Station Omega
Dive into the station's hidden subdirectories, where classified or restricted files might be stored, risking triggering security measures or uncovering something you weren’t meant to see.Trigger an emergency protocol to compile and download all station data into a portable drive, risking potential detection by whatever force is manipulating the station.Attempt to decrypt and access the corrupted logs that keep flashing on the screen, risking further system instability but potentially revealing critical hidden data.Use the terminal's monitoring tools to trace any unauthorized access points in the system, which might lead you to whoever—or whatever—has been tampering with the station's systems.