The Breach Setup & Rules
The Breach is a competitive Sci-Fi Net Crawler game with miniatures, where Breachers, intriguing digital rebels, try to steal secret information and complete their own goal.
In this video Mike takes you through everything you need to know to hack into the database and steal the data!
Kickstarter Campaign: https://bit.ly/Breach-LMS
Planet Earth... the end of the 21st century: the Achab Corporation influences and dominates the globe using outstanding technologies, obtained via access to Gene.sys, a secret database of unknown origin which has turned out to be a mine of information and knowledge. However, the Corporation is not the only entity that wants to obtain these secrets: the Breachers are expert hackers, capable of connecting to Gene.sys in order to steal information and increase the power and prestige of their faction. A.R.M. (the Achab Remote Mind) security system, a sophisticated artificial intelligence developed by Achab engineers, proactively detects and fights against each intrusion attempt to Gene.sys, but it seems that something is going wrong with it...
RSP on Patreon: www.patreon.com/ReadySteadyPlay
Notes: At 30:30, when you steal an Information token from the Database, after you remove your virus tokens (either 2 for partial or 4 from full), you then place one of your virus tokens into the now empty node space. It remains there for the remainder of the game. This is important if the game asks you to reference control of a node.
Chapters:
00:00 - Thematic Introduction
00:57 - Introduction
01:37 - Components
01:44 - Components - Main Game
03:18 - Components - Player
04:02 - Setup
04:34 - Setup - Players
06:53 - Setup - Database
08:55 - Setup - Firewall
11:19 - Gameplay
12:12 - Gameplay - Overview
12:50 - Gameplay - Goal
14:34 - Gameplay - Connecting to the Database
15:08 - Gameplay - Disconnecting and Reconnecting
17:16 - Gameplay - Breacher’s Turn
18:15 - Gameplay - Breacher’s Turn - Skills & Effectiveness
20:07 - Gameplay - Breacher’s Turn - Move Action
21:44 - Gameplay - Breacher’s Turn - Attack Action
24:31 - Gameplay - Breacher’s Turn - Screen Action
25:14 - Gameplay - Breacher’s Turn - Configure Action
26:01 - Gameplay - Breacher’s Turn - Upgrade Action and Cheats
28:23 - Gameplay - Breacher’s Turn - Disconnect
28:32 - Gameplay - Breacher’s Turn - Infect
29:59 - Gameplay - Breacher’s Turn - Net Phase
30:54 - Gameplay - Breacher’s Turn - Malware Cards
32:00 - Gameplay - Breacher’s Turn - Reward Cards
32:39 - Gameplay - Firewall Board & Turn
34:58 - Gameplay - Firewall Turn - ICE Deployment Tracks
36:08 - Gameplay - Firewall Turn - Guardian Deployment
37:24 - Gameplay - Firewall Turn - Guardian Stage B
38:32 - Room Effects
39:19 - Randomised Database Setup
40:13 - End