Welcome to the Game

Welcome to the Game

56 ratings
Descriptive Guide on Surviving, Locating Keys, Prevent Hacking, and Other Useful Tips
By rip in vacation (KraZ)
Finding it difficult to survive from the criminals lurking in the outside world? Having trouble finding keys within the Deep Web? Do you want some helpful advice for making the game easier like recognizing sound cues and preventing hacks? Here is my Descriptive Guide on how to easily survive and complete "Welcome to the Game"!
   
Award
Favorite
Favorited
Unfavorite
Step 1: Prevent Getting Hacked - How To Master
In this section, I will be talking about tips and tricks onto how to master the prevention of getting hacked. It is important to understand the mechanics of these "minigames" to prevent losing days (for some reason) which could result in a Game Over, and to prevent losing your notes, which are very important as the days get more difficult, making it almost impossible to retrieve them again. Here they are...

Denial of Service (D.O.S.) Attack - D.O.S_Blocker

Quick review before I discuss this:
Action Nodes are clickable, hollow squares that you can click on to summon an arrow to guide the traffic.
Traffic is the direction the source is going (shown by a node with slightly transparent green color filling the square)
Exit Node is where the traffic needs to go after it has activated all the action nodes. It is represented by a USB symbol.

This attack is honestly my least favorite due to how difficult it becomes later in the game and how little time you have to complete it. It requires the most skill, and a lot of luck for an easy generated puzzle. Here are the most important things you should know when getting D.O.S.ed...
  • Remember that the traffic must highlight all the action nodes before it can continue to the exit node. If you fail to highlight all of them and end up going to the exit node, you will get hacked.
  • Preemptively move your mouse along the arrows to find the best route. This may take some trial and error, but both time and speed is of the essence so you have no choice but to quickly navigate a correct direction for the traffic to follow.
  • Memorizing these could be crucial: 1 click = Up | 2 clicks = Right | 3 clicks = Down | 4 clicks = Left
  • The game will tell you if you set the action node in the right location!! Three things will happen when the traffic arrives at the node:
    1. It will continue along the path (correct)
    2. It will continue along the path, but towards the the exit (pay close attention, otherwise this may happen and you will get hacked!!)
    3. It will reset back to the beginning (meaning the arrow is pointing the wrong direction)
  • Sometimes you may have to change the direction of an action node after it has already been activated. This introduces another concept of why this attack is very frustrating. When this happens, it means the traffic is going in a sort of loop in which it activates the node, follows the arrows towards a random path whether to another action node or not, then back to the pre-activated node. If this happens, you'll have no choice but to locate the route even quicker.
  • Your middle-mouse button is an essential element! If you find yourself either running out of time, you've already found the route, or you're just about to wing it and hoping you get lucky, it is very important to use your middle-mouse button to speed up the process. When doing so, you accelerate the speed of the traffic without losing more time (the time declines at the same speed no matter what).

Pro Tip: one strategy I use is to hold down the middle-mouse button ALWAYS. This allows me to see where the traffic goes quicker than having to find a route myself. The downfall is, again, I might accidentally get to the exit node without activating all the others.

Kernal Attack - K3RN3LCOMP1L3R

This attack doesn't really need much explaining. Sadly, the only chance you can prevent from getting hacked from this attack is to just be a fast typer. It requires both skill in typing speed and luck in the difficulty of the text. Here are a couple of tips to help improve and recognize certain situations...
  • This is my favorite type of attack since I have a high average WPM (words per minute) of 80, making it easy to prevent getting hacked. My recommended WPM for you to be comfortable or close to comfortable would be 40-50+ WPM.
  • The best way you can improve your typing speed is to practice the Kernal Attack minigame in the "Hacker Mode" DLC for Welcome to the Game. Not only will this help you develop fast fingers, but it will also benefit by making you get used to typing unfamiliar and unused characters like "{}" ";" "[]" "<>" "=" "+" and so on.
  • If you are unable to get the "Hacker Mode" DLC or you are just unskilled in the typing regional area in general, in which you cannot type normal, everyday words comfortably and/or without looking at the keyboard (every now and then is fine, but constant contact with your keyboard is corruptive in this sense), then I suggest simple WPM- and typing-improving websites like "https://www.typing.com/typinglessons", "https://www.keyhero.com/wpm-typing-tips/", and "https://www.nitrotype.com/". (pls dont ban me i no advertize)

Vector Acess Performance Executer (V.A.P.E.) Attack - CloudGrid

This attack requires the most luck out of all three of them. Due to certain difficulties within the randomization of these challenges, this attack can either be very easy or very difficult. The most common tactic I want to share with you guys is the "Checker Board" tactic, in which when you start from top to bottom, you arrange the memory segments (the cloud squares) in a checkerboard pattern. For example:

☐ 回 ☐ ☒ ☐ → 回 ☐ 回 ☐ 回 ........ ☠ = unassignable spaces
☐ ☠ ☐ ☒ ☐ → ☐ ☠ ☐ 回 ☐ ......... ☐ = blank spaces
☐ ☒ ☐ ☒ ☐ → 回 ☐ 回 ☐ ☐ ......... ☒ = incomplete memory segment
☐ ☒ ☒ ☐ ☐ → ☐ 回 ☐ ☐ ☐ .......... 回 = complete memory segment
回 ☐ ☐ ☠ ☐ → 回 ☐ ☐ ☠ ☐

The only downfall for this tactic is that it can be time consuming...

