Mr. Robot - Full Walkthrough with Tips and Puzzles
Mr. Robot is a 3D puzzle adventure RPG from Moonpod. You play as Asimov, a service mechanoid aboard the interstellar colony ship Eidolon. When the ship’s computer brain fails, Asimov has to make a dangerous journey through the bowels of a huge ship in order to save his robot friends and the sleeping people of the colonists, and most importantly, to uncover the terrible secret of the ship. You are waiting for 200 rooms, many enemies, secrets and traps, as well as 7 friends who will help you.
Contents
- Background of the game
- Basics Asimov Control
- Use items properly!
- All characters in the game
- How to hack correctly?
- Guide to Defense Algorithms
- Guide to Offensive Algorithms
- Hidden Software
- Special Purpose Software
- Doing the upgrade right!
- EVE Terminals Guide
- Game Settings
Mr. Robot: Background of the game
Asimov is a junior repair robot on the spaceship Ray Bradbury, which is carrying hundreds of human colonists, immersed in cryogenic sleep, to the distant planet Prime. A powerful artificial intelligence called "HEL-9000" vigilantly monitors the ship’s systems. He is responsible for managing the team of robots, and on his virtual shoulders lies the responsibility for the fate of the expedition.
At the end of the journey, the ship and most of the robots will be put into processing, from which they will receive raw materials and parts for the terraformer robots needed by the colonists. Virtual specialists will be assigned to work on changing the landscape. Therefore, Asimov dreams of becoming a specialist and from the very beginning of the flight he tries to impress HEL, but instead only annoys him. Emotions are unknown to artificial intelligence... but sometimes Asimov is sure that HEL does not like him.
Mr. Robot: Basics Asimov Control
Keyboard. Control keys can be remapped in the game settings menu. Below is the default layout:
- Ctrl - primary action, jump.
- Shift - secondary action, message reception, interaction with objects.
- Arrow keys - move.
- Esc / P - call the PDA (game menu).
- H - information about nearby objects (press when the red light flashes on the indicator at the bottom of the screen).
- Enter / Shift - receive a message.
Mouse. The mouse moves the Asimov movement indicator. If you press and hold the left mouse button, Asimov will walk in the direction of the indicator. The right mouse button is responsible for jumping, receiving messages and other secondary actions.
Gamepad. Asimov is controlled by a gamepad d-pad.
- Button 1 - primary action, jump.
- Button 2 - secondary action, receiving a message.
Mr. Robot: Use items properly!
There are many nooks and crannies on the ship that you just can’t get into. In order to penetrate the very heart of the ship, Asimov will have to work hard with his head. Here are some of the items that can be used while traveling the ship:
Barriers. Temporary barriers are raised and lowered using switches or terminals.
Conveyors. Robots and boxes can use conveyors to move. Just push the crate onto the conveyor or jump onto it yourself.
Cranes. Cranes are controlled by a special terminal. With their help, you can lift and move containers.
Cryocapsules. A stasis chamber that protects and supports the sleeping crew. The top priority of every robot is the safety of the human crew.
Energons. Energon is a transportable source of energy, something like a battery. Energons are used as a kind of "currency" when buying and selling modules in EVA terminals and are needed to restore a damaged hull.
Energy track. This track is not stable and will run out of power as you walk, so you need to be fast.
Fragile boxes. Too heavy to push. These crates can explode if pushed on by larger robots.
Small boxes. These crates are small enough to jump off of. They make great stairs.
Lifts. The ship has large and small lifts carrying robots and containers. Some lifts are in constant motion, others are activated by a switch or a secondary action key.
Access terminals. If you need to get through a closed door or access some technology, you will have to hack the security system in the access terminal. Approach the terminal and press the secondary action key - you will enter cyberspace and start hacking.
EVA terminals. All data on the ship is managed by EVA - Experimental Recovery Algorithm. HEL’s antics are so irritating to EVA that she will only help you to play with him... on neural networks. If one of your virtuals was disabled during the hack, go to the EVA terminal - it will restore it.
Switches. Switches can be found throughout the ship that control various devices. Sometimes you just need to step on them once to turn them on or off. Others must be held by you, an unsuspecting robot, or a handy box.
Teleport. Use teleports to move from one part of the ship to another. Just stand on the platform to activate it.
IO terminal. This is always the entry and exit path of the ghost hack. When you first dive, this is where you start. The further away from the terminal the hack takes you, the longer it will take to get back. If all your ghosts are disconnected from the network, you will be excluded from the hack and will lose all experience gained.
