1.  
  2.                         ─────────────────────────────
  3.                            ▀▀▀▀█ ▀▀▀▀▀ █▄  █ █▀▀▀█
  4.                            █   █   █   █ ▀▄█ █   █
  5.                            ▀▀▀▀▀ ▀▀▀▀▀ ▀   ▀ ▀▀▀▀▀
  6.        
  7.                         █▀▀▀█ █▄ ▄█ ▀▀▀▀▀ ▀▀▀▀▀ █▀▀▀▀
  8.                         █▀▀▀▄  ▀█▀    █   ▀▀▀   ▀▀▀▀█
  9.                         ▀▀▀▀▀   ▀     ▀   ▀▀▀▀▀ ▀▀▀▀▀
  10.                         ─────────────────────────────
  11.                         P   R   E   S   E   N   T   S
  12.                         ─────────────────────────────
  13. ┌─────────────────────────────────────────────────────────────────────────────┐
  14. │                    Midnight Protocol v1.3.1                              │
  15. └─────────────────────────────────────────────────────────────────────────────┘
  16. ┌─────────────────────────────────────────────────────────────────────────────┐
  17. │ PUBLISHER: LuGus Studios / Iceberg Interactive                              │
  18. │ GENRE    : Strategy                                                         │
  19. │ DATE     : 2022/08                                                          │
  20. └─────────────────────────────────────────────────────────────────────────────┘
  21.  
  22.  You assume the mantle of a prominent hacktivist, ّDataْ, who recently got
  23.  doxxed and has been targeted for blackmail by a shadowy branch of government.
  24.  You interact with the virtual environment through your home terminal that
  25.  requires nothing more than your keyboard.
  26.  > HANG YOUR [H]AT
  27.  Will you respect othersْ privacy and bank accounts, or leave no stone
  28.  unturned? Midnight Protocol allows you to play as the hacker you want to be.
  29.  Help the police track down a rogue hacker, or blackmail a desperate husband
  30.  trying to recoverà dubious pictures. Gain black, grey, and white hat
  31.  reputation to change the direction of the story based on your choices.
  32.  > I[M]MERSION OVERLOAD
  33.  Midnight Protocolْs design focuses on immersing you in a world of digital
  34.  warfare without complicated hacking mechanics. Your keyboard is your weapon,
  35.  type commands to eliminate or evade security programs, letting your
  36.  keystrokes become part of the soundtrack.
  37.  > NICE [D]ECK
  38.  Cracking a digital safe or extracting classified data requires careful
  39.  planning. Pay the troll toll, use digital jackhammers, cloaks, and daggers
  40.  to combat cybersecurity. Buy new programs or hardware on the black market,
  41.  and customize your deck to fit your playstyle.
  42.  > DI[S]TRACTIONS ABOUND
  43.  Take on dozens of sidequests filled with easter eggs and references, gather
  44.  additional intel on your targets before you start a mission, and play some
  45.  hacker chess to wind down. Midnight Protocol is jam-packed with optional
  46.  missions, providing hours of additional content.
  47.  
  48.  
  49.  
  50.  HOW TO INSTALL?
  51.  Unrar, mount, install.
  52.  
  53.  
  54. ┌─────────────────────────────────────────────────────────────────────────────┐
  55. │                      THANKS FOR CHOOSING THE DINOBYTES.                     │
  56. │           MANY MORE DINO-FRESH RELEASES WILL FOLLOW SOON, WE HOPE.          │
  57. └─────────────────────────────────────────────────────────────────────────────┘