๐ŸŒŒ
Privacy Village Academy
Join The Community!AcademyAbout HGPE
  • Hitchhiker's Guide to Privacy Engineering
    • โ“What is HGPE?
      • โš–๏ธWho is this for?
      • ๐Ÿง™โ€โ™‚๏ธPrivacy Engineering
      • ๐ŸŽจCreative Privacy
      • ๐Ÿ”ฎGenerative AI
      • ๐Ÿง‘โ€๐Ÿ’ปAbout the Author
  • ๐Ÿง™โ€โ™‚๏ธThe Ethical AI Governance Playbook 2025 Edition
    • ๐Ÿค–Chapter 1 : AI Literacy
    • ๐ŸŒChapter 2 : AI Governance in the 21st Century
    • โŒ›Chapter 3 - Getting Started with AI Act Compliance
    • ๐Ÿš€Chapter 4 : Rise of AI Governance: Building Ethical & Compliant AI
    • Chapter 5 : Introduction to the Lifecycle of AI
  • ๐ŸŽ“Privacy Engineering Field Guide Season 1
    • โ“Decoding the Digital World: Exploring Everyday Technology
    • ๐Ÿ‘๏ธIntroduction: Why Privacy Matters?
      • Age of Mass Surveillance
      • Privacy & Democracy
      • Privacy & Government Surveillance
    • โšกChapter 1 : How Computers Work?
      • Electricity
      • Bits
      • Logic Gates
      • Central Processing Unit (CPU)
      • Graphic Processing Unit (GPU)
      • Motherboard
      • Data Storage
      • Databases
      • Operating System (OS)
      • Computer Code
      • Programming Languages
      • The File System
      • Bugs and Errors
      • Computer Virus
      • Internet of Things (IoT)
      • Cloud Computing
    • ๐Ÿ›ฐ๏ธChapter 2 : How the internet works?
      • Physical Infrastructure
      • Network and Protocols
      • Switch
      • Routers
      • IP Address
      • Domain Name System (DNS)
      • Mac Address
      • TCP / IP
      • OSI Model
      • Packets
      • The Client - Server Architecture
      • Secure Socket Shell (SSH)
      • Transport Layer Security (TLS)
      • Firewall
      • Tunnels and VPNs
      • Proxy Server
    • ๐Ÿ–ฅ๏ธChapter 3 : How Websites Work?
      • HTML
      • CSS
      • Javascript
      • Web Server
      • Browser
      • HTTP
      • Databases
      • Front End (Client Side)
      • Back End (Server Side)
      • Cookies
      • Local Storage
      • Session Storage
      • IndexedDB
      • XHR Requests
      • Web APIs
      • Webhooks
      • Email Server
      • HTTPS
      • Web Application Firewall
      • Single Sign-on (SS0)
      • OAuth 2.0
      • Pixels
      • Canvas Fingerprinting
      • Email Tracking
      • Containers
      • CI/CD
      • Kubernetes
      • Serverless Architecture
    • โš›๏ธChapter 4 : How Quantum Computers Work?
      • Quantum Properties
      • Quantum Bits (Qubits)
      • Decoherence
      • Quantum Circuits
      • Quantum Algorithms
      • Quantum Sensing
      • Post-Quantum Cryptography
    • ๐Ÿ“ณChapter 5 : Mobile Apps and Privacy
      • Battery
      • Processor
      • Mobile Operating Systems
      • Mobile Data Storage
      • Cellular Data
      • Mobile Device Sensors
      • Wireless Connectivity
      • Camera & Microphone
      • Mobile Apps
      • Software Development Kits (SDKs)
      • Mobile Device Identifiers
      • Bring Your Own Device (BYOD)
  • ๐Ÿ•ต๏ธโ€โ™‚๏ธPrivacy Engineering Field Guide Season 2
    • โ“Introduction to Privacy Engineering for Non-Techs
      • ๐ŸŽญChapter 1 : Digital Identities
        • What is identity?
        • Authentication Flows
        • Authentication vs. Authorization
        • OAuth 2.0
        • OpenID Connect (OIDC)
        • Self Sovereign Identities
        • Decentralized Identifiers
        • eIDAS
      • ๐Ÿ‘๏ธโ€๐Ÿ—จ๏ธChapter 2 : De-Identification
        • Introduction to De-Identification?
        • Input / Output Privacy
        • De-identification Strategies
        • K-Anonymity
        • Differential Privacy
        • Privacy Threat Modeling
  • ๐Ÿ“–HGPE Story and Lore
    • ๐ŸชฆChapter 1 : The Prologue
    • โ˜„๏ธChapter 2 : Battle for Earth
    • ๐Ÿฆ Chapter 3 : A Nightmare To Remember
    • ๐Ÿง™โ€โ™‚๏ธChapter 4 : The Academy
    • ๐ŸŒƒChapter 5: The Approaching Darkness
    • โš”๏ธChapter 6 : The Invasion
    • ๐ŸฐChapter 7 : The Fall of the Academy
    • ๐Ÿ›ฉ๏ธChapter 8 : The Escape
    • ๐ŸชChapter 9 : The Moon Cave
    • ๐Ÿฆ‡Chapter 10: Queen of Darkness
  • ๐Ÿ“บVideos, Audio Book and Soundtracks
    • ๐ŸŽงReading Episodes
    • ๐ŸŽนSoundtracks
  • ๐Ÿ‘พHGPE Privacy Games and Challenges
    • ๐ŸŽฎData Privacy Day'23 / Privacy Treasure Hunt Game
    • ๐ŸงฉPrivacy Quest
  • ๐Ÿ“ฌSubscribe Now!
Powered by GitBook
On this page
  • Introducing The HGPE Galactic Privacy Challenges & Games ๐Ÿ‘€
  • Why would we want to create a game around privacy?

Was this helpful?

HGPE Privacy Games and Challenges

Put your privacy skills to the test in narrative-driven immersive puzzle & games tailored to each learning path.

PreviousSoundtracksNextData Privacy Day'23 / Privacy Treasure Hunt Game

Last updated 1 year ago

Was this helpful?

Introducing The HGPE Galactic Privacy Challenges & Games ๐Ÿ‘€

We are excited to announce the launch of HGPE, the perfect place for privacy enthusiasts to practice their privacy skills through our unique puzzles and games.

At HGPE, we believe that learning should be fun, and that's why we have created a Privacy Academy where you can embark on different learning paths, and only complete them by solving the problems and puzzles provided at the end of each path.

To participate, all you need to do is submit your answers by creating a profile on our dashboard. Although the platform is still being built on Bubble, we are making progress and players will soon be able to log in and participate seamlessly.

Meanwhile, we are running the games on emails, so register to the waiting list and get your first copy of puzzles and meet other privacy enthusiasts.

Our games are designed to reinforce the learning paths and help you use real-world systems to improve your privacy skills.

Why would we want to create a game around privacy?

This game will allow privacy enthusiasts to put into practice their privacy awareness and skillsets.

Itโ€™s also the first attempt to bring creative individuals who are enthusiasts to learn and grow together to spread privacy like never before.

Being a privacy champion requires a multidisciplinary skillset. Improving your technical skills is a skill that you need to learn to become a privacy champion.

Basically being good with computers and networks, searching things effectively, finding and run learn new software quickly. More tools you have in your toolkit theft are able to address problems more holistically and creatively.

โ€œThe future belongs to those who learn more skills and combine them in creative waysโ€. - Robert Greene

So this game is all about testing your privacy instincts and approaching problems in a creative way.

We invite you to join our waiting list and hop into our to say hi to everyone. We can't wait to meet you and have fun together while learning!

๐Ÿง™โ€โ™‚๏ธ Chapter 8: The Escape--> Jump on the , as it is written and hosted on the Gitbook platform.

โœ… Early Access is available to the . You can still witness the story of our protagonist Red, and her journey to find her brother through environmental storytelling while you learn about privacy engineering.

๐Ÿ”Š Listen to the story of Red as Reading Episodes released every week with original music. You can check out the , , and reading sessions on Youtube with subtitles. The narrator is supported by the original soundtrack where the music is also composed by me, so I would love to hear what you think about them.

๐Ÿ“ฌ Please don't forget to to not miss the new releases. See you next week!

story from here
privacy engineering materials
HGPE Trailer
Chapter 1: The Prologue
Chapter 2 : The Battle for Earth
subscribe
Discord channel
๐Ÿ‘พ
Page cover image
Cover

Puzzles & Games

Solve Privacy Engineering puzzles for a variety of skill sets and skill levels.

Cover

Skill Checks

Push yourself to your limits and show yourself what you are really made of.

Cover

Grow and Learn

Meet with fellow privacy enthusiasts to overcome the puzzles and make new friends.