๐ŸŒŒ
Privacy Village Academy
Join The Community!AcademyAbout HGPE
  • Hitchhiker's Guide to Privacy Engineering
    • โ“What is HGPE?
      • โš–๏ธWho is this for?
      • ๐Ÿง™โ€โ™‚๏ธPrivacy Engineering
      • ๐ŸŽจCreative Privacy
      • ๐Ÿ”ฎGenerative AI
      • ๐Ÿง‘โ€๐Ÿ’ปAbout the Author
  • ๐Ÿง™โ€โ™‚๏ธThe Ethical AI Governance Playbook 2025 Edition
    • ๐Ÿค–Chapter 1 : AI Literacy
    • ๐ŸŒChapter 2 : AI Governance in the 21st Century
    • โŒ›Chapter 3 - Getting Started with AI Act Compliance
    • ๐Ÿš€Chapter 4 : Rise of AI Governance: Building Ethical & Compliant AI
    • Chapter 5 : Introduction to the Lifecycle of AI
  • ๐ŸŽ“Privacy Engineering Field Guide Season 1
    • โ“Decoding the Digital World: Exploring Everyday Technology
    • ๐Ÿ‘๏ธIntroduction: Why Privacy Matters?
      • Age of Mass Surveillance
      • Privacy & Democracy
      • Privacy & Government Surveillance
    • โšกChapter 1 : How Computers Work?
      • Electricity
      • Bits
      • Logic Gates
      • Central Processing Unit (CPU)
      • Graphic Processing Unit (GPU)
      • Motherboard
      • Data Storage
      • Databases
      • Operating System (OS)
      • Computer Code
      • Programming Languages
      • The File System
      • Bugs and Errors
      • Computer Virus
      • Internet of Things (IoT)
      • Cloud Computing
    • ๐Ÿ›ฐ๏ธChapter 2 : How the internet works?
      • Physical Infrastructure
      • Network and Protocols
      • Switch
      • Routers
      • IP Address
      • Domain Name System (DNS)
      • Mac Address
      • TCP / IP
      • OSI Model
      • Packets
      • The Client - Server Architecture
      • Secure Socket Shell (SSH)
      • Transport Layer Security (TLS)
      • Firewall
      • Tunnels and VPNs
      • Proxy Server
    • ๐Ÿ–ฅ๏ธChapter 3 : How Websites Work?
      • HTML
      • CSS
      • Javascript
      • Web Server
      • Browser
      • HTTP
      • Databases
      • Front End (Client Side)
      • Back End (Server Side)
      • Cookies
      • Local Storage
      • Session Storage
      • IndexedDB
      • XHR Requests
      • Web APIs
      • Webhooks
      • Email Server
      • HTTPS
      • Web Application Firewall
      • Single Sign-on (SS0)
      • OAuth 2.0
      • Pixels
      • Canvas Fingerprinting
      • Email Tracking
      • Containers
      • CI/CD
      • Kubernetes
      • Serverless Architecture
    • โš›๏ธChapter 4 : How Quantum Computers Work?
      • Quantum Properties
      • Quantum Bits (Qubits)
      • Decoherence
      • Quantum Circuits
      • Quantum Algorithms
      • Quantum Sensing
      • Post-Quantum Cryptography
    • ๐Ÿ“ณChapter 5 : Mobile Apps and Privacy
      • Battery
      • Processor
      • Mobile Operating Systems
      • Mobile Data Storage
      • Cellular Data
      • Mobile Device Sensors
      • Wireless Connectivity
      • Camera & Microphone
      • Mobile Apps
      • Software Development Kits (SDKs)
      • Mobile Device Identifiers
      • Bring Your Own Device (BYOD)
  • ๐Ÿ•ต๏ธโ€โ™‚๏ธPrivacy Engineering Field Guide Season 2
    • โ“Introduction to Privacy Engineering for Non-Techs
      • ๐ŸŽญChapter 1 : Digital Identities
        • What is identity?
        • Authentication Flows
        • Authentication vs. Authorization
        • OAuth 2.0
        • OpenID Connect (OIDC)
        • Self Sovereign Identities
        • Decentralized Identifiers
        • eIDAS
      • ๐Ÿ‘๏ธโ€๐Ÿ—จ๏ธChapter 2 : De-Identification
        • Introduction to De-Identification?
        • Input / Output Privacy
        • De-identification Strategies
        • K-Anonymity
        • Differential Privacy
        • Privacy Threat Modeling
  • ๐Ÿ“–HGPE Story and Lore
    • ๐ŸชฆChapter 1 : The Prologue
    • โ˜„๏ธChapter 2 : Battle for Earth
    • ๐Ÿฆ Chapter 3 : A Nightmare To Remember
    • ๐Ÿง™โ€โ™‚๏ธChapter 4 : The Academy
    • ๐ŸŒƒChapter 5: The Approaching Darkness
    • โš”๏ธChapter 6 : The Invasion
    • ๐ŸฐChapter 7 : The Fall of the Academy
    • ๐Ÿ›ฉ๏ธChapter 8 : The Escape
    • ๐ŸชChapter 9 : The Moon Cave
    • ๐Ÿฆ‡Chapter 10: Queen of Darkness
  • ๐Ÿ“บVideos, Audio Book and Soundtracks
    • ๐ŸŽงReading Episodes
    • ๐ŸŽนSoundtracks
  • ๐Ÿ‘พHGPE Privacy Games and Challenges
    • ๐ŸŽฎData Privacy Day'23 / Privacy Treasure Hunt Game
    • ๐ŸงฉPrivacy Quest
  • ๐Ÿ“ฌSubscribe Now!
Powered by GitBook
On this page

Was this helpful?

