Triumphs
20
Complete both variants of the Enigma Protocol activity.
Enigma Protocol: Corrupted Data
10
Destroy all available Network Security Nodes during a single run of Enigma Protocol.
Network Security Nodes destroyed
10
Complete Enigma Protocol in under {var:1771161717} minutes.
10
Complete Enigma Protocol by yourself, without leaving the activity.
Extract all of the strange Queries from the Vex Confluxes in Enigma Protocol.
Manifest
{
"displayProperties": {
"description": "",
"name": "Enigma Protocol",
"hasIcon": false
},
"nodeType": 1,
"isSeasonal": false,
"scope": 0,
"objectiveHash": 736068228,
"children": {
"presentationNodes": [],
"collectibles": [],
"records": [
{
"recordHash": 1974455497,
"nodeDisplayPriority": 0
},
{
"recordHash": 202515134,
"nodeDisplayPriority": 0
},
{
"recordHash": 3723908678,
"nodeDisplayPriority": 0
},
{
"recordHash": 1681803976,
"nodeDisplayPriority": 0
},
{
"recordHash": 156528210,
"nodeDisplayPriority": 0
}
],
"metrics": [],
"craftables": []
},
"displayStyle": 0,
"screenStyle": 0,
"requirements": {
"entitlementUnavailableMessage": ""
},
"disableChildSubscreenNavigation": false,
"categoryScoreUnlockValueHash": 0,
"maxCategoryRecordScore": 70,
"presentationNodeType": 1,
"traitIds": [],
"traitHashes": [],
"parentNodeHashes": [
399085099
],
"hash": 3567983470,
"index": 1570,
"redacted": false,
"blacklisted": false
}