• Microsoft fait de l’Europe un bastion prioritaire de sa stratégie de cybersécurité

    Microsoft a annoncé à Berlin, en Allemagne, le lancement d'un nouveau programme dédié à la sécurité informatique, le European Security Program....
    #microsoft #fait #leurope #bastion #prioritaire
    Microsoft fait de l’Europe un bastion prioritaire de sa stratégie de cybersécurité
    Microsoft a annoncé à Berlin, en Allemagne, le lancement d'un nouveau programme dédié à la sécurité informatique, le European Security Program.... #microsoft #fait #leurope #bastion #prioritaire
    WWW.USINE-DIGITALE.FR
    Microsoft fait de l’Europe un bastion prioritaire de sa stratégie de cybersécurité
    Microsoft a annoncé à Berlin, en Allemagne, le lancement d'un nouveau programme dédié à la sécurité informatique, le European Security Program....
    Like
    Love
    Wow
    Angry
    Sad
    351
    0 Σχόλια 0 Μοιράστηκε
  • I Spoke With Some of the Most Private People Online, and Here's What They Sacrifice

    How far would you go to keep yourself private online? There’s little doubt that advances in technology over the past three decades have eroded traditional concepts around privacy and security: It was once unthinkable to voluntarily invite big companies to track your every move and decision—now, we happily let them in exchange for the digital goods and services we rely on. Most people these days either tolerate these privacy intrusions or outright don’t care about them. But there’s a growing movement that believes it’s time to claim our privacy back. Some are working piecemeal, blocking trackers and reducing permissions where they can, while not totally ditching modern digital society as a whole. Others, however, are as hardcore as can be—a modern equivalent of "going off the grid."  We put out a call looking for the latter—people who are going to great lengths to protect their privacy in today’s mass surveillance world. We received a number of insightful, fascinating, and unique situations, but for this piece, I want to highlight four specific perspectives: "Ed," "Jane," "Mark," and "Jay."Ed is "ruthless" with app choices and permissionsThe first respondent, I’ll call Ed, since their privacy journey began with the Edward Snowden leaks: “I'd known something was likely up…as early as 2006I remember headlines about AT&T possibly spying, but high school me didn't take it too seriously at the time. The Snowden leaks, when I was in college, really opened my eyes. Ever since, I've taken steps to protect my privacy.”Ed says the biggest step they’ve taken towards a digitally private life has been their Proton account. If you’re not aware, Proton is a company that offers apps designed for privacy. Their email service, Proton Mail, is the most famous of the company’s products, but Proton makes other apps as well. Ed uses many of them, including Proton VPN, Proton Calendar, and Proton Drive. Ed pays for Proton Ultimate, which costs them nearly every two years. You don’t have to pay for Proton, but your experience is much more limited. That’s not totally dissimilar to Google’s offers, which gives you more features if you pay, but most people can definitely get by with a free Google Account. I'm not so sure the reverse is true. Speaking of Google, Ed does have a Google Account, but rarely logs into it. They don’t keep anything attached to it, however—Ed stores all files, for example, in Proton Drive or Tresoirt.Ed uses SimpleLogin for throwaway email addresses. That’s not just for the times Ed wants to avoid giving their email address to someone. According to them, they use an alias anytime an organization asks for their email, and frequently delete it when it’s no longer useful. Each online purchase gets its own alias, and that alias is deleted once the purchase is complete. Whenever Ed travels, they use an alias for any flights, hotels, and rental cars they use. Once the trip is up, they delete the alias. If one of those aliases receives a spam message, they delete it as well.Ed’s smartphone of choice is iPhone, and although Apple arguably has the best reputation for privacy in big tech, Ed is no fan: “Apple is no bastion of privacy of course, but they seem to be the least-worst of the big tech companies.” Ed doesn’t use iCloud for any backups: Any iPhone files are kept in Tresorit. That iPhone, of course, contains apps. But each app is there for a reason, and no app gets access to permissions unless it requires it: “I'm ruthless about apps and app permissions. If I'm not going to use the app regularly, I uninstall it. I grant only those permissions I think the app reasonably needs.” Ed protects his mobile internet traffic with Proton VPN, and only accesses the web via Firefox Focus, a special version of Firefox designed for privacy. Location services are always off on Ed’s iPhone, unless they’re using Apple Maps for navigation. Once they arrive at their destination, Ed disables location services again. They also have an interesting trick for getting back home without revealing their actual address:  “Additionally, when I'm navigating home, I don't enter my home address. I enter the address down the street just as an extra layer so I'm not entering my actual home address…I'll end navigation and turn off location while still driving…if I know the rest of the way home myself."Most of us deal regularlywith spam calls. Not Ed: They use the “Silence Unknown Callers” setting on iOS to send all numbers not in the Contacts app to voicemail. They then review all voicemails, and if they didn’t leave a message, they block the number. Our initial call out for this piece referenced how using a VPN can sometimes block incoming phone calls, but Ed isn’t bothered by that: “Since most calls these days are scams or telemarketing, and most people I do want to talk to aren't going to call me anyway, I see this as more of a feature than a bug.” For their desktop computing needs, Ed uses Windows. They admit they aren’t privacy experts when it comes to Microsoft’s OS, but they do what they can, including changing all privacy settings and uninstalling all programs they don’t use.They also run a clean version of Windows 11 after following Lifehacker’s guide. Firefox is their go-to PC browser, and they use a variety of extensions, including:ClearURLs: removes trackers from links.Decentraleyes: blocks data requests from third-party networks. Disconnect: blocks trackers from "thousands" of third-party sites.Firefox Multi-Account Containers: separates your browsing into siloed "containers" to isolate each session from one another.PopUpOFF: blocks pop-ups, overlays, and cookie alerts.Privacy Badger: blocks invisible trackers.Proton VPN: Proton's Firefox add-on for its VPN.uBlock Origin: popular content blocker.Ed didn’t say how much of an impact this array of extensions and settings has on their browsing, save for YouTube, which they admit does sometimes give them trouble. However, Ed has workarounds: “When YouTube wants me to 'sign in to confirm you're not a bot,' changing VPN servers usually does the trick.” Ed also uses the audible clues for ReCAPTCHA prompts, rather than the pictures, since they don’t want to help train Google’s “braindead AI.”Ed deleted all their social media accounts, including Facebook, X, Instagram, and LinkedIn. Though they’ve never had TikTok installed on their phone, they will watch it in Firefox when a friend sends them a video. Jane uses an open-source smartphone OS designed for privacyWhile Edward Snowden may have kicked off Ed’s interest in personal privacy, "Jane" has many strong beliefs motivating their desire for privacy. They are concerned about data brokers and Meta’s practices of tracking internet activity, and how these companies build profiles based on that data to sell to third-parties; they’re concerned about the possibility of telecommunication companies tracking our locations via cellular towers; they worry about US law enforcement and agencies reviewing citizens’ social media accounts accounts and tracking people. Their focus on privacy is fueled by true concern for their own well-being, not only the value of privacy as a concept.      Jane uses a VPN on all of their devices. Instead of Proton, however, Jane opts for Mullvad. They enable ad and tracker blocking, as well as a kill switch, which blocks your internet if you lose connection with the VPN—thus protecting your connection from being leaked out of the secure network.I’m a big advocate for strong and unique passwords and proper password management, but Jane definitely beats me when it comes to secure credentials. Jane uses six to eight-word passphrases generated by diceware, a tactic that chooses words based on dice rolls. Something like this diceware generator will roll a die five times, then find a word in a bank based on that five-digit number. You can repeat this as many times as you want to come up with a passphrase built up with random words. Jane saves all of their passphrases to a password manager, except for the ones for important accounts, like their bank. They commit those to memory, just in case someone breaches their password manager.     Like Ed, Jane uses Mullvad, but instead of just using their VPN, they opt for the web browser, which has those protections built in. Mullvad’s strict privacy settings break persistent logins on websites, so any sites Jane wants to stay logged in on are kept in Brave browser. For both Mullvad and Brave, Jane uses uBlock Origin.“From time-to-time I do run into sites that will block access due to being on a VPN or blocking ads and trackers. Instead of disablingVPN completely, switching my connection to one of Mullvad's rented servers instead of ones they own usually helps. Barring that, I occasionally go intoand temporarily whitelist a needed. This works for me to get around site blocks most of the time.”  Jane uses a Mac, and configured macOS based on various privacy guides. But instead of an iPhone, Jane opts for a Google Pixel. That might surprise readers who assumed hardcore privacy enthusiasts would break away from Google entirely. But X doesn’t run Android: Instead, they installed GrapheneOS on their Pixel, an open-source OS designed for privacy. Following a restart, Jane configured the Pixel to only unlock with a seven-word dice passphrase—for general use, they use a fingerprint scan and a six-digit PIN. If the don’t unlock their Pixel for a while, their phone automatically reboots to put it back into this “First Unlock” state. They also keep airplane mode on at all times to disable the phone’s radio communications, but maintain a wifi connection with timed automatic Bluetooth and wireless disabling. Jane also deleted all their social media accounts after downloading all data associated with those platforms.Mark uses phone and credit card masks“Mark” is perhaps the least hardcore of the respondents in this story, but that makes their experience both interesting and relatable. Unlike most of the people we spoke to, Mark is still on Facebook and Instagram. That’s due to their job, which requires them to be on the platform, but they’ve been “systematically” deleting everything they can over their 19-year Facebook history and saving the data to an external hard drive. Mark doesn’t follow anything that isn’t relevant to their job, and only uses Facebook and Instagram inside the DuckDuckGo browser. They don’t react to posts they see, and following their privacy tactics, Facebook doesn’t show them relevant ads anymore. “If there is an ad I'm actually interested in I'll search it up in a different browser rather than click it.”Mark has had four Google Accounts in their time online, and has deleted two so far. Like Facebook, they have to use Google for their job, but they delegate all their work to Chrome. All other browsing runs through Firefox, DuckDuckGo, or Tor. The latter is perhaps best known for being the browser of choice for browsing the dark web, but what makes it great for that is also what makes it a great choice for private browsing.Unlike others in this story, Mark hasn’t de-Googled themselves completely. In addition to using Chrome for work, Mark has a phone mask through Google, and has their contacts, calendar, and maps tied to the company—though they are moving away from Google as much as they can. They've been running through their old emails to find and delete outdated accounts they no longer use. Any accounts they do need now use an email mask that forwards to a Mailfence account, an encrypted email service.   