Ethan Heilman

Main || Writing

Three Great Games I Played at the Boston Festival of Indie Games

9-18-2013 4:31PM (ET)


Synthesis is a very pretty game, but watching other people play it didn't look that engaging. Synthesis has to be played to be understood, it is strangely, oddly, engaging. It has serious flow. Synthesis is a continuous graph based cellular automata sandbox game. If you ever wasted a few hours playing with Conway's Game of Life, this is the game for you. It takes everything fun about clicking randomly, pushing start and seeing unexpected emergent patterns and turns it up to 11. For such a deep game the UI is simple but allows complex actions such as writing novel automata and introducing them into the world. Think Steven Wolfram's A New Kind of Science on DMT in game form.


PWN Combat Hacking:

PWN Combat Hacking has two players compete to take over (hack) nodes (computers) in a graph (network). The game plays and looks suspiciously like the final hacker battle in the 1995 film Hackers. PWN has simple rules that result in well executed gameplay. Sadly I haven't been able to play it since FIG because attempting to update OSX from 10.7 to 10.8 (PWN only works on 10.8) resulted in catastrophic harddrive failure.

PWN Combat Hacking


Nika is a board game inspired by Peloponnesian War. It manages to abstract both the tactical elements of hoplites fighting in Phalanx and strategic elements. These strategic elements include cooperation between allied armies, and trade-offs between defense and offense. More incredibly it does this with a very simple set of rules. The game was explained to me and I was off and playing within three minutes. I've played more than my fair share of strategic games, I've even designed a few. Nika feels different strategically than other games. I couldn't map it into another game I was good at and that felt wonderful. There is something about Nika that was really fresh and kept me guessing. Wind Catcher Games is planning to sell it in the future by sadly it is not currently available.


NEXT On Trusting Authorities: Weighing the Risks of the RPKI

PREV Why Google Should Customize your Gmail Login Page to Prevent Phishing.