TUXDB - LINUX GAMING AGGREGATE
made by: NuSuey
NEWSFEED
▪️ GAMES
▪️ STEAM DECK ▪️ DEALS ▪️ CROWDFUNDING ▪️ COMMUNITY
tuxdb.com logo
Support tuxDB on Patreon
Currently supported by 10 awesome people!

🌟 Special thanks to our amazing supporters:


✨ $10 Tier: [Geeks Love Detail]
🌈 $5 Tier: [Arch Toasty][Benedikt][David Martínez Martí]

Steam ImageSteam ImageSteam ImageSteam ImageSteam Image
The Mechanics of Hacking


Development on Midnight Protocol is making great progress. As we get closer to a beta version, we are excited to reveal the first gameplay details. Real-world hacking is a methodical process and not a fast-paced caper, as it is often depicted in shows and movies. In Midnight Protocol, we wanted the best of both worlds by offering deep and strategic gameplay but also the adrenaline of breaking into a place youre not supposed to be. Midnight Protocol was primarily inspired by RPGs and traditional board game mechanics. Lets take a look at the basics of how hacking works in this game.

The Basics


Hacking in Midnight Protocol is turn-based and takes place on a network of connected nodes. During your turn, you can spend 2 actions to do any of the following:
  • Move to a connected node
  • Interface with your current node
  • Activate a program
  • Remove a running program
Your time on the network is short-lived though, as the network will attempt to trace your signal. Every turn, the trace bar will increase by one. More prudent strategies will cost more time. So the way you spend that limited time on the network is key.

Nodes


Nodes on a network can vary from the access node where your mission starts, to financial databases, email servers, or password-protected vaults. All of these nodes offer a unique interface action. Interfacing with a bridge node, for instance, activates or deactivates certain network connections. Some node actions are more contextual, such as stopping a moving vehicle, unlocking an electronic lock or breaking into a network-connected fridge.

ICE


The trace is not the only anti-intrusion measure employed by the various networks. Inspired by the classic works of William Gibson, network connections are also guarded by intrusion countermeasure electronics, or ICE for short. These network programs will generally halt your progress and apply a variety of negative effects. Their position on the network is initially hidden. As you grow more experienced with the game, you will be able to make educated guesses about which connections might contain ICE or you might use specialized programs to root them out before they can become a problem. Once ICE is in play, you can employ dedicated programs such as Dagger of Jackhammer to tear it down. As you progress in the game, ICE becomes more dangerous and unpredictable. Some ICE will even stop hiding and go on the offensive

RESOURCES


Programs are at the heart of your strategy and determine your play style, but you can only bring a total of five programs on a mission. During the game, more programs will open up for you to buy with the credits you earn or will be awarded to you based on narrative choices you make. You wont be able to run all 5 of your programs, however. Programs you activate require processing slices to operate. You start the game with 8 of these slices and a program can have a maximum of 8 slices at its disposal. That means you can run one program at full capacity, or two at half capacity, and so on. This leads to turn-to-turn key decisions. Will you take away slices from Cloak, a program that has a chance to stop the network trace every turn, to empower Dagger, the program that is tearing down a Binary Wall? Will you sacrifice Leech, a program that is draining credits from a financial server in favor of cracking that vault node just a little bit faster? Additionally, some programs offer only an immediate benefit but cannot be removed for a set amount of turns. Sniffer, for example, will immediately tell you if a connection is guarded by ICE, but will continue to occupy 2 slices for another 2 turns. The slices system is also a potential target for the many different types of ICE you will encounter. Some ICE will install malware that will eat up your slices until properly removed. Scorpion, for instance, inflicts you with a program called Poison that will use your own slices to increase the trace every turn but can be manually removed by spending an action.

Advanced Tools


There are many more things to consider while playing. Hardware will give you passive upgrades. Challenges require you to mix up your strategy in exchange for cash. Finally, there are also system operators who have an active turn on the network and who employ deadly, dedicated programs to root out any hacker on the network. These mechanics turn every level into a puzzle where you try to figure out the best strategy for surviving on the network and force you to take risks in a situation where you dont have complete information. Will you play it safe? Or will you risk running into ICE?


