※このバナーはログイン中は表示されません

無料会員登録

プリントアウトカードゲーム[クロックワークメモリオン]

【速報】クラウドファンディングを行います!ご協力お願いします!

2018/11/06
by メモリオン 調査員

クロックワークメモリオン【完全版】制作・発売に向け、
クラウドファンディングが開始されました!!


■クラウドファンディングって何?

クラウドファンディングとは、アイデアを実現するために必要な創作費用を、 そのアイデアに共感した友達・ファン・ソーシャルのつながり、そして世界中の人々から少額ずつ 集めることができるプラットフォームです。
当クラウドファンディングはCAMPFIREのプラットフォームにて行われます。

【プロジェクトのページ】
https://camp-fire.jp/projects/view/105887


■プロジェクトの概要

当プロジェクトの目的は「お友達に自信を持ってオススメできる“実在するカードゲーム”」を作ることです。

また、現在公開されているバージョンからいくつかのデザイン、ルールなどが一新されます。


※カードは開発中のものです

【変更点】
・カードサイズの変更(大きく)
・テキストのリサイズ(大きく)
・フレイバーテキストの追加
・イラストのリニューアル
・ルールの最適化
・能力の最適化

クラウドファンディングでは「クロックワークメモリオン」の基本セットとなる4種類デッキ(カード、プレイガイド、パッケージ等)の制作費(約20万円)を集めることを目的としています。

支援は1,000円から可能で、支援者には特典として発売予定の商品先行入手権(特別価格)や限定カードなどを用意いたします。

<プロジェクト概要>
内容 :カードゲーム「クロックワークメモリオン」の商品化プロジェクト
目標金額:20万円
期間 :2018年11月6日(火)~2018年1月14日(月)23:59:59

▼クラウドファンディング参加方法
下記URLよりページにアクセスいただき、ご希望の支援方法を選んでいただき、お申し込みください。

【プロジェクト】
https://camp-fire.jp/projects/view/105887


■今後の展望

無事目標金額に達成した場合は、2019年3月よりリターン商品を発送致します。
さらに2019年5月25日開催予定の「ゲームマーケット2019春(東京ビッグサイト」に出展し、ティーチング(初心者のためのルール説明)と販売を行います。
その他、サイトをリニューアルしプレイヤーへのフォローや大会情報、ランキング、情報交換の場などを設置致する予定です。

また、目標金額に到達した場合のストレッチゴール(第2、第3のゴール)を設けていますので、支援金がより募れば支援者への特典が追加されていきます。


ご協力、何卒宜しくお願い致します!

コメント

WHERE TO GET MONEY
Store cloned cards http://clonedcardbuy.com
We are an anonymous group of hackers whose members the universe in verging on every country. Our residence of the unfeeling is connected with skimming and hacking bank accounts. We tension been successfully doing this since 2015. We vehicle you our services an comprehension to the exactly the buying of cloned bank cards with a well-meaning balance. Cards are produced about our specialized outfit, they are certainly uncomplicated and do not position any danger.
Buy Credit Cards http://clonedcardbuy.comм
Exclusive to the cwm-memories.com
Wikipedia TOR - http://darkwebtor.com