Mark was the only respondent to talk about entertainment in relation to privacy: “I've also been switching to physical media over streaming, so buying CDs and DVDs, locally as much as possible. I'm lucky to have a local music store and a local bookstore...one of the owners of our bookstore wrote a book on how to resist Amazon and why. Any book I want, I can either order through them or on Alibris. For music, I use our local record store and Discogs.”When shopping online, Mark uses a credit card mask, but still uses the card itself when shopping in person. They want to start using a credit card mask in retail locations like Janet Vertesi, an associate professor of sociology at Princeton University, but they haven’t quite gotten there yet.   What really piqued my interest most about Mark, however, wasn’t their perspective on their own privacy concerns, but the concerns around the privacy of their kids: “They each have a Gmail, two of them have Snapchat. Their schools use Gaggle and Google to spy on them. I don't even know how to start disconnecting them from all this...I was a kid during the wild west of the internet and this feels like getting back to my roots. My kids are end users who understand apps and touchscreens, not torrenting their music or coding a basic website.I feel like Big Data has its grip on the kids already and I don't have a guidebook on navigating that as a parent.”  Mark’s current focus on their kids’ privacy includes deleting their health data from their local health system. That’s in part due to a data breach impacting the health system, but also the language about autism from Robert F. Kennedy Jr., the current Secretary of Health and Human Services.Jay de-googled their life and uses a VoIP phone number"Jay's" origin story with personal privacy dates back to 2017. That year, Equifax suffered a major hack, where nearly 148 million Americans had sensitive data stolen and weren’t notified about the breach for months. Jay was frustrated: You don’t choose to give your data to Equifax, or any credit bureau, and yet so many people lost their data. They also felt that companies were not properly held responsible for these events, and lawmakers were simply too out of touch to do what was necessary to protect citizens’ privacy, so they took it upon themselves to protect their own data. Ever since this incident, Jay freezes their credit: “It was frustratingly difficult back then, but nowadays, it is very easy...The freeze will not allow anyone to pull credit for large purchases in your name, even if they have your social security number. I decided I wanted to pursue some privacy for the things I do have a choice over.”  From here, Jay de-googled their life, including both Google Search as well as YouTube. They’ve found no issue with using alternative search engines, and, in fact, sees Google getting worse, as it tries to show you results based on what it thinks it knows about you, not what is most relevant to your actual query: “The internet was supposed to be a place you went to find information, not where you became the information that companies take instead."Jay uses tools to prevent fingerprinting, where companies identify you and track you across the internet, but worries that going too far with things like ad blockers puts a target on your back as well. Jay chooses to pick “a couple of effective tools,” and runs with those.For their smartphone needs, Jay goes with Apple. Like Ed, Jay doesn’t believe Apple is perfect, and even considers their privacy policies a bit of a gimmick, but sees them as the better alternative to Android. Jay likes the security of the App Store, and the array of privacy features in both Safari and Apple Accounts as a whole. They highlight Safari’s “Advanced Tracking and Fingerprinting Protection” feature, which helps block trackers as you browse the web; iCloud’s Private Relay, which hides your IP address; and “Hide My Email,” which generates email aliases you can share with others without giving your true email address away.Most of us are plagued with spam calls, but following the Robinhood data breach in 2021, Jay started receiving a flood of them. They decided to change their phone number and made a point of never sharing it with businesses. For the times they need to give out their number to parties they don’t trust, they use a number generated by My Sudo, which, for per year, gives them a VoIPphone number. It works with most services that rely on SMS, but it won’t function for two-factor authentication.My Sudo lets you change your number for an additional so if Jay’s number ever was compromised or started receiving too much spam, they could swap it.        Jay, like many respondents, deleted all social media services: “It has its place in society for a lot of people, and is no doubt a great way to connect. However, I found that the fear of deleting it was a lot worse than actually deleting it. The people you care about won’t forget you exist.” That said, Jay doesn't mind any of the obstacles this lifestyle does throw their way: “It is a challenging topic, as most people consider you a little bit 'out there' if you take steps to make your life a little less convenient, but more private. The modern world sells you convenience, while pretending it is free, and harvesting your data for so much more than you actually get out of your relationship to them.”      What it takes to be private on the modern internetThere's no one way to tackle personal privacy. Every one of the respondents to our query had something unique about their approach, and many had different motivations behind why they were so concerned about their privacy.There are plenty of common through lines, of course. Most privacy people love Proton, which makes sense. Proton seems to be the only company that offers a suite of apps most closely resembling Google's while also prioritizing privacy. If you want your email, calendar, word processor, and even your VPN all tied up nicely under one privacy-focused umbrella, that's Proton. But not everyone wants an ecosystem, either. That's why you see respondents using other VPNs, like Mullvad, or other private storage options, like Tresorit. These apps and services exist—they might just not be owned by one company, like Apple or Google.Google and Meta are more commonalities, in that most privacy enthusiasts ditch them entirely. Some, like Mark, haven't been able to fully shake off these data-hungry companies. In Mark's case, that's because they need these platforms for work. But while most hardcore privacy people delete their Google and Meta accounts, most of us have trouble de-Googling and de-Metaing our digital lives. In general, though, the keys to privacy success include the following: Use a VPN to protect your internet traffic; prioritize privacy in your web browser, both through the browser itself, as well as extensions that block ads and protect your traffic; shield your sensitive information whenever possible, by using email aliases, alternate phone numbers, or credit card masks; use strong and unique passwords for all accounts, and store those passwords in a secure password manager; use two-factor authentication whenever possible; and stick to end-to-end encrypted chat apps to communicate with others. While there's always more you can do, that's the perfect storm to keep your digital life as private as reasonably possible. Some might read through the examples here and see steps that are too much effort to be worth it. It might seem out of reach to ditch Gmail and Instagram, break certain websites, and force your friends and family to learn new numbers and email addresses to protect your privacy, especially if you don't feel your privacy has that much of an impact on your life. But even if you aren't sold on the concept of privacy itself, there are real-world results from sticking with these methods. Jay no longer receives spam calls and texts; Mark no longer sees ads that are freakishly relevant to their likes. It's a lifestyle change, to be sure, but it's not just to serve some concept of privacy. You can see results by changing the way you interact with the internet, all without having to actually disconnect from the internet, and, by extension, the world at large.
    #spoke #with #some #most #private
    I Spoke With Some of the Most Private People Online, and Here's What They Sacrifice
    How far would you go to keep yourself private online? There’s little doubt that advances in technology over the past three decades have eroded traditional concepts around privacy and security: It was once unthinkable to voluntarily invite big companies to track your every move and decision—now, we happily let them in exchange for the digital goods and services we rely on. Most people these days either tolerate these privacy intrusions or outright don’t care about them. But there’s a growing movement that believes it’s time to claim our privacy back. Some are working piecemeal, blocking trackers and reducing permissions where they can, while not totally ditching modern digital society as a whole. Others, however, are as hardcore as can be—a modern equivalent of "going off the grid."  We put out a call looking for the latter—people who are going to great lengths to protect their privacy in today’s mass surveillance world. We received a number of insightful, fascinating, and unique situations, but for this piece, I want to highlight four specific perspectives: "Ed," "Jane," "Mark," and "Jay."Ed is "ruthless" with app choices and permissionsThe first respondent, I’ll call Ed, since their privacy journey began with the Edward Snowden leaks: “I'd known something was likely up…as early as 2006I remember headlines about AT&T possibly spying, but high school me didn't take it too seriously at the time. The Snowden leaks, when I was in college, really opened my eyes. Ever since, I've taken steps to protect my privacy.”Ed says the biggest step they’ve taken towards a digitally private life has been their Proton account. If you’re not aware, Proton is a company that offers apps designed for privacy. Their email service, Proton Mail, is the most famous of the company’s products, but Proton makes other apps as well. Ed uses many of them, including Proton VPN, Proton Calendar, and Proton Drive. Ed pays for Proton Ultimate, which costs them nearly every two years. You don’t have to pay for Proton, but your experience is much more limited. That’s not totally dissimilar to Google’s offers, which gives you more features if you pay, but most people can definitely get by with a free Google Account. I'm not so sure the reverse is true. Speaking of Google, Ed does have a Google Account, but rarely logs into it. They don’t keep anything attached to it, however—Ed stores all files, for example, in Proton Drive or Tresoirt.Ed uses SimpleLogin for throwaway email addresses. That’s not just for the times Ed wants to avoid giving their email address to someone. According to them, they use an alias anytime an organization asks for their email, and frequently delete it when it’s no longer useful. Each online purchase gets its own alias, and that alias is deleted once the purchase is complete. Whenever Ed travels, they use an alias for any flights, hotels, and rental cars they use. Once the trip is up, they delete the alias. If one of those aliases receives a spam message, they delete it as well.Ed’s smartphone of choice is iPhone, and although Apple arguably has the best reputation for privacy in big tech, Ed is no fan: “Apple is no bastion of privacy of course, but they seem to be the least-worst of the big tech companies.” Ed doesn’t use iCloud for any backups: Any iPhone files are kept in Tresorit. That iPhone, of course, contains apps. But each app is there for a reason, and no app gets access to permissions unless it requires it: “I'm ruthless about apps and app permissions. If I'm not going to use the app regularly, I uninstall it. I