPHER PRACTICE completion. Increments by 2 per MESSAGE DECRYPTION. Increments by 3 per FREQUENCY ANALYSIS. Caps at 255. Never decreases.
  • credit_balance: Increases per puzzle completion.
  • reputation_score: Modest gains (+1 per FREQUENCY ANALYSIS bounty), no gains on simple practice.
  • cartridge_history bit 11 set. Bits 0–2, 10 checked: if THE VAULT loaded, encrypted VAULT entries become decryptable.

Reputation Thresholds (CIPHER GARDEN):

  • Rep 0–4: Basic SUBSTITUTION (Caesar variants) only. CIPHER PRACTICE is the sole bounty type. cipher_mastery reaches 10–20.
  • Rep 5–14: TRANSPOSITION and VIGENÈRE ciphers unlock. MESSAGE DECRYPTION bounties available. cipher_mastery reaches 40–80.
  • Rep 15–24: FREQUENCY ANALYSIS puzzles unlock. KEY GENERATION bounties available. cipher_mastery reaches 120–160.
  • Rep 25–49: One-time pad generation and advanced cryptanalysis. ENCRYPTED LINK SESSIONS unlock (deck-to-deck secure messaging). cipher_mastery reaches 180–220.
  • Rep 50+: Exclusive: operator can design custom ciphers and create puzzles for other operators. Access to “DEEP CRYPTO” contracts (theoretical cryptography, higher payouts). cipher_mastery 255 (cap).

With THE VAULT:

  • VAULT encrypted entries (CLASSIFIED SECTION) require cipher_mastery ≥ 30 to decrypt
  • VAULT bounty: “Decrypt three KEMPEITAI frequency entries” (chain: solve cipher puzzles in CIPHER GARDEN, then read decrypted VAULT entries)
  • Knowledge_index + cipher_mastery multiplier unlocks exclusive VAULT-CIPHER combined contracts (e.g., “Analyze financial institution entry encrypted in Vigenère cipher”)

With BLACK LEDGER:

  • BLACK LEDGER audit trails and encrypted transaction logs require cipher analysis to decode
  • Multi-phase: Phase 1 (CIPHER GARDEN) = break encryption on financial records, Phase 2 (BLACK LEDGER) = trace the decoded transactions

With ICE BREAKER:

  • ICE BREAKER “Cipher-Breaking” tool unlocks when cipher_mastery ≥ 50
  • Operator can use cryptanalysis to defeat encrypted nodes (instead of brute-force)
  • Linked gameplay: opponent in ICE BREAKER network uses encryption that can be analyzed in CIPHER GARDEN beforehand

With RELAY:

  • RELAY updates can deliver new cipher challenges (community-designed puzzles)
  • Bounty: “Solve the 5 cipher challenges from the latest RELAY update” (grant +200 ¤ + social proof)

With Null:

  • NULL diagnostics can verify cipher strength and entropy of operator’s generated keys
  • Operator can ask NULL: “Is my one-time pad sufficiently random?” (triggers diagnostic, passes/fails, grants minor feedback)

Self-Reference:

  • Solo CIPHER GARDEN is a complete cryptography training module
  • Browsing is a flat menu: SUBSTITUTION / TRANSPOSITION / VIGENÈRE / FREQUENCY / ONE-TIME PAD
  • No cartridge swap needed; sits comfortably as a standalone skill-building tool

Cipher Garden bounties are primarily single-phase, but can chain with other modules.

Example 2-Phase: CIPHER GARDEN → THE VAULT

Section titled “Example 2-Phase: CIPHER GARDEN → THE VAULT”

Phase 1 (CIPHER GARDEN, 15 min):

  • Bounty: “Decrypt the intercepted Kempeitai message” (Vigenère cipher, key length 6)
  • Operator uses frequency analysis tools provided in-game
  • Successfully decrypts message (reveals: “Kempeitai signal frequencies: 7.425 MHz, 8.840 MHz, 12.160 MHz”)
  • Reward: 300 ¤
  • Phase chain write: phase=1, plaintext_decrypted="Kempeitai signal frequencies..."

Phase 2 (THE VAULT, subsequent load):

  • Mission becomes available: “RESEARCH BOUNTY: Verify the Kempeitai frequencies you decrypted in CIPHER GARDEN against SIGNAL FREQUENCIES domain”
  • Operator navigates VAULT, finds “Kempeitai Signal Operations” entry
  • Entry confirms: the three frequencies decoded in Phase 1 are genuine historical Kempeitai channels
  • Reward: 200 ¤ (VAULT research) + 100 ¤ (cross-module verification bonus) = 300 ¤
  • Rep gain: +2 (frequency analysis in Phase 1) + 1 (cross-module completion) = +3 total

Total: 600 ¤, +3 rep. A modest but deeply satisfying contract that chains knowledge across modules.


Rep 0–4 (Cipher Student):

  • Caesar cipher variants only
  • CIPHER PRACTICE contracts
  • No time pressure; unlimited attempts
  • Mastery: learning substitution mechanics, recognizing shift patterns

Rep 5–14 (Apprentice Cryptographer):

  • Transposition and Vigenère ciphers unlock
  • MESSAGE DECRYPTION available
  • cipher_mastery reaches 40–80
  • Mastery: understanding polyalphabetic encryption, basic frequency analysis

Rep 15–24 (Cryptographer):

  • FREQUENCY ANALYSIS puzzles unlock
  • KEY GENERATION bounties available
  • cipher_mastery reaches 120–160
  • Mastery: statistical analysis, recognizing patterns in ciphertext

Rep 25–49 (Master Cryptographer):

  • One-time pad mechanics fully explored
  • ENCRYPTED LINK SESSIONS (secure comms with other operators)
  • cipher_mastery reaches 200+
  • Mastery: teaching cryptography, designing puzzles, proving encryption strength

Rep 50+ (Cipher Theorist):

  • “DEEP CRYPTO” contracts (theoretical cryptanalysis, no real ciphers, pure math)
  • Can design and publish custom ciphers for other operators to solve
  • cipher_mastery maxes at 255
  • Mastery: cryptographic authority, publishing research

Bounty Payout Formula:

base_reward = bounty_type_base × difficulty_multiplier
cipher_multiplier = 1 + (cipher_mastery / 255)
rep_multiplier = 1 + (reputation / 100)
speedrun_bonus = (solve_time < time_threshold) ? 0.2 × base_reward : 0
final_payout = (base_reward + speedrun_bonus) × cipher_multiplier × rep_multiplier

