• Register

It's now the year 2032. In the recent past, a major cyberwar decimated much of the global internet infrastructure. What remains of it has largely been seized by pre-existing power players. Many countries have shunned the global internet and attempted to close their electronic borders (with varying degrees of success), while governments in general have lost much of their power in favor of corporatoins, loosely-tied criminal and vigilante groups, and even skilled individuals. In a world where information is more valuable than gold (but maybe not Bitcoin), "Spy" may now be the world's top-paying job title.

Post news Report RSS Inventing the Internet

The internet will play a huge role in your hacking escapades in Spycursion. Here we'll outline how the internet works in the world of Spycursion.

Posted by on

What is the internet? It’s billions of devices, all running their own operating system and software, networked together, “speakng” to one another. This networking works because the devices all “speak” in common protocols, some of which you’ve probably heard of: IP, TCP, HTTP, etc.

Spycursion’s own version of the internet is similar. It contains thousands of different electronic devices — servers, laptops, phones, etc. All of these devices are connected, and most of them can be located and/or hacked (with varying levels of difficulty) by players.

Notice the word “located” above. Just like in the real world, Spycursion’s internet is a big place. If you’re on a mission to steal data from someone’s laptop, you could go about that in two ways: You could access it physically, or you could hack it remotely. The latter method is obviously safer, but you would need to know its IP address (its “home” on the internet), which you wouldn’t necessarily have at first. That’s where tagging comes in — identifying the device, out in the game world, and getting its IP address, so that you can hack it remotely from the safety of your own apartment. Very spy-like indeed.

We’ll explain more about the hacking and security mechanics in a future post, but in a nutshell, what you’ll need to do to hack a target over the internet is scan it for vulnerabilities — gather information on what software is running on it — and then deploy exploits against the vulnerable software. You can create these exploits yourself, using the in-game programming language called Slang (another future blog post), or you can purchase them, find them in a secret location, or steal them from an unsuspecting victim.

The miniature internet in Spycursion has a lot of similarities with that of the real world — and being a video game, of course, you are free to wreak mayhem all over it without consequence. Your game character, however, may end up making a lot of enemies…

Post a comment

Your comment will be anonymous unless you join the community. Or sign in with your social account: