Feeds
75%
Infinity Blade iOS game icon

Infinity Blade II

In need of a quick slash?

  • alert
  • submit to reddit

Choosing a cloud hosting partner with confidence

iGamer I liked the original Infinity Blade when it arrived just over a year ago, but it seemed to fall short of classic status due to the repetitive nature of the combat, the rigidly linear exploration and threadbare fantasy storyline.

This sequel does try to add a bit more variety to the formula, although I still found the continuous conveyor belt of demonic foes a tad tedious at times.

I was also a little miffed at the price increase: £4.99, compared to £3.99 for the original. And I’m no great fan of games that tempt you with in-app purchases for weapons and other items either – although, to be fair, you can still get by perfectly well without having to cough up extra cash for the Super Sword Of Thumping+3.

Infinity Blade iOS game icon

Blinded by the light: optical effects abound in IB II

The original Infinity Blade looked wonderful, and Infinity Blade II goes even further thanks to the A5 processor in the latest iPhone and iPad.

Developer Chair has really gone to town with the lighting effects, with endless shafts of light streaming through foliage and epic vistas with castles perched on craggy mountaintops.

Infinity Blade iOS game screenshot

The swipe'n'slash combat remains - but with a few new twists

In fact, it got so carried away with the lens-flare effects that there were times when I felt I needed sunglasses to go into combat.

And why is there lens flare anyway? Do games developers only see the real world through a camera's optics? My eyes certainly don't bring their own Photoshop filters with them.

Infinity Blade iOS game screenshot

You can now use two-handed hardware

The storyline follows straight on from the original game. You've wrested control of the mighty Infinity Blade sword from the God King and now you're heading off in search of the mysterious Worker of Secrets for some reason that I didn’t entirely understand.

Fortunately, there’s a tie-in paperback advertised within the game to shed some light on the finer details of the plot. And a soundtrack album too.

Ker-ching!

Beginner's guide to SSL certificates

Next page: Fight is right

More from The Register

next story
Ex-US Navy fighter pilot MIT prof: Drones beat humans - I should know
'Missy' Cummings on UAVs, smartcars and dying from boredom
Don't wait for that big iPad, order a NEXUS 9 instead, industry little bird says
Google said to debut next big slab, Android L ahead of Apple event
Xperia Z3: Crikey, Sony – ANOTHER flagship phondleslab?
The Fourth Amendment... and it IS better
Netscape Navigator - the browser that started it all - turns 20
It was 20 years ago today, Marc Andreeesen taught the band to play
A drone of one's own: Reg buyers' guide for UAV fanciers
Hardware: Check. Software: Huh? Licence: Licence...?
The Apple launch AS IT HAPPENED: Totally SERIOUS coverage, not for haters
Fandroids, Windows Phone fringe-oids – you wouldn't understand
Apple SILENCES Bose, YANKS headphones from stores
The, er, Beats go on after noise-cancelling spat
Here's your chance to buy an ancient, working APPLE ONE
Warning: Likely to cost a lot even for a Mac
prev story

Whitepapers

Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
Cloud and hybrid-cloud data protection for VMware
Learn how quick and easy it is to configure backups and perform restores for VMware environments.
Three 1TB solid state scorchers up for grabs
Big SSDs can be expensive but think big and think free because you could be the lucky winner of one of three 1TB Samsung SSD 840 EVO drives that we’re giving away worth over £300 apiece.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.