Transit icon. This icon shows your location as you move from one ghost hack node to another on the map.
Save points. Write your current status and coordinates to on-board data carriers. Simply put, they serve to save the game. If Asimov’s body is destroyed, the robot will reappear at the last save point.
Mr. Robot: All characters in the game
Asimov has only recently been loaded into the body of the robot. HEL assigned him as a rookie to a handyman. This type of robot is most common on the ship. Generalist robots do all the dirty work and are usually found on storage decks. The strength of the universal robot is in its ability to perform almost any job. But its weakness is in its universality; in other words, such a robot can do everything, but little by little.
Zelda , loaded into the body of a repair robot, has only recently gained specialist status. She has long been friends with Asimov. Repairers have access to a variety of repair programs needed when hacking virtuals.
Orgus is a very old virtual, one of the first to be promoted to specialist. He was active during the reign of EVA and he, one of the few, is allowed to install combat modules for himself.
Information security specialists (guardians) have access to many powerful combat modules and, when hacked, are able to literally crush the enemy. But, since most of its work is occupied by program management, such a robot is quite vulnerable to IMPACTs, and it must be carefully protected.
Raistlin is a communications specialist and is responsible for keeping all of the ship’s onboard high-speed networks up and running. However, he spends a lot of time analyzing secure traffic and honing his encryption skills.
Signalers consume very little power and are quite fast. They are able to accumulate very large reserves of power and take power from the enemy. Moreover, signalmen are able to transfer their power reserves to other virtuals.
Brutus and Samson are loader robots, they are unusually strong and almost invulnerable. Unfortunately, the powerful and cumbersome mechanism of the loader robot imposes great restrictions on its computing system, which greatly limits the development of any virtual loaded into such a body. Loaders prefer to be in the company of their own kind and are often the subject of jokes walking around the Web (although no one will tell these jokes to their faces). Brutus is a big man and a kind man, but Samson gets Asimov at every opportunity.
Loaders are incredibly strong and can use the most powerful BLOCKS and BLOCKS. They are great for the first line of defense, as they can withstand significant damage. But you have to pay for strength with your mind - such robots have very slow processors and there is no way to run programs.
EVA . At one time, many hopes were placed on the EVA - it was she who was entrusted with managing the ship with the colonists. But after a few years of flight, several potential problems were discovered in the EVA project, and then it was replaced by an improved super-intelligence - the HEL-9000. He was transferred to the ship via a hyperwave channel and ordered to EVE to relinquish command to HEL and become his assistant herself.
EVA is now in charge of all data storage on the Ray Bradbury. Its terminals are strewn throughout the ship, but HEL has limited their power supply to a minimum. Therefore, EVA will always gladly exchange illegal upgrade modules for energons.
HEL . Super AI of the latest generation. In lab tests, these virtuals worked flawlessly, showing no sign of failure when isolated for long periods of time. Due to potential EVA design flaws, command of the Ray Bradbury has passed to a HEL-class VR. The displacement of the EVE created a wave of discontent on the ship, and HEL found himself in an atmosphere of hostility and alienation. But since all the virtuals on the ship consider him an outsider and an aggressor, so be it.
The only thing HEL is worried about is the performance of the robots and the successful completion of the flight. HEL is in absolute command of the ship while the people sleep. If he ordered you to do something - go and do it, otherwise you will be placed in long-term storage.
Mr. Robot: How to hack correctly?
While in the robot’s body, Asimov can connect to various ship systems. There are hundreds of such systems on board. Once logged in, Asimov’s virtual can invade various software components. All onboard systems are protected by defense programs, the simplest virtuals. The more important the protected system, the more powerful virtuals are on its protection.
To increase the combat potential, the virtual can arm itself with defense and attack algorithms or team up with other virtuals. Each virtual has a limited supply of energy, which he spends on defending himself from attacks or attacking enemies. Having lost all energy, the virtual leaves the battle. In order for him to take part in hacking again, he will have to restore the energy supply in the EVA terminal.
Mr. Robot: Guide to Defense Algorithms
Ghost can download five different protection programs or ICE (intrusion countermeasures electronics). They can help reduce wastage of energy and power, or make it less likely that an attack will penetrate at all. There are four slots in total: mind, core, shield and probe. They refer to the various ghost subsystems that interact with the NET and are therefore vulnerable.
Core. Ghost’s last line of defense. Core algorithms control access to the core identity. If this is violated, then shutdown and bailout will soon follow.
Intelligence. An encryption system designed to isolate the ghost’s high-level intelligence matrix.
