Cyber Manhunt is a story-oriented puzzle game focusing on big data, hacking, citizen privacy, and social workers. It focuses on social issues such as cyber violence and privacy breaches.
## About This Game
Hello everyone, we are Aluba Studios, and we are happy to share our game with
you: Cyber Manhunt .
Yes, this is a cyber manhunt games, combined with a network of violence ,
big data , loss of privacy and other social problems , to the story of
puzzle games.
Many of our plot settings refer to real events , so you can also see some
familiar figures from some character image setting maps, and you can think of
reality after playing the game.
## Theme Idea
During the internal communication, we found that when the Internet continues
to penetrate people’s lives and accelerate the transmission of information, a
negative event can quickly spread throughout the Internet.
In this process, sin will be exposed and punished, which will make people
happy; but some people will suffer malicious insults and insults from the
Internet keyboard man. When these cyber violence continue to escalate, the
consequences often exceed the incident itself, and even more stressful and end
precious lives.
Therefore, we decided to develop such a game related to the theme of ”
hacking “, ” cyber manhunt ” and ” privacy data leakage “. We hope that
players can play the role of a hacker , and find out their privacy secrets
, like God controls the destiny of others behind his back and witnesses their
end. I hope that through this process, players can think and make their own
right judgments.
## Features
Implemented some cyber manhunt means and integrated them into our game:
* Web search
The player collects basic information about the target object through the
browser search function.
* Database
Use known information to enter into the database. After filtering, perhaps
other information about the target object.
* Crack
Generate passwords based on the obtained target person information, and use it
to log in to accounts on various platforms (including email, social platforms,
chat software, etc.)
* Disguise
Obtain the needs, social circles, etc. of the target object, choose disguise
according to the information, and get more information by contacting the
target object
* Chat Routine
After adding the target object as a friend, perform a chat Routine to get
information.
* Picture Analysis
Get valuable information and relevant clues from pictures.
* Phishing
Send phishing links to invade the target person’s hardware devices (computer,
mobile phone), and obtain private information.
More advanced cyber manhunt methods will be unlocked later!
## Gameplay
*Highly Immersive
The player plays a hacker in the game, accepts the commission of a company,
and completes cyber manhunt incidents.
*Rich Gameplay
There are a lot of Social Engineering features in the game, also include
Reasoning, Tracking, Puzzles-Solving, Destroying and Invading etc..
*Complex Story
The game will judge the good and evil of the player’s behavior. Different
judgments will trigger the corresponding plot direction.
*Multiple Chars
There are many characters on the stage who has its own personality
characteristics and unknown stories. You play a hacker to discover the truth
of the incident one by one.
## Summary
When we first decided on the theme of the game, we also considered it for a
long time. Because of the better independent games such as This War of Mine
, Papers, Please and Orwell etc., we also want to make a game that allows
players to think outside the game. Therefore, in terms of subject matter, I
also racked my brains.
And in order to give players a real hacking experience, we even established a
social engineering group to find some professor in the industry and ask them
about social engineering. I even read the book The Art of Deception by the
famous hacker Kevin David Mitnick, and saw how the real hacker master works.
These online and offline learning directly opened the door to a new world for
everyone in our team. The disciplines involved include social engineering,
psychology, micro-expressions, tactics, etc. The rich content also allows us
full of confidence in the subject matter and gameplay of the game.
Not just professionals and books, we are also looking for inspiration in some
film works. For example, through Who Am I: No System Is Safe , we have seen
more artistic and more representative forms of hacking technology. Through
Searching we have learned how to create reversals in details and how let the
audience / player focus on where we expect them to focus. Every part of the
learning has benefited us a lot, and we can’t wait to use them in our games.
To sum up, this game is very special and unique which combines a lot of
features. I really hope that you guys could like this game much. Please feel
free to leave your messages or feedback in Community.
Minimum System Requirements | Recommended System Requirements | |
CPU | Intel(R) Core(TM) i3-3220 | Intel(R) Core(TM) i5-3470 |
RAM | 4 GB RAM | 8 GB RAM |
OS | Windows 7/8/10 | Windows 7/8/10 |
Graphics Card | NVIDIA GeForce GT 610 | NVIDIA GeForce GT 630 |
Direct X | Version 9.0c | Version 9.0c |
SOUND CARD | 100% DirectX 9.0c compatible sound card | 100% DirectX 9.0c compatible sound card |
HDD Space | 3 GB available space | 3 GB available space |
Minimum System Requirements | Recommended System Requirements | |
CPU | Intel Core i3 2.00 Ghz | Intel Core i3 2.00 Ghz |
RAM | 4 GB RAM | 4 GB RAM |
OS | OS X 10.8 Mountain Lion | OS X 10.8 Mountain Lion |
Graphics Card | Intel Iris Graphics | Intel Iris Graphics |
HDD Space | 2 GB available space | 2 GB available space |