Hacker Protocol is very important (although somewhat controversial) in the game of Mindnight. When 2 or more hackers find themselves in a node together, they must know who should hack, and who should secure. Using hacker protocol is how we do this!
Want to help the channel? Consider donating through Patreon:
Patreon:
Thank you all for watching! If you enjoyed this video please leave a like, share, or comment! Feel Free to Check out the Links Below!
Connect With Me!
Twitch:
Twitter:
Email: skimmmilk131@gmail.com
Outro Song –
Nguồn: https://benhnamkhoa.com.vn/
Xem thêm bài viết khác: https://benhnamkhoa.com.vn/game/
What is meta? I do not understand.
in the past rule 3 don't even exist and people use gut feelings
“I don’t wanna be too talkative” continues to be the one talking 90% of the time
To be fair Rule 3 is kind of iffy and the devs try to stop the spread of it, but the rest idk how people don’t know lol
I've heard about 5 or so variations of rule 3.
1 and 2 are always the same, and in that order. (though some disregard rule 2)
rule 3 normally goes like this,
1. counter clockwise from starting player
2. clockwise from starting player
3. person with name coming first alphabetically
4. person with name coming last alphabetically (annoying since it contradicts #3)
5. person closest to those who propped (this one can be really weird though, as sometimes the do it clockwise/counter from the propper)
6. I know there's another one I've heard but I can't remember it ATM, if I do I might edit this
comment other rule 3's you've heard, because there's quite a few.
edit 1: fixing a couple typos/grammar
Fvrron in game here-
To explain some of my stupid actions, this was very early in the morning for me. I had heard 3rd rule only once, and could not recall during the game. I was hoping Skimm would pick up that i wanted him to hack, but he wouldn't break protocol. I also failed at skimmreading him so that sucks also lol
hi. i always hack n1, never bluff.
i also hate meta.
You should make a video where you explain the complete protocol of the game to spread the information, or at least put it in the description of this one.
Skimm, protocol 3 has 3 variations
Ccw, cw, and closest.
The so called protocol, (which is not an actual thing, just us community members making it up)
1. Hack when solo in node.
2. Proposer hacks when 2 hackers.
3. Hacker who hacked already always hacks, the others don't (5p game).
4. If both of you haven't hacked, don't hack. If the other guy doesn't know protocol, it's usually safe for you to hack because they're afraid of a double and will secure. Depends on how active they are.
Some "non-legit" protocols:
1. You and your buddy get put in a node. Whoever is closer to the proposer hacks, OR ccw like skimm said, OR cw like some people. This is not specified for everyone, different people have different versions (out of these 3).
2. If your buddy is playing aggressive, play passive. If double, your buddy will hack, you secure. And vice versa.
Keep in mind, these are all not real tactics and only those some made up for themselves and their communities. No Moon games do not actually support these tactics and you will be suspected as a hacker if you bring this up.
How do you never know peoples levels when youre doing custom games?? They dont show you?
When you've never played this game before, but know all the meta, hammer, protocall and techniques from watching Skimm.
this was probably not a good first video to watch for this game. i am so confused, and kinda frustrated by all the passing and talking and not actually ever doing anything
This is the first time I've ever seen this game and it looks very, very, interesting!
This is interesting to hear your take on protocol
Because from what I understand rule 1 and 2 are the same as what u said
But rule 3 gets muddied and everyone seems to have there own take on it
For example I’ve always understood that who ever is Closest to the propper hacks.
Meaning n2 you should have hacked. Where node 3 fvrron should have
This is the first time that I have heard of the protocol. I always knew it existed since people talk about it, but I never knew what it was. I dunno if there was a video where skimm explained it that I didn't watch, but now I finally know what the protocol is! Yaay~~
Skimm: "consistant"
Everyone: "It's Skimm." 😉
thorn of lies? lol i know its throne of lies. but still…
whats the point of rule 1 and 2? only using rule 3 would be simpler
What do you have to say about the town of Salem data breach? Bmg has lied multiple times, I want to hear your opinion.
Perfect switched names, though. Zach was led and led was zach. Fvrron was allyn and allyn was fvrron. Kretle was skimm and skimm was kretle.
Plus, they're perfect horizontally aligned (left and right).
That's nice 😀