grant only those permissions I think the app reasonably needs.” Ed protects his mobile internet traffic with Proton VPN, and only accesses the web via Firefox Focus, a special version of Firefox designed for privacy. Location services are always off on Ed’s iPhone, unless they’re using Apple Maps for navigation. Once they arrive at their destination, Ed disables location services again. They also have an interesting trick for getting back home without revealing their actual address:  “Additionally, when I'm navigating home, I don't enter my home address. I enter the address down the street just as an extra layer so I'm not entering my actual home address…I'll end navigation and turn off location while still driving…if I know the rest of the way home myself."Most of us deal regularlywith spam calls. Not Ed: They use the “Silence Unknown Callers” setting on iOS to send all numbers not in the Contacts app to voicemail. They then review all voicemails, and if they didn’t leave a message, they block the number. Our initial call out for this piece referenced how using a VPN can sometimes block incoming phone calls, but Ed isn’t bothered by that: “Since most calls these days are scams or telemarketing, and most people I do want to talk to aren't going to call me anyway, I see this as more of a feature than a bug.” For their desktop computing needs, Ed uses Windows. They admit they aren’t privacy experts when it comes to Microsoft’s OS, but they do what they can, including changing all privacy settings and uninstalling all programs they don’t use.They also run a clean version of Windows 11 after following Lifehacker’s guide. Firefox is their go-to PC browser, and they use a variety of extensions, including:ClearURLs: removes trackers from links.Decentraleyes: blocks data requests from third-party networks. Disconnect: blocks trackers from "thousands" of third-party sites.Firefox Multi-Account Containers: separates your browsing into siloed "containers" to isolate each session from one another.PopUpOFF: blocks pop-ups, overlays, and cookie alerts.Privacy Badger: blocks invisible trackers.Proton VPN: Proton's Firefox add-on for its VPN.uBlock Origin: popular content blocker.Ed didn’t say how much of an impact this array of extensions and settings has on their browsing, save for YouTube, which they admit does sometimes give them trouble. However, Ed has workarounds: “When YouTube wants me to 'sign in to confirm you're not a bot,' changing VPN servers usually does the trick.” Ed also uses the audible clues for ReCAPTCHA prompts, rather than the pictures, since they don’t want to help train Google’s “braindead AI.”Ed deleted all their social media accounts, including Facebook, X, Instagram, and LinkedIn. Though they’ve never had TikTok installed on their phone, they will watch it in Firefox when a friend sends them a video. Jane uses an open-source smartphone OS designed for privacyWhile Edward Snowden may have kicked off Ed’s interest in personal privacy, "Jane" has many strong beliefs motivating their desire for privacy. They are concerned about data brokers and Meta’s practices of tracking internet activity, and how these companies build profiles based on that data to sell to third-parties; they’re concerned about the possibility of telecommunication companies tracking our locations via cellular towers; they worry about US law enforcement and agencies reviewing citizens’ social media accounts accounts and tracking people. Their focus on privacy is fueled by true concern for their own well-being, not only the value of privacy as a concept.      Jane uses a VPN on all of their devices. Instead of Proton, however, Jane opts for Mullvad. They enable ad and tracker blocking, as well as a kill switch, which blocks your internet if you lose connection with the VPN—thus protecting your connection from being leaked out of the secure network.I’m a big advocate for strong and unique passwords and proper password management, but Jane definitely beats me when it comes to secure credentials. Jane uses six to eight-word passphrases generated by diceware, a tactic that chooses words based on dice rolls. Something like this diceware generator will roll a die five times, then find a word in a bank based on that five-digit number. You can repeat this as many times as you want to come up with a passphrase built up with random words. Jane saves all of their passphrases to a password manager, except for the ones for important accounts, like their bank. They commit those to memory, just in case someone breaches their password manager.     Like Ed, Jane uses Mullvad, but instead of just using their VPN, they opt for the web browser, which has those protections built in. Mullvad’s strict privacy settings break persistent logins on websites, so any sites Jane wants to stay logged in on are kept in Brave browser. For both Mullvad and Brave, Jane uses uBlock Origin.“From time-to-time I do run into sites that will block access due to being on a VPN or blocking ads and trackers. Instead of disablingVPN completely, switching my connection to one of Mullvad's rented servers instead of ones they own usually helps. Barring that, I occasionally go intoand temporarily whitelist a needed. This works for me to get around site blocks most of the time.”  Jane uses a Mac, and configured macOS based on various privacy guides. But instead of an iPhone, Jane opts for a Google Pixel. That might surprise readers who assumed hardcore privacy enthusiasts would break away from Google entirely. But X doesn’t run Android: Instead, they installed GrapheneOS on their Pixel, an open-source OS designed for privacy. Following a restart, Jane configured the Pixel to only unlock with a seven-word dice passphrase—for general use, they use a fingerprint scan and a six-digit PIN. If the don’t unlock their Pixel for a while, their phone automatically reboots to put it back into this “First Unlock” state. They also keep airplane mode on at all times to disable the phone’s radio communications, but maintain a wifi connection with timed automatic Bluetooth and wireless disabling. Jane also deleted all their social media accounts after downloading all data associated with those platforms.Mark uses phone and credit card masks“Mark” is perhaps the least hardcore of the respondents in this story, but that makes their experience both interesting and relatable. Unlike most of the people we spoke to, Mark is still on Facebook and Instagram. That’s due to their job, which requires them to be on the platform, but they’ve been “systematically” deleting everything they can over their 19-year Facebook history and saving the data to an external hard drive. Mark doesn’t follow anything that isn’t relevant to their job, and only uses Facebook and Instagram inside the DuckDuckGo browser. They don’t react to posts they see, and following their privacy tactics, Facebook doesn’t show them relevant ads anymore. “If there is an ad I'm actually interested in I'll search it up in a different browser rather than click it.”Mark has had four Google Accounts in their time online, and has deleted two so far. Like Facebook, they have to use Google for their job, but they delegate all their work to Chrome. All other browsing runs through Firefox, DuckDuckGo, or Tor. The latter is perhaps best known for being the browser of choice for browsing the dark web, but what makes it great for that is also what makes it a great choice for private browsing.Unlike others in this story, Mark hasn’t de-Googled themselves completely. In addition to using Chrome for work, Mark has a phone mask through Google, and has their contacts, calendar, and maps tied to the company—though they are moving away from Google as much as they can. They've been running through their old emails to find and delete outdated accounts they no longer use. Any accounts they do need now use an email mask that forwards to a Mailfence account, an encrypted email service.   Mark was the only respondent to talk about entertainment in relation to privacy: “I've also been switching to physical media over streaming, so buying CDs and DVDs, locally as much as possible. I'm lucky to have a local music store and a local bookstore...one of the owners of our bookstore wrote a book on how to resist Amazon and why. Any book I want, I can either order through them or on Alibris. For music, I use our local record store and Discogs.”When shopping online, Mark uses a credit card mask, but still uses the card itself when shopping in person. They want to start using a credit card mask in retail locations like Janet Vertesi, an associate professor of sociology at Princeton University, but they haven’t quite gotten there yet.   What really piqued my interest most about Mark, however, wasn’t their perspective on their own privacy concerns, but the concerns around the privacy of their kids: “They each have a Gmail, two of them have Snapchat. Their schools use Gaggle and Google to spy on them. I don't even know how to start disconnecting them from all this...I was a kid during the wild west of the internet and this feels like getting back to my roots. My kids are end users who understand apps and touchscreens, not torrenting their music or coding a basic website.I feel like Big Data has its grip on the kids already and I don't have a guidebook on navigating that as a parent.”  Mark’s current focus on their kids’ privacy includes deleting their health data from their local health system. That’s in part due to a data breach impacting the health system, but also the language about autism from Robert F. Kennedy Jr., the current Secretary of Health and Human Services.Jay de-googled their life and uses a VoIP phone number"Jay's" origin story with personal privacy dates back to 2017. That year, Equifax suffered a major hack, where nearly 148 million Americans had sensitive data stolen and weren’t notified about the breach for months. Jay was frustrated: You don’t choose to give your data to Equifax, or any credit bureau, and yet so many people lost their data. They also felt that companies were not properly held responsible for these events, and lawmakers were simply too out of touch to do what was necessary to protect citizens’ privacy, so they took it upon themselves to protect their own data. Ever since this incident, Jay freezes their credit: “It was frustratingly difficult back then, but nowadays, it is very easy...The freeze will not allow anyone to pull credit for large purchases in your name, even if they have your social security number. I decided I wanted to pursue some privacy for the things I do have a choice over.”  From here, Jay de-googled their life, including both Google Search as well as YouTube. They’ve found no issue with using alternative search engines, and, in fact, sees Google getting worse, as it tries to show you results based on what it thinks it knows about you, not what is most relevant to your actual query: “The internet was supposed to be a place you went to find information, not where you became the information that companies take instead."Jay uses tools to prevent fingerprinting, where companies identify you and track you across the internet, but worries that going too far with things like ad blockers puts a target on your back as well. Jay chooses to pick “a couple of effective tools,” and runs with those.For their smartphone needs, Jay goes with Apple. Like Ed, Jay doesn’t believe Apple is perfect, and even considers their privacy policies a bit of a gimmick, but sees them as the better alternative to Android. Jay likes the security of the App Store, and the array of privacy features in both Safari and Apple Accounts as a whole. They highlight Safari’s “Advanced Tracking and Fingerprinting Protection” feature, which helps block trackers as you browse the web; iCloud’s Private Relay, which hides your IP address; and “Hide My Email,” which generates email aliases you can share with others without giving your true email address away.Most of us are plagued with spam calls, but following the Robinhood data breach in 2021, Jay started receiving a flood of them. They decided to change their phone number and made a point of never sharing it with businesses. For the times they need to give out their number to parties they don’t trust, they use a number generated by My Sudo, which, for per year, gives them a VoIPphone number. It works with most services that rely on SMS, but it won’t function for two-factor authentication.My Sudo lets you change your number for an additional so if Jay’s number ever was compromised or started receiving too much spam, they could swap it.        