This article is a walkthrough of Welcome to the Game.
Welcome to the Game is a randomly generated puzzle game where you start off navigating the Deep Wiki I in search of eight bits of code called called "keys", hidden within the websites of the Deep Web. You only have 30 in-game days to do so.
In order to beat the game, as listed above, you will need good earshot (to hear sound cues) and fast typing (to be able to avoid Kernel attacks).
There are 2 keys on each Wiki. Deep Wiki I will contain keys 1 and 2. In order to access Deep Wiki II, the player has to complete the puzzle on ChosenAwake, which is always located on the first Deep Wiki. Deep Wiki II has keys 3 and 4. The player will have to complete another puzzle located on Claffis to access the Deep Wiki III, which is always on the second Deep Wiki. Deep Wiki III has keys 5 and 6.
Unlike the other keys, the seventh key is the trickiest as it can be found on ANY of the three wikis, forcing you to check every website.
The Gatekeeper is always on Deep Wiki III and contains the eighth key. Upon entering the site it will quiz you information from other websites. You have to answer eight questions correctly in a row. If you fail a question you'll get hacked and you'll be forced to restart the quiz.
In order to make the game easier, a key cue was added in the 2.0 update. When the player clicks on a link to another site the address bar will load and become blue. If a site has no keys on it the address bar will immediately become white. If a website has a key on it, the address bar will stay blue for 2 seconds before turning white again.
Hopefully, you've been keeping notes of the keys, as you'll need them to complete the final address bar. How it works is that you will have to type in the 4 digits to the keys in numbered order. For example, you start with the 4 digits labeled next to 1, and the digits next to 2 and so on. Once you type every digit in the address bar, enter the site and you have finished the game.
Throughout the game hackers will attempt to steal the players' info. If the player loses hacks they will lose several days and the hackers have a chance of stealing their notes. There are three types of hacks in the game: A D.O.S (Denial of Service) attack, K3RN3LC0MP1L3R (Kernel) attack, and a V.A.P.E (Vector Access Performance Executor) attack.
DOS attacks will display several nodes with arrows, most of which are filler. A few nodes will display a path, but some of them will be empty, and the player has to click the empty nodes to correct the course of travel in order to reach the exit node. If the player does not reach the exit node in time, they will be hacked, and if the player moves a node in the wrong direction the path will restart, but the clock will not.
Kernel attacks will display a certain amount of codes that the player will have to type before the timer above (moving counterclockwise) runs out. If the text turns red while typing, it means the player has typed the wrong letter and has to fix it to match the code above, otherwise the player cannot proceed to the next line. The code has to be EXACT. Typing all lines exactly will block the hack. If the player does not type in the codes in time, they will be hacked.
VAPE attacks will display a CloudGrid like table. At the start of the game, these hacks are 3x3, as the game progresses it becomes a 5x5. In order to block the hack the player has to make the grids adjacent. To eachother. None can be directly on top or next to eachother. If the player does not do this in time, (the clock goes by fast in these attacks), they will be hacked.
As listed earlier, if you fail a hack, the hackers take away several days and there is a chance that they can erase your notes, and is generally a time-waster. In this game time is something you cannot afford. In order to prevent attacks you will have to reset the modem right beside your computer. It will take around 20 seconds to reset.
The Kidnapper is one of two criminals in the game. He will attempt to enter your house to. kidnap you. He'll be active only if you found enough keys or if the van appear outside of your front door. He has two cues that warn of his presence:
Once you see one of these cues, the only way to proceed is to turn off the lights (and if your microphone is enabled, stay dead quiet). After about 20 seconds the Kidnapper will walk by the window, speaking in Russian. Once his footsteps fade, the player might believe he is gone. He only truly leaves once he says "nothing here". Once he says this, you can turn on the lights and proceed back to your computer.
The Breather is the other criminal in the game, who will attempt to kill the player. He'll be active only after his second call. He only enters through the front door, which the player will have to guard in order to prevent him from breaking in.
He has two cues that signal that he has arrived :
Once you hear one of these two sound effects, you have to go to the front door and hold the doorknob shut. He will try to pick the door open.
If you want to get rid of him, you have the option of choosing the discreet method or the fast method.
Watch out for audio cues, some are fake while others mean that you'll die soon, since it can be hard to hear them or understand them on a first playthrough if you feel the need to hear them, here's a video to hear them.
For any who can't watch the video I'll try to describe it for you :
While the breather's sound cues sound like he will enter at any second, he isn't
The player actually has extra time to complete the game if they don't pick up a sound cue. The player has 45 seconds to react to the sound cue after it plays. After that, the enemy is already in the house. If the Breather is in the house, the Location Services icon will appear after the 45 second timeframe to trick the player into looking behind them. After the 45-second timeframe, the player has another 120 seconds (2 minutes) to keep browsing before the game forces the player out of computer mode to confront the attacker, which will lead to a Game Over.