A downloadable game

About the world of the game

The plot of the game unfolds in a slightly alternate reality of the 20XX. Electronic music and technology are in vogue. The Internet is already everywhere, it has covered the entire globe and penetrated into every possible corner. People exist, simultaneously, in two parallel worlds: terrestrial and digital. Two personalities that intersect in one being. During the day you are a manager, programmer or someone else in an office or factory, and in the evening you are a funny and cheerful dude, a fan of shooters and with an anime girl in your avatar.

Computer networking helps to unite people all over the world and easily communicate, share knowledge, memes and just have fun. But it is a wonderful tool for manipulating information. It has become hard to find the truth, and even harder to hide anything. Private lives, commercial, government, military systems are under attack. Hackers who are sometimes well-meaning and sometimes not so well-meaning get into places that were thought impossible to get into. The hacker may be on the other side of the planet and it is impossible to catch him. The means of defense are evolving, but hacking technologies are evolving as well. The further it goes, the more difficult it becomes for everyone.

A unit is being set up within the Council of States to monitor “cleanliness” in the digital world. The “Everest” project is being implemented, under which each country is limited to access to the common network. A single point of traffic exit from the country, from each city (in large cities from each district separately) is created. Access to the network is based on identification documents, and going outside your segment costs money and more control. Has life become easier? In terms of information security, yes. If a hack happens, it is easier and faster to track down the perpetrator, and it is not so easy to sell the information obtained. In terms of freedom of information, of course, it has become more difficult, everything is checked and costs money. With the use of such restrictions, defenses have evolved faster and more aggressively. It's not as easy for the average hacker to find allies or information. “Everest” has halted the evolution of hacking technology. Or has it?

About the game

The game is divided into two parts:

  1. exploratory, in which we move around the map;
  2. combat, in which we fight to capture a node.

Exploration

The player moves from node to node in the web of a computer network. Each node must be hacked, then you can pass through it. The map is a closed network in which the player can move in any available direction.  But at one point there is an Everest server. To win, the player needs to hack it.

We can sweep the entire map to get more resources. But each hacked node takes time, and the security system is evolving. The more the player spends time, the more serious enemy will meet at the end.

Combat

Turn-based battles in a closed arena. Layout of battle mechanics, phases is shown in the video. This mechanics I call “turn-based bullet hell”.


The game was based on ideas from my competition projects: 

Leave a comment

Log in with itch.io to leave a comment.