![]() ![]() Before I can explain how those work, I should mention that each network you can access is composed of a series of what are called “nodes.” Once you’ve connected to your chosen network, the game is played entirely via command line-style inputs. From here, you can choose the network with which you’d like to initiate a connection. When you’re at your deck’s main menu, you’ll need to press your “A” key to access the list of network addresses you can breach for various purposes. The game even pops up with a reassuring message explaining that you’re not supposed to be able to see your mouse cursor when you’re in-game in case its absence disoriented you. The first thing you’ll likely notice when you start playing is that it’s entirely keyboard-controlled. Let us now switch gears to how Midnight Protocol’s main gameplay mechanics function. I think I’ve established enough of the backdrop against which the game’s events take place. These “marks” will also help you add some funds to your bank account, which will become increasingly important as you progress throughout Midnight Protocol’s campaign. In any case, the first email you receive from Clover mentions that they, along with another of your comrades nicknamed Snail, will soon have what they refer to as a few “easy marks” to send you in an effort to help you get your head back in the game. I’ll be referring to this particular ally of yours as “Clover” from now on for simplicity’s sake. The first time you boot up your computer or “deck,” as they’re apparently called within the game after you’re released from prison, you’ll find an email from one of your allies who operates under the name “Cl0v3r.” Thankfully, you don’t have to go about this momentous task alone. You must first use your skills and your connections to track them down. Finding out Kraken’s motive is your primary objective within Midnight Protocol.Īs you might expect, it isn’t as if you can just send Kraken an email and politely ask them to explain themselves. The reason you were arrested is due to a leak of your identity, an act which is commonly referred to nowadays as “doxxing.” When the game’s story begins, you already have a clear idea of who was responsible for leaking your identity to the authorities: a fellow hacker who goes by the alias “Kraken.” What you don’t know is why they doxxed you and ultimately landed you behind bars. This was done because “the Digital Security Office cannot verify beyond a reasonable doubt that the individual in our custody is responsible for the cybercrimes committed under that alias.” Within Midnight Protocol, you play as a prominent “hacktivist” known only by the alias “Data.” The game starts out by showing you a notice from the United Nations Digital Security Office declaring that although you’ve been arrested for hacking-related criminal activity, all charges against you have been formally dropped. One quite recent example of such games is LuGus Studios and Iceberg Interactive’s Midnight Protocol. However, there are a fair few games I can think of off the top of my head that allow players to assume the roles of those hackers with more competency than any relevant film. I agree with what Keiran said in his review of the former of those in that I’m sure a considerable portion of our audience has seen at least one of those television and/or movie scenes of stereotypical “hackers.” You know, the ones who type a bunch of gibberish commands into an MS-DOS prompt or something along those lines when trying to break into a network before triumphantly declaring, “I’m in.”įor many people, those portions of films and other non-interactive media constitute all they know (or at least think they know) about how “hacking” works. Then you have games like Hacknetand (to a somewhat lesser extent) Tech Support: Error Unknown. That title in particular, however, features quite a bit of educational value for those who might be looking to learn what it offers to teach. ![]() ![]() I suspect that wouldn’t necessarily be the case if I weren’t already intimately well-versed in the process of building and setting up computers. For instance, I feel as though I enjoy PC Building Simulator as much as I do because I know how to do everything that’s simulated within the game in the real world. What I mean to express with that term is that I suspect those games are most greatly enjoyed by people who are familiar with things like the ins and outs of how computers fit together and function, along with related topics like networking.Īllow me to attempt to elaborate. Over the course of my decade-long tenure as a strict PC-only gamer, I’ve become increasingly familiar with a genre of titles that I can only think to describe as “games for nerds.” That’s not a condemnation of any title in that category by any stretch of the imagination, though I’m keenly aware of how being called a “game for nerds” might sound. ![]()
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |