Advertisement
Guest User

Untitled

a guest
Jun 19th, 2018
138
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 5.04 KB | None | 0 0
  1. Hacking Game Ideas
  2.  
  3. Philosophy:
  4. The player doesn't just have to simply be a hacker for hire. They may become a big influencer on powerful factions and manipulate the currents of world events if skilled and wealthy enough. The early game however will be a difficult slog to acrue funds for survival, upgrades and simply avoiding arrest or murder. Retreat from current residences could likely happen a lot.
  5. The player also must manage personal finances for shelter and sustenance. Their character can also die or be captured if local or international enforcers have them tracked down and have reason for them to be taken out of the picture. As such, the player can buy increasingly secure residences and even security teams or items that can provide getaways.
  6. If arrested or captured, it may be possible that the player can be broken out if attatched to strong enough factions.
  7.  
  8.  
  9. Region Statistics:
  10. The world map will be divided into many zones, each with their own statistics.
  11. Instability - Represents degree of economic failure and people's unwillingness to cooperate with local regimes. This raises fees and might lower payouts in the region. Corporation and Political Factions may be weakened by this, while Movement Factions will become stronger.
  12. Chaos - Becomes in play once Instability reaches a certain level. Some regions will have a much higher Instability-Chaos threshold than others. Jobs for hacking ops involving armed conflicts between factions be much more common and leave a greater amount of impact than normal. Chaos levels also degrade Digital Infastructure over time.
  13. Digital Infastructure - A low amount of this will greatly limit hacking activities and opportunities in the region. If this reaches zero, the region becomes a Blackout area that greatly limits what kind of hacking may done in the region. During Blackout, many factions will be scrambling to re-establish their own infastructures for a big monopoly of user data. Those who succesfully do so, will win a high control over the region.
  14.  
  15.  
  16. Cryptocurrency Theft:
  17. May hack into poorly secured wallets or invade crypto mining ops to secure a percentage of the income flow. Siphoning a tiny amount of the stream won't be noticed, but bigger amounts will be much riskier.
  18.  
  19. Vendor Hacks:
  20. Physical Electronic storefronts can be hacked to a divert stream of income over a long period of time, or a larger one for a very short period of time. Digital storefronts may be hacked too, but this is much more difficult.
  21.  
  22. Courier Hacks:
  23. Easy and smallscale hacks can generate some income for the hacker through the aquisition of stolen goods, but these always generate a high amount of risk as courier services are highly traced.
  24. Hacking jobs can also be taken to ensure that illegal goods safely make it through the system past security checks and to their destination. Drug or weapon cartels would offer this kind of job often.
  25. Difficult and advanced courier hacks can create instability for an entire region through huge delivery glitches or targeted to damage specific factions by causing logistical and supply issues.
  26.  
  27. Blackmail Hacks:
  28. Hacks that force the victim to pay funds or provide data that can be helpful in delving deeper into the networks of factions they are related to. Ordinary people are very easy to blackmail hack. A person of status and influence is very difficult to blackmail, but can provide incredible opportunities to manipulate the current landscape.
  29.  
  30. Advert Hacking:
  31. May range from small things such as website banners, all the way to billboards and commercials. Will generate funds or influence for certain factions, while making others lose out on it.
  32.  
  33. Research Tap
  34. Becomes available once 'secrets' are uncovered through hacking high profile organizations or gathering enough data breadcrumbs that allow discovery or research initiative. Research tapping is difficult, has a multitude of steps and time consuming, but can yield highly lucrative data and even opportunities to manipulate or hijack the research initiative.
  35. Potential yields:
  36. - Selling highly valueble data to competitors for lots of funds
  37. - Leaking data to harm the researcher's stock value.
  38. - Blackmail leverage
  39. - Sabotage for catastrophical damage to faction some time after research project concludes. More damaging sabotage requires starting a new seperate Op
  40.  
  41. Operational Overseeing.
  42. An advanced hacking job that could take place during all sorts of operations, whether they be armed struggles, digital manuevers and perhaps both at the same time. Responsibilities would include guarding networks of equipment and disabling devices and securities of obstacles so that the team you're in charge of overseeing succeeds their task with minimal casualty.
  43.  
  44. Sabotage
  45. A job to aggresively take over the systems of something to either destroy it or make it perform an unintended action. This can range anywhere to small items with digital connections, all the way to banking systems and military hardware like missiles and submarines. More high profile sabotages will very likely require a physical ground team that require Operational Overseeing.
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement