Skip to main content

How to Unlock (and Play) Hidden Chess Game Inside Facebook Messenger
















What can you do with Facebook Messenger?
  • Chat with your friends
  • Send GIFs, stickers, and photos
  • Make video calls
  • Send people money in Messenger
Have you ever wondered to Play a game while you chat with friends?

Yes, it is possible.

Facebook had made it to the reality by building a hidden built-in functionality in Facebook Messenger that lets you play Chess with your friends without having to install a third-party app.

It just takes one simple step to unlock this hidden game.

All you need to do is: type "@fbchess play" and hit Enter, during a conversation, and a small square box would appear in the chat box.

Here's how to play: The person who initiated the game would be assigned "White" side, to make the first movement.

Although there is some standard algebraic notation like:-
  • B for “Bishop”
  • R for “Rook”
  • Q for “Queen”
  • K for “King”
  • N for “Knight”
  • P for “Pawn”
Pawns could be moved by issuing the simple commands with numbers (along with the vertical axes).

For, e.g. If your first play would take the second pawn from the left and move it up one block, you would write: ‘@fbchess Pb3,’ or simply ‘@fbchess b3.'

You could refer to the help section by issuing the command "@fbchess help" for the possible commands to assist you throughout the game.

It turns out that the commands are case sensitive. The board will update and notify you whether it is your turn to play.

You can undo a move with "@fbchess undo" command or by clicking the "undo" button — but your opponent has to accept the request to undo.

The game would also allow you to have a conversation during the game with your friend, resumes the game by issuing the game commands.

FB Chess is currently available for both mobile and web platforms, eliminating the need to download it separately.

This new Productive Time Killer Game initiated to entertain its users by sharpening brain while having a chat with your mate equally.

Comments

  1. Hello my friend! I would like to tell you that this write-up is awesome, great written and include almost all important information.Amazing quality and well explained. keep sharing. Shop at Mini beamer

    ReplyDelete

Post a Comment

Popular posts from this blog

Beginning of Hacking

Before Hollywood took the hacking phenomena under its wing, unless you were a clued-in techy, the world of hacking would be unfamiliar territory. In recent years, movies like The Girl with the Dragon Tattoo, The Matrix and The Italian Job have managed to glamourize the high-tech thrill of breaking into servers, cracking door codes and hijacking security networks. But before television brought the hacker technology into our general knowing, hacking was still an occurring reality for some. So what is the history of hacking and where did today's sophisticated hacking begin? Late 1950s – The MIT Start Off with a Bang Hacking wasn’t always about computers. In fact, the first ‘hackers’ were roof and tunnel hackers, which the Massachusetts Institute of Technology was instrumental in introducing. These were people who entered roof and utility tunnel spaces without authorization, in other words getting into a place they shouldn’t be in – which is where computer hacking go...

Internet of Threats!

T he Internet of Things (IoT) is continuing to gain traction with an ever-increasing number of connected devices coming to market. But as tech-savvy consumers begin investing in their first devices for a connected home, what is to stop them becoming a cyber attacker's next target? While still uncommon, we know that cyber attackers are going after connected consumer devices, demonstrated on a massive scale by the group of Russian hackers who published thousands of live-streaming webcam footage from over 250 countries. Unless the manufacturers of connected devices take a holistic approach to bolstering their cyber security efforts, these types of attacks will increase in number. To gain a greater understanding of the cyber security risks that consumers could be exposing themselves to, research was conducted into the cyber security posture of six ‘always-on’ consumer IoT devices. The results were unsettling. Veracode carried out a set of uniform tests across all the...

Microsoft Keeps Backup of Your Encryption Key on its Server — Here's How to Delete it!!

Have you recently purchased a Windows computer? Congratulations! As your new Windows computer has inbuilt disk encryption feature that is turned on by default in order to protect your data in case your device is lost or stolen. Moreover, In case you lost your encryption keys then don't worry, Microsoft has a copy of your Recovery Key. But Wait! If Microsoft already has your Disk Encryption Keys then what’s the use of using disk encryption feature? Doesn't Encryption mean  Only you can unlock your disk ? Microsoft Probably Holds your Encryption Keys Since the launch of Windows 8.1, Microsoft is offering disk encryption as a built-in feature for Windows laptops, Windows phones and other devices. However, there is a little-known fact,  highlighted  by The Intercept, that if you have logged into  Windows 10  using your Microsoft account, your system had automatically uploaded a copy of your recovery key to Microsoft’s server...