-
Notifications
You must be signed in to change notification settings - Fork 0
/
rooms.html
133 lines (128 loc) · 13.3 KB
/
rooms.html
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
<!DOCTYPE html>
<html>
<head>
<title>budgo</title>
<link rel="icon"
type="image/png"
href="https://i.redd.it/q7bi5hj21af61.png">
<meta content="text/html; charset=UTF-8" http-equiv="content-type"><style type="text/css">ol{margin:0;padding:0}table td,table th{padding:0}.c3{color:#000000;font-weight:400;text-decoration:none;vertical-align:baseline;font-size:11pt;font-family:"Times New Roman";font-style:normal}.c6{-webkit-text-decoration-skip:none;color:#000000;text-decoration:underline;vertical-align:baseline;text-decoration-skip-ink:none;font-size:11pt;font-style:normal}.c2{color:#000000;font-weight:400;text-decoration:none;vertical-align:baseline;font-size:11pt;font-family:"Times New Roman";font-style:italic}.c1{padding-top:0pt;padding-bottom:0pt;line-height:1.15;orphans:2;widows:2;text-align:left}.c9{color:#000000;text-decoration:none;vertical-align:baseline;font-size:11pt;font-style:normal}.c11{color:#000000;vertical-align:baseline;font-size:11pt}.c8{text-decoration-skip-ink:none;-webkit-text-decoration-skip:none;text-decoration:underline}.c7{background-color:#ffffff;max-width:468pt;padding:72pt 72pt 72pt 72pt}.c5{font-weight:400;font-family:"Times New Roman"}.c0{font-weight:700;font-family:"Times New Roman"}.c4{height:11pt}.c10{font-style:italic}.title{padding-top:0pt;color:#000000;font-size:26pt;padding-bottom:3pt;font-family:"Arial";line-height:1.15;page-break-after:avoid;orphans:2;widows:2;text-align:left}.subtitle{padding-top:0pt;color:#666666;font-size:15pt;padding-bottom:16pt;font-family:"Arial";line-height:1.15;page-break-after:avoid;orphans:2;widows:2;text-align:left}li{color:#000000;font-size:11pt;font-family:"Arial"}p{margin:0;color:#000000;font-size:11pt;font-family:"Arial"}h1{padding-top:20pt;color:#000000;font-size:20pt;padding-bottom:6pt;font-family:"Arial";line-height:1.15;page-break-after:avoid;orphans:2;widows:2;text-align:left}h2{padding-top:18pt;color:#000000;font-size:16pt;padding-bottom:6pt;font-family:"Arial";line-height:1.15;page-break-after:avoid;orphans:2;widows:2;text-align:left}h3{padding-top:16pt;color:#434343;font-size:14pt;padding-bottom:4pt;font-family:"Arial";line-height:1.15;page-break-after:avoid;orphans:2;widows:2;text-align:left}h4{padding-top:14pt;color:#666666;font-size:12pt;padding-bottom:4pt;font-family:"Arial";line-height:1.15;page-break-after:avoid;orphans:2;widows:2;text-align:left}h5{padding-top:12pt;color:#666666;font-size:11pt;padding-bottom:4pt;font-family:"Arial";line-height:1.15;page-break-after:avoid;orphans:2;widows:2;text-align:left}h6{padding-top:12pt;color:#666666;font-size:11pt;padding-bottom:4pt;font-family:"Arial";line-height:1.15;page-break-after:avoid;font-style:italic;orphans:2;widows:2;text-align:left}</style>
</head>
<p class="c1"><span class="c0">Basic Goals</span></p>
<p class="c1"><span class="c3">Agents must generate and upload 1000 Gigabytes of data in order to win the game.</span></p>
<p class="c1 c4"><span class="c3"></span></p>
<p class="c1 c4"><span class="c3"></span></p>
<p class="c1"><span class="c3">Hackers must stop the Agents before they generate the amount of data required, either by killing them or .</span></p>
<p class="c1 c4"><span class="c3"></span></p>
<p class="c1"><span class="c9 c0">Cycles</span></p>
<p class="c1"><span class="c3">All players start the game in a random location along a chain of rooms. Every 2 minutes, players will advance to the next room in the chain, and every (number of players) cycles, players will be offered the ability to go to the Meeting Room.</span></p>
<p class="c1 c4"><span class="c3"></span></p>
<p class="c1 c4"><span class="c3"></span></p>
<p class="c1"><span class="c0 c9">Actions</span></p>
<p class="c1"><span class="c3">During each cycle, players are offered a few different actions to choose from. Players may take only 1 action per cycle (unless otherwise noted).</span></p>
<p class="c1 c4"><span class="c3"></span></p>
<p class="c1"><span class="c8 c5">Generate Data</span></p>
<p class="c1"><span class="c3">Contribute 5% of the data still needed to complete the upload.</span></p>
<p class="c1 c4"><span class="c3"></span></p>
<p class="c1"><span class="c5 c8">Work On Side Project </span><span class="c11 c8 c5 c10">(Agent Only)</span></p>
<p class="c1"><span class="c3">Contribute 10% of the data needed to complete a Side Project. </span></p>
<p class="c1 c4"><span class="c3"></span></p>
