{"id":12963,"date":"2018-02-16T09:07:00","date_gmt":"2018-02-16T09:07:00","guid":{"rendered":"http:\/\/www.gamasutra.com\/view\/news\/314634"},"modified":"2018-02-16T09:07:00","modified_gmt":"2018-02-16T09:07:00","slug":"7-games-with-interesting-hacking-mechanics-all-devs-should-study","status":"publish","type":"post","link":"https:\/\/sickgaming.net\/blog\/2018\/02\/16\/7-games-with-interesting-hacking-mechanics-all-devs-should-study\/","title":{"rendered":"7 games with interesting hacking mechanics all devs should study"},"content":{"rendered":"<p>Games have immense capacity to make us feel cool or smart or highly capable \u2014 or all three at the same time. And few things can pull that off quite like a great hacking mechanic.<\/p>\n<p>These days hacking is more topical than ever,\u00a0and for anyone making a game that even flirts with the implications of the growing interconnectedness and networking capabilities of objects and devices all over the world \u2014 and the sometimes-questionable security protocols protecting them \u2014 it&#8217;s rife for potential as a video game mechanic.<\/p>\n<p>With that in mind, we reached out to several developers for their help building a list of games with hacking mechanics that every dev should study.\u00a0<\/p>\n<h2><strong><em>Watch Dogs 2 \u2014<\/em> an open-world hacker&#8217;s toolkit<\/strong><\/h2>\n<p><em>Watch Dogs 2<\/em>&#8216;s satire-laden cautionary tale on the dangers of unchecked, unregulated technological progress has hacking woven into its very DNA. Whether it&#8217;s the InfoSec-rooted storyline or the hacktivist credentials of its lead character and his team, or the remote-controlled contraptions and Internet of Things trickery, this is a game that&#8217;s as much about the ethics of tech-powered vigilantism as about holding technology corporations accountable for their wanton breaches of customer privacy and the security flaws of their products.<\/p>\n<p><img decoding=\"async\" alt=\"\" src=\"https:\/\/www.sickgamedev.win\/wp-content\/uploads\/2018\/02\/7-games-with-interesting-hacking-mechanics-all-devs-should-study.jpg\" \/><\/p>\n<p>It&#8217;s little wonder, then, that the player is armed with a plethora of fun hacking tools \u2014 in addition to all the usual open-world fare. The player can hack into security cameras around the city, remotely hijack cars (either one or many at a time), drain people&#8217;s bank accounts, redirect electrical currents to power gates and elevators, and much more.\u00a0<em>Watch Dogs 2<\/em>\u00a0is a fine example in how to give players a large range of ways to interact with the world while simultaneously nudging them to favor a subset of available options. &#8220;Even\u00a0though a wide selection of firearms and weapons is included,&#8221; notes <em>Quadrilateral Cowboy<\/em>\u00a0and <em>Thirty Flights of Loving<\/em>\u00a0developer Brendon\u00a0Chung, &#8220;using them just kinda feels like&#8230; the wrong way to play the game?&#8221;\u00a0<\/p>\n<p>&#8220;<em>Watch Dogs 2<\/em> never explicitly says it,&#8221; he continues, &#8220;but everything about the character personalities, dialogue, and tone of the game steers you away from weapons and toward the way-more-fun gadgets and hacking tools.&#8221;<\/p>\n<p><strong><em>TAKEAWAY: If the theme and story allows for it, arming players with a hacker&#8217;s toolkit of special skills and gadgets can be a delightful, refreshing, and possibility-laden way to escape the dominant modality of 3D action and open-world games.<\/em><\/strong><\/p>\n<h2><strong><em>Hacknet<\/em><\/strong> <strong>and<\/strong> <strong><em>Uplink<\/em><\/strong> \u2014 <strong>Hollywood-style hacking coolness<\/strong><\/h2>\n<p><em>HackMud<\/em>\u00a0developer Sean Gubelman points to both <em>Uplink<\/em>\u00a0and <em>Hacknet<\/em>\u00a0for the strong theming of their core hacking mechanics. These are games that make the player a cyber hacker in the way popular culture imagines this to be. They&#8217;re about Hollywood-style hacking, designed to look and feel like elite code cracking and cybercrime without requiring much \u2014 if any \u2014 actual hacking knowledge.<\/p>\n<p><img decoding=\"async\" alt=\"\" src=\"https:\/\/www.sickgamedev.win\/wp-content\/uploads\/2018\/02\/7-games-with-interesting-hacking-mechanics-all-devs-should-study-1.jpg\" \/><\/p>\n<p>There&#8217;s an interesting difference in how they do this: in <em>Hacknet<\/em>, the player spends much of their time typing Unix commands into a terminal interface to break through network security and explore and wreak havoc on the connected systems. <em>Uplink<\/em>, on the other hand, is more theatrical. It involves building elaborate routing sequences to hide your real IP address, then dialling in and using a password-cracking program to gain access to the target system \u2014 with everything depicted in the kinds of fancy, futuristic interfaces of <em>WarGames<\/em>\u00a0or the hacking scenes in any number of\u00a0late-90s movies.<\/p>\n<p><strong><em>TAKEAWAY: Good game mechanics are never solely about substance. You need the right mechanic in the right place in the right game, and when it comes to emulating highly-difficult real-world tasks like hacking you ideally want another layer: cool. The best hacking mechanics make players feel like they&#8217;re geniuses, even if just for a moment.<\/em><\/strong><\/p>\n<h2><strong><em>Else Heart.Break()<\/em><\/strong> \u2014 <strong>hacking intertwined with everything<\/strong><\/h2>\n<p>At first glance, <em>Else Heart.Break()<\/em>\u00a0seems like a traditional point-and-click adventure game. In truth, however, it&#8217;s anything but traditional. Its sprawling city is full of places to go and things to do, and its lifeblood is a BASIC-derivative language that makes everything in the city work. If a player clicks on an object with the &#8220;hack&#8221; command, which is unlocked once the player gets access to a special key, they get to see the object&#8217;s code \u2014 and to change its properties or behaviors. The effectiveness of this hacking mechanic, says\u00a0<em>Deus Ex: Mankind Divided<\/em> lead designer Richard Knight, rests on the decision to expose the language to the player \u2014 which lends it a &#8220;realistic feel&#8221; and lets the game become about &#8220;solving problems creatively through language expression.&#8221;<\/p>\n<p><img decoding=\"async\" alt=\"\" src=\"https:\/\/www.sickgamedev.win\/wp-content\/uploads\/2018\/02\/7-games-with-interesting-hacking-mechanics-all-devs-should-study-2.jpg\" \/><\/p>\n<p>Introversion founder and creative director Chris Delay argues that the critical thing about <em>Else Heart.break()<\/em>\u00a0that its hacking mechanic is all-pervasive in its world.\u00a0&#8220;I couldn&#8217;t believe how far they&#8217;d gone with this concept,&#8221; he explains. &#8220;Every door, every item, even food and drink, every system in the game could be analysed and understood by reading its source code, then edited.\u00a0I found myself wandering around the world just looking for objects to inspect. Eventually, when you find a second key and realise you can now actually hack THE KEY ITSELF, well, my mind was blown.&#8221;<\/p>\n<p><strong><em>TAKEAWAY: The best hacking mechanics are often deeply tied to the game&#8217;s world \u2014 they upend rules and logic, reshaping them at least in part to the player&#8217;s whims.<\/em><\/strong><\/p>\n<h2><strong><em>TIS-100<\/em><\/strong> <strong>and\u00a0<em>Shenzhen I\/O<\/em><\/strong> \u2014 <strong>hacking as a programming challenge<\/strong><\/h2>\n<p>Zachtronics&#8217; pair of programming games favor the older meaning of computer hacking, from a time when before the term gained its nefarious connotations. They are games about programming for the purposes of mastering a system, solving problems, and experimenting. Knight praises them for the same reasons he recommends <em>Else Heart.Break()<\/em>\u00a0\u2014 they&#8217;re about building things (<em>Shenzhen<\/em>\u00a0especially) and solving problems in creative ways, using code and simulated circuits.<\/p>\n<p><img decoding=\"async\" alt=\"\" src=\"https:\/\/www.sickgamedev.win\/wp-content\/uploads\/2018\/02\/7-games-with-interesting-hacking-mechanics-all-devs-should-study-3.jpg\" \/><\/p>\n<p>In <em>TIS-100<\/em>, this means reading a detailed technical reference manual for an imaginary 1980s computer and then manipulating pre-written Assembly code to repair corrupted segments (and then optionally refining this code to minimize its size and required clock cycles, like any self-respecting 1980s hacker). <em>Shenzhen I\/O<\/em>, meanwhile, is more like roleplaying a hardware hacker who&#8217;s stuck having to make stuff for money when really they&#8217;re only in it for the challenge of making a radio-controlled LED vape pen or a drinking game scorekeeper that tracks and visualizes past performance. These are games that don&#8217;t simply have a hacking <em>mechanic<\/em>; they are simplifications of real-world hacking, as engineers see it \u2014 where the entire goal is to solve technical puzzles, <em>for the puzzle<\/em>, and then to solve them better.