Telegraphs 2: Post-attack vulnerability
Previous Article | Next Article My post on telegraphing enemy attacks, was about making an enemy telegraph before it attacks to ask the question: "Can you avoid my attack?" This…
Setups
Review This is one part in a series of articles that attempts to explain how I think when I design. The purpose of these articles is not as much to…