Below, find the list of the most common hacking actions, i.e.
the ones that are not connected with an individual mission, or a category of collectibles only.
Profiler is also often used to locate the more important characters, e.g.
current mission targets, or the holders of a combination necessary to disarm the local security system.
The second group comprises of attempts to hack into telephones and other devices that the NPCs are equipped with.
After you hack into the system, you will be allowed to watch the location via the camera lens.
Thanks to hacking into devices, you’re able to distract the enemies.
it’s possible for you to, e.g.
you might afford this pop in of aggressive actions, e.g.
against the interactive generators, which may explode at the moment that you define.
Finally, there is one more use for the hacking mechanism that is worth mentioning.
you’re free to use it to lose law enforcers.
The possible actions have been described in the chapter entitledHow to escape the police?.
until the battery goes flat).
This site is not associated with and/or endorsed by the Ubisoft or Ubisoft Studios.
All logos and images are copyrighted by their respective owners.