<\/p>\n<p><strong><em>TAKEAWAY: Hacking mechanics, much like real hacking, can be a means to an end or they can be both the means and the end \u2014 which is to say that the hacking can be about hacking and not about opening a door or distracting a guard or stealing money or whatever.<\/em><\/strong><\/p>\n<h2><strong><em>HackMud<\/em><\/strong> \u2014 <strong>an exercise in trust<\/strong><\/h2>\n<p>The whole point of <em>HackMud<\/em>\u00a0is to behave like a hacker. That means whiling away the hours tethered to the command-line prompt, writing and editing your own scripts and programs and running other people&#8217;s code when you don&#8217;t know how or can&#8217;t be bothered doing something the hard way. Everything except for a few key system commands is player-authored, so there&#8217;s always a lingering question as to whether it&#8217;s worth the effort writing a new script or program or worth the risk of using an existing one.\u00a0<\/p>\n<p><img decoding=\"async\" alt=\"\" src=\"https:\/\/www.sickgamedev.win\/wp-content\/uploads\/2018\/02\/7-games-with-interesting-hacking-mechanics-all-devs-should-study.png\" \/><\/p>\n<p>Delay says that he had &#8220;a brief obsession&#8221; with the game. He praises its treatment of the issue of trust in hacking.\u00a0&#8220;You are constantly trying to ascertain how trustworthy a player or script is, and if they are actually going to steal all your cash (which happens often),&#8221; he explains.\u00a0&#8220;There are command line tools to determine how trustworthy a script is, but many of them are written by players as well. The game forces you into a world of hackers and has you fend for yourself. One typo and you can lose everything, especially as most of the &#8216;safe&#8217; system commands have nasty malware versions that share the same filename except with a single typo, which your client will happily run if you type the name wrongly.&#8221;<\/p>\n<p><strong><em>TAKEAWAY: In the real world, hackers often rely as much on trust and cooperation as on skill and collaboration \u2014 so why not make hacking mechanics in games work the same way?<\/em><\/strong><\/p>\n<h2><strong><em>Quadrilateral Cowboy<\/em><\/strong>\u00a0<strong>and<\/strong> <strong><em>Gunpoint\u00a0<\/em><\/strong>\u2014 <strong>hacking as a system<\/strong><\/h2>\n<p><em>Quadrilateral Cowboy<\/em>\u00a0ties its hacking systems into a computer-in-a-briefcase that can be used to control the environment \u2014 to switch off lights and open doors or operate lasers and rifles and more for player-specified spans of time (&#8220;door4.open(2)&#8221;, for instance, will open door 4 for 2 seconds).\u00a0Gubelman says that it does a great job of connecting the world and the typed hacking commands together through puzzles.<\/p>\n<p><img decoding=\"async\" alt=\"\" src=\"https:\/\/www.sickgamedev.win\/wp-content\/uploads\/2018\/02\/7-games-with-interesting-hacking-mechanics-all-devs-should-study-4.jpg\" \/><\/p>\n<p>It&#8217;s a heist game in which the 3D environment is the puzzle(s) and this simple (but versatile!) hacking mechanic becomes almost like a toolbox. And it&#8217;s the detail afforded by this combination \u2014 the objects in the environment, each placed for narrative or gameplay purposes (or both), but also the precisely-timed sequences of commands and multi-character actions \u2014 that makes the game compelling.<\/p>\n<p>Gubelman also points to <em>Gunpoint<\/em>\u00a0as a fine example of hacking mechanics that connect a game&#8217;s world and its puzzles \u2014 thanks to a nifty gizmo that allows the player to manipulate the wiring of each level to activate elevators, overload light switches and power pockets, re-wire motion detectors, and so on. As in <em>Quadrilateral Cowboy<\/em>, these actions don&#8217;t merely forge a path; they also affect the behavior of other characters and objects. The hacking here is not a parlor trick or an isolated puzzle, but rather a core system that can be played with for sometimes-unexpected environmental consequences.<\/p>\n<p><strong><em>TAKEAWAY: Even in games with free character movement around an environment, hacking mechanics are more compelling if they work in concert with other systems to produce emergent situations.