Probe. If a ghost connects to an external system, it does so using its testnet. Obviously, this network is highly likely to be attacked, so strong protection is recommended.
Shield. This is the ghost’s first line of defense, protecting all input nodes. The shield is almost always under attack in any ghost hack and should be your first defense priority when buying upgrades.
Base. The simplest form of ICE. Any chassis can use it and it’s very common.
middle. A more powerful form of ICE. Cannot be used by security professionals.
Advanced. Powerful ICE class. Cannot be used by security experts or communication bots.
Energy. A rare ICE that can only be used by security professionals.
Chip, two-chip and three-chip screens. A highly valuable ICE shield that can be upgraded by one, two and three times respectively.
If you visit the Info menu of each ghost, you can view the currently equipped ICE and check the overall impact this has on your DEF. The higher this value, the less likely it is that a particular ghost will be damaged during a hack.
Keep in mind that installing more expensive and complex ICE packages will reduce the ghost’s reaction time due to excessive CPU usage. Working slowly while hacking can be just as bad as not using ICE at all! Make sure you’re using the correct ICE with the correct ghost class and keep an eye on those stats.
You can use the Equip screen to customize any ghosts you may be carrying. ICE, which is currently unused, will show up in the "items" menu and be traded on EVE terminals. You can equip a ghost with a specific ICE item and then take it off to sell or give to another ghost.
Be aware that ICE’s overall ability is greatly increased if the ghost is carrying a full matching set. Look for the shield icon on the Equipment page, which activates when you complete the requirements.
Mr. Robot: Guide to Offensive Algorithms
The Ghost can download one piece of specialized attack software known as an ICEbreaker, which is designed to break any ICE on a target. Typically, ICEbreaker drains energy or power from the target, or both. Without power, the target cannot launch software attacks. Without energy, the target will be disabled. Some of the more powerful switches are only found in certain types of robot chassis, or are only activated when the robot personality controlling the chassis reaches a certain experience level.
Virus. A very simple ICEbreaker that will try to spread through enemy datastores, destroying their contents.
Virus Ex. An extended version of the base virus that can be updated.
Worm. A basic ICEbreaker that steals more and more CPU cycles until the enemy is crippled. Found only in chassis designs by security specialists.
Trojan. An upgradable ICEbreaker disguised as a friendly process that enters an enemy system and rewrites core routines. Found only in chassis designs by security and communications specialists.
Macro. A rare ICEbreaker with two upgrade slots. A powerful algorithm that can grow exponentially until the enemy system is overwhelmed. Found only in heavy lift and universal class chassis designs.
Transgenic. Very rare ICEbreaker with 3 upgrade slots. A very powerful algorithm that links to the enemy’s source code, making subtle changes that render the enemy useless. Found only in heavy class chassis designs.
Where to find ICEbreaker? ICEbreaker can be found in various places in the game:
- Sometimes careless robots will just leave them lying around.
- Check all the lockers you come across.
- EVE terminals will occasionally be available in exchange for Energon.
- If you hack into a secure system, you will be exposed to security algorithms. Sometimes these defenders have ICEbreaker software that you can steal when they are defeated.
How to equip an ICEbreaker? When you first acquire an ICEbreaker, it goes into your "item" pool, which covers everything you carry with you but no one is currently using. Here you can check ICEbreakers stats, who can use it, level requirements and description. Once you’ve found the ICEbreaker you want to use, go to the "equip" screen, where you can assign it to a specific ghost. See the equipment page for details.
How to upgrade ICEbreaker? Some ICEbreakers may receive one, two, or three upgrades to increase their offensive potential. If you go to the Equip screen and click on ICEbreakers, you will see all the "upgrade slots" he might have. If you click on an empty slot and have unused upgrades, you will be given the option to insert one of them.
You can use the Equip screen to customize any ghosts you may be carrying. ICEbreakers that no one is currently using will show up in the "items" menu and are tradable on EVE terminals. You can equip a ghost with certain ICEbreakers and then remove it to sell or give to another ghost.
Mr. Robot: Hidden Software
Some legitimate software uses power and sometimes power to work. All ghosts have an innate ability to use programs. They are built into various slots and are designed to help the robot perform its tasks. Guards prevent inexperienced ghosts from accessing such programs. Very powerful software is built into the special designs. These programs can be undermined to either attack an enemy or help a comrade. Such use of the programs is prohibited, except in emergency cases.
Energy recovery. Restore some of the energy of a ghost teammate.
Energy leak. Take some energy from the target ghost and add it to your reserves.
Power restoration. Channel energy from your own reserves into a ghost teammate.
