NieR: Automata Ver 1.1a – 23 – Cannon Fodder

By the time A2 reaches the base of the Tower, Devola has been infected by the virus that claimed Popola. A2 assures her she and her sister were useful before putting her out of her misery. RIP Devola and Popola, along with any hope of other androids being healed of the virus. On to the Tower.

9S is already in there, and the Escher-esque Gothic architecture, stark palette, and brooding soundtrack lend the Tower’s impossibly vast interior just the right Final Dungeon atmosphere. He’s welcomed warmly by the annoying voices of the Red Girls, which eventually merge into the voice of an old man. Needless to say, the reason for this is not given.

Nor is the reason the Red Girls send 9S into a chamber full of 2B clones with evil smirks on their faces, unless they simply want to pile on his misery by making him kill androids that look just like the one he loved. For his part, 9S is able to distinguish between these copies and “his” 2B, as they move differently and wear different expressions. While he manages to defeat all of the copies, the last one self-destructs, leaving him without and arm and infected by the virus.

A2 enters a gigantic and fancy Library where all of human knowledge is stored, but when she reaches out to a glowing book, it repels her with an electrical barrier. She asks Pod to unlock her ability to go into Hacking, upon which she enters the same beige void 9S visited. There, she learns the same secrets he learned which made him a target for execution again and again: humanity is extinct, and the YoRHa Project was always nothing but an sacrificial lamb.

However, Pod manages to infect the Red Girls with a virus, and tells A2 all she needs to do is buy time while it kicks in. Both A2 and 9S are attacked by gigantic (and honestly somewhat silly-looking) Machine Lifeforms, both now voiced by the old man but also involved in inner conflict and disagreement. The virus Pod injected does its work: the networking the MLs tout proves to be their undoing.

The two ML robots end up destroying each other, falling down the barrel of the massive cannon that is the main purpose of the Tower: to obliterate the human servers on the moon, and with it all remnants of humanity for good. Presumably the MLs need to do this in order to properly “evolve,” but even they seem to remain at the mercy of a virus, the same as the androids.

That leaves us with the only two androids left: A2 and 9S. A2 is still interested in stopping the MLs from destroying the moon server, while 9S, will soon succumb to the virus after having Pod attach one of the 2B’s arms to replace his. Nines doesn’t care about anything other than avenging 2B by killing A2. If he dies in the process, so be it.

The problem is, A2 is a much better fighter than him, so I suspect he’ll lose, and also likely be put out of his misery just as 2B, Lily, and the twins. Unlike 9S, A2 has decided to reject the cruel systems that tell her she has no  purpose and never has. She’s going to fight, and be useful, till the bitter end. But I’m getting ahead of myself; she has to beat Nines first.

Rating: 4/5 Stars

Commercials Cooperation Advertisements:


(1) IT Teacher IT Freelance

IT電腦補習

立刻註冊及報名電腦補習課程吧!
电子计算机 -教育 -IT 電腦班” ( IT電腦補習 ) 提供一個方便的电子计算机 教育平台, 為大家配對信息技术, 電腦 老師, IT freelance 和 programming expert. 讓大家方便地就能找到合適的電腦補習, 電腦班, 家教, 私人老師.
We are a education and information platform which you can find a IT private tutorial teacher or freelance.
Also we provide different information about information technology, Computer, programming, mobile, Android, apple, game, movie, anime, animation…


(2) ITSec

https://itsec.vip/

www.ITSec.vip

www.Sraa.com.hk

www.ITSec.hk

www.Penetrationtest.hk

www.ITSeceu.uk

Secure Your Computers from Cyber Threats and mitigate risks with professional services to defend Hackers.

ITSec provide IT Security and Compliance Services, including IT Compliance Services, Risk Assessment, IT Audit, Security Assessment and Audit, ISO 27001 Consulting and Certification, GDPR Compliance Services, Privacy Impact Assessment (PIA), Penetration test, Ethical Hacking, Vulnerabilities scan, IT Consulting, Data Privacy Consulting, Data Protection Services, Information Security Consulting, Cyber Security Consulting, Network Security Audit, Security Awareness Training.

Contact us right away.

Email (Prefer using email to contact us):
SalesExecutive@ITSec.vip

Leave a Reply

Your email address will not be published. Required fields are marked *