The Chaos Academy game is a card project in which you need to collect the best warriors and destroy the enemy army pursuing similar goals.
The story tells of a loss of balance between divine and demonic powers. Previously, they created an abundance of benefits for mankind, received in return sincere faith. But the development of technology has forced people to overshadow beliefs, because of which there was a danger of the destruction of the whole universe. The best of the earth were called to a special island for the revival of religious foundations, the return of the former forces to the representatives of order and chaos. The emperors who exist somewhere between the earthly and the supernatural worlds became the main people among people.
On a battlefield of 16 squares, the player determines the placement of his warriors and other elements needed in confrontations. Among the available characters, there is necessarily the Emperor and several units, selected by the system from the deck available to the user before the battle. The enemy also arranges cards, but there is no initial division of the site into halves, so the enemy may be too close to the main person. Another non-trivial solution of the developer is the ability to hide the map from the antagonist until it is attacked. Such a scheme allows you to organize cool traps with a sad outcome for enemy personalities.
Hero cards have health and ability indicators. Each ward has unique skills, it is important to recognize them and make a wise combination of forces on the battlefield for the best effect. Cards are able to beat each other, take away health by such actions. It is important to save the team from large-scale losses, to protect your emperor and attack the alien leader. Anime-style graphics lend charm to the mysterious storyline. Cool missions and random battles guarantee an interesting pastime!
The following is the main content of this update: - Fix the issue that some pop-up windows may disappear on full-screen devices and cause the game to freeze
Allows the app to create network sockets and use custom network protocols. The browser and other applications provide means to send data to the internet, so this permission is not required to send data to the internet.
Allows the app to view information about network connections such as which networks exist and are connected.
Allows the app to modify the system's settings data. Malicious apps may corrupt your system's configuration.
Allows the app to retrieve information about currently and recently running tasks. This may allow the app to discover information about which applications are used on the device.
Allows the app to view information about Wi-Fi networking, such as whether Wi-Fi is enabled and name of connected Wi-Fi devices.
Allows the app to view information about Wi-Fi networking, such as whether Wi-Fi is enabled and name of connected Wi-Fi devices.
MOUNT_UNMOUNT_FILESYSTEMS
Allows the app to control the vibrator.
Allows the app to prevent the device from going to sleep.
Allows the app to create network sockets and use custom network protocols. The browser and other applications provide means to send data to the internet, so this permission is not required to send data to the internet.
Allows the app to view information about network connections such as which networks exist and are connected.
Allows the app to modify the system's settings data. Malicious apps may corrupt your system's configuration.
Allows the app to retrieve information about currently and recently running tasks. This may allow the app to discover information about which applications are used on the device.
Allows the app to view information about Wi-Fi networking, such as whether Wi-Fi is enabled and name of connected Wi-Fi devices.
Allows the app to view information about Wi-Fi networking, such as whether Wi-Fi is enabled and name of connected Wi-Fi devices.
MOUNT_UNMOUNT_FILESYSTEMS
Allows the app to control the vibrator.
Allows the app to prevent the device from going to sleep.
Allows the app to create network sockets and use custom network protocols. The browser and other applications provide means to send data to the internet, so this permission is not required to send data to the internet.
Allows the app to view information about network connections such as which networks exist and are connected.
Allows the app to modify the system's settings data. Malicious apps may corrupt your system's configuration.
Allows the app to retrieve information about currently and recently running tasks. This may allow the app to discover information about which applications are used on the device.
Allows the app to view information about Wi-Fi networking, such as whether Wi-Fi is enabled and name of connected Wi-Fi devices.
Allows the app to view information about Wi-Fi networking, such as whether Wi-Fi is enabled and name of connected Wi-Fi devices.
MOUNT_UNMOUNT_FILESYSTEMS
Allows the app to control the vibrator.
Allows the app to prevent the device from going to sleep.
Allows the app to create network sockets and use custom network protocols. The browser and other applications provide means to send data to the internet, so this permission is not required to send data to the internet.
Allows the app to view information about network connections such as which networks exist and are connected.
Allows the app to modify the system's settings data. Malicious apps may corrupt your system's configuration.
Allows the app to retrieve information about currently and recently running tasks. This may allow the app to discover information about which applications are used on the device.
Allows the app to view information about Wi-Fi networking, such as whether Wi-Fi is enabled and name of connected Wi-Fi devices.
Allows the app to view information about Wi-Fi networking, such as whether Wi-Fi is enabled and name of connected Wi-Fi devices.
MOUNT_UNMOUNT_FILESYSTEMS
Allows the app to control the vibrator.
Allows the app to prevent the device from going to sleep.
Attention! All files represented on this site either were found freely distributed on the internet or by their authors’ permission. If any of materials on this site violates your rights,
report us