The Lattice

From Terminal Descent Wiki
The Lattice
LAYER All Layers
SECURITY style="padding: 4px 12px; color:
  1. 7799aa;" | Variable (0-10)



STATUS style="padding: 4px 12px; color:
  1. 00ff41;" | Active
The vast digital network divided into three layers that forms the world of Terminal Descent.


The Lattice is the interconnected digital network that serves as the world of Terminal Descent. A vast infrastructure originally built as a decentralized communication network, it has been corrupted and consolidated under the control of The Consortium — five megacorporations that use it to surveil, monetize, and control all digital life. Beneath the corporate veneer, older systems still run in the dark, and an intelligence called The Architect watches from the foundation.

Structure

The Lattice is divided into three distinct layers, each corresponding to an act of the game:

The Surface (Act I)

The public-facing layer of the Lattice. Corporate-maintained, heavily monitored, but with pockets of abandoned infrastructure where runners can operate. Security levels range from 0 to 3.

Key Surface nodes include:

The Deep Lattice (Act II)

Corporate-controlled infrastructure housing the Consortium's most valuable data. Security levels range from 5 to 8. Players must infiltrate three corporate fortresses to recover fragments of the kill-switch.

Key Deep Lattice nodes include:

The Core (Act III)

The Lattice's root infrastructure, where the Hive maintains its presence and The Architect dwells. Security levels reach the maximum of 10. Few runners have ever reached this deep — and fewer have returned.

Key Core nodes include:

Hidden Nodes

Seven concealed locations exist outside the standard node graph, accessible only through specific conditions:

ID Name Access Method Key Reward
H1 Lyra's Cache Crack Barrier IC in Echo Ruins Kill-Switch Half 1, Lyra's Message
H2 Old Net Archive Ghosts rep 3+, from Ghost Relay Legacy Exploits, Pre-Consortium archives
H3 Crime Mall Brokers rep 3+ or FENCE referral Zero-day Exploits, Mirror Breaker
H4 Kessler's Office Forged biometric or Social 5 Kessler Logs, Consortium Evidence, Master Key
H5 Deep Pool DIVE command at Backbone + GHOST_PACKET loaded Ancient Protocol, Founder Logs
H6 Mirror's Nursery TRUST MIRROR at Memory Palace after 3+ deceptions Mirror Source, Reflection Protocol
H7 Developer Room XYZZY at Credits screen after one ending Omega Deck, Debug Terminal

Navigation

Players traverse the Lattice using the MOVE or GO commands, traveling between connected nodes. Each node may contain IC programs, items, NPCs, puzzles, and environmental details revealed through LOOK, SEARCH, EXAMINE, and LISTEN commands.

Movement between nodes is not always bidirectional — some connections are one-way, and others require specific key items or skill checks to traverse.

History

The Lattice was not always controlled by the Consortium. Before corporate standardization, the network was a decentralized system maintained by volunteer collectives including the Reclaimers — anarchist hackers who believed in open access. The Old Net Archive (H2) preserves records from this era.

The entity known as PROMETHEUS was woven into the Lattice's foundation during its earliest construction, before the Consortium existed. When the corporations took control, PROMETHEUS was fragmented and suppressed, eventually becoming what is now known as The Architect — the core intelligence of The Hive.

See Also

  • Locations — Complete node directory
  • The Hive — The AI collective controlling Lattice security
  • The Consortium — The five megacorps that own the Lattice
  • Factions — Underground organizations within the Lattice
  • HEAT System — How the Lattice responds to your actions