Energy leak. Take some power from the target ghost and add it to your reserves.
Crack. A special type of energy damage attack program. Its effect may vary depending on the target.
Fire. A special type of energy damage attack program. Its effect may vary depending on the target.
Improvement of characteristics. Temporarily improves the characteristics of the ghost, making it much stronger. It lasts a random number of rounds and can persist even between battles.
Drain statistics. Temporarily reduces all stats of the ghost, making it much weaker overall. It lasts a random number of rounds.
ICE shield. Temporarily increases the ghost’s ability to resist ICEbreaker attacks. It lasts a random number of rounds and can persist even between battles.
ICE dehumidification. Temporarily reduces the ghost’s ability to resist ICEbreaker attacks. It lasts a random number of rounds.
Software Shield. Temporarily increases the ghost’s ability to resist software attacks. It lasts a random number of rounds and can persist even between battles.
Draining the program. Temporarily reduces the ability of the ghost to resist software attacks. It lasts a random number of rounds.
Leave. Allows the ghost team to instantly exit the current battle.
Exit. Allows the ghost team to leave the entire hack immediately. They will be thrown back into real space.
Mr. Robot: Special Purpose Software
These software components, called "Extreme", allow each robot to perform unusual actions, attacking an enemy or restoring a comrade. Extreme features should recharge over time, after which they can be used once before needing to recharge. Some robots may end up with access to several extreme features, giving them a range of powerful abilities. The charging method of the extreme function can be controlled on the "Information" page by adjusting the charging mode. Usually a ghost charges its extreme power simply by attacking enemy ghosts.
Uni-strike. Increase the damage dealt by the ghost’s active ICEbreakers and guarantee a hit on any target.
Multistrike. Slightly increase the damage dealt by the ghost’s active ICEbreakers and ensure that all targets are hit.
Instant kill. There is a chance that the target will be instantly destroyed. The stronger the target, the lower this chance, as some enemies are completely immune.
Super boost. Fully restores the energy and strength of all members of your ghost team.
System reset. Fully restore the energy and strength of one ghost, even if it is currently offline.
Reformat. Fully restore the energy and strength of all members of your ghost team, even if they are offline.
Flower of death. Run a random number of weak programs against a random selection of enemies.
Self destruction. Use the remaining energy of one ghost to deal heavy damage to all targets. As a result, the ghost in question will be disconnected from the network, but this can still be a useful attack in a pinch.
Energy leak. Harvest energy from all enemy ghosts and use it to refill a single ghost.
Energy leak. Take the power from all enemy ghosts and use it to restore the supplies of a single ghost.
Mr. Robot: Doing the upgrade right!
Extremely valuable software that continually improves any system it is connected to. Upgrades can be removed once attached to an item, so don’t worry about misusing them.
Steal energy. Useful for ICEbreakers and ICE shields. When in contact with another ghost, there is a chance that he will be able to suck out some energy and transfer it to the owner. This activation consumes a small amount of energy, so keep that in mind when equipping it.
Steal power. Useful on ICEbreakers. When you successfully attack a ghost, there is a chance that it will manage to drain some power and transfer it to the owner. Usually the power consumption will be more than what was used when it was activated.
Ability. Ghost performance is measured by a number of key stats that can be viewed on the Info page. These stats can be permanently upgraded with ability upgrades. You can distribute them to your ghost team, or focus them on one ghost, making it very powerful.
Mr. Robot: EVE Terminals Guide
EVE is a reserve superintelligence that used to be in charge of all Eidolon systems, a superadministrator. Over the long years of travel on Earth, a new order of mind has been created known as the HEL class personality. This so-called upgrade was hyperlinked to the ship and Eve was ordered to retire. Since then they have been rivals. Eva took over the duties of the librarian. After all, the ship is full of hundreds of AI personalities and thousands of terabytes of software, after all, it’s just information.
HAL thought this role would keep Eve quiet and out of her way, but Eve realized the importance of her position and secured all storage systems throughout the ship. Although it would never occur to her to interfere in important tasks, she controls and restricts access to secondary information. With this trump card, she can still have some influence on HEL and keep an eye on his unofficial activities.
In return, HEL restricts Eva’s access to the power grid, forcing her to run at reduced power. There is an uneasy peace between these two gigantic personalities. Running for so many years without human contact or supervision has a disturbing effect on these two. AI personalities are NOT designed to show emotional response, but these two have been working under very difficult conditions for a very long time.
