|

The Breach

It’s time to log on to Breachhub. First of all, open the ports, delete the cookies, because we don’t want to dirty the keyboard, and then we’re ready to load our viruses….

We are the Breachers. Tech wizards whose job is to sneak into a secret database to get very important information. It could be pictures of kittens, the location of a golden train, the phone number of Kim Jong Un’s hairdresser or Epstein’s list.

Create your own avatar

Before we go online, we need to create our avatar. We don’t have to move a hundred sliders to create our ideal self. Simply combine your personality with one of the avatars and you are done. This will give us various special abilities that will have an asymmetrical effect on our gameplay. The whole merging process is straightforward and has a good effect on the replayability of our breach.

Next, we need to log into the database. Don’t worry if you can’t remember your password. The game will remember it for you, just like your favourite Internet Explorer. Once inside the network, we land at the gate and are ready to hack.

Cube Programming

We will navigate the web, finding new paths and infect source code. Our IT exploits won’t look like those in most films or TV series. We won’t have to nervously click on the keyboard and throw around incomprehensible jargon even for computer scientists. We will program our actions by moving cubes.

When we want to move, all we have to do is move a yellow cube out of its slot. How many movement points this gives us depends on how many cubes were there. We calculate this using a simple rule that applies to almost all of our actions. The cubes in the slot of the matching colour give us 2 power points. Others give us 1.

After using an action, the cube moves to a different slot. It all depends on the avatar we choose. Each one has a slightly different programming layout. The most important thing is to remember to manage the whole system well. Because when the cube lands in the cache, we have to use the configuration action. Even though we will have many other ways to move them anyway.

This is where the fun of The Breach lies. Moving the cubes and optimising our moves. A hidden Euro game with ameri vibe. It’s great and, let me tell you, not so easy to master. Especially as we are not alone on the net. There are other users and viruses that want to click with us in a rather unpleasant way.

Click it

Other Breachers in the race also have their own goals, and these will often clash with ours. If someone is the first to steal the data we want, we can rudely copy their homework. To infect another user, we have to move the cube again and calculate the strength of our attack. We compare it to our opponent’s defence and, depending on how high it is, we throw as many viruses onto their drive.

When a Breacher is defeated, it logs off the network and we copy what we need. Logging back into the network is easy, but leaves us with only one action to perform on the next activation. We must remember that this game is a race, as the first to reach the target wins. That is why every KO hurts so much.

In addition to other Breachers, we will also have to watch out for the Firewall and its minions. It’s not enough to simply disable the Windows firewall to get rid of them. Hostile software also attacks us and regularly tries to make our lives miserable. On the Internet, it comes in the form of tentacled creatures, minotaurs and beautiful women. So don’t click on every link that pops up.

WinRar Full Pro Licence

The biggest threat, however, is XAN4TH.RAR. WinRar Full Pro with a purchased licence won’t even help us. It’s such malicious software that in its rounds it removes our gates needed to log in. When it removes the last gate, we all lose. In my opinion, this is a more elegant form of Black Rose that we cannot artificially pump up with points because we see ourselves losing.

Dealing with the firewall and its minions was not easy at first. We had to concentrate hard to analyse their moves well. However, a quick phone call to a friend and a few reads through the manual meant that I already knew what Swordfish was.

More data

The coolest thing is that the more data we collect, the more opportunities we have. You can feel the development and progression of the game here. With the upgrade action we will also be able to use our special abilities and add new cubes to the system. On top of this, we also have malware cards, which we will use for various machinations or boosting our actions. We can use them to make really cool combos that will break the rules of the game and cause astonishment on the faces of our opponents. There are really quite a lot of options available in the game, and that is the best thing about The Breach.

On top of that, we also get a box of streach goals, which adds new Breachers, new opponents, loads of other modules and special scenarios that modify our gameplay quite a bit. It feels like I’m only on the first page of the search history and the best part is that I’m eager to see what’s on the next pages. By the way, I purchased the Kabuki Nights and Erebus expansions. However, that’s a topic for another review.

Summary

My Internet knowledge comes from only one source. 9GAG taught me about frog Wednesdays, about inserting potatoes at the end of long posts and about Polish Beaver. That’s why I’m glad The Breach taught me about programming with cubes. This action system is just great and I haven’t come across anything like it in other games of this type. It’s also quite intuitive, but at the same time it requires us to plan our actions well. Because we don’t want to be left with downloaded ports and expose ourselves to a malware attack.

I’m very keen to log on to The Breach because it provides me with negative interaction, fast gameplay, exciting race, scales well and most importantly, the firewall also tries to throw us off the grid. By the way the game has great figures and because of the colourful plastic I don’t even have to paint them. Because they look great anyway.

However, learning how to program it myself was not easy, and running the firewall efficiently will require several approaches. Mainly because the instructions use a lot of 'IT jargon’.

Final verdict: If you master this game Then you will have a great time.

Pros

  • Clever cube management mechanism
  • Sensational IT vibe
  • Phenomenal figures
  • Negative interaction
  • Thematic Actions
  • Many Character Combinations
  • Additional content means many hours of discovering something new

Cons

  • Learning the game is not easy

[Współpraca reklamowa z Czacha Games]

Podobne Posty