Planet Earth… the end of the 21st century: the Achab Corporation influences and dominates the globe using outstanding technologies, obtained via access to Gene.sys, a secret database of unknown origin which has turned out to be a mine of information and knowledge.
However, the Corporation is not the only entity that wants to obtain these secrets: the Breachers are expert hackers, capable of connecting to Gene.sys in order to steal information and increase the power and prestige of their faction. A.R.M. (the Achab Remote Mind) security system, a sophisticated artificial intelligence developed by Achab engineers, proactively detects and fights against each intrusion attempt to Gene.sys, but it seems that something is going wrong with it…
3100+ Breachers connected to the Network! 30+ Stretch goals unlocked! About 70 miniatures included!
Kickstarter campaign ended! Preorders will open soon!
The Breach is a competitive Net Crawler game for 1-4 players, lasting approximately 25 minutes per player, where they attempt to breach the Gene.sys database to steal secret information. Each player is a Breacher, a digital rebel, guided by their ideals or by their Faction interests.
The game map is Gene.sys, a virtual universe of mysterious origin, currently controlled by the Achab Corporation. After hacking into the database, the Breacher Avatars will need to face several dangers: not just other Breachers, but also I.C.E. controlled by the A.R.M. (the Achab Remote Mind), who will try to stop the incursions. In case of need, A.R.M. will also use powerful Guardians to try to put an end to intrusion attempts.
will allow you to fully immerse yourself in the game’s setting.
The Breach is a Net Crawler with a distinctive resource management system, set collection mechanics and variable powers. Your objective is to spread your viruses inside the database, while gathering as much information as possible.
The game turn is structured in three phases: Firewall (I.C.E. run their subroutines against players), Actions (Avatars choose and execute their actions) and Net (Avatars configure their skills and steal information using viruses). You will be able to upgrade your Avatar, assign Viruses, fight the Guards and other Avatars, explore the rooms of Gene.sys, but also install programs and use Cheat codes to manipulate the database according to your needs.
Pay also attention to the health of your Avatar: if it will suffer enough damage, it will be disconnected from the network and reconnected in a different location! However, you could play more strategic and take advantage also of this event…
Each game of The Breach will be different from the previous one: the choice among Avatar, Breacher and Database structure offers a different challenge each time, and players have to clever to identify the best strategy for optimizing the available resources.
Let’s start talking about the game!
Each player takes the role of one Breacher, a digital rebel, who connects to the Network using an Avatar.
Breachers and Avatars have special powers and abilities.
Breachers have their special abilities indicated on their card and use some special cards to activate other abilities and powers.
Avatars have three different slots, each one with their abilities: Movement, Attack, and Evasion.
By combining Breachers and Avatars you can create several different combinations, this makes every single game a unique experience!
First overview of The Breach gameplay
Breachers goal is to collect information, according to a personal secret Objective card.
At the beginning of the game, Breachers connect to their Avatars and start to explore the Gene.sys Database, accessing into a room next to a Gate.
During the game turns, Breachers move and try to infect with their virus the rooms where their Avatars are.
If the Firewall does not react, the virus can be placed.
If all rooms adjacent to an information have been infected, the Breacher can discard all viruses and steal that information, archiving it in their Hard-Drives.
The Cube Engine, the core system of The Breach
Avatar Skills (Movement, Attack, and Evasion) are managed by the Cube Engine. Each time Breachers take an action, they must move a Code cube of the corresponding color to the next box following the connecting arrows. The sum of the Code cubes in a single box indicates the value of that skill (+2 for each cube of the corresponding color, +1 for each cube of a different color).
Let’s see an example: The Avatar wants to attack an I.C.E. next to him.
Thanks to the 2 red Code cubes on the Attack box (Red), the attack power of the Avatar is equal to 4, enough to defeat the I.C.E. (it has an Evasion value of 3).
The red cube used for the attack action is pushed into the next slot, following the arrows.
With a second action, the Avatar decides to move: 1 yellow Code cube is in the Movement box (Yellow), so the action can be performed, the skill value is 3 (1 yellow cube plus 1 red cube). The Avatar moves, and the yellow cube is pushed into the Cache box (Grey), according to the arrows in the Avatar card.
The Configure action allows each Breacher to rearrange the Code cubes in the different slots, always following the arrows.
Mastering the Cube Engine makes the difference between a common Hacker and a Breacher!
The Actions: Click, Click, Click…!!!
The number of actions (Clicks) and reconfigurations available to each Breacher depends on how many Information they collected since that moment.
Clicks allow players to upgrade their Avatars and Breachers, screen themselves, attack, and so on.
With the Screen action, an Avatar can ignore dangerous effects, like the Traits on the I.C.E. Description Cards, a Virus, and the effects that increase their Threat.
Using a Click to Configure also allows to draw a Malware card:
they have special effects that can boost the strategy of each player or generate real game twists.
With the Upgrade action, an Avatar can (for example) get an extra Code cube, to improve their Skills in the Cube Engine.
Beware The Firewall!
When an Avatar tries to infect a room with a virus, the Firewall of the Gene.sys database could react in different ways to contrast the intrusion D8 side, one effect will happen.
In the Firewall board, there is a Deployment Track for each I.C.E. category (Intrusion Countermeasures Electronics), that matches the symbols on the D8. At the start of each game, players can choose an I.C.E. for each category, from the available Activation cards.
The obtained result means that an Echo I.C.E. is activating. The Firewall is now actively opposing the intrusion of the Avatar and will send some countermeasures.
Now the Avatar has to fight the Echo I.C.E., just deployed by the Firewall of the Gene.sys!
We will talk about how the fight works very soon… 😉
After a Firewall reaction, the Echo I.C.E. has just been deployed in the same room where Hugo (the Avatar) is. Echo now attacks the Avatar with a value of 4 (STEP 1), equal to the Firewall Strength.
Hugo has an Evasion value of 3 because in its Evasion Box there is one blue Code Cube (2 points) and one yellow Code Cube (1 point).
Since the Attack value of the I.C.E. is higher than the Evasion value of the Avatar, Hugo is infected by 2 Viruses (STEP 2).
Hugo decides to Evade. Hugo moves the blue Code Cube from the Evasion Box and can now ignore 1 Virus. (STEP 3).
The remaining Virus is applied as standard (STEP 4).