Feeds
80%
Infinity Blade

Infinity Blade

Is the iDevice fantasy fighter as sharp as it's claimed to be?

  • alert
  • submit to reddit

SANS - Survey on application security programs

Passed from father to son

And here we come to Infinity Blade's novelty: you come back, not, in true, illogical videogame fashion, as yourself, but as your own revenge-seeking offspring. You killled my paw and so forth.

Infinity Blade

'If you look to your right, you'll see the famous the Bloody Tower, built by Sir Hengist in the Fifth Century'

Some 20 years on - during which time the God King has kindly returned your old man's kit to your sole surviving parent, and you've trained yourself up to dad's level - and you're ready to have a go yourself, for the honour of the family.

The castle remains entirely unchanged during the intervening years - the weather's no different either - and its new guardians patrol the same areas as their late predecessors did.

Here we encounter what is Infinity Blade's chief disappointment: stunning the castle may look, but there's not very much of it, and you're destined to tread the very same ground over and over again. Your feet are on rails, and there's only one junction: do you go straight into the main hall or up a set of stairs to the right? The latter give you a couple more baddies to bash but still takes you to the room behind the main door.

There's no exploration here, unless you count glancing around at ever stop to look for bags of gold, treasure chests and vials of health-boosting balm that the God King has carelessly left lying around.

Infinity Blade

The Bridge of Scythes

So beyond building your experience level, choosing and using weapons, armour and magical rings, there less role-playing here than there is running around as the Master Chief in Halo. Infinity Blade is less RPG, more 3D fantasy Street Fighter, so you walk from bout to bout.

Combat fraud and increase customer satisfaction

More from The Register

next story
WTF happened to Pac-Man?
In his thirties and still afraid of ghosts
Reg man builds smart home rig, gains SUPREME CONTROL of DOMAIN – Pics
LightwaveRF and Arduino: Bright ideas for dim DIYers
Leaked pics show EMBIGGENED iPhone 6 screen
Fat-fingered fanbois rejoice over Chinternet snaps
Microsoft signs Motorola to Android patent pact – no, not THAT Motorola
The part that Google never got will play ball with Redmond
Apple patent LOCKS drivers out of their OWN PHONES
I'm sorry Dave, I'm afraid I can't let you text that
Happy 25th birthday, Game Boy!
Monochrome handset ushered in modern mobile gaming era
Slip your finger in this ring and unlock your backdoor, phone, etc
Take a look at this new NFC jewellery – why, what were you thinking of?
Rounded corners? Pah! Amazon's '3D phone has eye-tracking tech'
Now THAT'S what we call a proper new feature
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
prev story

Whitepapers

Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.