Jay, like many respondents, deleted all social media services: “It has its place in society for a lot of people, and is no doubt a great way to connect. However, I found that the fear of deleting it was a lot worse than actually deleting it. The people you care about won’t forget you exist.” That said, Jay doesn't mind any of the obstacles this lifestyle does throw their way: “It is a challenging topic, as most people consider you a little bit 'out there' if you take steps to make your life a little less convenient, but more private. The modern world sells you convenience, while pretending it is free, and harvesting your data for so much more than you actually get out of your relationship to them.”      What it takes to be private on the modern internetThere's no one way to tackle personal privacy. Every one of the respondents to our query had something unique about their approach, and many had different motivations behind why they were so concerned about their privacy.There are plenty of common through lines, of course. Most privacy people love Proton, which makes sense. Proton seems to be the only company that offers a suite of apps most closely resembling Google's while also prioritizing privacy. If you want your email, calendar, word processor, and even your VPN all tied up nicely under one privacy-focused umbrella, that's Proton. But not everyone wants an ecosystem, either. That's why you see respondents using other VPNs, like Mullvad, or other private storage options, like Tresorit. These apps and services exist—they might just not be owned by one company, like Apple or Google.Google and Meta are more commonalities, in that most privacy enthusiasts ditch them entirely. Some, like Mark, haven't been able to fully shake off these data-hungry companies. In Mark's case, that's because they need these platforms for work. But while most hardcore privacy people delete their Google and Meta accounts, most of us have trouble de-Googling and de-Metaing our digital lives. In general, though, the keys to privacy success include the following: Use a VPN to protect your internet traffic; prioritize privacy in your web browser, both through the browser itself, as well as extensions that block ads and protect your traffic; shield your sensitive information whenever possible, by using email aliases, alternate phone numbers, or credit card masks; use strong and unique passwords for all accounts, and store those passwords in a secure password manager; use two-factor authentication whenever possible; and stick to end-to-end encrypted chat apps to communicate with others. While there's always more you can do, that's the perfect storm to keep your digital life as private as reasonably possible. Some might read through the examples here and see steps that are too much effort to be worth it. It might seem out of reach to ditch Gmail and Instagram, break certain websites, and force your friends and family to learn new numbers and email addresses to protect your privacy, especially if you don't feel your privacy has that much of an impact on your life. But even if you aren't sold on the concept of privacy itself, there are real-world results from sticking with these methods. Jay no longer receives spam calls and texts; Mark no longer sees ads that are freakishly relevant to their likes. It's a lifestyle change, to be sure, but it's not just to serve some concept of privacy. You can see results by changing the way you interact with the internet, all without having to actually disconnect from the internet, and, by extension, the world at large. #spoke #with #some #most #private
    LIFEHACKER.COM
    I Spoke With Some of the Most Private People Online, and Here's What They Sacrifice
    How far would you go to keep yourself private online? There’s little doubt that advances in technology over the past three decades have eroded traditional concepts around privacy and security: It was once unthinkable to voluntarily invite big companies to track your every move and decision—now, we happily let them in exchange for the digital goods and services we rely on (or are hopelessly addicted to). Most people these days either tolerate these privacy intrusions or outright don’t care about them. But there’s a growing movement that believes it’s time to claim our privacy back. Some are working piecemeal, blocking trackers and reducing permissions where they can, while not totally ditching modern digital society as a whole. Others, however, are as hardcore as can be—a modern equivalent of "going off the grid."  We put out a call looking for the latter—people who are going to great lengths to protect their privacy in today’s mass surveillance world. We received a number of insightful, fascinating, and unique situations, but for this piece, I want to highlight four specific perspectives: "Ed," "Jane," "Mark," and "Jay."Ed is "ruthless" with app choices and permissionsThe first respondent, I’ll call Ed, since their privacy journey began with the Edward Snowden leaks: “I'd known something was likely up…as early as 2006[.] I remember headlines about AT&T possibly spying, but high school me didn't take it too seriously at the time. The Snowden leaks, when I was in college, really opened my eyes. Ever since, I've taken steps to protect my privacy.”Ed says the biggest step they’ve taken towards a digitally private life has been their Proton account. If you’re not aware, Proton is a company that offers apps designed for privacy. Their email service, Proton Mail, is the most famous of the company’s products, but Proton makes other apps as well. Ed uses many of them, including Proton VPN, Proton Calendar, and Proton Drive. Ed pays for Proton Ultimate, which costs them nearly $200 every two years (a new account is now billed yearly at $119.88). You don’t have to pay for Proton, but your experience is much more limited. That’s not totally dissimilar to Google’s offers, which gives you more features if you pay, but most people can definitely get by with a free Google Account. I'm not so sure the reverse is true. Speaking of Google, Ed does have a Google Account, but rarely logs into it. They don’t keep anything attached to it, however—Ed stores all files, for example, in Proton Drive or Tresoirt (another end-to-end encrypted service).Ed uses SimpleLogin for throwaway email addresses. That’s not just for the times Ed wants to avoid giving their email address to someone. According to them, they use an alias anytime an organization asks for their email, and frequently delete it when it’s no longer useful. Each online purchase gets its own alias, and that alias is deleted once the purchase is complete. Whenever Ed travels, they use an alias for any flights, hotels, and rental cars they use. Once the trip is up, they delete the alias. If one of those aliases receives a spam message, they delete it as well.Ed’s smartphone of choice is iPhone, and although Apple arguably has the best reputation for privacy in big tech, Ed is no fan: “Apple is no bastion of privacy of course, but they seem to be the least-worst of the big tech companies.” Ed doesn’t use iCloud for any backups: Any iPhone files are kept in Tresorit. That iPhone, of course, contains apps. But each app is there for a reason, and no app gets access to permissions unless it requires it: “I'm ruthless about apps and app permissions. If I'm not going to use the app regularly, I uninstall it. I grant only those permissions I think the app reasonably needs.” Ed protects his mobile internet traffic with Proton VPN, and only accesses the web via Firefox Focus, a special version of Firefox designed for privacy. Location services are always off on Ed’s iPhone, unless they’re using Apple Maps for navigation. Once they arrive at their destination, Ed disables location services again. They also have an interesting trick for getting back home without revealing their actual address:  “Additionally, when I'm navigating home, I don't enter my home address. I enter the address down the street just as an extra layer so I'm not entering my actual home address…I'll end navigation and turn off location while still driving…if I know the rest of the way home myself."Most of us deal regularly (if not daily) with spam calls. Not Ed: They use the “Silence Unknown Callers” setting on iOS to send all numbers not in the Contacts app to voicemail. They then review all voicemails, and if they didn’t leave a message, they block the number. Our initial call out for this piece referenced how using a VPN can sometimes block incoming phone calls, but Ed isn’t bothered by that: “Since most calls these days are scams or telemarketing, and most people I do want to talk to aren't going to call me anyway, I see this as more of a feature than a bug.” For their desktop computing needs, Ed uses Windows. They admit they aren’t privacy experts when it comes to Microsoft’s OS, but they do what they can, including changing all privacy settings and uninstalling all programs they don’t use. (That includes OneDrive and Edge.) They also run a clean version of Windows 11 after following Lifehacker’s guide. Firefox is their go-to PC browser, and they use a variety of extensions, including:ClearURLs: removes trackers from links.Decentraleyes: blocks data requests from third-party networks. Disconnect: blocks trackers from "thousands" of third-party sites.Firefox Multi-Account Containers: separates your browsing into siloed "containers" to isolate each session from one another.PopUpOFF: blocks pop-ups, overlays, and cookie alerts.Privacy Badger: blocks invisible trackers.Proton VPN: Proton's Firefox add-on for its VPN.uBlock Origin: popular content blocker.Ed didn’t say how much of an impact this array of extensions and settings has on their browsing, save for YouTube, which they admit does sometimes give them trouble. However, Ed has workarounds: “When YouTube wants me to 'sign in to confirm you're not a bot,' changing VPN servers usually does the trick.” Ed also uses the audible clues for ReCAPTCHA prompts, rather than the pictures, since they don’t want to help train Google’s “braindead AI.”Ed deleted all their social media accounts, including Facebook, X, Instagram, and LinkedIn. Though they’ve never had TikTok installed on their phone, they will watch it in Firefox when a friend sends them a video. Jane uses an open-source smartphone OS designed for privacyWhile Edward Snowden may have kicked off Ed’s interest in personal privacy, "Jane" has many strong beliefs motivating their desire for privacy. They are concerned about data brokers and Meta’s practices of tracking internet activity, and how these companies build profiles based on that data to sell to third-parties; they’re concerned about the possibility of telecommunication companies tracking our locations via cellular towers; they worry about US law enforcement and agencies reviewing citizens’ social media accounts accounts and tracking people. Their focus on privacy is fueled by true concern for their own well-being, not only the value of privacy as a concept.      Jane uses a VPN on all of their devices. Instead of Proton, however, Jane opts for Mullvad. They enable ad and tracker blocking, as well as a kill switch, which blocks your internet if you lose connection with the VPN—thus protecting your connection from being leaked out of the secure network.I’m a big advocate for strong and unique passwords and proper password management, but Jane definitely beats me when it comes to secure credentials. Jane uses six to eight-word passphrases generated by diceware, a tactic that chooses words based on dice rolls. Something like this diceware generator will roll a die five times, then find a word in a bank based on that five-digit number. You can repeat this as many times as you want to come up with a passphrase built up with random words. Jane saves all of their passphrases to a password manager, except for the ones for important accounts, like their bank. They commit those to memory, just in case someone breaches their password manager.     