“Untrusted” Overview and Opinion

Malware curiosity or simply an urge to delve into a hacking or heist simulation that involves more than simple “wash, rinse, repeat” types of routines – this is no typo on the scoreboard of such strategy turned based gems new to the world. On 5/9/21, EvolvedLabs dropped a release of a surprisingly cost free title, “Untrusted” This not only involve technique, upgrades earned by experience and diligent scrutiny to detail, but communication also plays a hefty role in this good vs. bad guys cyber bout.

The two above images reveal every possible occupancy/role involved in each match.

Each match will be between 10-16 online players and will always consist of two agents (One head, one field, but with chances for diplomatic bribes to turn criminals onto their side on occasion) and a variety of different types of hackers, dirty law enforcement, bodyguards, intermediate blackhatters and even journalists to take part in the quest to capture the full grid of nodes and servers before the 9 day limit is up.

As seen in the top row labeled “Target Network Topology,” the goal for the hacking team is to get the majority (if not all) nodes and servers tapped into and remotely taken over from left to right before the time is up. The hacker group is a notorious Blackhat group named “NETSEC.” The Federal Agent side will have to take every precaution in terms of staking hideouts based on electronic communication surveillance, targeted arrests, cyber fortification (DDOS preventers, log jammers, kiddie script tools to throw hackers off, etc.) and other kinds of ways of getting information like interrogations and stings.

From the Field Agent’s perspective, this is your database to keep in touch with your teammate and whoever else may be persuaded to cross over.

Above is the interface that all criminals will use to carry out the operation but is perfectly accessible by Agents as well.
This is a standard node log. Even without requesting information, people on both sides can observe who pounced onto the IP address in question by turn so if privy people can guess who’s who.
Above are what logs on a tapped node or server look like. This can be best used to figure out which perpetrator infiltrated most recently, and how they may either be a capture-able suspect or how they may lead to greater wells of information.
Above is a Field Agents’ log scrambler. This often doesn’t serve much of a purpose but can throw off criminals who further digitally travel through without being able to see which player is the shark in the water.
When gaining more heavy access towards progress throughout the match and keeping more closely in touch with team leaders who pile this information together, this is what an event log looks like.
This is the final result of my sample match. The game is over when either all nodes and servers have been hacked into, or whenever the criminals all get either arrested or killed within the 9 day limit.

As far as intricacy goes I was really blown away by this by the fact that it’s absolutely free on Steam. If I could make a tweak or two personally I’d probably add in more of a whitehat influence rather than two Agents who would likely go absolutely insane if such were a real life situation. Definitely worth the time of checking out and getting a hang on the evolution of each match and seasons to follow. 8.5/10

Leave a Reply

Discover more from McZeusifer's Post Bytes

Subscribe now to keep reading and get access to the full archive.

Continue reading