Nestled in-between are the Grey Hat tactics, which are perceived as more neutral actions. These are real terms used in the field, White Hat referring to the chaotically good side of hacking whereas Black Hat refers to the more criminal side. Turning this information over to the police would net you some White Hat reputation points, while redirecting those funds to your own account means gains in the Black Hat reputation department. One touch I really loved about Midnight Protocol was how you’d come across some juicy stuff, like a program that was designed make embezzlement a breeze, and you could choose what to do with this information. Using tools like cloak for stealth or dagger to break down any barriers, Data can deftly dance around anything thrown their way, coming out richer and wiser in the process. Data will need to move from node to node, draining bank accounts, downloading sensitive information, and decrypting company secrets, without being traced or running smack dab into a firewall. The way the terminals are set up, Data will have two actions per turn before the anti-hacking protocols can activate. Of course, no good hacker goes into a job without their tools, and Midnight Protocol has plenty on offer. Typing “interface” to interact with a node, “move” to move to another one, or “end” to end the turn make this typing turn-based strategy game really feel like you’re doing something high tech in an easily digestible way. When it comes to the hacker terminals, people who work in computer programming or are old enough to remember typing in DOS prompts (me) will immediately recognize the mechanics. Sure, you can autofill this information by pressing “tab” but there’s something fun about typing swift, secretive emails about hacker things. On the main menu, this means tapping “e” for email or “b” for black market, but also the fun mechanic of just smashing keys at random to login or compose emails. It’s best to keep a low profile… for now.Ĭontrols are really fun in Midnight Protocol, as they’re keyboard-only based. Besides, whoever doxxed Data is still out there - for all Data knows, this person still has it out for them. Things move fast in the hacking world, and a year may as well be an eternity as far as technological advances in hacking are concerned. Clover helps Data with not only lucrative assignments, but information on Data’s doxxer, cautioning Data along the way. Naturally, Data gets right back into the swing of things, reaching out to their friend Clover for leads. Midnight Protocol opens up on Data being released from their year-long imprisonment due to a lack of evidence tying them to cyber crimes, hacktivists everywhere rejoicing. Featuring unique keyboard-only controls and a mixture of turn-based strategy with narrative-RPG gameplay, Midnight Protocol offers the Hackers experience on Steam for only $14.99. Developed by LuGus Studios and published by Iceberg Interactive, Midnight Protocol asks players to “hack into servers, beat security systems and discover encrypted secrets”in an effort to not only get back into the hacking game, but also find out who doxxed you - and why. In all seriousness, that movie has absolutely inspired hackers and data-activists the world over, including the notorious donk_enby when they downloaded 30 terabytes of information from Parler using the referential name “crash override.” It’s a thrilling rush to feel like a hacker, but it’s a lot safer when you’re playing out your fantasies in game form.Įnter Midnight Protocol, a game about a doxxed hacker seeking not revenge, but answers. I know for a fact it’s compelled me to say “I’m in” when I login to any of my accounts because LET ME DREAM. The 1995 cult cinematic classic Hackers made a lasting impression on those who loved the idea of solving cyber-conspiracies.
0 Comments
Leave a Reply. |