Like Ed, Jane uses Mullvad, but instead of just using their VPN, they opt for the web browser, which has those protections built in. Mullvad’s strict privacy settings break persistent logins on websites, so any sites Jane wants to stay logged in on are kept in Brave browser. For both Mullvad and Brave, Jane uses uBlock Origin.“From time-to-time I do run into sites that will block access due to being on a VPN or blocking ads and trackers. Instead of disabling [my] VPN completely, switching my connection to one of Mullvad's rented servers instead of ones they own usually helps. Barring that, I occasionally go into [uBlock Origin] and temporarily whitelist a needed [URL] ([ReCAPTCHA] etc). This works for me to get around site blocks most of the time.”  Jane uses a Mac, and configured macOS based on various privacy guides. But instead of an iPhone, Jane opts for a Google Pixel. That might surprise readers who assumed hardcore privacy enthusiasts would break away from Google entirely. But X doesn’t run Android: Instead, they installed GrapheneOS on their Pixel, an open-source OS designed for privacy. Following a restart, Jane configured the Pixel to only unlock with a seven-word dice passphrase—for general use, they use a fingerprint scan and a six-digit PIN. If the don’t unlock their Pixel for a while, their phone automatically reboots to put it back into this “First Unlock” state. They also keep airplane mode on at all times to disable the phone’s radio communications, but maintain a wifi connection with timed automatic Bluetooth and wireless disabling. Jane also deleted all their social media accounts after downloading all data associated with those platforms.Mark uses phone and credit card masks“Mark” is perhaps the least hardcore of the respondents in this story, but that makes their experience both interesting and relatable. Unlike most of the people we spoke to, Mark is still on Facebook and Instagram. That’s due to their job, which requires them to be on the platform, but they’ve been “systematically” deleting everything they can over their 19-year Facebook history and saving the data to an external hard drive. Mark doesn’t follow anything that isn’t relevant to their job, and only uses Facebook and Instagram inside the DuckDuckGo browser. They don’t react to posts they see, and following their privacy tactics, Facebook doesn’t show them relevant ads anymore. “If there is an ad I'm actually interested in I'll search it up in a different browser rather than click it.”Mark has had four Google Accounts in their time online, and has deleted two so far. Like Facebook, they have to use Google for their job, but they delegate all their work to Chrome. All other browsing runs through Firefox, DuckDuckGo, or Tor. The latter is perhaps best known for being the browser of choice for browsing the dark web, but what makes it great for that is also what makes it a great choice for private browsing.Unlike others in this story, Mark hasn’t de-Googled themselves completely. In addition to using Chrome for work, Mark has a phone mask through Google, and has their contacts, calendar, and maps tied to the company—though they are moving away from Google as much as they can. They've been running through their old emails to find and delete outdated accounts they no longer use. Any accounts they do need now use an email mask that forwards to a Mailfence account, an encrypted email service.   Mark was the only respondent to talk about entertainment in relation to privacy: “I've also been switching to physical media over streaming, so buying CDs and DVDs, locally as much as possible. I'm lucky to have a local music store and a local bookstore...one of the owners of our bookstore wrote a book on how to resist Amazon and why. Any book I want, I can either order through them or on Alibris. For music, I use our local record store and Discogs.”When shopping online, Mark uses a credit card mask, but still uses the card itself when shopping in person. They want to start using a credit card mask in retail locations like Janet Vertesi, an associate professor of sociology at Princeton University, but they haven’t quite gotten there yet.   What really piqued my interest most about Mark, however, wasn’t their perspective on their own privacy concerns, but the concerns around the privacy of their kids: “They each have a Gmail, two of them have Snapchat. Their schools use Gaggle and Google to spy on them. I don't even know how to start disconnecting them from all this...I was a kid during the wild west of the internet and this feels like getting back to my roots. My kids are end users who understand apps and touchscreens, not torrenting their music or coding a basic website. (Is this my version of "I drank out of the garden hose"?) I feel like Big Data has its grip on the kids already and I don't have a guidebook on navigating that as a parent.”  Mark’s current focus on their kids’ privacy includes deleting their health data from their local health system. That’s in part due to a data breach impacting the health system, but also the language about autism from Robert F. Kennedy Jr., the current Secretary of Health and Human Services.Jay de-googled their life and uses a VoIP phone number"Jay's" origin story with personal privacy dates back to 2017. That year, Equifax suffered a major hack, where nearly 148 million Americans had sensitive data stolen and weren’t notified about the breach for months. Jay was frustrated: You don’t choose to give your data to Equifax, or any credit bureau, and yet so many people lost their data. They also felt that companies were not properly held responsible for these events, and lawmakers were simply too out of touch to do what was necessary to protect citizens’ privacy, so they took it upon themselves to protect their own data. Ever since this incident, Jay freezes their credit: “It was frustratingly difficult back then, but nowadays, it is very easy (it just requires an account, which I use a burner email for)...The freeze will not allow anyone to pull credit for large purchases in your name, even if they have your social security number (and because of the data breach, someone probably does). I decided I wanted to pursue some privacy for the things I do have a choice over.”  From here, Jay de-googled their life, including both Google Search as well as YouTube. They’ve found no issue with using alternative search engines, and, in fact, sees Google getting worse, as it tries to show you results based on what it thinks it knows about you, not what is most relevant to your actual query: “The internet was supposed to be a place you went to find information, not where you became the information that companies take instead."Jay uses tools to prevent fingerprinting, where companies identify you and track you across the internet, but worries that going too far with things like ad blockers puts a target on your back as well. Jay chooses to pick “a couple of effective tools,” and runs with those.For their smartphone needs, Jay goes with Apple. Like Ed, Jay doesn’t believe Apple is perfect, and even considers their privacy policies a bit of a gimmick, but sees them as the better alternative to Android. Jay likes the security of the App Store, and the array of privacy features in both Safari and Apple Accounts as a whole. They highlight Safari’s “Advanced Tracking and Fingerprinting Protection” feature, which helps block trackers as you browse the web; iCloud’s Private Relay, which hides your IP address; and “Hide My Email,” which generates email aliases you can share with others without giving your true email address away.Most of us are plagued with spam calls, but following the Robinhood data breach in 2021, Jay started receiving a flood of them. They decided to change their phone number and made a point of never sharing it with businesses. For the times they need to give out their number to parties they don’t trust, they use a number generated by My Sudo, which, for $20 per year, gives them a VoIP (Voice over Internet Protocol) phone number. It works with most services that rely on SMS, but it won’t function for two-factor authentication. (Which is fine, seeing as SMS-based 2FA is the weakest form of secondary authentication.) My Sudo lets you change your number for an additional $1, so if Jay’s number ever was compromised or started receiving too much spam, they could swap it.        Jay, like many respondents, deleted all social media services: “It has its place in society for a lot of people, and is no doubt a great way to connect. However, I found that the fear of deleting it was a lot worse than actually deleting it. The people you care about won’t forget you exist.” That said, Jay doesn't mind any of the obstacles this lifestyle does throw their way: “It is a challenging topic, as most people consider you a little bit 'out there' if you take steps to make your life a little less convenient, but more private. The modern world sells you convenience, while pretending it is free, and harvesting your data for so much more than you actually get out of your relationship to them.”      What it takes to be private on the modern internetThere's no one way to tackle personal privacy. Every one of the respondents to our query had something unique about their approach, and many had different motivations behind why they were so concerned about their privacy.There are plenty of common through lines, of course. Most privacy people love Proton, which makes sense. Proton seems to be the only company that offers a suite of apps most closely resembling Google's while also prioritizing privacy. If you want your email, calendar, word processor, and even your VPN all tied up nicely under one privacy-focused umbrella, that's Proton. But not everyone wants an ecosystem, either. That's why you see respondents using other VPNs, like Mullvad, or other private storage options, like Tresorit. These apps and services exist—they might just not be owned by one company, like Apple or Google (or Proton).Google and Meta are more commonalities, in that most privacy enthusiasts ditch them entirely. Some, like Mark, haven't been able to fully shake off these data-hungry companies. In Mark's case, that's because they need these platforms for work. But while most hardcore privacy people delete their Google and Meta accounts, most of us have trouble de-Googling and de-Metaing our digital lives. In general, though, the keys to privacy success include the following: Use a VPN to protect your internet traffic; prioritize privacy in your web browser, both through the browser itself, as well as extensions that block ads and protect your traffic; shield your sensitive information whenever possible, by using email aliases, alternate phone numbers, or credit card masks; use strong and unique passwords for all accounts, and store those passwords in a secure password manager; use two-factor authentication whenever possible (perhaps passkeys, when available); and stick to end-to-end encrypted chat apps to communicate with others. While there's always more you can do, that's the perfect storm to keep your digital life as private as reasonably possible. Some might read through the examples here and see steps that are too much effort to be worth it. It might seem out of reach to ditch Gmail and Instagram, break certain websites, and force your friends and family to learn new numbers and email addresses to protect your privacy, especially if you don't feel your privacy has that much of an impact on your life. But even if you aren't sold on the concept of privacy itself, there are real-world results from sticking with these methods. Jay no longer receives spam calls and texts; Mark no longer sees ads that are freakishly relevant to their likes. It's a lifestyle change, to be sure, but it's not just to serve some concept of privacy. You can see results by changing the way you interact with the internet, all without having to actually disconnect from the internet, and, by extension, the world at large.