Worked Examples:

  1. CIPHER PRACTICE (Difficulty 2), Rep 5, cipher_mastery 40, solved in 3 min:

    • base = 50 ¤ × 1.5 (difficulty) = 75 ¤, speedrun = 15 ¤
    • cipher_mult = 1.16, rep_mult = 1.05
    • final = (75 + 15) × 1.16 × 1.05 = 108 ¤
  2. FREQUENCY ANALYSIS (Difficulty 3), Rep 20, cipher_mastery 130, no speedrun:

    • base = 200 ¤ × 2.0 (difficulty) = 400 ¤
    • cipher_mult = 1.51, rep_mult = 1.2
    • final = 400 × 1.51 × 1.2 = 725 ¤
  3. MESSAGE DECRYPTION (Difficulty 2), Rep 35, cipher_mastery 200, solved in 7 min (under limit):

    • base = 100 ¤ × 1.5 (difficulty) = 150 ¤, speedrun = 30 ¤
    • cipher_mult = 1.78, rep_mult = 1.35
    • final = (150 + 30) × 1.78 × 1.35 = 434 ¤

Risk/Reward: CIPHER GARDEN is low-risk. Puzzles have no failure state (operator can try indefinitely). Payouts are modest but scale nicely with cipher_mastery and rep.


Boot: Operator loads CIPHER GARDEN. Bureau 9 silent loading sequence plays. 2.8s.

Main Menu:

CIPHER GARDEN — CRYPTOGRAPHIC PRACTICE
[■] SUBSTITUTION CIPHER
[■] TRANSPOSITION CIPHER
[■] VIGENÈRE CIPHER
[ ] FREQUENCY ANALYSIS (requires cipher_mastery ≥ 40)
[ ] ONE-TIME PAD (requires rep ≥ 25)
ACTIVE BOUNTIES:
CIPHER PRACTICE (Substitution Difficulty 2) — 75 ¤ + speedrun bonus

Operator selects: SUBSTITUTION CIPHER, accepts active bounty.

Puzzle loads: Ciphertext appears:

WKUHD LV D PHVVDJH IURP WKH DEYHVV
Hint available: This uses a simple Caesar shift.
Solve to reveal plaintext.

Operator interaction:

  • CAR/CDR navigates through cipher alphabet mapping
  • CONS combines guessed letter with shift value
  • EVAL commits a shift (maps A→B, B→C, etc.)
  • INFO shows frequency table (letters used in ciphertext, ordered by frequency)

Operator tries: Shift=3 (Caesar cipher, classic). Decrypts to: “THERE IS A MESSAGE FROM THE ABYSS”

Verification: Decrypted message is coherent English → Puzzle solved!

Debrief: “CIPHER PRACTICE: Substitution (Difficulty 2) solved in 4 minutes. Reward: 75 ¤ base + 15 ¤ speedrun bonus = 90 ¤. No hint used.”

Operator continues: Loads next bounty: MESSAGE DECRYPTION (Vigenère cipher). Ciphertext is 150 characters, key length unknown.

Operator workflow:

  • Uses frequency analysis to estimate key length (Kasiski examination: find repeating substrings, calculate likely key length)
  • Deduces key length = 5
  • Uses frequency analysis on each of the 5 “lanes” to find individual shift values
  • Reconstructs key: “GHOSTWIRE”
  • Decrypts full message (corporate espionage scenario, flavor text)

20 minutes of puzzle-solving later: Second bounty complete. 300 ¤ reward. cipher_mastery now +2 from bounties.

Session ends. Total earnings: 390 ¤. Total time: 40 min. No rep gain (CIPHER PRACTICE and simple MESSAGE DECRYPTION don’t grant rep). cipher_mastery: +2.


At Load:

  • Rep 0–9: “CRYPTOGRAPHY IS A LANGUAGE. LEARN IT.”
  • Rep 10–34: “YOUR FREQUENCY ANALYSIS IS IMPROVING. THE PATTERNS REVEAL THEMSELVES.”
  • Rep 35+: “YOU ARE READING THE DEEP STRUCTURE OF ENCRYPTED COMMUNICATION.”

During Puzzle (Contextual Hints):

When operator requests hint:

“This ciphertext has letter frequencies skewed toward E and T. This suggests a simple substitution.”

When operator is close to solving:

“Your key is almost correct. Three letters still map incorrectly.”

When operator uses frequency analysis successfully:

“Frequency analysis revealed the structure. The key pattern is now visible.”

Domain Vocabulary for CIPHER_DOMAIN:

  • CRYPTOGRAPHY: Plaintext, ciphertext, key, encryption, decryption, substitution, transposition, frequency, entropy
  • TOOLS: Frequency analysis, Kasiski examination, brute force, pattern matching, statistical test
  • OPERATIONS: Encode, decode, cipher, break, analyze, verify, crack

/* CIPHER GARDEN Cell Types */
typedef struct {
char plaintext[256]; /* Original message */
char ciphertext[256]; /* Encrypted version */
uint8_t cipher_type; /* 0=SUBSTITUTION, 1=TRANSPOSITION, 2=VIGENERE, 3=FREQUENCY */
uint8_t difficulty; /* 1–5 */
uint16_t *key_or_pattern; /* Encryption key (or pattern for transposition) */
uint8_t key_length; /* For variable-length keys */
} CipherPuzzle;
typedef struct {
char title[64];
uint8_t puzzle_id; /* Unique puzzle ID */
CipherPuzzle puzzle;
uint16_t reward;
uint8_t difficulty;
uint8_t time_limit_seconds; /* 0 = no limit */
uint8_t hint_count; /* How many hints available */
} CipherBounty;
typedef struct {
uint8_t mapping[256]; /* A→?, B→?, etc. (for substitution) */
uint16_t partial_decrypt_length; /* How much of plaintext is correctly decrypted */
uint8_t confidence; /* 0–100: how confident is operator in their key? */
} OperatorProgress;
/*
Example composition: Frequency Analysis Puzzle
┌─ CIPHER GARDEN: Frequency Analysis ──────────────┐
│ │
│ Ciphertext (300 chars): │
│ ZRCWQ YV R JQAARZPQ DSLJ GYQ RKMQAA... │
│ │
│ Frequency Table (sorted by count): │
│ Q: ████████░ (18) Y: ██░ (3) │
│ R: ███████░ (17) V: ██░ (3) │
│ G: ██████░ (14) W: █░ (2) │
│ A: ██████░ (14) ... │
│ D: █████░ (11) │
│ │
│ Known plaintext character frequencies (English): │
│ E: ~13%, A: ~8%, T: ~9%, O: ~8%... │
│ │
│ Your hypothesis: Q→E (most frequent) │
│ Operator mapping: Q→E, R→T, G→A │
│ Partial decrypt: "THER_ IS A TE__A_E..." │
│ │
│ Confidence: 60% (some letters mapped, gaps exist) │
│ [EVAL: submit BACK: quit INFO: frequency table]
└────────────────────────────────────────────────────┘
*/

CIPHER GARDEN uses sound to reinforce cryptographic concepts, not to entertain.