Moving on... there are a couple of patterns that will generate that are easy to decipher and rearrange. Memorizing these patterns can help fend you off from getting hacked by giving you more time. Most of these can be solved from common logical sense; here are a few of them:

☒ ☒ ☐ → ☐ 回 ☐
☒ ☐ ☐ → 回 ☐ 回
☐ ☐ ☐ → ☐ ☐ ☐

☒ ☒ ☒ → 回 ☐ 回
☐ ☐ ☐ → ☐ 回 ☐
☐ ☐ ☐ → ☐ ☐ ☐

☒ ☐ ☐ → 回 ☐ ☐
☒ ☐ ☐ → ☐ 回 ☐
☒ ☐ ☐ → 回 ☐ ☐

☐ ☒ ☐ → ☐ 回 ☐
☒ ☒ ☒ → 回 ☐ 回
☐ ☐ ☐ → ☐ 回 ☐

☐ ☐ 回 → ☐ ☐ 回
☒ ☐ ☐ → ☐ 回 ☐
☒ ☐ ☐ → 回 ☐ ☐

=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
That's it for this section! Hope I helped you become a better and less vulnerable person against getting hacked! Be sure to check out the other sections for eloquent advice and step-by-step tutorials of how to easily understand the concepts of and win "Welcome to the Game"!
[UNFINISHED] Step 2: Searching for the 8 Keys (& 4 Hidden Key Locations)
In this section, I will be talking about tips and tricks onto how to easily observe your surrounding (online) environment into identifying specific possible locations of the 8 keys. It is important to understand the way the keys are generated in order to advance through the game much easier than you would by pure guesswork. Here they are...

The 8 Randomly-Generated Keys

Before I start under this topic I want to first explain how these keys work:
  • First off, the image to the right show what a key will look like on a screen or in a notepad on your desk (more info about that later).
  • The number before the hyphen indicates the location of the key in the Red Room URL.
  • The 4 random characters after the hyphen are part of what the Red Room's URL is composed of.
  • Given these facts, an example would be two keys labeled "1 - gt68 " and "2 - g7b3 ". Since there is a "1" before the hyphen on the first key, then it goes at the beginning of the Red Room URL. The other code has a 2 before the hyphen, indicating it goes after the first key. The final product would be the following:

    "http://gt68g7b3 (the other 6 keys) .ann"

How to easily locate these keys:

In this game, these keys are NOT completely randomly generated, there ARE some patterns when keys spawn in different websites. Here are the most vital tips and tricks you are going to want to know...

SIDE NOTE: If you come across a clickable image/text of some sort, the Key will either spawn somewhere on that page or on your desktop as a ".txt" file.

  • Picture...
    - Be sure to check every image, photo, or pretty much anything not text-related. Highlight your mouse over it to make sure it is or isn't clickable.
    - Look for anything in the picture that may stick out. Although some sites (like The Bomb Maker ) you only have to move your cursor over a picture to find a link, other sites (preferably ones with big images) will have clickable figures within the images, like the stash of cash in the the man's hand at "Tango Down".









The 4 Hidden Keys (Locations)


Greet My Sisters
  • Abbey's toe
  • Abbey's ring
  • Samantha's button on her jeans
  • (there may be others...)
Grandma's Fantasy
  • The picture of the man in the text message (entry 2)
  • The grandma's right eye
  • The grandma's left eye
  • The grandma's mouth
NudeYoutubers
  • Any of the nipples
Testical Mutilation
  • Left top lift/heel tip/top piece
  • Right top lift/heel tip/top piece
  • The tip of the hand crimping tool
  • (there may be others...)

    HOW DO THE SECRET KEYS WORK??
    Sadly, there is no way to get the secret ending unless you have the Red Room URL. But if you do, follow these steps:
    Once you find all four keys from all four websites, they should've all appeared on your desk as .txt files. Once this has happened, you must open all the text files and enter the Red Room by entering the 8-key generated URL. DO NOT WORRY, this does not lead you to the Red Room, but rather a seperate cutscene:
    Your phone starts ringing, and you are forced out of your computer screen as your character (now non-playable) picks it up. The main character is a girl; she starts speaking to a man on the phone. These two know each other; the man talks you into doing what the two of you have been planning that night. She also adresses the man as "babe" (is there a relationship going on?). Once she informs the man that she's on her way, she hangs up and heads to the living room and looks into the mirror, gussying up. The screen then blacks out and "2017 Q2" appears on it...