    0 Σχόλια 0 Μοιράστηκε
  • Kingdom Hearts’ dual Keyblades, Oblivion and Oathkeeper, are the perfect analogy for its story

    With Tetsuya Nomura finally breaking a three-year silence to drop new Kingdom Hearts 4 details, what better time to revisit the series’ most iconic weapon? The Keyblade has long sparked debate — is it a sword? Should it be included in Cool Sword Day celebrations? Or is it simply a giant key-shaped billy club? Regardless of classification, the Keyblade stands as one of the most revolutionary one-handed fictional weapons, alongside the lightsaber — not just for its bold, genre-defying design, but for how deeply it’s woven into the lore, with each unique Keyblade symbolizing each wielder’s alignment with light or darkness.While the Kingdom Key remains the franchise’s most recognizable blade, thanks largely to its constant presence in marketing, no Keyblade has captured fan devotion quite like Oblivion. Oathkeeper trails closely behind, earning a strong third place. The designers at Square Enix surely know the popularity of these Keyblades in the fandom, as all three appear in every major installment. But beyond their striking designs, it’s Oblivion and Oathkeeper that best embody Kingdom Hearts’ core theme: the eternal clash between light and dark. That makes them far more than just cool weapons; they’re narrative anchors.In the original Kingdom Hearts, most new Keychains — items that transform the appearance and abilities of your Keyblade — are earned by completing Disney-themed worlds. These worlds have usually offered loose retellings of their respective films, often feeling like standalone adventures with minimal connection to the overarching storyline of Kingdom Hearts. However, Oathkeeper and Oblivion came from Traverse Town and Hollow Bastion, respectively, which are two original worlds — meaning, they’re not worlds based on Disney movies. What’s more, the Keychains for each weapon have a strong significance for Kingdom Hearts’ protagonist Sora; one is deeply tied to Kairi, his love interest, and the other to his best frenemy, Riku. Image: Square EnixKairi gives Sora the Oathkeeper after he awakens her from her slumber and brings her to Traverse Town for safety. She offers him her “lucky charm” as a promise that they’ll be reunited. The charm resembles a Paopu Fruit from their home, Destiny Island — a fruit said to bind the destinies of two people who share it, ensuring they’ll always be connected, no matter what. Meanwhile, Oblivion is found in a chest in Hollow Bastion, mere feet away from Sora’s final confrontation with Riku — a confrontation that mirrors their playful sparring match at the beginning of the game.Oathkeeper and Oblivion have always shared a yin-and-yang dynamic, reflected in everything from how they’re acquired to the two characters they’re tied to; that’s even before we factor in their stark white and black color schemes. Oblivion’s in-game ability focuses on strength, while Oathkeeper prioritizes magic. Oathkeeper’s appearance emphasizes the elegance of a Keyblade, while Oblivion highlights the destruction. They’re a terrific pair; they went together like lamb and tuna fish. What has truly cemented the importance of these two Keyblades is their prominent appearance in the game’s secret ending, Deep Dive / Another Side, Another Story. It features a hooded figure in an unknown location, dual-wielding both Oblivion and Oathkeeper in a fight with another mysterious silver-haired figure, who ends up taking and wielding Oblivion during the confrontation. Little did we know then that the hooded figure was Roxas, another version of Sora, and that Riku was the silver-haired man who took Oblivion for himself. At the time, fans couldn’t fully grasp the implications of this final scene, but that moment instantly elevated the significance of both weapons. The secret ending was shrouded in mystery, yet the presence of Oathkeeper and Oblivion strongly hinted that the hooded figure had a deep connection to Sora, Riku, and Kairi.It’s clear Nomura had grand plans for Oathkeeper and Oblivion, deliberately threading them deeper into the series’ overarching narrative than most other Keyblades. Still, he probably didn’t expect them to eclipse the franchise’s default weapon: the iconic Kingdom Key. Despite its central role and compelling history as the light counterpart to King Mickey’s Kingdom Key D, not to mention that it initially chose Riku before ultimately selecting Sora, it’s Oathkeeper and Oblivion that has came to embody the emotional core of the franchise, capturing the heartsof millions of fans along the way.See More:
    #kingdom #hearts #dual #keyblades #oblivion
    Kingdom Hearts’ dual Keyblades, Oblivion and Oathkeeper, are the perfect analogy for its story
    With Tetsuya Nomura finally breaking a three-year silence to drop new Kingdom Hearts 4 details, what better time to revisit the series’ most iconic weapon? The Keyblade has long sparked debate — is it a sword? Should it be included in Cool Sword Day celebrations? Or is it simply a giant key-shaped billy club? Regardless of classification, the Keyblade stands as one of the most revolutionary one-handed fictional weapons, alongside the lightsaber — not just for its bold, genre-defying design, but for how deeply it’s woven into the lore, with each unique Keyblade symbolizing each wielder’s alignment with light or darkness.While the Kingdom Key remains the franchise’s most recognizable blade, thanks largely to its constant presence in marketing, no Keyblade has captured fan devotion quite like Oblivion. Oathkeeper trails closely behind, earning a strong third place. The designers at Square Enix surely know the popularity of these Keyblades in the fandom, as all three appear in every major installment. But beyond their striking designs, it’s Oblivion and Oathkeeper that best embody Kingdom Hearts’ core theme: the eternal clash between light and dark. That makes them far more than just cool weapons; they’re narrative anchors.In the original Kingdom Hearts, most new Keychains — items that transform the appearance and abilities of your Keyblade — are earned by completing Disney-themed worlds. These worlds have usually offered loose retellings of their respective films, often feeling like standalone adventures with minimal connection to the overarching storyline of Kingdom Hearts. However, Oathkeeper and Oblivion came from Traverse Town and Hollow Bastion, respectively, which are two original worlds — meaning, they’re not worlds based on Disney movies. What’s more, the Keychains for each weapon have a strong significance for Kingdom Hearts’ protagonist Sora; one is deeply tied to Kairi, his love interest, and the other to his best frenemy, Riku. Image: Square EnixKairi gives Sora the Oathkeeper after he awakens her from her slumber and brings her to Traverse Town for safety. She offers him her “lucky charm” as a promise that they’ll be reunited. The charm resembles a Paopu Fruit from their home, Destiny Island — a fruit said to bind the destinies of two people who share it, ensuring they’ll always be connected, no matter what. Meanwhile, Oblivion is found in a chest in Hollow Bastion, mere feet away from Sora’s final confrontation with Riku — a confrontation that mirrors their playful sparring match at the beginning of the game.Oathkeeper and Oblivion have always shared a yin-and-yang dynamic, reflected in everything from how they’re acquired to the two characters they’re tied to; that’s even before we factor in their stark white and black color schemes. Oblivion’s in-game ability focuses on strength, while Oathkeeper prioritizes magic. Oathkeeper’s appearance emphasizes the elegance of a Keyblade, while Oblivion highlights the destruction. They’re a terrific pair; they went together like lamb and tuna fish. What has truly cemented the importance of these two Keyblades is their prominent appearance in the game’s secret ending, Deep Dive / Another Side, Another Story. It features a hooded figure in an unknown location, dual-wielding both Oblivion and Oathkeeper in a fight with another mysterious silver-haired figure, who ends up taking and wielding Oblivion during the confrontation. Little did we know then that the hooded figure was Roxas, another version of Sora, and that Riku was the silver-haired man who took Oblivion for himself. At the time, fans couldn’t fully grasp the implications of this final scene, but that moment instantly elevated the significance of both weapons. The secret ending was shrouded in mystery, yet the presence of Oathkeeper and Oblivion strongly hinted that the hooded figure had a deep connection to Sora, Riku, and Kairi.It’s clear Nomura had grand plans for Oathkeeper and Oblivion, deliberately threading them deeper into the series’ overarching narrative than most other Keyblades. Still, he probably didn’t expect them to eclipse the franchise’s default weapon: the iconic Kingdom Key. Despite its central role and compelling history as the light counterpart to King Mickey’s Kingdom Key D, not to mention that it initially chose Riku before ultimately selecting Sora, it’s Oathkeeper and Oblivion that has came to embody the emotional core of the franchise, capturing the heartsof millions of fans along the way.See More: #kingdom #hearts #dual #keyblades #oblivion
    WWW.POLYGON.COM
    Kingdom Hearts’ dual Keyblades, Oblivion and Oathkeeper, are the perfect analogy for its story
    With Tetsuya Nomura finally breaking a three-year silence to drop new Kingdom Hearts 4 details, what better time to revisit the series’ most iconic weapon? The Keyblade has long sparked debate — is it a sword? Should it be included in Cool Sword Day celebrations? Or is it simply a giant key-shaped billy club? Regardless of classification, the Keyblade stands as one of the most revolutionary one-handed fictional weapons, alongside the lightsaber — not just for its bold, genre-defying design, but for how deeply it’s woven into the lore, with each unique Keyblade symbolizing each wielder’s alignment with light or darkness.While the Kingdom Key remains the franchise’s most recognizable blade, thanks largely to its constant presence in marketing, no Keyblade has captured fan devotion quite like Oblivion. Oathkeeper trails closely behind, earning a strong third place. The designers at Square Enix surely know the popularity of these Keyblades in the fandom, as all three appear in every major installment. But beyond their striking designs, it’s Oblivion and Oathkeeper that best embody Kingdom Hearts’ core theme: the eternal clash between light and dark. That makes them far more than just cool weapons; they’re narrative anchors.In the original Kingdom Hearts, most new Keychains — items that transform the appearance and abilities of your Keyblade — are earned by completing Disney-themed worlds. These worlds have usually offered loose retellings of their respective films, often feeling like standalone adventures with minimal connection to the overarching storyline of Kingdom Hearts. However, Oathkeeper and Oblivion came from Traverse Town and Hollow Bastion, respectively, which are two original worlds — meaning, they’re not worlds based on Disney movies. What’s more, the Keychains for each weapon have a strong significance for Kingdom Hearts’ protagonist Sora; one is deeply tied to Kairi, his love interest, and the other to his best frenemy, Riku. Image: Square EnixKairi gives Sora the Oathkeeper after he awakens her from her slumber and brings her to Traverse Town for safety. She offers him her “lucky charm” as a promise that they’ll be reunited. The charm resembles a Paopu Fruit from their home, Destiny Island — a fruit said to bind the destinies of two people who share it, ensuring they’ll always be connected, no matter what. Meanwhile, Oblivion is found in a chest in Hollow Bastion, mere feet away from Sora’s final confrontation with Riku — a confrontation that mirrors their playful sparring match at the beginning of the game.Oathkeeper and Oblivion have always shared a yin-and-yang dynamic, reflected in everything from how they’re acquired to the two characters they’re tied to; that’s even before we factor in their stark white and black color schemes. Oblivion’s in-game ability focuses on strength, while Oathkeeper prioritizes magic. Oathkeeper’s appearance emphasizes the elegance of a Keyblade, while Oblivion highlights the destruction. They’re a terrific pair; they went together like lamb and tuna fish. What has truly cemented the importance of these two Keyblades is their prominent appearance in the game’s secret ending, Deep Dive / Another Side, Another Story. It features a hooded figure in an unknown location, dual-wielding both Oblivion and Oathkeeper in a fight with another mysterious silver-haired figure, who ends up taking and wielding Oblivion during the confrontation. Little did we know then that the hooded figure was Roxas, another version of Sora, and that Riku was the silver-haired man who took Oblivion for himself. At the time, fans couldn’t fully grasp the implications of this final scene, but that moment instantly elevated the significance of both weapons. The secret ending was shrouded in mystery, yet the presence of Oathkeeper and Oblivion strongly hinted that the hooded figure had a deep connection to Sora, Riku, and Kairi.It’s clear Nomura had grand plans for Oathkeeper and Oblivion, deliberately threading them deeper into the series’ overarching narrative than most other Keyblades. Still, he probably didn’t expect them to eclipse the franchise’s default weapon: the iconic Kingdom Key. Despite its central role and compelling history as the light counterpart to King Mickey’s Kingdom Key D, not to mention that it initially chose Riku before ultimately selecting Sora, it’s Oathkeeper and Oblivion that has came to embody the emotional core of the franchise, capturing the hearts (pun intended) of millions of fans along the way.See More:
    0 Σχόλια 0 Μοιράστηκε
  • What Makes Elden Ring Nightreign the Most Anticipated Game of 2025?

