Cyberdeck in The Ascent is a tool that provides the player with the ability to hack. In The Ascent, there are many features that you can hack such as doors, chests, ATMs, vending machines, turrets, and many more. By default, you start off with a basic cyberdeck, but as you progress and explore, you can obtain various cyberdeck upgrades that boosts the hacking capability of the interface. This page covers information regarding the various upgrades for the Cyberdeck.
Hack everything within cyberdeck reach by holding C. Many objects in the world require a cyberdeck capable of hacking that particular type. What your cyberdeck can hack can be read in the Journal's Character screen and most things hackable in the world are indicated by the color Yellow.
Doors and Chests can even be protected by more and more complicated ICE and as such, require even more powerful cyberdecks. Upgrade your deck and increase its capabilities by finding Cyberdeck Upgrades in the world.
What is ICE?
ICE (Intrusion Countermeasure Electronics) is security software put in place to prevent hostile hacking attempts. It comes in many forms and different complexity. When attempting to override lacks in the world, it might require a cyberdeck capable of breaking said ICE.
If an enemy hacker sets out to hack you: bring up your cyberdeck quickly to deploy Black ICE to counter and send them a happy surprise.
The Ascent All Cyberdeck
Click on the header to sort the table.
|TA Lifestyle||400||0.5||Cheap but fairly reliable. It doesn't come with any bells and whistles, but it can crack a door open if used by the right deck jockey.||Yes||No||No||No||No||No|
|City Kicker||420||0.5||Entry level stuff for the delinquent and misguided. The City Kicker has more copies than most cyberdecks due to the simplicity of software combined with the immediate thrill of controlling your surrounding.||Yes||ICE 1||No||No||No||No|
|Peacemaker CD||440||0.5||Part of CorpSec's Cyber Division's standard loadout - the PCD is directly linked and authorised for control of all turrets broadcasting on the standard protocols.||Yes||ICE 1||No||No||Yes||No|
|Icepick||460||0.5||Extremely hard to get by and if word gets out that you have one - you can expect a lot of unpleasant visitors. When the Icepick meets countermeasures, the pick wins.||Yes||ICE 1||ICE 1||No||Yes||No|
|Plug||480||0.5||Jam packed with miscellaneous code found in various groups - these keys are often seen used by script kiddies and thugs just wanting a free snack from the vending machines.||Yes||ICE 1||ICE 1||No||Yes||Yes|
|Visitor||500||0.5||Mostly circulated amongst specialist groups, the algorithms are custom work by anonymous bit jockeys for profit. The so called Visitor Deck is frequently used in badly surveillanced residential areas.||Yes||ICE 2||ICE 1||No||Yes||Yes|
|Manta D||520||0.5||A clustered mess of all illegal and hard to get by ICE breakers sold to the highest bidders on the tangle.||Yes||ICE 2||ICE 2||No||Yes||Yes|
|Diva||540||0.5||The no.1 fear of any storage facility. DIVA will break nearly any immediate lock if the user knows a thing or two. Never seen on the street, this level of soft and hardware can only be found amongst the top tier hackers in mega corporations.||Yes||ICE 2||ICE 3||No||Yes||Yes|
|The Arcade||560||0.5||The world is on free play with no ICE stopping you from going where you want and taking what should be yours. Rumored on the feeds, people aren't sure it's out there or just made up vaporware.||Yes||ICE 2||ICE 3||Yes||Yes||Yes|
|Ghost of Veles||580||0.5||When you know you're not wanted but your runner skills suggest otherwise. The Ghost of Veles gets you in if you've got the skill to navigate the bitslag. Every crime syndicate battles it out to get their hands on the ghosts.||Yes||ICE 3||ICE 3||Yes||Yes||Yes|