I'm a solo independent game developer working out of Boston. My goal is to make competitive multiplayer games that allow players to make interesting and meaningful strategic decisions. I like trying to create experiences that are simple up-front but have huge amounts of challenge and complexity embedded within the systems. I'm the creator of the iOS digital board game New World Colony and am currently working on a multiplayer hacking game called PWN.

Comment History
82apps
82apps - - 6 comments @ Disco Dodgeball

You can get it from Steam Early Access: Store.steampowered.com

Good karma+1 vote
82apps
82apps - - 6 comments @ PWN - Combat Hacking

Definitely will! On the PC I can have larger maps, hotkeys for the hacking powers, and more sophisticated networked multiplayer. Could be lots of fun.

Good karma+2 votes
82apps
82apps - - 6 comments @ Character Profile - Phantom

Phantom is an extremely reclusive hacker that is a master of electronic espionage. He is hired by private corporations as well as various political entities to covertly sneak into and recover valuable data from a wide array of targets. He is believed to control private access paths into virtually every corner of the internet. His actions have earned him a number of extremely powerful enemies, and as such is forced to live his life on the run, hopping between hidden access terminals on a regular basis.

Good karma+1 vote
82apps
82apps - - 6 comments @ Power - Encrypt

Encryption is a special ability that you can use to defend your network nodes. By encrypting a node, you force your opponent to go through a short 'decryption' process before they can capture the node. As such, it can be used very effectively at high-traffic choke points to block off large sections of the network.

As an additional bonus, Encryption will also block the Spike attack from traveling through and disabling nodes or destroying your other boosts.

However, encryption has a weakness. It is only effective if the node is powered. If you can isolate encrypted nodes from the rest of the network, they will lose power and you can bypass the encryption and easily capture them.

Good karma+1 vote
82apps
82apps - - 6 comments @ Campaign

This is an example of a campaign map. The player starts out on the left side, without any special powers. Each node represents a battle they have to win in order to progress. The 'special power' nodes are battles against individual characters, after which they'll earn that character's ability. So by the end of the campaign, the player will have conquered all the other hackers and earned their abilities. There's a few branching paths that give the player a few options in terms of how they want to progress. Once all powers have been unlocked, the player will be able to enter the tournament mode using that character.

Good karma+1 vote
82apps
82apps - - 6 comments @ A live match of PWN at the Boston Festival of Indi

These two players are competing against each other via bluetooth to take over a three-dimensional structured network of nodes. During the game they're sending viruses at each other's devices, encrypting nodes, and sending 'spikes' which temporarily disable the opponent's network.

Good karma+1 vote