    There’s a fresh wave of co-operative action-slash-shooters on the horizon, all vying for your squad’s attention and all looking decent, for the most part: ARC Raiders, FBC: Firebreak, Marathon, amongst others. It feels like we’re on the cusp of a new golden age in online co-op, so to pitch Elden Ring Nightreign as the cream of the crop, as one of 2025’s biggest games, we must be confident it has both the magic to entice players into its world and the power to make them stay.  We’ve between now and Nightreign’s worldwide release on 30th May to convince you this is the one to plump for if you’re on the fence as to which of 2025’s upcoming blockbuster co-ops to funnel your hours into.
    Straight off the bat, first thing to state with Elden Ring Nightreign is this is a standalone adventure. Not only do players require zero prior knowledge of Elden Ring’s expansive narrative and lore to get the best out of Nightreign but, unlike last year’s Shadow of the Erdtree expansion, players don’t even need to own the original title. This is a one-time purchase, not live service, no seasons, or battle passes – at least, there’s nothing officially announced at time of this feature’s creation. Instead, squads of three can jump right in and start battling away in a reimagined version of Elden Ring starting area Limgrave, rebranded here as Limveld.

    The premise is straightforward enough: Elden Ring Nightreign is an action survival adventure with roguelike structure. Three warriors find themselves castaway in a hostile realm, an environment lulling them in with its lush pastures and golden canopies, yet bandits, soldiers, and monsters – some cameoing out of Elden Ring, some brand-new creations cooked up by FromSoftware – stalk the landscape. The task is to kill and pillage, to scavenge the loot of your slain foe to level up during each run. Runs last three days, and this scavenging phase takes place during daytime. An ever-shrinking battle royale-style perimeter – confusingly dubbed the Night Rain, as in rain shower – channels players to the map’s centre where an end-of-day boss awaits. The clock is ticking, and as a result exploration is much less cerebral than FromSoft’s usual Souls style. Exploration is still critical mind, just done at a ramped-up pace. Supporting all the bandit slaying are subterranean caves dotted with treasure, guarded bastions harbouring documents, short environmental puzzles, and middling bosses.
    Should squads survive two nights in Lemveld then they’ll be transported to an arena known as the Spirit Shelter where they can put all their skills and upgrades to the test and take on one of eight pre-chosen mega bosses, known as Nightlords. If Elden Ring’s boss battles are anything to go by, these climactic showdowns at the end of a couple of days’ toil are sure to be a spectacle.
    Each run begins with players at level one but Nightreign’s upgrades, via discoverable runes, come quickly. In fact, levelling up in this Elden Ring spin-off is extremely fast, and to demonstrate Nightreign’s pick-up-and-play ethos adding XP to your character isn’t as arduous a task as it is in FromSoftware’s other titles. Spending runes here levels up your character whilst boosting their overall stats. There’s no time to labour over which ability to upgrade. Furthermore, each of the game’s playable heroes can wield just about every weapon; it’s their unique skills and abilities which distinguish them from each other. So, build customisation is a shade more limited compared to traditional RPG levelling up, but it is possible in the form of randomised loot which, of course, is dropped by downed enemies. Some of this loot functions passively – weapon stat buffs, elemental and physical affinities, and numerous other effects – and some is housed in breakable chests that usually contain some sort of consumable to upgrade weapon damage or similar.

    Progression outside of the action exists too in the form of advancing character stories. See, in between runs players return to an alternative version of the Roundtable Hold from Elden Ring and here, alongside affixing permanent runic upgrades, they’ll be able to experience a form of narrative progression for each of the game’s eight hero characters. Before we get into describing these characters in-depth, it’s worth pointing out that FromSoftware have stated that as each character’s story advances then the world of Limveld will re-shape and react in tandem. It’s incarnation upon starting the game is a mix of fixed structures and landmarks, but – to alleviate any staleness – there’ll be elements of variation in where enemies spawn and the like. As an aside, dramatic, unexpected changes can occur too: crashing meteorites, boss ambushes, and… uhm, sudden volcanoes.
    So, onto Elden Ring Nightreign’s cast of heroes and, yes, we’re calling them heroes as FromSoftware have clearly gone down the route that’s well established by Apex Legends and Overwatch, et cetera. Each hero in Elden Ring Nightreign is uniquely skilled, with their own abilities and combat style. Together with collectable loot and upgrades, this blend of skills across three-player teams is sure to create innumerably powerful synergies. Unlike FromSoft’s usual fayre, there isn’t ability to create or customise these characters beyond permanent upgrades and collectable outfits. As you’d expect, there’s breadth to the cast though. All info on their uniqueness is available on Bandai Namco’s website, but just know that each playable hero possesses distinct passive ability, character skill, and ultimate art, the latter being a powerful signature move.
    Wylder is an easy to learn tough to master hero who’s attacking and defensive capabilities are evenly balanced. Their passive ability – Sixth Sense – allows them one free respawn, presumably retaining runes that’d be dropped in any other death. Raider is tough as old boots, a powerful, armour-clad sea farer who wields humungous weapons. Ironeye is an archer with pinpoint accuracy, Recluse is the mage able to conjure powerful spells and cursed magic. Guardian is defensive, with a solid shield that can withstand the most ferocious attacks. Finally, Duchess is like the spy, nimble, swift, and evasive, with an ultimate art capable of making herself and the rest of the squad invisible.
    At face value, without considering any runic powerups, there’re clear strategies that Nightreign players can pursue. For example: Ironeye’s character skill marks enemy weakpoints, Raider’s retaliate skill pummels the marked enemy until they recoil, before Wylder unleashes their powerful character art onslaught stake to finish the stunned foe off. The fact that these situations will occur at breakneck speed is enticing. FromSoftware, as per reports of early demo players, haven’t reinvented the wheel when it comes to Elden Ring’s combat. Veterans of The Lands Between will feel right at home when the skirmishes commence. With scalable difficulties – another first in FromSoftware’s Souls canon – there’s the hope here that players with less finely-tuned reflexes will finally be able to enjoy the ravishing combat upon which FromSoft have made their name.
    Players cannot expect this to perform like a multi-player Soulslike though, no. Elden Ring Nightreign is very much its own thing, taking the macabre universe already established in its single player guises and translating it into an experience more akin to Apex Predators or – sacrilegiously perhaps – Fortnite. It’s a sure-fire winning combination, and one that has potential to elevate Elden Ring Nightreign above the pile of co-op games coming out before the end of the year. 
    Note: The views expressed in this article are those of the author and do not necessarily represent the views of, and should not be attributed to, GamingBolt as an organization.
    #what #makes #elden #ring #nightreign
    What Makes Elden Ring Nightreign the Most Anticipated Game of 2025?
    There’s a fresh wave of co-operative action-slash-shooters on the horizon, all vying for your squad’s attention and all looking decent, for the most part: ARC Raiders, FBC: Firebreak, Marathon, amongst others. It feels like we’re on the cusp of a new golden age in online co-op, so to pitch Elden Ring Nightreign as the cream of the crop, as one of 2025’s biggest games, we must be confident it has both the magic to entice players into its world and the power to make them stay.  We’ve between now and Nightreign’s worldwide release on 30th May to convince you this is the one to plump for if you’re on the fence as to which of 2025’s upcoming blockbuster co-ops to funnel your hours into. Straight off the bat, first thing to state with Elden Ring Nightreign is this is a standalone adventure. Not only do players require zero prior knowledge of Elden Ring’s expansive narrative and lore to get the best out of Nightreign but, unlike last year’s Shadow of the Erdtree expansion, players don’t even need to own the original title. This is a one-time purchase, not live service, no seasons, or battle passes – at least, there’s nothing officially announced at time of this feature’s creation. Instead, squads of three can jump right in and start battling away in a reimagined version of Elden Ring starting area Limgrave, rebranded here as Limveld. The premise is straightforward enough: Elden Ring Nightreign is an action survival adventure with roguelike structure. Three warriors find themselves castaway in a hostile realm, an environment lulling them in with its lush pastures and golden canopies, yet bandits, soldiers, and monsters – some cameoing out of Elden Ring, some brand-new creations cooked up by FromSoftware – stalk the landscape. The task is to kill and pillage, to scavenge the loot of your slain foe to level up during each run. Runs last three days, and this scavenging phase takes place during daytime. An ever-shrinking battle royale-style perimeter – confusingly dubbed the Night Rain, as in rain shower – channels players to the map’s centre where an end-of-day boss awaits. The clock is ticking, and as a result exploration is much less cerebral than FromSoft’s usual Souls style. Exploration is still critical mind, just done at a ramped-up pace. Supporting all the bandit slaying are subterranean caves dotted with treasure, guarded bastions harbouring documents, short environmental puzzles, and middling bosses. Should squads survive two nights in Lemveld then they’ll be transported to an arena known as the Spirit Shelter where they can put all their skills and upgrades to the test and take on one of eight pre-chosen mega bosses, known as Nightlords. If Elden Ring’s boss battles are anything to go by, these climactic showdowns at the end of a couple of days’ toil are sure to be a spectacle. Each run begins with players at level one but Nightreign’s upgrades, via discoverable runes, come quickly. In fact, levelling up in this Elden Ring spin-off is extremely fast, and to demonstrate Nightreign’s pick-up-and-play ethos adding XP to your character isn’t as arduous a task as it is in FromSoftware’s other titles. Spending runes here levels up your character whilst boosting their overall stats. There’s no time to labour over which ability to upgrade. Furthermore, each of the game’s playable heroes can wield just about every weapon; it’s their unique skills and abilities which distinguish them from each other. So, build customisation is a shade more limited compared to traditional RPG levelling up, but it is possible in the form of randomised loot which, of course, is dropped by downed enemies. Some of this loot functions passively – weapon stat buffs, elemental and physical affinities, and numerous other effects – and some is housed in breakable chests that usually contain some sort of consumable to upgrade weapon damage or similar. Progression outside of