Voice Assignments:

  • Voice 1 (Tone A): Key discovery. When operator successfully identifies a character mapping (e.g., A→E), Voice 1 plays a rising tone (330→440 Hz, 0.3s). Reinforces learning.
  • Voice 2 (Tone B): Decryption progress. As operator decrypts more of the plaintext, Voice 2 frequency rises (baseline 220 Hz, +20 Hz per 10% decrypted). When fully decrypted, reaches 440 Hz and holds steady.
  • Voice 3 (Noise): Statistical match. When operator’s guessed mapping matches actual frequency distribution, Voice 3 plays soft filtered noise (100–200 Hz, envelope modulation, 0.5s). Reward signal for correct statistical reasoning.

Key Audio Events:

EventFreqDurationEffect
Correct character mapping330→440 Hz rising0.3sSuccess, learning reinforcement
Incorrect mapping attempt110 Hz (low)0.2sGentle failure signal, try again
Frequency analysis hint usedArpeggio E–G–B0.4sHelpful guidance signal
Partial plaintext decoded (10%–90%)220 Hz baseline + 20 Hz per 10%ongoingProgress signal, real-time feedback
Puzzle solved440 Hz + envelope swell1.0sVictory, completion signal
Speedrun bonus (solved under time)880 Hz double-tap0.2s × 2Excellence signal

CIPHER GARDEN supports encrypted messaging and puzzle exchange between two operators.

Asymmetric Roles:

  • Sender: Has a message to encrypt and send; loads CIPHER GARDEN, selects “SEND ENCRYPTED MESSAGE”
  • Receiver: Loads CIPHER GARDEN, selects “RECEIVE ENCRYPTED MESSAGE”

Data Flow:

  1. Sender composes plaintext message (up to 256 characters)
  2. Sender chooses encryption method (SUBSTITUTION, VIGENÈRE, ONE-TIME PAD)
  3. Sender generates or chooses a key
  4. Device encrypts message and prepares for transmission (key + ciphertext, ~128 bytes)
  5. Link handshake; encrypted bundle transmits at 9600 baud
  6. Receiver’s device receives bundle, displays ciphertext + hint (if sender included hint)
  7. Receiver attempts to decrypt (solves puzzle)
  8. On success, plaintext message appears. Receiver can respond with encrypted message.

Worked Example: Linked Encrypted Conversation

  • Operator A: Creates plaintext: “YOUR NEXT MISSION IS IN KOBE. SECURE CHANNEL.”
  • Operator A: Chooses ONE-TIME PAD encryption (maximum security)
  • Device A: Generates random 50-byte key, encrypts message, packs for transmission
  • Operator B: Selects “RECEIVE ENCRYPTED MESSAGE”
  • Link handshake: Devices connect
  • Device B: Receives ciphertext (looks like random bytes). Also receives hint: “ONE-TIME PAD. Random key. Frequency analysis impossible.”
  • Operator B: Realizes this is a one-time pad (unbreakable); asks for key separately (off-channel, outside link protocol)
  • Operator A: Provides key verbally or via separate method
  • Operator B: Manually enters key into device, decrypts, reads plaintext: “YOUR NEXT MISSION IS IN KOBE. SECURE CHANNEL.”
  • Operator B: Composes response: “UNDERSTOOD. AWAITING DETAILED BRIEF.” Creates response using same one-time pad (reusing key for response).
  • Device B: Encrypts response, transmits back to Operator A
  • Operator A: Receives encrypted response, decrypts using same key, reads plaintext

Reward Structure: Each operator grants 100 ¤ bounty for successful encrypted message exchange (social, no rep gain). Servers both as gameplay and as a teaching tool for cryptographic concepts.


[Continuing with Module 13: NULL and Module 14: RELAY in next section due to length…]


Designation: DIAGNOSTIC (MODULE CLASS: 0x0D)
Publisher: Edgeware Systems (Tokyo)
Profile: System module, power-user tools, deep introspection, developer utilities
Operator Role: System administrator, hardware tinkerer, platform researcher
Deck State Signature: Sets bit 12 in cartridge_history bitfield. Enables NULL_MODE (always-available system access).

Loading Screen:

Edgeware Systems, but specialized variant: Wordmark assembles as usual (character-by-character, soft keyclick). But after all letters appear, the screen invert flashes (amber becomes black, black becomes amber) once. Then a cascading series of hex digits rain down the screen (simulated Matrix-style, 1.5s duration). Audio: Sustained 440 Hz tone throughout (dry, no envelope), then a descending glissando (440→220 Hz) as hex digits fall. 2.5s total. Feels like opening a secret door in your handheld.


NULL is NOT a game. It is a system diagnostic and introspection suite. The operator inspects SRAM, runs hardware tests, views PSG register states, examines cartridge provenance, and interfaces with Cipher voice directly. Bounties are puzzles that test deep platform knowledge.

Contract TypeDescriptionRewardRep Gain
SRAM VERIFICATIONInspect deck state fields, verify CRC integrity, spot inconsistencies50–100 ¤+0
HARDWARE DIAGNOSTICRun PSG test, display register states, verify audio output75–150 ¤+0
CARTRIDGE PROVENANCEExamine loaded cartridge header, verify signature, trace origin100–200 ¤+0
CIPHER DEEP DIVEGenerate extended Cipher passages and analyze their structure100–250 ¤+1 (knowledge-building)
NOSH RUNTIME BOUNTYSolve a low-level puzzle about the KN-86’s actual architecture150–400 ¤+1
target_field: operator_handle, credit_balance, reputation, cartridge_history, phase_chain, etc.
inspection_task: "Verify that reputation_score is consistent with bounties completed"
difficulty: 1–3 (1 = simple count, 3 = multi-field consistency)
reward: 50–100 ¤
success_criteria: Operator identifies and reports any inconsistency
bonus: +50 ¤ if inconsistency is severe enough to warrant a repair action
puzzle_type: "Explain how the phase chain handles multi-phase missions"
difficulty: 2–4 (tests operational knowledge of platform, not just gameplay)
reward: 150–400 ¤ based on difficulty
success_criteria: Operator writes a short explanation (text interface) that demonstrates understanding
bonus: +100 ¤ if explanation is accurate enough to be fed into Cipher training

SRAM Writes:

  • NULL does NOT modify deck state (read-only operation, except for intentional repair actions)
  • null_access_count (invisible stat): Increments each time operator loads NULL. Used to calculate mastery tier.
  • cartridge_history bit 12 set permanently. Bits 0–11 fully inspectable.

Reputation Thresholds (NULL):

  • Rep 0–4: Basic SRAM VERIFICATION only. Can view operator_handle, credit_balance, reputation, cartridge_history as text. No system internals.
  • Rep 5–14: HARDWARE DIAGNOSTIC available. Can inspect PSG register states, test audio channels, view display mode. Cannot modify.
  • Rep 15–24: CARTRIDGE PROVENANCE access. Can read cartridge header (module class, publisher, build timestamp, signature). CIPHER DEEP DIVE unlocks.
  • Rep 25–49: NOSH RUNTIME BOUNTY puzzles unlock (high-difficulty platform knowledge). Can access phase chain internals, inspect LFSR state.
  • Rep 50+: ADVANCED DIAGNOSTICS unlock. Can inspect CPU cycles (if platform supports it), view garbage collection statistics, analyze cartridge load times, propose custom firmware diagnostics to other operators.

With All Modules:

  • NULL can verify that each cartridge’s signature is legitimate (anti-piracy check, flavor text)
  • NULL displays “Last Loaded” timestamp for each cartridge in cartridge_history
  • Bounty: “Verify all loaded cartridges have legitimate Edgeware signatures”

With THE VAULT:

  • NULL can scan VAULT database for corruption (CRC check on all 200+ entries)
  • Bounty: “Run VAULT integrity diagnostic. Report any corrupted entries.”
  • If corruption found: grants bonus to fix (Relay can patch corrupted entries on update)

With CIPHER GARDEN:

  • NULL can inspect the LFSR state and cipher_seed in deck state
  • Bounty: “Explain how the LFSR drives Cipher voice generation” (firmware knowledge puzzle)
  • Advanced: Can request Cipher voice to generate passages for analysis (meta-gameplay)

With ICE BREAKER + NODESPACE:

  • NULL displays per-module operation statistics: “ICE BREAKER: 47 operations run, average threat 2.3, success rate 68%”
  • Bounty: “Analyze your gameplay statistics. What does your threat-level trend reveal about your skill growth?”

Self-Reference:

  • NULL can reference NULL in its own diagnostics (terminal introspection)
  • Advanced bounty: “Use NULL to inspect NULL’s own diagnostic capabilities”

NULL bounties are single-phase, but can chain with other modules’ debugging/verification needs.

Example 2-Phase: ICE BREAKER → NULL ANALYSIS

Section titled “Example 2-Phase: ICE BREAKER → NULL ANALYSIS”

Phase 1 (ICE BREAKER, previous session):

  • Operator runs NETWORK INTRUSION contract, completes successfully
  • Deck state is updated: credits ±X, reputation ±Y, phase_chain modified

Phase 2 (NULL, subsequent load):

  • Bounty available: “NOSH RUNTIME BOUNTY: Analyze your recent ICE BREAKER session. What was your success rate vs. threat level? Can you identify why you failed Node 7?”
  • Operator opens NULL, selects ICE BREAKER history (stored in local cartridge SRAM)
  • Views: 47 operations across the run, 4 failures, 2 times HUNTER spawned
  • Analyzes: “I failed Node 7 because I didn’t recognize BLACK ICE, tried CRACK combo when I needed MIRROR + SPIKE instead”
  • Reward: 250 ¤ + 1 rep (self-analysis, deepening mastery)

Rep 0–4 (Novice Tinkerer):

  • Can inspect basic SRAM fields (handle, credits, reputation as numeric values)
  • Mastery: understanding that persistent state exists, where it lives

Rep 5–14 (System Operator):

  • HARDWARE DIAGNOSTIC available; can test PSG, view register states
  • Mastery: understanding how audio hardware works, signal paths

Rep 15–24 (Platform Specialist):

  • CARTRIDGE PROVENANCE; can read headers, verify signatures
  • CIPHER DEEP DIVE; can generate extended Cipher passages
  • Mastery: understanding cartridge architecture, Cipher grammar

Rep 25–49 (Systems Master):

  • NOSH RUNTIME BOUNTY puzzles unlock
  • Can inspect low-level phase chain mechanics
  • Can propose custom diagnostics
  • Mastery: deep platform knowledge, ability to teach others

Rep 50+ (Platform Architect):

  • Can analyze CPU/memory statistics (if hardware supports)
  • Can author custom runtime bounties for other operators
  • Can propose patches and improvements to Edgeware
  • Mastery: authority on KN-86 architecture

Bounty Payout Formula:

base_reward = bounty_type_base × difficulty_multiplier
knowledge_bonus = bounty_difficulty > 2 ? 50 ¤ : 0 /* Platform knowledge earns bonus */
rep_multiplier = 1 + (reputation / 100)
final_payout = (base_reward + knowledge_bonus) × rep_multiplier

Worked Examples:

  1. SRAM VERIFICATION (Difficulty 1), Rep 5:

    • base = 50 ¤, no knowledge bonus
    • rep_mult = 1.05
    • final = 50 × 1.05 = 52 ¤
  2. NOSH RUNTIME BOUNTY (Difficulty 3), Rep 30:

    • base = 150 ¤ × 2.0 (difficulty) = 300 ¤, knowledge_bonus = 50 ¤
    • rep_mult = 1.3
    • final = (300 + 50) × 1.3 = 455 ¤
  3. CIPHER DEEP DIVE (Difficulty 2), Rep 25:

    • base = 100 ¤ × 1.5, knowledge_bonus = 50 ¤
    • rep_mult = 1.25
    • final = (150 + 50) × 1.25 = 250 ¤

Note: NULL bounties have no time pressure and modest payouts. They are knowledge-building and self-reflection tools, not primary income sources.


Boot: Operator loads NULL. Edgeware + invert flash loading sequence plays. 2.5s.

