The Breach Setup & Rules

Subscribers:
9,270
Published on ● Video Link: https://www.youtube.com/watch?v=Kjc8ucqZBJM



Duration: 40:55
580 views
29


The Breach is a competitive Sci-Fi Net Crawler game with miniatures, where Breachers, intriguing digital rebels, try to steal secret information and complete their own goal.

In this video Mike takes you through everything you need to know to hack into the database and steal the data!

Kickstarter Campaign: https://bit.ly/Breach-LMS

Planet Earth... the end of the 21st century: the Achab Corporation influences and dominates the globe using outstanding technologies, obtained via access to Gene.sys, a secret database of unknown origin which has turned out to be a mine of information and knowledge. However, the Corporation is not the only entity that wants to obtain these secrets: the Breachers are expert hackers, capable of connecting to Gene.sys in order to steal information and increase the power and prestige of their faction. A.R.M. (the Achab Remote Mind) security system, a sophisticated artificial intelligence developed by Achab engineers, proactively detects and fights against each intrusion attempt to Gene.sys, but it seems that something is going wrong with it...

RSP on Patreon: www.patreon.com/ReadySteadyPlay

Notes: At 30:30, when you steal an Information token from the Database, after you remove your virus tokens (either 2 for partial or 4 from full), you then place one of your virus tokens into the now empty node space. It remains there for the remainder of the game. This is important if the game asks you to reference control of a node.

Chapters:
00:00 - Thematic Introduction
00:57 - Introduction
01:37 - Components
01:44 - Components - Main Game
03:18 - Components - Player
04:02 - Setup
04:34 - Setup - Players
06:53 - Setup - Database
08:55 - Setup - Firewall
11:19 - Gameplay
12:12 - Gameplay - Overview
12:50 - Gameplay - Goal
14:34 - Gameplay - Connecting to the Database
15:08 - Gameplay - Disconnecting and Reconnecting
17:16 - Gameplay - Breacher’s Turn
18:15 - Gameplay - Breacher’s Turn - Skills & Effectiveness
20:07 - Gameplay - Breacher’s Turn - Move Action
21:44 - Gameplay - Breacher’s Turn - Attack Action
24:31 - Gameplay - Breacher’s Turn - Screen Action
25:14 - Gameplay - Breacher’s Turn - Configure Action
26:01 - Gameplay - Breacher’s Turn - Upgrade Action and Cheats
28:23 - Gameplay - Breacher’s Turn - Disconnect
28:32 - Gameplay - Breacher’s Turn - Infect
29:59 - Gameplay - Breacher’s Turn - Net Phase
30:54 - Gameplay - Breacher’s Turn - Malware Cards
32:00 - Gameplay - Breacher’s Turn - Reward Cards
32:39 - Gameplay - Firewall Board & Turn
34:58 - Gameplay - Firewall Turn - ICE Deployment Tracks
36:08 - Gameplay - Firewall Turn - Guardian Deployment
37:24 - Gameplay - Firewall Turn - Guardian Stage B
38:32 - Room Effects
39:19 - Randomised Database Setup
40:13 - End







Tags:
rules
explanation
RSP
Ready
Steady
Play
Lets
Let's
Michael Dennis
Board Games
Board
Game
London
Session
Let's play
lets play
playthrough
how to play
rules explanation
entertainment
funny
banter
setup and rules
game
board
Board Game
gameplay
live
online
board game play
series
board game gameplay
review
opinion
the breach
breach
ludus magnus studio
lms
ks
kickstarter
cyber
cyberpunk
netrunner
miniatures
net crawler
crawler
breacher
avatar
campaign
scifi
competitive