the action exists too in the form of advancing character stories. See, in between runs players return to an alternative version of the Roundtable Hold from Elden Ring and here, alongside affixing permanent runic upgrades, they’ll be able to experience a form of narrative progression for each of the game’s eight hero characters. Before we get into describing these characters in-depth, it’s worth pointing out that FromSoftware have stated that as each character’s story advances then the world of Limveld will re-shape and react in tandem. It’s incarnation upon starting the game is a mix of fixed structures and landmarks, but – to alleviate any staleness – there’ll be elements of variation in where enemies spawn and the like. As an aside, dramatic, unexpected changes can occur too: crashing meteorites, boss ambushes, and… uhm, sudden volcanoes. So, onto Elden Ring Nightreign’s cast of heroes and, yes, we’re calling them heroes as FromSoftware have clearly gone down the route that’s well established by Apex Legends and Overwatch, et cetera. Each hero in Elden Ring Nightreign is uniquely skilled, with their own abilities and combat style. Together with collectable loot and upgrades, this blend of skills across three-player teams is sure to create innumerably powerful synergies. Unlike FromSoft’s usual fayre, there isn’t ability to create or customise these characters beyond permanent upgrades and collectable outfits. As you’d expect, there’s breadth to the cast though. All info on their uniqueness is available on Bandai Namco’s website, but just know that each playable hero possesses distinct passive ability, character skill, and ultimate art, the latter being a powerful signature move. Wylder is an easy to learn tough to master hero who’s attacking and defensive capabilities are evenly balanced. Their passive ability – Sixth Sense – allows them one free respawn, presumably retaining runes that’d be dropped in any other death. Raider is tough as old boots, a powerful, armour-clad sea farer who wields humungous weapons. Ironeye is an archer with pinpoint accuracy, Recluse is the mage able to conjure powerful spells and cursed magic. Guardian is defensive, with a solid shield that can withstand the most ferocious attacks. Finally, Duchess is like the spy, nimble, swift, and evasive, with an ultimate art capable of making herself and the rest of the squad invisible. At face value, without considering any runic powerups, there’re clear strategies that Nightreign players can pursue. For example: Ironeye’s character skill marks enemy weakpoints, Raider’s retaliate skill pummels the marked enemy until they recoil, before Wylder unleashes their powerful character art onslaught stake to finish the stunned foe off. The fact that these situations will occur at breakneck speed is enticing. FromSoftware, as per reports of early demo players, haven’t reinvented the wheel when it comes to Elden Ring’s combat. Veterans of The Lands Between will feel right at home when the skirmishes commence. With scalable difficulties – another first in FromSoftware’s Souls canon – there’s the hope here that players with less finely-tuned reflexes will finally be able to enjoy the ravishing combat upon which FromSoft have made their name. Players cannot expect this to perform like a multi-player Soulslike though, no. Elden Ring Nightreign is very much its own thing, taking the macabre universe already established in its single player guises and translating it into an experience more akin to Apex Predators or – sacrilegiously perhaps – Fortnite. It’s a sure-fire winning combination, and one that has potential to elevate Elden Ring Nightreign above the pile of co-op games coming out before the end of the year.  Note: The views expressed in this article are those of the author and do not necessarily represent the views of, and should not be attributed to, GamingBolt as an organization. #what #makes #elden #ring #nightreign
    GAMINGBOLT.COM
    What Makes Elden Ring Nightreign the Most Anticipated Game of 2025?
    There’s a fresh wave of co-operative action-slash-shooters on the horizon, all vying for your squad’s attention and all looking decent, for the most part: ARC Raiders, FBC: Firebreak, Marathon, amongst others. It feels like we’re on the cusp of a new golden age in online co-op, so to pitch Elden Ring Nightreign as the cream of the crop, as one of 2025’s biggest games, we must be confident it has both the magic to entice players into its world and the power to make them stay.  We’ve between now and Nightreign’s worldwide release on 30th May to convince you this is the one to plump for if you’re on the fence as to which of 2025’s upcoming blockbuster co-ops to funnel your hours into. Straight off the bat, first thing to state with Elden Ring Nightreign is this is a standalone adventure. Not only do players require zero prior knowledge of Elden Ring’s expansive narrative and lore to get the best out of Nightreign but, unlike last year’s Shadow of the Erdtree expansion, players don’t even need to own the original title. This is a one-time purchase, not live service, no seasons, or battle passes – at least, there’s nothing officially announced at time of this feature’s creation. Instead, squads of three can jump right in and start battling away in a reimagined version of Elden Ring starting area Limgrave, rebranded here as Limveld. The premise is straightforward enough: Elden Ring Nightreign is an action survival adventure with roguelike structure. Three warriors find themselves castaway in a hostile realm, an environment lulling them in with its lush pastures and golden canopies, yet bandits, soldiers, and monsters – some cameoing out of Elden Ring, some brand-new creations cooked up by FromSoftware – stalk the landscape. The task is to kill and pillage, to scavenge the loot of your slain foe to level up during each run. Runs last three days, and this scavenging phase takes place during daytime. An ever-shrinking battle royale-style perimeter – confusingly dubbed the Night Rain, as in rain shower – channels players to the map’s centre where an end-of-day boss awaits. The clock is ticking, and as a result exploration is much less cerebral than FromSoft’s usual Souls style. Exploration is still critical mind, just done at a ramped-up pace. Supporting all the bandit slaying are subterranean caves dotted with treasure, guarded bastions harbouring documents, short environmental puzzles, and middling bosses. Should squads survive two nights in Lemveld then they’ll be transported to an arena known as the Spirit Shelter where they can put all their skills and upgrades to the test and take on one of eight pre-chosen mega bosses, known as Nightlords. If Elden Ring’s boss battles are anything to go by, these climactic showdowns at the end of a couple of days’ toil are sure to be a spectacle. Each run begins with players at level one but Nightreign’s upgrades, via discoverable runes, come quickly. In fact, levelling up in this Elden Ring spin-off is extremely fast, and to demonstrate Nightreign’s pick-up-and-play ethos adding XP to your character isn’t as arduous a task as it is in FromSoftware’s other titles. Spending runes here levels up your character whilst boosting their overall stats. There’s no time to labour over which ability to upgrade. Furthermore, each of the game’s playable heroes can wield just about every weapon; it’s their unique skills and abilities which distinguish them from each other. So, build customisation is a shade more limited compared to traditional RPG levelling up, but it is possible in the form of randomised loot which, of course, is dropped by downed enemies. Some of this loot functions passively – weapon stat buffs, elemental and physical affinities, and numerous other effects – and some is housed in breakable chests that usually contain some sort of consumable to upgrade weapon damage or similar. Progression outside of the action exists too in the form of advancing character stories. See, in between runs players return to an alternative version of the Roundtable Hold from Elden Ring and here, alongside affixing permanent runic upgrades, they’ll be able to experience a form of narrative progression for each of the game’s eight hero characters. Before we get into describing these characters in-depth, it’s worth pointing out that FromSoftware have stated that as each character’s story advances then the world of Limveld will re-shape and react in tandem. It’s incarnation upon starting the game is a mix of fixed structures and landmarks, but – to alleviate any staleness – there’ll be elements of variation in where enemies spawn and the like. As an aside, dramatic, unexpected changes can occur too: crashing meteorites, boss ambushes, and… uhm, sudden volcanoes. So, onto Elden Ring Nightreign’s cast of heroes and, yes, we’re calling them heroes as FromSoftware have clearly gone down the route that’s well established by Apex Legends and Overwatch, et cetera. Each hero in Elden Ring Nightreign is uniquely skilled, with their own abilities and combat style. Together with collectable loot and upgrades, this blend of skills across three-player teams is sure to create innumerably powerful synergies. Unlike FromSoft’s usual fayre, there isn’t ability to create or customise these characters beyond permanent upgrades and collectable outfits. As you’d expect, there’s breadth to the cast though. All info on their uniqueness is available on Bandai Namco’s website, but just know that each playable hero possesses distinct passive ability, character skill, and ultimate art, the latter being a powerful signature move. Wylder is an easy to learn tough to master hero who’s attacking and defensive capabilities are evenly balanced. Their passive ability – Sixth Sense – allows them one free respawn, presumably retaining runes that’d be dropped in any other death. Raider is tough as old boots, a powerful, armour-clad sea farer who wields humungous weapons. Ironeye is an archer with pinpoint accuracy, Recluse is the mage able to conjure powerful spells and cursed magic. Guardian is defensive, with a solid shield that can withstand the most ferocious attacks. Finally, Duchess is like the spy, nimble, swift, and evasive, with an ultimate art capable of making herself and the rest of the squad invisible. At face value, without considering any runic powerups, there’re clear strategies that Nightreign players can pursue. For example: Ironeye’s character skill marks enemy weakpoints, Raider’s retaliate skill pummels the marked enemy until they recoil, before Wylder unleashes their powerful character art onslaught stake to finish the stunned foe off. The fact that these situations will occur at breakneck speed is enticing. FromSoftware, as per reports of early demo players, haven’t reinvented the wheel when it comes to Elden Ring’s combat. Veterans of The Lands Between will feel right at home when the skirmishes commence. With scalable difficulties – another first in FromSoftware’s Souls canon – there’s the hope here that players with less finely-tuned reflexes will finally be able to enjoy the ravishing combat upon which FromSoft have made their name. Players cannot expect this to perform like a multi-player Soulslike though, no. Elden Ring Nightreign is very much its own thing, taking the macabre universe already established in its single player guises and translating it into an experience more akin to Apex Predators or – sacrilegiously perhaps – Fortnite. It’s a sure-fire winning combination, and one that has potential to elevate Elden Ring Nightreign above the pile of co-op games coming out before the end of the year.  Note: The views expressed in this article are those of the author and do not necessarily represent the views of, and should not be attributed to, GamingBolt as an organization.
    0 Σχόλια 0 Μοιράστηκε