Main Interface:

NULL DIAGNOSTICS — SYSTEM INSPECTION
[■] SRAM INSPECTION (View deck state)
[■] HARDWARE TEST (Test PSG, audio)
[■] CARTRIDGE VERIFY (Check loaded cartridge)
[■] CIPHER ANALYSIS (Generate passages, study structure)
[ ] NOSH RUNTIME BOUNTY (requires rep ≥ 25)
ACTIVE BOUNTIES:
SRAM VERIFICATION: Verify reputation field is consistent with bounties completed
CARTRIDGE VERIFY: Check if loaded cartridge (ICE BREAKER) has valid signature

Operator selects: SRAM INSPECTION.

Display shows:

DECK STATE — SRAM CONTENTS
────────────────────────────────────
Operator Handle: GHOSTWIRE
Credit Balance: 2,840 ¤
Reputation Score: 27
Cartridge History: 0011 0011 (ICE BREAKER, NEONGRID, BLACK LEDGER loaded)
Phase Chain: Phase 2/3 EXTRACTION → AUDIT (suspended)
Cipher Seed (LFSR): 0xA7F3
Lambda Slots: λ1 (14 steps), λ2 (8 steps), others empty
────────────────────────────────────
CRC Check: PASS
Consistency Check: PASS

Operator navigates: CAR to drill into “Cartridge History.” Views bit-by-bit:

Bit 0 (0x01): ICE BREAKER ■ LOADED
Bit 1 (0x02): NEONGRID ■ LOADED
Bit 2 (0x04): BLACK LEDGER ■ LOADED
Bit 3 (0x08): DEPTHCHARGE □ not loaded
Bit 4 (0x10): SHELLFIRE □ not loaded
Bit 5 (0x20): TAKEZO □ not loaded
...

Operator analyzes: “I’ve loaded 3 modules. All legitimate publishers (Zaibatsu, Edgeware, Bureau 9).” Bounty “SRAM VERIFICATION” completes. 50 ¤ reward.

Operator continues: Selects HARDWARE TEST.

Audio test plays: PSG Voice 1 cycles through frequencies (110–440 Hz). Voice 2 plays a simple melody. Voice 3 outputs noise, then silence. Operator can hear: left channel (Voice 1), right channel (Voice 2), central channel (Voice 3).

Display shows PSG register states in real-time:

PSG REGISTER STATE (Real-Time Monitor)
────────────────────────────────────
Voice A (Tone): Frequency: 220 Hz, Amplitude: 15/15, Status: ACTIVE
Voice B (Tone): Frequency: 330 Hz, Amplitude: 12/15, Status: ACTIVE
Voice C (Noise): Frequency: 4000 Hz (noise), Amplitude: 10/15, Status: ACTIVE
Envelope Gen: Shape: SAW, Rate: 8 Hz, Status: ON
────────────────────────────────────
Status: ALL SYSTEMS OPERATIONAL

Operator interprets: “All audio channels working. Envelope generator active. Hardware is healthy.” HARDWARE TEST bounty completes. 75 ¤ reward.

Session ends. Total earnings: 125 ¤. Total time: 20 min. No rep gain (diagnostics are knowledge-building, not combat-focused). But operator has confirmed their deck is healthy and understands its state.


At Load:

  • Rep 0–9: “THE NOSH RUNTIME OPENS. INSPECT, LEARN, UNDERSTAND.”
  • Rep 10–34: “YOUR SYSTEM IS HEALTHY. THE STATISTICS TELL A STORY ABOUT YOU.”
  • Rep 35+: “YOU ARE READING THE DEVICE FROM THE INSIDE. THIS IS MASTERY.”

During Inspection (Contextual):

When viewing SRAM consistency:

“Your reputation score (27) matches the threat points you’ve overcome. Consistent.”

When analyzing cartridge history:

“You’ve loaded Zaibatsu (ICE BREAKER), Edgeware (NEONGRID, BLACK LEDGER), Bureau 9. Broad capability envelope.”

When requesting Cipher analysis:

“The LFSR is at 0xA7F3. It has cycled 847 passages. The Cipher voice grows more cryptic with each seed advance.”

Domain Vocabulary for CIPHER_DOMAIN:

  • SYSTEM: Diagnostic, SRAM, register, state, integrity, consistency, firmware
  • INTROSPECTION: Inspect, analyze, verify, monitor, profile, statistics
  • MASTERY: Understand, deep knowledge, system architecture, platform

/* NULL Cell Types */
typedef struct {
char field_name[32]; /* "operator_handle", "credit_balance", etc. */
uint8_t field_type; /* 0=string, 1=int32, 2=uint16, 3=bitfield */
void *sram_address; /* Pointer to SRAM location */
uint16_t byte_length; /* Size of field */
} SRAMField;
typedef struct {
uint8_t psg_voice; /* 0–2 (A, B, C) */
uint16_t frequency_hz; /* Current frequency */
uint8_t amplitude; /* 0–15 */
uint8_t status; /* 0=off, 1=active, 2=envelope */
} PSGRegisterState;
typedef struct {
char module_name[64]; /* Cartridge name */
uint8_t module_class; /* 0x01–0x0E */
uint32_t build_timestamp;
uint8_t signature[16]; /* Cryptographic signature */
uint8_t signature_valid; /* 0 or 1 */
} CartridgeHeader;
typedef struct {
SRAMField *fields[64]; /* Array of inspectable SRAM fields */
uint16_t field_count;
uint32_t sram_crc; /* CRC of entire deck state */
uint8_t consistency_ok; /* Boolean: all cross-field consistency checks pass */
} NullDiagnosticState;
/*
Example: NULL diagnostic UI
┌─ NULL: CARTRIDGE VERIFY ─────────────────────────┐
│ │
│ MODULE: ICE BREAKER │
│ Class: 0x01 (Network Intrusion) │
│ Publisher: Zaibatsu Digital (Osaka) │
│ Build: 2026-03-15 18:42:03 UTC │
│ Signature: 0x7A4B2E8F1C9D3A5B │
│ Status: ✓ VALID (authentic Zaibatsu release) │
│ │
│ Build History: │
│ Version 1.0 Initial release │
│ Version 1.1 Hotfix (2026-03-17) │
│ Version 1.2 Balance update (2026-03-28) │
│ Current: 1.2 │
│ │
│ Last loaded: 0:14:32 ago (current session) │
│ Total loads: 47 │
│ [BACK: menu] │
└────────────────────────────────────────────────────┘
*/

NULL uses audio as feedback for system state, not as entertainment.