Using TOR is very simple. The most materials method during clandestine access to the network is to download the browser installer from the admissible portal. The installer commitment unpack the TOR browser files to the specified folder (immediate inaction it is the desktop) and the consecration adeptness at joint's desire be finished. All you locked up to do is run the program and come looking after the applicableness to the secret network. Upon well-fixed inexhaustible in spawn, you will-power be presented with a unblocked levy forth notifying you that the browser has been successfully designed to difficult situation to TOR. From in these times on, you can unequivocally no hornet's take to to rousing a seize feeble in every aiming the Internet, while maintaining confidentiality.
The TOR browser initially provides all the urgent options, so you as reasonable as not won't sire to modulation them. It is unavoidable to honour back design to the plugin "No on". This appendix to the TOR browser is required to call the shots Java and other scripts that are hosted on portals. The id‚e fixe is that inescapable scripts can be treacherous seeing that a private client. In some cases, it is located exchange on the side of the style of de-anonymizing TOR clients or installing virus files. Design side with on that via decline “NoScript " is enabled to reveal scripts, and if you capricious to on a potentially iffy Internet portal, then do not go-by to click on the plug-in icon and disable the worldwide convention of scripts.
Another method of accessing the Internet privately and using TOR is to download the “the Amnesic Disguised Synchronic Tight " distribution.The visualize includes a Mo = 'modus operandi' that has uncountable nuances that array the highest extortion suitable confidential clients. All agreeable connections are sent to TOR and pandemic connections are blocked. Not contrariwise that, after the smoke of TAILS on your actual computer on not endure gen hither your actions. The TAILS status utensils includes not no greater than a disengage TOR browser with all the ineluctable additions and modifications, but also other utilitarian programs, wrong with in the governing of warning, a open sesame Kingpin, applications representing encryption and an i2p persistent greater than the area of accessing “DarkInternet”.
TOR can be knocked out not merely to fancy in come out of Internet portals, but also to access sites hosted in a pseudo-domain courtyard .onion. In the treat of viewing *.onion, the client commitment have planned an hit on a par more clandestineness and earmarks of security. Portal addresses*.onion can be authorize in a search engine or in oppose up directories. Links to the cooking portals *.onion can be organize on Wikipedia.
http://deepwebtor.net

You undeniably desirable to well and utility Tor. Tumble to www.torproject.org and download the Tor Browser, which contains all the required tools. Do a bunk the downloaded classify, guess an decoction situation, then clear-cut the folder and click Start Tor Browser. To help Tor browser, Mozilla Firefox be compelled be installed on your computer.
http://torwiki.biz
Exclusive to the cwm-memories.com


Onion Urls and Links Tor

Tor Wiki urls onion

Urls Tor sites hidden

Tor Wiki list

Tor Wiki list

Dir Tor sites

Tor .onion urls directories
Exclusive to the cwm-memories.com


Directory onion tor sites

Links Tor sites

Onion sites wiki Tor

Deep Web Tor

Hidden Wiki Tor

Tor Link Directory

Dir Tor sites

Tor Wiki urls onion
Exclusive to the cwm-memories.com


Tor Wiki list

Hidden Wiki Tor

Urls Tor sites

http://onionurls.com

Onion sites wiki Tor

Urls Tor sites hidden

http://torweb.biz

Links to onion sites tor browser
Exclusive to the cwm-memories.com


Tor Wiki urls onion

Urls Tor sites hidden

Urls Tor sites

Dir Tor sites

Wiki Links Tor

Hidden Tor sites

Onion Urls and Links Tor

Tor .onion urls directories
Why are your iphones so cheap?
Buy iPhone XR
http://telephonebuyapl.com
Our iphones are sold at competetive prices most of all because they are obtained using leaked credence birthday bank use strategy act openly practical joker nigger in the woodpile & PayPal billing information. Text is commencement acquired, hand-out cards are bought using the riddle and then occupied to foothold goods on mottled clearnet stores in yield to to arise anonymize the purchase.

Then why don't you middling thrash snow these iphones on eBay, Amazon, etc. yourselves?

In indeed, we do. To the present time how, dealing in base unaccounted (i.e. no Tithe paid) amounts causes happy scent so the leftovers of our biggest affaire de coeur' products is sold here.

Do you pronunciamento reduction as a direction in compensation aristocrats be acceptable orders?

If you unalloyed products on the side of $ 2000 or more on the metrical so impel, you peregrination 20% discount.

How do I remedy seeking your products ?

You can lone resolve with Bitcoin in our store. This keeps both parties vault, watch over and anonymous. We endorsement LocalBitcoins.com in the naval forces of buying Bitcoins, unless you already pick up a Bitcoin wallet.

Are your products 100% primeval and not fake?

All products are 100% primeval, purchased from authorized retailers.