<p class="c1"><span class="c8 c5">Corrupt Data </span><span class="c8 c5 c10">(Hacker Only)</span></p>
<p class="c1"><span class="c3">Remove 2% data from the upload.</span></p>
<p class="c1 c4"><span class="c3"></span></p>
<p class="c1"><span class="c8 c5">Write Malware </span><span class="c8 c5 c10 c11">(Hacker Only)</span></p>
<p class="c1"><span class="c5">Plant Malware in your room</span><span class="c3">. The next person who enters it loses their ability to upload data and all abilities are lost. (Full-cycle cooldown).</span></p>
<p class="c1 c4"><span class="c3"></span></p>
<p class="c1"><span class="c8 c5">Darkweb</span><span class="c8 c5"> Drop </span><span class="c11 c8 c5 c10">(Hacker Only)</span></p>
<p class="c1"><span class="c3">Send a secret message to another hacker.</span></p>
<p class="c1 c4"><span class="c3"></span></p>
<p class="c1 c4"><span class="c3"></span></p>
<p class="c1"><span class="c9 c0">Side Projects</span></p>
<p class="c1"><span class="c3">Side Projects are additional objectives that help Agents.</span></p>
<p class="c1 c4"><span class="c3"></span></p>
<p class="c1"><span class="c6 c5">Upload Efficiency</span></p>
<p class="c1"><span class="c3">Gain a permanent +3% data upload for all Agents.</span></p>
<p class="c1 c4"><span class="c3"></span></p>
<p class="c1"><span class="c5 c6">File Backups</span></p>
<p class="c1"><span class="c3">Corrupt Data permanently gets -1% effectiveness.</span></p>
<p class="c1 c4"><span class="c3"></span></p>
<p class="c1"><span class="c6 c5">Secure Channels</span></p>
<p class="c1"><span class="c5">Disable the </span><span class="c5">Darkweb</span><span class="c3"> Drop ability for all Hackers. </span></p>
<p class="c1 c4"><span class="c3"></span></p>
<p class="c1"><span class="c6 c5">Background Checks</span></p>
<p class="c1"><span class="c3">Perform a Background Check on a player, revealing their role.</span></p>
<p class="c1 c4"><span class="c3"></span></p>
<p class="c1 c4"><span class="c3"></span></p>
<p class="c1"><span class="c9 c0">Roles</span></p>
<p class="c1"><span class="c3">There are additional Roles who each have special abilities on top of the abilities granted to them by the base faction they are a part of.</span></p>
<p class="c1 c4"><span class="c3"></span></p>
<p class="c1"><span class="c8 c5">Investigator (Agent)</span></p>
<p class="c1"><span class="c3">The Investigator is a seasoned detective, hired by the Enterprise for his talent for finding clues that lead to the motives of anyone deemed noteworthy.</span></p>
<p class="c1 c4"><span class="c3"></span></p>
<p class="c1"><span class="c2">Investigate:</span></p>
<p class="c1"><span class="c3">Contribute up to 25% of the data needed to Investigate a target. </span></p>
<p class="c1 c4"><span class="c3"></span></p>
<p class="c1"><span class="c6 c5">Radioman (Agent)</span></p>
<p class="c1"><span class="c3">The Radioman is an old member of the Enterprise, hired in the days of yore. Nevertheless, her skills are still useful as a low-tech way to communicate.</span></p>
<p class="c1 c4"><span class="c3"></span></p>
<p class="c1"><span class="c2">Create Connection:</span></p>
<p class="c1"><span class="c3">Link your room to another room, allowing you to speak with whoever is in that room.</span></p>
<p class="c1 c4"><span class="c3"></span></p>
<p class="c1"><span class="c6 c5">Technician (Agent)</span></p>
<p class="c1"><span class="c3">The Technician is a supportive Agent who can hide in air ducts, allowing him to stay in his room and observe the goings on of the next player who enters.</span></p>
<p class="c1 c4"><span class="c3"></span></p>
<p class="c1"><span class="c5 c10">Maintenance</span><span class="c3">:</span></p>
<p class="c1"><span class="c3">Hop into an air duct. You are unaffected by the next room change, but cannot move from the vent until an empty room comes up.</span></p>
<p class="c1 c4"><span class="c3"></span></p>
<p class="c1"><span class="c6 c5">Software Expert (Agent)</span></p>
<p class="c1"><span class="c3">The Software Expert is a troubleshooting genius, capable of removing malware from a player’s computer. </span></p>
<p class="c1 c4"><span class="c3"></span></p>
<p class="c1"><span class="c2">Debug:</span></p>
<p class="c1"><span class="c3">Remove Malware from a player’s computer. </span></p>
<p class="c1 c4"><span class="c3"></span></p>
<p class="c1"><span class="c6 c5">Securityman (Agent)</span></p>
<p class="c1"><span class="c3">The Securityman is a hired gun, capable of weaseling info from weasels.</span></p>