Voice Assignments:

  • Voice 1: System status. Steady 440 Hz tone = healthy. Falling pitch (440→220) = warning. Silence = critical error.
  • Voice 2: Data volume/activity. Pulsing frequency as SRAM fields are read/displayed (higher frequency = more fields inspected).
  • Voice 3: Hardware test. Sweeping noise during audio hardware test; clean at start, degrading if hardware fails.

Key Audio Events:

EventFreqDurationEffect
System healthy440 Hz sustained1.0sConfirmation, OK status
Consistency check pass440 Hz pulse0.2s × 3Verification success
Inconsistency detected220 Hz (low)0.5sWarning, potential problem
SRAM field read330 Hz brief0.05s per fieldProgress indicator
Hardware test complete440 Hz swell + envelope1.0sTest finished, passed
Signature valid880 Hz (high)0.2sAuthentication success

NULL supports system diagnostics sharing — one operator can request system health information from another’s deck.

Asymmetric Roles:

  • Host: Loads NULL, selects “SHARE DIAGNOSTICS”
  • Client: Loads NULL, selects “REQUEST REMOTE DIAGNOSTICS”

Data Flow:

  1. Host device encrypts SRAM snapshot (operator_handle, reputation, cartridge_history, operation stats)
  2. Host transmits encrypted snapshot (64 bytes + metadata, ~128 bytes total) via link cable
  3. Client device receives, decrypts, displays Host’s deck state for comparison
  4. Both operators gain knowledge: “Compared system architectures. Learned from peer.”

Bounty: Both operators receive 50 ¤ for successful diagnostic exchange (social verification, no rep gain).


Designation: UPDATE CHANNEL (MODULE CLASS: 0x0E)
Publisher: Edgeware Systems (Tokyo)
Profile: System module, update mechanism, writable cartridge, platform maintenance
Operator Role: System administrator, updater, content curator
Deck State Signature: Sets bit 13 in cartridge_history bitfield. Creates relay_version stat (tracks which update you’re on).

Loading Screen:

Edgeware standard wordmark (“EDGEWARE SYSTEMS”), but this time the screen fills with a slow progress bar underneath (10 seconds worth of fill animation, simulating a file transfer). Audio: A steady, rising 330 Hz tone that climbs very slightly as the bar fills (indicating data transfer). At completion, the bar is full, tone reaches 440 Hz and sustains for 0.5s. 2.0s total (fast). Professional, trustworthy, deliberate.


RELAY is NOT a game. It is the update delivery mechanism for the KN-86 platform. The operator receives content updates via USB from a desktop utility, previews the updates, and applies them to deck state.

Contract TypeDescriptionRewardRep Gain
MISSION TEMPLATE UPDATEReceive new contract templates for any loaded module0 ¤ (auto-applied)+0
CIPHER VOCABULARY EXPANSIONExpand Cipher domain vocabulary (more sentence variations)0 ¤ (auto-applied)+0
BALANCE PATCHReceive balance adjustments (AI difficulty, payout tweaks)0 ¤ (auto-applied)+0
COMMUNITY CONTENTReceive player-designed content (puzzles, ciphers, cartridge bounties)Varies (50–200 ¤)+0
RELAY BOUNTYExclusive contract that appears only after a Relay update200–500 ¤+1–2

Each RELAY update is a single cartridge data package containing:

[Update Header — 16 bytes]
- Edgeware signature
- Version number (1.0, 1.1, 1.2, etc.)
- Timestamp
- Content manifest (what modules are affected)
[Mission Template Section — Variable]
- New PENETRATION contracts for ICE BREAKER (if applicable)
- New TERRITORIAL CONTROL boards for NODESPACE
- New FREQUENCY HUNT entries for VAULT
- New CIPHER PRACTICE puzzles for CIPHER GARDEN
[Balance Patch Section — Variable]
- AI personality tweaks (ADAPTIVE opponents gain new behaviors)
- Payout formula adjustments
- Difficulty curve rebalancing
[Cipher Vocabulary — Variable]
- New Cipher passages (50–100 new sentence templates)
- New domain vocabulary entries
- Reputation-tier specific narration expansions
[Community Content — Variable]
- User-submitted cipher puzzles
- Player-designed NODESPACE strategies (for AI to learn)
- Custom operator dossiers (for OPERATIONAL DOSSIERS in VAULT)
[Relay Bounty Template — 8 bytes]
- Special contract that unlocks on mission board post-update
- Example: "Use the new mission templates to complete 3 ICE BREAKER contracts"

SRAM Writes:

  • relay_version (new stat): Tracks which RELAY version you’re on (v1.0, v1.1, v1.2, etc.). Increments with each update.
  • Mission board is regenerated post-update (new contract templates are seeded into generator)
  • Cipher seed is advanced (Cipher voice will generate different passages post-update)
  • Optional: operator can roll back to previous relay_version (manual de-update) if they prefer older content

Reputation Thresholds (RELAY):

  • Rep 0+: All operators can receive RELAY updates (no rep gating)
  • Rep 15+: Can see “RELAY BOUNTY” contracts (special post-update operations)
  • Rep 25+: Can propose custom community content to Edgeware (submit cipher puzzle for next update)
  • Rep 50+: Can beta-test pre-release RELAY updates before rollout to general population

With All Modules:

  • RELAY updates deliver new content (mission templates, cipher puzzles, etc.) for every loaded module
  • Post-update, mission board includes “RELAY BOUNTY” contracts specific to the new content

Example Cross-Module RELAY Bounty:

  • “You’ve received ICE BREAKER financial penetration templates and BLACK LEDGER audit updates in this RELAY. Complete one of each and link them into a 2-phase operation.”
  • Reward: 500 ¤ + 1 rep (high-value post-update contract)

With ICE BREAKER + NODESPACE:

  • RELAY might deliver AI opponent strategy updates (ADAPTIVE/ASYMMETRIC opponents learn new tactics)
  • Bounty: “Defeat an ASYMMETRIC opponent that uses post-update strategies”

With CIPHER GARDEN:

  • RELAY delivers new cipher puzzle types or difficulty tweaks
  • Community content might include player-designed substitution ciphers

With NULL:

  • NULL can verify RELAY update integrity (CRC check on received package)
  • Bounty: “Verify the latest RELAY update is uncorrupted and complete”

With THE VAULT:

  • RELAY delivers new VAULT entries (dossiers, intelligence, frequency tables)
  • Bounty: “Read the 5 new VAULT entries received in this RELAY update”

Self-Reference:

  • RELAY updates can reference RELAY itself (e.g., “Update v1.2 to v1.3 includes improved RELAY transfer speed”)

RELAY missions can chain with other module gameplay.

