Feeds
80%
Infinity Blade

Infinity Blade

Is the iDevice fantasy fighter as sharp as it's claimed to be?

  • alert
  • submit to reddit

High performance access to file storage

Passed from father to son

And here we come to Infinity Blade's novelty: you come back, not, in true, illogical videogame fashion, as yourself, but as your own revenge-seeking offspring. You killled my paw and so forth.

Infinity Blade

'If you look to your right, you'll see the famous the Bloody Tower, built by Sir Hengist in the Fifth Century'

Some 20 years on - during which time the God King has kindly returned your old man's kit to your sole surviving parent, and you've trained yourself up to dad's level - and you're ready to have a go yourself, for the honour of the family.

The castle remains entirely unchanged during the intervening years - the weather's no different either - and its new guardians patrol the same areas as their late predecessors did.

Here we encounter what is Infinity Blade's chief disappointment: stunning the castle may look, but there's not very much of it, and you're destined to tread the very same ground over and over again. Your feet are on rails, and there's only one junction: do you go straight into the main hall or up a set of stairs to the right? The latter give you a couple more baddies to bash but still takes you to the room behind the main door.

There's no exploration here, unless you count glancing around at ever stop to look for bags of gold, treasure chests and vials of health-boosting balm that the God King has carelessly left lying around.

Infinity Blade

The Bridge of Scythes

So beyond building your experience level, choosing and using weapons, armour and magical rings, there less role-playing here than there is running around as the Master Chief in Halo. Infinity Blade is less RPG, more 3D fantasy Street Fighter, so you walk from bout to bout.

High performance access to file storage

More from The Register

next story
Samsung Galaxy S5 fingerprint scanner hacked in just 4 DAYS
Sammy's newbie cooked slower than iPhone, also costs more to build
Microsoft lobs pre-release Windows Phone 8.1 at devs who dare
App makers can load it before anyone else, but if they do they're stuck with it
Feast your PUNY eyes on highest resolution phone display EVER
Too much pixel dust for your strained eyeballs to handle
Report: Apple seeking to raise iPhone 6 price by a HUNDRED BUCKS
'Well, that 5c experiment didn't go so well – let's try the other direction'
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Nvidia gamers hit trifecta with driver, optimizer, and mobile upgrades
Li'l Shield moves up to Android 4.4.2 KitKat, GameStream comes to notebooks
AMD unveils Godzilla's graphics card – 'the world's fastest, period'
The Radeon R9 295X2: Water-cooled, 5,632 stream processors, 11.5TFLOPS
Sony battery recall as VAIO goes out with a bang, not a whimper
The perils of having Panasonic as a partner
NORKS' own smartmobe pegged as Chinese landfill Android
Fake kit in the hermit kingdom? That's just Kim Jong-un-believable!
Gimme a high S5: Samsung Galaxy S5 puts substance over style
Biometrics and kid-friendly mode in back-to-basics blockbuster
prev story

Whitepapers

Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
HP ArcSight ESM solution helps Finansbank
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.