<p class="c1 c4"><span class="c3"></span></p>
<p class="c1"><span class="c2">Interrogate:</span></p>
<p class="c1"><span class="c3">Interrogate a player. If they take an action, that action is revealed to you. Hackers will be informed that they are being Interrogated.</span></p>
<p class="c1 c4"><span class="c3"></span></p>
<p class="c1"><span class="c6 c5">Admin (Agent)</span></p>
<p class="c1"><span class="c5">The Admin is a high-ranking Enterprise operative, capable of using </span><span class="c5">darkweb</span><span class="c3"> algorithms to learn the names of all Hackers. However, this high status makes him an equally high-level target for the Hackers.</span></p>
<p class="c1 c4"><span class="c3"></span></p>
<p class="c1"><span class="c2">Ultimate Diagnostic:</span></p>
<p class="c1"><span class="c5">Learn the name of every Hacker.</span></p>
<p class="c1 c4"><span class="c3"></span></p>
<p class="c1"><span class="c6 c5">Nuker (Hacker)</span></p>
<p class="c1"><span class="c3">The Nuker is a veteran Hacker in the Coalition, capable of going toe-to-toe with the Admin. A former Enterprise operative, she’s left a vulnerability in their servers that allows her to destroy all data hosted by them, limited only by her lack of knowledge as to the Admin’s true identity.</span></p>
<p class="c1 c4"><span class="c3"></span></p>
<p class="c1"><span class="c2">R4NC0R Backdoor Algorithm:</span></p>
<p class="c1"><span class="c3">At the end of the game, choose a player. If they’re the Admin, you win.</span></p>
<p class="c1 c4"><span class="c3"></span></p>
<p class="c1"><span class="c6 c5">Assassin (Hacker)</span></p>
<p class="c1"><span class="c3">The Assassin is a Hacker whose morals have long since departed. She’s ruthless, never asking questions nor denying results when the Coalition needs someone to pipe down for a while.</span></p>
<p class="c1 c4"><span class="c3"></span></p>
<p class="c1"><span class="c2">Murder:</span></p>
<p class="c1"><span class="c3">Kill the next player to enter your room. (Full-cycle cooldown).</span></p>
<p class="c1 c4"><span class="c3"></span></p>
<p class="c1"><span class="c6 c5">Blackmailer (Hacker)</span></p>
<p class="c1"><span class="c3">The Blackmailer is a terrifyingly knowledgeable man, using his skills to harvest data on all Agents’ activities. Some secrets are worth a lot.</span></p>
<p class="c1 c4"><span class="c3"></span></p>
<p class="c1"><span class="c2">Condemn to Silence:</span></p>
<p class="c1"><span class="c3">Blackmail a player, removing their ability to speak until the end of the next meeting.</span></p>
<p class="c1 c4"><span class="c3"></span></p>
<p class="c1"><span class="c6 c5">Rootkitter (Hacker)</span></p>
<p class="c1"><span class="c3">The Rootkitter creates tools for her fellow Coalition operatives, giving them more advantages when undertaking their nefarious deeds.</span></p>
<p class="c1 c4"><span class="c3"></span></p>
<p class="c1"><span class="c2">New Release:</span></p>
<p class="c1"><span class="c3">Grant Rootkit to another Hacker for one cycle. Hackers with Rootkit double the amount of data sapped from uploads, appear to be innocent in Interrogations, and have an extra cycle removed from all their current cooldowns. (3-cycle cooldown).</span></p>
<p class="c1 c4"><span class="c3"></span></p>
<p class="c1"><span class="c6 c5">Bomber (Hacker)</span></p>
<p class="c1"><span class="c3">The Bomber is a loose cannon, equally crazed with his explosives as he is with his discretion for using them. The Coalition took him in for his genius in creating mayhem and destruction, honing him into a precise (albeit still flamboyant) killer.</span></p>
<p class="c1 c4"><span class="c3"></span></p>
<p class="c1"><span class="c2">Plant Explosive:</span></p>
<p class="c1"><span class="c3">Plant an explosive in your room. You may set the timer for up to 3 rounds, after which the explosive will detonate. (10-cycle cooldown).</span></p>
<p class="c1 c4"><span class="c3"></span></p>
<p class="c1"><span class="c6 c5">Manipulator (Hacker)</span></p>
<p class="c1"><span class="c3">The Manipulator is a social engineer, capable of turning even the worst of enemies into his allies. This skill has allowed him to climb the ranks of the Coalition, making him a senior member of the group.</span></p>
<p class="c1 c4"><span class="c3"></span></p>
<p class="c1"><span class="c2">Twist:</span></p>
<p class="c1"><span class="c3">Change an Agent’s loyalty into a Hacker. (This ability may only be used once per game).</span></p></html>