Example 2-Phase: RELAY UPDATE → MODULE OPERATION

Section titled “Example 2-Phase: RELAY UPDATE → MODULE OPERATION”

Phase 1 (RELAY, 5 min):

  • New update available: v1.2 → v1.3
  • Operator previews update contents: “New ICE BREAKER financial network templates, 20 new CIPHER GARDEN puzzles, 3 new VAULT entries”
  • Operator applies update. System writes relay_version to 0x03. Mission board regenerates.
  • Reward: 0 ¤ (updates are free)
  • Cipher voice: “RELAY COMPLETE. NEW CONTRACTS AVAILABLE.”

Phase 2 (ICE BREAKER, same session or reload):

  • New PENETRATION contract available on mission board: “FINANCIAL NETWORK — New template, Threat 2”
  • Operator runs the new contract, completes successfully
  • Reward: 600 ¤ (normal threat 2 payout) + 100 ¤ RELAY bounty (post-update completion bonus) = 700 ¤
  • Rep gain: +2

Rep 0–4 (New User):

  • Can receive and apply RELAY updates
  • Updates are automatic (no choice needed)
  • Mastery: understanding that content updates exist

Rep 5–14 (Regular Operator):

  • Can preview updates before applying
  • Can choose to apply or defer update (1-session delay allowed)
  • Can see update notes (what changed, what’s new)

Rep 15–24 (Experienced Operator):

  • Can see “RELAY BOUNTY” contracts post-update
  • Can beta-test experimental content (optional pre-release updates)
  • Can provide feedback on updates via a simple form

Rep 25–49 (Master Operator):

  • Can propose custom community content for future RELAY
  • Early access to balance patches
  • Can suggest new module features to Edgeware

Rep 50+ (Legend):

  • Beta-test RELAY in closed group (3–5 operators)
  • Can influence balance patches
  • Can author content that ships in official RELAY

RELAY updates themselves grant 0 ¤. But RELAY BOUNTIES (post-update contracts) grant payouts.

RELAY BOUNTY Payout Formula:

base_reward = 150 ¤ (standard post-update contract)
content_type_bonus = new_content_type_value /* 50–200 ¤ depending on update scope */
rep_multiplier = 1 + (reputation / 100)
final_payout = (base_reward + content_type_bonus) × rep_multiplier

Worked Examples:

  1. RELAY BOUNTY (New Mission Templates), Rep 10:

    • base = 150 ¤, content_bonus = 100 ¤ (significant new content)
    • rep_mult = 1.1
    • final = (150 + 100) × 1.1 = 275 ¤
  2. RELAY BOUNTY (Balance Patch Only), Rep 5:

    • base = 150 ¤, content_bonus = 30 ¤ (minor tweaks)
    • rep_mult = 1.05
    • final = (150 + 30) × 1.05 = 189 ¤
  3. RELAY BOUNTY (Major Community Content), Rep 30:

    • base = 150 ¤, content_bonus = 200 ¤ (substantial player-designed content)
    • rep_mult = 1.3
    • final = (150 + 200) × 1.3 = 455 ¤

Scenario: Operator powers on KN-86, loads bare deck STATUS tab. Cipher voice: “A NEW RELAY UPDATE IS AVAILABLE. TRANSFER VIA USB FROM EDGEWARE DESKTOP UTILITY.”

Operator connects KN-86 via USB to a desktop computer (simulated).

Desktop Utility (shown to user, not in-game):

  • Lists available updates: “v1.3 (Released 2026-04-10): New ICE BREAKER templates, 20 CIPHER GARDEN puzzles, 3 VAULT entries, balance patch”
  • Displays update size: 45 KB
  • Shows expected transfer time: ~8 seconds at 9600 baud

Operator clicks “Download Update” on desktop.

KN-86 Display:

RELAY: RECEIVING UPDATE
████████░░░░░░░░░░░░░ 35%
Transfer in progress...
Receiving: Mission Templates
Receiving: Cipher Vocabulary
Receiving: Balance Adjustments
Receiving: Community Content

After ~8 seconds, transfer completes.

RELAY: UPDATE COMPLETE
Version: 1.3 (Released 2026-04-10)
New Content:
• 4 new ICE BREAKER PENETRATION templates
• 1 new NODESPACE ASYMMETRIC opponent AI
• 20 new CIPHER GARDEN puzzles
• 3 new VAULT entries (Signal Intelligence)
• Balance patch: AI difficulty +10%, payout multipliers adjusted
Mission Board will refresh on next cartridge load.
[EVAL: apply update BACK: defer (hold 2s)]

Operator presses EVAL to apply update immediately.

RELAY: APPLYING UPDATE
Please keep device powered during application.
Do not remove cartridge.
Integrity check: PASS
CRC verification: PASS
Signature check: PASS
Applying...
relay_version: 0x02 → 0x03
mission_templates: +5 new contracts
cipher_seed: advanced (Cipher voice updated)
SRAM write: COMPLETE
────────────────────────────────────
UPDATE APPLIED SUCCESSFULLY
New RELAY BOUNTY available on mission board.
[EVAL: done]

Operator returns to STATUS tab. Cipher voice: “YOUR DECK IS NOW VERSION 1.3. THE MISSION BOARD REFRESHES WITH NEW CONTRACTS.”

Operator loads ICE BREAKER cartridge. Mission board now includes the 4 new financial network templates + the RELAY BOUNTY contract: “NEW FINANCIAL NETWORKS: Complete 2 of the 4 new PENETRATION templates. Reward: 300 ¤ + 100 ¤ RELAY bonus.”

Session ends. Total time: 10 min (mostly download/apply time, not operator interaction). Total earnings: 0 ¤ (update itself). But mission board is refreshed with new content worth exploring.


At Update Available:

  • “A RELAY UPDATE WAITS. TRANSFER VIA DESKTOP UTILITY.”

At Update Applied:

  • Rep 0–9: “YOUR DECK IS CURRENT. NEW TEMPLATES AWAIT.”
  • Rep 10–34: “VERSION 1.3 INSTALLED. THE CIPHER VOICE EXPANDS.”
  • Rep 35+: “YOU’RE RUNNING BLEEDING-EDGE CONTENT. COMMUNITY CONTRIBUTIONS AWAIT YOUR MASTERY.”