    =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
    That's it for this section! Hope I helped your key-locating skills improve! Be sure to check out the other sections for eloquent advice and step-by-step tutorials of how to easily understand the concepts of and win "Welcome to the Game"!
[NOT STARTED] Step 3: The Kidnapper and the Killer (how to deal with/what are the cues?)
"The Gatekeeper" Answers

From The Gatekeeper Wiki ( http://welcometothegame.wikia.com/wiki/The_Gatekeeper ):
  • "How much does it cost to access the shadow web?" - Answer: $200
  • "At which day did the Mobile Rat arrive on zeroDay?" - Answer: 042116
  • "How many sites did the Takedownman take down?" - Answer: 162
  • "How much does Cotton Road sell Crystal Meth for?" - Answer: $250
  • "What is the FacePage login password for Tony Lee Smith from Seattle, WA?" - Answer: gearsUPdownUP
  • "How many operational warehouses does Warehouse 33 have?" - Answer: 4
  • "What is the name of the pastor who wants to purge the world of heretics?" - Answer: Donald
  • "On Weed Post which of the following products will burn your lungs?" - Answer: Roger Dodger
  • "A confession reveals that this individuals desires to be kidnapped and raped. How old is this individual?" - Answer: 22
  • "Who is the author of Butchering the Human Carcass for Human Consumption?" - Answer: Bob Arson
  • "How much is an AK-47 on Hot Burners?" - Answer: $800
  • "What is the cheapest place to purchase Heroine?" - Answer: The Family Drug Shop
  • "How old is the slave doll Tanya?" - Answer: 22
  • "How much is a 1911 on The Bunker?" - Answer: $1,200
  • "What are the first four letters for Legions hash message?" - Answer: MIIF
  • "What do the Loogaroo request you bring them?" - Answer: Blood
  • "What drug does The Family Drug Store not sell?" - Answer: LSD
  • "The one's who follow the cult of theistic satanists ask for teaching of?" - Answer: Strength
  • "How much does Pay 2 Rape cost for two hours?" - Answer: $2000
  • "What pay method does The Muhgel accept?" - Answer: Bitcoins
  • "At which level does Bathroom Cams let you see bathroom stalls?" - Answer: Second Level
  • "Which weapon isn't on EuroFirearms?" - Answer: 1911
  • "Which item is not listed on Grave Thieves?" - Answer: Coins
  • "On Death Log, how does somebody found their parents?" - Answer: Suicide/Homicine
  • "Which one is the most affordable passport?" - Answer: Camouflage
  • "Which gift gives streight to the family bond?" - Answer: Michael
  • "What is the minimum count of women for a hunt?" - Answer: Five
  • "How many people are there in Hidden Cams?" - Answer: 15
  • "What's the 6th picture on Is Evil?" - Answer: A heart
  • "What's the price of 30ml of winstrol?" - Answer: $240
  • "What item is not listed on Organ Mart?" - Answer: Lung
  • "How much does it cost to access Scream ♥♥♥♥♥?" - Answer: $500
  • "How much costs a consultion on Doctor Murder?" - Answer: $10.000
  • "Which century took people upon themselves to rid the world of witches?" - Answer: 15th
  • "Who bares it all?" - Answer: Suzy Lu
  • "Which target in Kill For Me pays $8.000?" - Answer: Megan
  • "Which package for Greet MySisters has a live chat?" - Answer: Deluxe
  • "What are the last four digits of the contact URL of DarkBook?" - Answer: 8e99
  • "What ingredient does the Bomb Maker use for his work?" - Answer: Bleach
  • "What color have the heels on Testical Mutilation?" - Answer: White
Other The Gatekeeper Answers (some may be missing because I've been finding the rest):
  • "Which of the following does Cheap Surgery NOT offer?" - Answer:
  • "Which entry on Grandmas Fantasy introduces Park?" - Answer:
  • "How often do the flesh traders meet up? - Answer: Once a Month
If you know any ANSWERS missing in this Guide for The Gatekeeper, please leave a comment below with the Full Question and Answer. Thanks!
7 Comments
D0RKU5 14 Nov, 2023 @ 7:40am 
that one part where the killer runs at you is so much more intense when lights are off, literally was speechless for ten whole minutes
TopCapo 25 Dec, 2020 @ 3:26pm 
Love the guide man, keep up the great work! I know I'm a little late to the show, but I'd still love to see the outcome :)
Mishka 4 Nov, 2017 @ 9:13am 
Imgay
Kotzwurst 6 Sep, 2017 @ 1:08pm 
Very good guide this far!
stoical silence 7 Aug, 2017 @ 3:23pm 
Missing Answer to The Gatekeeper

"Which entry on Grandmas Fantasy introduces Park?" - Answer: Entry 4
slinky 2 Jul, 2017 @ 6:18am 
HELO GAIS
rsquare88 27 Dec, 2016 @ 9:38pm 
Very good that this is the only guide that mentions the locations of the 4 keys for alternative ending. Kudos!

On another note, very good to see specific strategies on how to take on each hack.

Most important though is location of Red Room URL keys as it is the most frustrating. There is already a guide started by MsChaCha that has lots of locations for the Red Room codes but there is a big chance that the codes are found in completely random locations on certain sites and it is a game of luck. MsChaCha also put the most accurate guide when it comes to kidnapper and The Breather.

Very nice guide regardless.