Feeds
85%
Limbo

Limbo

Left in the shade

  • alert
  • submit to reddit

High performance access to file storage

A diminutive shadow boy walking through a monochrome world

Stylistically, Limbo is hauntingly beautiful Art House, favouring interpretation over lucidity. No story or explanation guides your journey. You're just a diminutive shadow boy walking through a foreboding, gloomy, monochrome world - silent but for occasional discordant orchestral notes and the ominous hum of far-off industrial machinery. It's a dangerous place where those age-old gaming conventions help navigate its pitfalls and puzzles. And where only curiosity and a vague hope of salvation compel your continued progress.

Limbo

Banks can be helpful after all

Everything prevents your safe passage. Water is an ever-present danger for a shadow boy who can't swim, precipices for one who can't fly. Spiked pits and bear traps await mistimed jumps in the early forest level. And later, in the game's industrial setting, electrified floors, circular saws, machine presses and rapid-firing nails guns all kill in an instant.

But inanimate objects are Limbo's least unsettling hazards. Among the mist and pines of its forest lurk giant spiders, mind-controlling glowworms and - creepiest of all - a malevolent clan of eyeless shadow children, reminiscent of Lord of the Flies' biguns, who lure you on towards their mortal traps.

Its ability to disturb is not limited to hazards alone. The squelching and oozing as you pull the last leg from a dying spider might churn a stomach or two, but it's nowhere near as harrowing as the sight of another shadow boy wading calmly into a pool of water, bowing down his head and drowning himself.

Limbo

Hanging out with the shadows

Each of your own shadow boy's deaths is, like the suicidal boy's, exquisitely animated and disturbingly silent. All too resigned to his fate, he doesn't so much as whimper as inky blood spurts from his dismembered remains, or as the light of his eyes flickers and fades from his pulverised body.

High performance access to file storage

More from The Register

next story
Video games make you NASTY AND VIOLENT
Especially if you are bad at them and keep losing
Report: Apple seeking to raise iPhone 6 price by a HUNDRED BUCKS
'Well, that 5c experiment didn't go so well – let's try the other direction'
Nvidia gamers hit trifecta with driver, optimizer, and mobile upgrades
Li'l Shield moves up to Android 4.4.2 KitKat, GameStream comes to notebooks
Gimme a high S5: Samsung Galaxy S5 puts substance over style
Biometrics and kid-friendly mode in back-to-basics blockbuster
Dell Wyse Cloud Connect: Pocket Android desktop
Ultrathin client with a lot of baggage. The upside? It's a rogue sysadmin's delight
AMD unveils Godzilla's graphics card – 'the world's fastest, period'
The Radeon R9 295X2: Water-cooled, 5,632 stream processors, 11.5TFLOPS
Sony battery recall as VAIO goes out with a bang, not a whimper
The perils of having Panasonic as a partner
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
NORKS' own smartmobe pegged as Chinese landfill Android
Fake kit in the hermit kingdom? That's just Kim Jong-un-believable!
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.