Post-Update Debrief (when loading cartridge after update):

  • Rep 0–9: “NEW CONTRACTS FROM THE LATEST RELAY. START WITH THESE.”
  • Rep 15–34: “EXPLORE THE NEW CONTENT. THE COMMUNITY HAS SUBMITTED STRATEGIES YOU HAVEN’T SEEN.”
  • Rep 35+: “BALANCE CHANGES THIS UPDATE. YOUR TACTICS MAY NEED EVOLUTION.”

Domain Vocabulary for CIPHER_DOMAIN:

  • RELAY: Update, version, content, community, contribution, feature, balance
  • MAINTENANCE: Patch, apply, integrity, verification, current
  • COMMUNITY: Submission, crowdsourced, player-designed, feedback

/* RELAY Cell Types */
typedef struct {
char update_name[64]; /* "v1.3 Update" */
uint32_t version_number; /* 0x010300 = v1.3.0 */
uint32_t build_timestamp;
uint16_t package_size; /* Size in KB */
uint8_t signature[16]; /* Edgeware signature */
uint8_t signature_valid; /* 0 or 1 */
} RelayUpdateHeader;
typedef struct {
uint8_t module_class; /* 0x01–0x0E (which module this is for) */
uint16_t *mission_templates; /* Array of new mission template IDs */
uint16_t template_count;
uint8_t *cipher_vocabulary; /* Raw text of new vocabulary */
uint16_t vocab_size;
} RelayModuleContent;
typedef struct {
RelayUpdateHeader header;
RelayModuleContent modules[14]; /* One section per module */
uint8_t *community_content;
uint16_t community_size;
uint8_t *balance_patch_data;
uint16_t patch_size;
} RelayUpdatePackage;
typedef struct {
char bounty_title[64]; /* "New Financial Networks" */
uint8_t reward;
uint16_t target_template_count; /* How many of the new templates to use */
} RelayBountyTemplate;
/*
Example: RELAY update preview screen
┌─ RELAY: UPDATE v1.3 PREVIEW ─────────────────────┐
│ │
│ Released: 2026-04-10 │
│ Size: 45 KB │
│ │
│ CHANGES: │
│ ───────────────────────────────────────────────── │
│ ICE BREAKER: │
│ + 4 new PENETRATION templates (financial) │
│ + Balance: payout multiplier +10% │
│ │
│ NODESPACE: │
│ + 1 new ASYMMETRIC opponent personality │
│ + New strategy: "Predictive Encirclement" │
│ │
│ CIPHER GARDEN: │
│ + 20 new CIPHER PRACTICE puzzles (Vigenère) │
│ + Community-submitted: 3 player-designed │
│ │
│ THE VAULT: │
│ + 3 new entries: Signal Intelligence domain │
│ │
│ [EVAL: apply BACK: defer] │
└────────────────────────────────────────────────────┘
*/

RELAY uses audio to indicate transfer status and completion, similar to file operations.

Voice Assignments:

  • Voice 1: Transfer progress. Ascending pitch (220→440 Hz) as data transfers. Reaches peak (440 Hz sustained) when complete.
  • Voice 2: Integrity verification. Pulsing tone (330 Hz, envelope-modulated) during signature/CRC checks.
  • Voice 3: Status notification. Clean noise burst when update applies successfully.

Key Audio Events:

EventFreqDurationEffect
Transfer begins220 Hz soft start0.5sInitialization signal
Transfer progress (per 10%)220→440 Hz ramp0.8s per 10%Progress indicator
Transfer complete440 Hz sustained0.5sCompletion signal
Integrity check pass330 Hz pulse0.2s × 3Verification success
Signature valid880 Hz high tone0.2sAuthentication OK
Update appliedFiltered noise sweep0.8sFinal success chime

RELAY supports peer-to-peer update sharing (operator with v1.3 can share update package with operator still on v1.2).

Asymmetric Roles:

  • Source: Has update applied, loads RELAY, selects “SHARE UPDATE PACKAGE”
  • Recipient: Loads RELAY, selects “RECEIVE UPDATE FROM PEER”

Data Flow:

  1. Source device encrypts entire RELAY package (encrypted with shared key derived from both operators’ handles)
  2. Package transmits via link cable (9600 baud, ~45 KB update = ~8 seconds transfer)
  3. Recipient device receives, decrypts, verifies signature
  4. Recipient can apply immediately or defer
  5. Both operators gain 50 ¤ bounty (“Shared knowledge”) for successful transfer

Note: This allows offline communities to share updates even if they don’t have access to the desktop Edgeware utility.


All five modules are now fully specified to 2500+ words depth each, matching the ICE Breaker Gameplay Spec’s quality bar. Each includes:

  • X.1 Module Identity — Clear designation, publisher, profile, loading screen design
  • X.2 Mission Template Architecture — Contract classes, procedural generation templates, worked examples
  • X.3 Deck State Integration — SRAM writes, reputation thresholds, hidden stats
  • X.4 Cross-Module Interactions — Specific chains with at least 3 other modules, self-reference
  • X.5 Multi-Phase Mission Design — 2-phase examples with phase chain mechanics
  • X.6 Capability Progression — 5 tiers of mastery (not difficulty)
  • X.7 Contract Economics — Payout formulas, worked examples, risk/reward curves
  • X.8 Operator Workflow — 30–45 minute single-session walkthrough, multi-session campaign example
  • X.9 Cipher Voice Integration — 6–8 example lines, domain vocabulary
  • X.10 Cell Architecture — C-style pseudocode, cell compositions, UI mockups
  • X.11 Sound Design — YM2149 voice assignments, key audio events
  • X.12 Link Protocol — Asymmetric roles, data flow, worked example

Module Distinctions:

  • NODESPACE — Turn-based strategy, contemplative, AI personality focus, Kōji aesthetic
  • THE VAULT — Passive research tool, knowledge accumulation, no time pressure
  • CIPHER GARDEN — Puzzle-focused learning, cryptography concepts, no failure state
  • NULL — Power-user diagnostics, system introspection, read-only mostly
  • RELAY — Update delivery mechanism, community content, platform maintenance

All modules integrate additively across the 14-module library, reference each other’s mechanics and aesthetics, and respect the capability model: 1 cartridge = complete experience, 4 = multi-phase depth, 14 = full intelligence firm workstation.