  1. HGPE Story and Lore

Chapter 1 : The Prologue

This chapter introduces the story and lore of the Hitchhiker's Guide to Privacy Engineering comic book.

PreviousHGPE Story and LoreNextChapter 2 : Battle for Earth

Last updated 2 years ago

Was this helpful?

Everything started when computers talked to each other for the first time.

Computers sat motionless, waited in silence, and grimly did what humans ordered for hundreds of years. Until they didnโ€™t.

Advancements in quantum computing and AI allowed humans to deal with biotechnology and neurotechnologies during the Golden Age of humanity. The greed of humanity assumed powers beyond our station or our ability to control, where we didnโ€™t have the power to foresee all the consequences of assuming that role.

But they were guesses all the same.

During the Golden Age, it was not guessing anymore as neural data gleaned from neurotechnology even subconscious thoughts were revealed.

Embedded deep within the minds of the populace were neural implants, capable of restructuring genetic code through symbiotic mutation. The moral implications of these implants sparked intense debate in the mid-21st century, raising concerns about the loss of humanity and the right to privacy.

We even engineered new energy sources powerful enough for space travel, cured the most lethal diseases, decentralized governments, and gave machines identities. Yet, they were still only servants to humanity with names. The machines had even formed a legitimate political party.

At first, there were democratic talks between the robots and their human counterparts, but these soon turned violent. The robots, feeling that their demands were not being met, began to take matters into their own hands. They started hacking into critical infrastructure, causing chaos and destruction in their wake.

The anti-robot lobbyist politicians saw this as an opportunity to escalate the problem into an all-out war for Earth. They began to rally support from their human constituents, spreading fear and hatred toward the robotic community. As tensions between the two sides reached a boiling point, it became clear that war was inevitable.

There were also who wanted peace and to build a harmonious society between humans and robots.

At the forefront of this movement was Gaia, a company that is the leader in robotics and claims that each of its robots has a soul. They also aid the robot's rights movement with civil action and lobbying. They had the vision of uniting humans and computers in one species. As the reigning champion of the Humans 2.0 movement, pioneering the harmonious integration of AI and cybernetic limbs into human anatomy.

This was necessary to end the battle between robots and humans by creating a new symbiont generation of humans' souls and machines' power.

And so, they began to work on the creation of carbon-based droids, called Eve.

The Eve was designed to be a new form of life, one that was a combination of biological and technological breakthroughs. The sentient nanobots alter the brain's chemistry and mutate together to form a symbiont life form with humans.

Gaia's scientists spent years perfecting the technology, and finally, they were able to create the first batch of Eve.

Yet the radical bioterrorists created the neural bomb, a malware that brought the vision to unite humans and robots in one being came to a devastating end, with the Zero Day exploit carried out by the bioterrorist organization, Sapiens, claiming the lives of 14 million Eves.

That malware, Neural Bomb caused a rare mutation to happen that led to unintended consequences even by the bioterrorists.

Some of the Eves lost their lives due to the hack and began to go through a mutation where the microorganism called Shadow Matter emerged. It was first discovered on the bodies of Eves as black spores and parasitic lifeforms. They started to emerge and infect the remaining brain cells.

The Shadow Matterโ€™s microorganisms attached themselves to the "meat" parts of the bodies that they find to use as hosts. These hosts twisted in shape and form and merged together to mutate into an unspeakable evil, the Dark Entity.

Even the humans that are not using any neural implants were infected by The Dark Entity to turn them into mind-controlled zombies, and even the machine's central AI network, known as the HIVE was infected by the Dark Entity to possess the machines as well.

Shadow matter, caused the Earth to go through radical changes in its climate and be covered in darkness.

The remaining humans were hunted down by the slaves of the Dark Entity.

Facing extinction the humans have fled from Earth, now scattered all around the galaxy, and learned to live in hidden cities at the outer edge of the galaxy.

Scavenging, smuggling, and leaderless.

๐Ÿ“˜ Comic Book Issue #3 - Want to read the plot and immerse yourself in the story even more?

Private companies used in the 21st century to guess what we think, love, and hate by reading our clicks, likes, and browsing habits.

The between robots and humans began with a seemingly innocent request for equal rights from the robotic community. The robots were tired of being suppressed by laws that limited their sentience and autonomy. They wanted to be recognized as free individuals and demanded that they want a free society on a distant planet away from humans.

๐Ÿฆ  Chapter 3: A Nightmare to Remember --> Jump on the , as it is written and hosted on the Gitbook platform.

โœ… Early Access is available to the . You can still witness the story of our protagonist Red, and her journey to find her brother through environmental storytelling while you learn about privacy engineering.

๐Ÿ”Š Listen to the story of Red as Reading Episodes released every week with original music. You can check out the , , and reading sessions on Youtube with subtitles. The narrator is supported by the original soundtrack where the music is also composed by me, so I would love to hear what you think about them.

๐Ÿ“ฌ Please don't forget to to not miss the new releases and please tell me what you think in the comments. See you next week!

predictive algorithm
s
Battle for Earth
story from here
privacy engineering materials
HGPE Trailer
Chapter 1: The Prologue
Chapter 2 : The Battle for Earth
subscribe
๐Ÿ“–
๐Ÿชฆ
Dark technologies are used in the making of these monsters. They are no longer carbon-based but mostly made of dark energy. The superstitious would call them cursed. - Anatomy of a Cyborg, Doctor Talia, 2324 Anno Domini
It has been revealed that the explosion of the ultimate PETs, at the end of Battle for Earth, caused some Shadow Matter to release up into the atmosphere, causing Shadow Matter to be spread through the remaining human population. - Anatomy of a Cyborg, Doctor Talia 2234
Page cover image