[ 2020-05-18 17:55:03 CET ] [ Original post ]

Midnight Protocol
LuGus Studios Developer
LuGus Studios Publisher
2021-10-13 Release
GameBillet: 13.19 €
Game News Posts: 46
🎹🖱️Keyboard + Mouse
Very Positive (212 reviews)
Public Linux Depots:
  • Midnight Protocol (Linux) [1.76 G]

Hack into servers, beat security and steal encrypted data in a world where your identity is just another network address. An engaging story, agonizing dilemmas, and an easily accessible hacking system turn every player into a network hacker in Midnight Protocol.

Midnight Protocol is a tactical narrative-driven RPG set in a near future filled with labor automation, big data, controversial AI applications, legal gray zones, and the nebulous nature of online identity. You assume the mantle of a prominent hacktivist who has been targeted for blackmail by a shadowy branch of government.

The player interacts with their virtual environment through text commands, hacking into countless challenging networks. Character development and roleplay choices made during and in between missions affect the storyline and outcome of the game.

GAMEBILLET

[ 5975 ]

4.12$ (17%)
11.56$ (11%)
4.00$ (80%)
6.71$ (16%)
33.19$ (17%)
4.44$ (11%)
17.19$ (14%)
4.95$ (17%)
17.79$ (11%)
8.00$ (11%)
25.19$ (16%)
16.99$ (15%)
11.99$ (20%)
25.19$ (16%)
16.57$ (17%)
5.00$ (50%)
8.24$ (45%)
17.79$ (11%)
12.74$ (15%)
24.87$ (17%)
4.44$ (11%)
19.37$ (22%)
1.64$ (18%)
16.79$ (16%)
13.19$ (12%)
11.75$ (22%)
17.19$ (14%)
26.39$ (12%)
16.79$ (16%)
16.52$ (17%)
GAMERSGATE

[ 1742 ]

8.49$ (58%)
0.37$ (63%)
2.25$ (85%)
30.0$ (50%)
8.25$ (67%)
1.74$ (91%)
2.55$ (91%)
12.49$ (50%)
7.2$ (64%)
3.25$ (75%)
0.63$ (87%)
14.99$ (50%)
2.76$ (86%)
19.19$ (23%)
10.0$ (75%)
9.66$ (68%)
4.5$ (50%)
3.83$ (91%)
8.5$ (66%)
6.0$ (60%)
1.84$ (91%)
4.25$ (57%)
1.25$ (75%)
10.91$ (22%)
2.38$ (66%)
17.99$ (40%)
5.0$ (50%)
9.0$ (55%)
3.0$ (80%)
7.65$ (74%)
MacGamestore

[ 1755 ]

9.99$ (33%)
14.99$ (25%)
8.99$ (10%)
1.19$ (88%)
22.99$ (23%)
10.49$ (48%)
37.79$ (6%)
8.99$ (78%)
25.49$ (15%)
18.45$ (8%)
14.29$ (29%)
78.99$ (12%)
36.99$ (8%)
1.99$ (93%)
12.99$ (13%)
43.99$ (12%)
32.99$ (18%)
26.89$ (10%)
13.49$ (10%)
5.39$ (10%)
10.99$ (21%)
1.10$ (78%)
13.99$ (30%)
1.19$ (88%)
3.99$ (73%)
1.29$ (84%)
17.99$ (28%)
45.99$ (23%)
24.99$ (17%)
38.89$ (22%)

FANATICAL BUNDLES

Time left:

356379 days, 12 hours, 52 minutes


Time left:

3 days, 19 hours, 52 minutes


Time left:

6 days, 19 hours, 52 minutes


Time left:

10 days, 19 hours, 52 minutes


Time left:

35 days, 19 hours, 52 minutes


Time left:

6 days, 19 hours, 52 minutes


Time left:

45 days, 19 hours, 52 minutes


Time left:

50 days, 19 hours, 52 minutes


HUMBLE BUNDLES

Time left:

1 days, 13 hours, 52 minutes


Time left:

2 days, 13 hours, 52 minutes


Time left:

4 days, 13 hours, 52 minutes


Time left:

9 days, 13 hours, 52 minutes


Time left:

9 days, 13 hours, 52 minutes


Time left:

11 days, 13 hours, 52 minutes


Time left:

11 days, 13 hours, 52 minutes


Time left:

11 days, 13 hours, 52 minutes


Time left:

16 days, 13 hours, 52 minutes

by buying games/dlcs from affiliate links you are supporting tuxDB
🔴 LIVE