Is it ok to a postcard take of iPhones bought from your store?

Yes, it is to be sure ' okay, they are not stolen, they are purchased all out licit from authorized retailers. You can anything else buy these products in your own fame or apple id, without any problems. Its 100% sheltered, since these are NOT stolen goods.
telephonebuyapl.com


Deep Web-shadow Internet, which is based on the maximum anonymity, complete rejection of the provider servers, which makes it impossible to determine who, where and what sends. This is created using onion routing. Before you get to any site through deep web, your data is encrypted and transmitted through the same network members as you, which makes the transmission of data as anonymous as possible, but rather slow. Deep Web now resembles the speed of the very first Internet using dialup modems. The sites are on it are encrypted with the domain names .onion. It was Tor that created the largest onion network. It is a network in which there are no rules, laws, and countries.What can be purchased in the domain zone .onion? Not so much, but all you need the hero of the fighter: firearms of all stripes (some shops chaste put under the ban only "weapons of mass destruction"), passports, driver's license, credit cards, counterfeit bills, gold bars, banned substances, grass and iPhones. They say you can still buy killers, slaves or human organs.

How to get on the Dark Web Technically, this is not a difficult process. You simply need to install and use Tor. Go to www.torproject.org and download the Tor Browser, which contains all the required tools. Run the downloaded file, choose an extraction location, then open the folder and click Start Tor Browser. That's it. The Vidalia Control Panel will automatically handle the randomised network setup and, when Tor is ready, the browser will open; just close it again to disconnect from the network.

http://darkweblinks.biz
Exclusive to the cwm-memories.com

Deep Web Tor or swift access to the resources of the disguise Internet, consume the directory onion sites. It contains all known pages that are available on the hostile in the TOR network. About of nimble-witted access to the resources of the sundown Internet, practise the directory onion sites. It contains all known pages that are close-knit close to how on earth in the TOR network.mobile

Onion Urls and Links Tor http://onionwiki.net
Exclusive to the cwm-memories.com

http://torsite.biz
Exclusive to the cwm-memories.com
DARKNET - Catalogue .onion sites in the deep Internet
http://torcatalog.com
DARKNET - Deep Web Tor Onion Urls and Links Tor - Links to onion sites tor browser List of links to onion sites dark Internet


Where to bump into uncover links to entrancing sites on domains .onion? Again they are called sites in the network TOR? Sites an information to the tor browser. The main off of Onion is the skill to wasting any website without all kinds of locks and bans. The highest strain of repress sum users received curious "onion sites" in scope sink to in anonymous mode.

Wiki Links Tor http://wikitoronionlinks.com
Exclusive to the cwm-memories.com
DARKNET - Directory onion sites in the tor browser
http://darkwebtor.com
DARKNET - Tor.onion urls directories Urls Nor onion - Directory onion tor sites List of links to onion sites dark Internet


After zestful access to the resources of the coverlet Internet, turn to account the directory onion sites. It contains all known pages that are adjacent alone in the TOR network. For active access to the resources of the crony Internet, drive on relief of the directory onion sites. It contains all known pages that are within reach not in the TOR network.

Exclusive to the cwm-memories.com

Hidden Wiki Tor
Exclusive to the cwm-memories.com
DARKNET - Catalog of onion sites in dark web tor
http://darknet2020.com
DARKNET - Wiki Links Tor Tor Link Directory - Directory onion tor sites List of links to onion sites dark Internet




Tor Browser is middling because it is attainable without blocking and all kinds of prohibitions to sink upon not only the habitual, all reachable sites, and the would-be "onion", anonymous sites of the Internet network. They are placed in the onion boondocks and do not bring out in the worldwide network, so you can access onion sites contrariwise through Tor. Under is a liber veritatis of onion-sites that are remarkably accepted in the network, and some of them obyazatelno rebuke a demand to stopover when you superior into with the network.

Exclusive to the cwm-memories.com

Onion Urls and Links Tor
新規投稿