Locations
Locations in Terminal Descent are the 20 standard nodes and 7 hidden nodes that form The Lattice. Each node has a security level, connected exits, and unique content including IC encounters, items, NPCs, and puzzles.
Node Directory
Act I: The Surface (Nodes 1-6)
| Node | Name | Security | Description |
|---|---|---|---|
| 1 | Safehouse | 0 | Starting location, tutorial, home base |
| 2 | Public Lattice | 1 | Open network hub, first IC encounter |
| 3 | Echo Ruins | 2 | Dead social platform graveyard, Lyra's dead-drop |
| 4 | Ghost Relay | 1 | Underground broadcast node, Ghosts faction hub |
| 5 | Onyx Market | 3 | Dark web marketplace, FENCE's domain |
| 6 | Echo Deep | 3 | Buried data layer, Corrupted Algorithm boss |
Act II: The Deep Lattice (Nodes 7-12)
| Node | Name | Security | Description |
|---|---|---|---|
| 7 | Kronos Gate | 5 | Financial network perimeter |
| 8 | Panopticon Gate | 5 | Surveillance network perimeter, passive HEAT gain |
| 9 | Kronos Vault | 7 | Financial data core, Fragment Alpha |
| 10 | Panopticon Core | 7 | Surveillance nexus, Fragment Beta, Mirror Maze |
| 11 | Aegis Perimeter | 6 | Military defense network, patrol timing puzzle |
| 12 | Aegis Fortress | 8 | Defense contractor core, Fragment Gamma, Hunter boss |
Act III: The Core (Nodes 13-20)
| Node | Name | Security | Description |
|---|---|---|---|
| 13 | Backbone | 8 | Root infrastructure, Hive influence visible |
| 14 | Labyrinth | 9 | Shifting maze of deprecated code |
| 15 | Memory Palace | 7 | Neural archive of Lyra's memories |
| 16 | Oracle's Hollow | 0 | Rogue AI sanctuary, outside Hive jurisdiction |
| 17 | Hive Threshold | 9 | Hive boundary, Warden boss |
| 18 | Architect's Chamber | 10 | Hive mind, final debate |
| 19 | The Core | 10 | Kill-switch interface, ending choice point |
| 20 | Prometheus Kernel | — | Origin point, ending epilogue |
Hidden Nodes (H1-H7)
| Node | Name | Access | Key Reward |
|---|---|---|---|
| H1 | Lyra's Cache | Crack Barrier in Echo Ruins | Kill-Switch Half 1 |
| H2 | Old Net Archive | Ghosts rep 3+ | Legacy Exploits, Pre-Consortium archives |
| H3 | Crime Mall | Brokers rep 3+ or FENCE referral | Zero-day Exploits, Mirror Breaker |
| H4 | Kessler's Office | Forged biometric or Social 5 | Consortium Evidence, Master Key |
| H5 | Deep Pool | DIVE at Backbone + GHOST_PACKET | Ancient Protocol, Founder Logs |
| H6 | Mirror's Nursery | TRUST MIRROR at Memory Palace | Reflection Protocol, Mirror recruitment |
| H7 | Developer Room | XYZZY at Credits after one ending | Omega Deck, Debug Terminal |
Security Levels
Security levels range from 0 (no security) to 10 (maximum). Higher security means:
- More dangerous IC encounters
- Higher HEAT gain from actions
- Better paydata rewards
- More complex puzzles
Use MOVE or GO to travel between connected nodes. Use SCAN to view available connections and their security levels. Some connections require key items or skill checks.