<\/em><\/strong><\/p>\n<h2><strong><em>Bioshock<\/em><\/strong>\u00a0\u2014 <strong>hacking abstracted from reality<\/strong><\/h2>\n<p>Knight points out that hacking mechanics need not be in any way realistic. &#8220;If it&#8217;s something far-flung or fantastical,&#8221; he explains, &#8220;a mini-game makes sense as a way to abstract it entirely.&#8221; In something like the <em>Deus Ex<\/em>\u00a0games, for instance, the Internet as we know it has been transformed into something more akin to the worlds of Neal Stephenson&#8217;s <em>Snow Crash<\/em>\u00a0and William Gibson&#8217;s\u00a0<em>Neuromancer<\/em>. Its conception of technology and networking is already abstract, so the &#8220;hacking&#8221; can be almost anything.<\/p>\n<p>&#8220;You could turn it into a turn-based RPG and it would still make sense that you&#8217;re not port sniffing or running buffer overflows or whatever,&#8221; says Knight. &#8220;<em>Bioshock<\/em> essentially does the same thing with their clone of <em>Pipe Dream<\/em>. In both cases, the player is not a hacker. They can hack,\u00a0but it&#8217;s a skill to learn for a hero that is usually a clean-slate. A mini-game to master hacking becomes a skill to optimize just as combat and exploration do.&#8221;<\/p>\n<p><strong><em>TAKEAWAY: The further a game is from a current day real-world setting, the more freedom you have to make your hacking mechanics unlike real hacking \u2014 and you might even be better off making it something completely abstracted away from real hacking.<\/em><\/strong><\/p>\n<h2><strong>Press X to hack<\/strong><\/h2>\n<p>Knight also points out that sometimes when hacking is thematically appropriate it need not necessarily be implemented in a game mechanic. &#8220;If you&#8217;re doing something heroic, or rather too easily within the skill of the player, it makes sense not to apply gameplay to hacking at all,&#8221; he explains.\u00a0<\/p>\n<p>In <em>Hitman<\/em>\u00a0(2016), for instance, the player controls an elite and highly-trained assassin, which Knight suggests makes it perfectly logical that a player to press X to hack a computer or fly a helicopter \u2014 he&#8217;s an expert for whom such acts would be trivial and straightforward. And that then leaves the designers more time to focus on the parts where he is actually at risk \u2014 the core part of his job: maintaining cover and assassinating his targets.<\/p>\n<p>Whether it&#8217;s a plot contrivance, as in this <em>Hitman<\/em> example, or a core mechanic like in most of the games listed here, or anywhere in between, hacking mechanics executed well can offer both a refreshingly non-violent way to get things done and an intellectual challenge that leaves successful players feeling like geniuses. But take care if\/when using them, especially if it&#8217;s not as a core mechanic, as the line between too complex and too simple may be aggravatingly small.<\/p>\n<p><em>Thanks to Richard Knight, Sean Gubelman, Chris Delay, and Brendon Chung for their help putting this list together<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Games have immense capacity to make us feel cool or smart or highly capable \u2014 or all three at the same time. And few things can pull that off quite like a great hacking mechanic. These days hacking is more topical than ever,\u00a0and for anyone making a game that even flirts with the implications of [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":12964,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[20],"tags":[],"class_list":["post-12963","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news"],"_links":{"self":[{"href":"https:\/\/sickgaming.net\/blog\/wp-json\/wp\/v2\/posts\/12963","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sickgaming.net\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sickgaming.net\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sickgaming.net\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/sickgaming.net\/blog\/wp-json\/wp\/v2\/comments?post=12963"}],"version-history":[{"count":0,"href":"https:\/\/sickgaming.net\/blog\/wp-json\/wp\/v2\/posts\/12963\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/sickgaming.net\/blog\/wp-json\/wp\/v2\/media\/12964"}],"wp:attachment":[{"href":"https:\/\/sickgaming.net\/blog\/wp-json\/wp\/v2\/media?parent=12963"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sickgaming.net\/blog\/wp-json\/wp\/v2\/categories?post=12963"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sickgaming.net\/blog\/wp-json\/wp\/v2\/tags?post=12963"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}