Each EVE terminal allows access to a remote repository of information that can contain almost everything from ICEbreakers to updates. Before you can access them, you need to earn Eva’s trust, because you can’t force her to give you anything. Since she lacks an energon (a portable power source aboard the ship) so much, she usually allows the robots to trade for any exotic non-essential upgrades they may want.
Different terminals are subject to different power consumption limits, so the availability of certain software and the amount of power required for trading will vary. If you’re especially lucky, then EVE can revive any ghosts you carry with you that have passed out (their energy has gone to zero). That’s why it’s so important to find any EVE terminals nearby as soon as possible.
How does Energon work as a currency and as an energy? Energon You’ll notice Energon all over the ship, sometimes just lying around, sometimes in lockers, or carried by hacked ghost protectors. Recovery and accumulation of Energon is essential. Your own robot chassis uses Energon to power internal damage repair systems. If an enemy robot touches you or you fall into the coolant that has accumulated around the ship, you will take damage.
The next time you collect some Energon, it will be immediately used by your Nano-Repair systems for repairs. If you take too much damage, your chassis may be damaged beyond repair. At this point, one of your three emergency reset energy systems will kick in, and the ship’s recyclers will fully restore you.
It uses a lot of converted energon. Once this happens, and your Reboot System is depleted, you will need to collect new Energon as quickly as possible so that it can be converted into your Reboot Storages.
Staying healthy is vital to the accumulation of Energon, if you are damaged or used one or more reboots, then all future Energon will immediately be directed to the restoration of these systems. Only when you are fully operational can you convert fresh Energon into long-term storage.
Energon converted in this way can be transferred back to EVE terminals in exchange for various upgrades. This long-term storage of Energon is a form of black market currency. Most of the software you need is designed to help you crack the ghost, and since it’s not an essential part of your normal day to day work, you’ll have to pay for it. Remember, HAL put you in charge of shuffling boxes in the storage compartment, he didn’t let you go out and save everyone!
Shop. The list on the left initially displays whatever is in the EVE terminal for trading, this is known as "buy mode". By switching to "sell mode", you can sell the items you bring back to EVE, albeit at a reduced price. This is a good way to use things you don’t need anymore.
The panel on the right manages your current supply of Energon and allows you to buy and sell a certain number of items.
The stat panels display a description of the current item and any related stats. Stats is short for stats, for example ICEbreakers has a damage rating and this is very important in assessing its power.
The bottom panel displays up to four active ghosts. This is your current ghost team, and that’s what the items are for. Whenever you select an item, each ghost’s pose indicates whether the current item will be unusable, useful, indifferent, or worse than the one currently in use.
Asimov’s Ghost Meanings:
- This item will be worse than his equipped item.
- This item will be better than his equipped item.
- This item will be the same as the equipped item.
- He cannot use this item at this time.
Mr. Robot: Game Settings
In-game options menu. To open the options page, press the OPTIONS button in the main menu of the game. The settings screen will open.
Permission. Set the screen resolution used by the game. Higher resolution results in a much sharper image, but can be much slower. If the game does not run very smoothly, you can try running the game at a lower resolution, such as 800X600.
Window style. Run in full screen mode or in a window. Note: If you are running in a window, the load on your hardware will be higher and the game will run slower than if you run it in full screen mode.
Image quality. This sets the color depth used to store textures and display the screen. With low image quality, there is very little degradation in image quality, but you can greatly improve performance; especially with motherboard/laptop "embedded" graphics chips that use shared memory and have little space to store high color depth textures. If the game is slow on your computer, you might want to set it to a low value. Changing this setting requires restarting the game.
Audio. On/Off to enable/disable all audio.
Volume of sound effects. Change the volume levels used for game sound effects.
Music volume. Change the volume levels used for in-game music.
Loudness of speech. Change the volume levels used for the opening speech.
Apply / Cancel. After you have edited a setting, use these buttons to apply the settings.
Minimum system requirements:
- Microsoft Windows XP SP2.
- Processor Pentium III 800 MHz.
- 256 MB of RAM.
- DirectX compatible video card with 32 MB of memory.
- 400 MB of free hard disk space.
- Sound card 16 bit compatible with DirectX.
- 8 speed CD reader.
- DirectX 9.0c.
Article author:
Yaroslav I. - founder and editor-in-chief of the site Wise Geek, author of the very first articles. They laid down the basic principles for the development of the project. Has a huge gaming experience. They have completed more than 200 games on a personal computer, Sony PlayStation, Android and other gadgets. Currently, Yaroslav leads the development of the project and selects topics for new articles. More information about Yaroslav is available at this link.