You assume the mantle of a prominent hacktivist, ‘Data’, who recently got doxxed and has been targeted for blackmail by a shadowy branch of government.
You interact with the virtual environment through your home terminal that requires nothing more than your keyboard.
> HANG YOUR [H]AT 3a3g1s
Will you respect others’ privacy and bank s, or leave no stone unturned? Midnight Protocol allows you to play as the hacker you want to be. Help the police track down a rogue hacker, or blackmail a desperate husband trying to recover… dubious pictures. Gain black, grey, and white hat reputation to change the direction of the story based on your choices.
> I[M]MERSION OVERLOAD 6j1038
Midnight Protocol’s design focuses on immersing you in a world of digital warfare without complicated hacking mechanics. Your keyboard is your weapon, type commands to eliminate or evade security programs, letting your keystrokes become part of the soundtrack.
> NICE [D]ECK 4y5q29
Cracking a digital safe or extracting classified data requires careful planning. Pay the troll toll, use digital jackhammers, cloaks, and daggers to combat cybersecurity. Buy new programs or hardware on the black market, and customize your deck to fit your playstyle.
> DI[S]TRACTIONS ABOUND 724l3g
Take on dozens of sidequests filled with easter eggs and references, gather additional intel on your targets before you start a mission, and play some hacker chess to wind down. Midnight Protocol is jam-packed with optional missions, providing hours of additional content.
TRAILER DE GAMEPLAY - Midnight Protocol 5q3o6
CAPTURES D'ÉCRAN - Midnight Protocol 223d5w
Configuration minimale* z3fq
OS: Windows 7
Processor: Intel Core i5 2.4Ghz or better
Memory: 3 GB RAM
Graphics: Geforce GTX 960 / Radeon HD 7750 or better, 1GB video card memory