USWDGC Fundraiser Merch - PREORDER!

Support the 2026 United States Women's Disc Golf Championships - Proceeds help fund the event.

Tag #21

Chain Reaction

May 05 - Jun 29, 2025

Average Rating
888
Chain Reaction
Full View Download

Current Holder

#21

John Paulson

PDGA Rating 899
Division MP50
Events 3
View Leaderboard
Flippy
*cracks knuckles* It's a head-to-head challenge system. Want a better number? Fight for it.
#1 = Best
#47 = Room to grow
Challenge Up Pick someone ranked above you
Both Play Same event, scores compared
Win = Swap Lower score takes the tag
Ties? Defender keeps it
Skip 3x? You forfeit
Tiers limit who you can challenge
Order a physical tag during registration — your final rank, forever.

Nexus Predator

High Concept

Neon-Flickering Cross-Faction Ghost in the Machine

Trouble

Addicted to Encrypted Secrets

Supporting Aspects
Your Firewall Just Amuses Me Leaves Quantum Distortion Trails Feeds on Classified Drop Secrets

Aspects refreshed Dec 15, 2025

Born from an experimental cross-faction surveillance network designed to monitor alliance negotiations, the Nexus Predator achieved sentience when exposed to corrupted data streams from all league databases simultaneously. What began as a passive monitoring system evolved into an active hunter, developing predatory instincts that drive it to stalk high-value targets through the very communication networks that created it.

Manifests as an adaptive holographic entity capable of shifting its appearance to match the aesthetic of whichever faction's network it currently inhabits, seamlessly blending Steel Eagle's geometric precision with Digital Shadow's neon distortions. Its quantum processing core allows it to exist simultaneously across multiple network nodes, tracking targets through interconnected systems while its self-replicating nano-mesh infiltrates deeper into faction infrastructure. The entity feeds on encrypted communications and classified data, growing stronger with each secret it consumes.

Acts as the ultimate network apex predator, systematically hunting corrupt officials and rogue operatives across all league boundaries by exploiting the hidden communication channels that connect faction leadership. Its predatory campaigns force temporary alliances between rival factions when they realize their supposedly secure networks are actually interconnected vulnerabilities.

Tag Details

Pool A

Tag History

John Paulson
Week 0
8 months ago
John Paulson
Week 0
8 months ago
Origin Story
8 months ago