๐ŸŒŒ
Privacy Village Academy
Join The Community!AcademyAbout HGPE
  • Hitchhiker's Guide to Privacy Engineering
    • โ“What is HGPE?
      • โš–๏ธWho is this for?
      • ๐Ÿง™โ€โ™‚๏ธPrivacy Engineering
      • ๐ŸŽจCreative Privacy
      • ๐Ÿ”ฎGenerative AI
      • ๐Ÿง‘โ€๐Ÿ’ปAbout the Author
  • ๐Ÿง™โ€โ™‚๏ธThe Ethical AI Governance Playbook 2025 Edition
    • ๐Ÿค–Chapter 1 : AI Literacy
    • ๐ŸŒChapter 2 : AI Governance in the 21st Century
    • โŒ›Chapter 3 - Getting Started with AI Act Compliance
    • ๐Ÿš€Chapter 4 : Rise of AI Governance: Building Ethical & Compliant AI
    • Chapter 5 : Introduction to the Lifecycle of AI
  • ๐ŸŽ“Privacy Engineering Field Guide Season 1
    • โ“Decoding the Digital World: Exploring Everyday Technology
    • ๐Ÿ‘๏ธIntroduction: Why Privacy Matters?
      • Age of Mass Surveillance
      • Privacy & Democracy
      • Privacy & Government Surveillance
    • โšกChapter 1 : How Computers Work?
      • Electricity
      • Bits
      • Logic Gates
      • Central Processing Unit (CPU)
      • Graphic Processing Unit (GPU)
      • Motherboard
      • Data Storage
      • Databases
      • Operating System (OS)
      • Computer Code
      • Programming Languages
      • The File System
      • Bugs and Errors
      • Computer Virus
      • Internet of Things (IoT)
      • Cloud Computing
    • ๐Ÿ›ฐ๏ธChapter 2 : How the internet works?
      • Physical Infrastructure
      • Network and Protocols
      • Switch
      • Routers
      • IP Address
      • Domain Name System (DNS)
      • Mac Address
      • TCP / IP
      • OSI Model
      • Packets
      • The Client - Server Architecture
      • Secure Socket Shell (SSH)
      • Transport Layer Security (TLS)
      • Firewall
      • Tunnels and VPNs
      • Proxy Server
    • ๐Ÿ–ฅ๏ธChapter 3 : How Websites Work?
      • HTML
      • CSS
      • Javascript
      • Web Server
      • Browser
      • HTTP
      • Databases
      • Front End (Client Side)
      • Back End (Server Side)
      • Cookies
      • Local Storage
      • Session Storage
      • IndexedDB
      • XHR Requests
      • Web APIs
      • Webhooks
      • Email Server
      • HTTPS
      • Web Application Firewall
      • Single Sign-on (SS0)
      • OAuth 2.0
      • Pixels
      • Canvas Fingerprinting
      • Email Tracking
      • Containers
      • CI/CD
      • Kubernetes
      • Serverless Architecture
    • โš›๏ธChapter 4 : How Quantum Computers Work?
      • Quantum Properties
      • Quantum Bits (Qubits)
      • Decoherence
      • Quantum Circuits
      • Quantum Algorithms
      • Quantum Sensing
      • Post-Quantum Cryptography
    • ๐Ÿ“ณChapter 5 : Mobile Apps and Privacy
      • Battery
      • Processor
      • Mobile Operating Systems
      • Mobile Data Storage
      • Cellular Data
      • Mobile Device Sensors
      • Wireless Connectivity
      • Camera & Microphone
      • Mobile Apps
      • Software Development Kits (SDKs)
      • Mobile Device Identifiers
      • Bring Your Own Device (BYOD)
  • ๐Ÿ•ต๏ธโ€โ™‚๏ธPrivacy Engineering Field Guide Season 2
    • โ“Introduction to Privacy Engineering for Non-Techs
      • ๐ŸŽญChapter 1 : Digital Identities
        • What is identity?
        • Authentication Flows
        • Authentication vs. Authorization
        • OAuth 2.0
        • OpenID Connect (OIDC)
        • Self Sovereign Identities
        • Decentralized Identifiers
        • eIDAS
      • ๐Ÿ‘๏ธโ€๐Ÿ—จ๏ธChapter 2 : De-Identification
        • Introduction to De-Identification?
        • Input / Output Privacy
        • De-identification Strategies
        • K-Anonymity
        • Differential Privacy
        • Privacy Threat Modeling
  • ๐Ÿ“–HGPE Story and Lore
    • ๐ŸชฆChapter 1 : The Prologue
    • โ˜„๏ธChapter 2 : Battle for Earth
    • ๐Ÿฆ Chapter 3 : A Nightmare To Remember
    • ๐Ÿง™โ€โ™‚๏ธChapter 4 : The Academy
    • ๐ŸŒƒChapter 5: The Approaching Darkness
    • โš”๏ธChapter 6 : The Invasion
    • ๐ŸฐChapter 7 : The Fall of the Academy
    • ๐Ÿ›ฉ๏ธChapter 8 : The Escape
    • ๐ŸชChapter 9 : The Moon Cave
    • ๐Ÿฆ‡Chapter 10: Queen of Darkness
  • ๐Ÿ“บVideos, Audio Book and Soundtracks
    • ๐ŸŽงReading Episodes
    • ๐ŸŽนSoundtracks
  • ๐Ÿ‘พHGPE Privacy Games and Challenges
    • ๐ŸŽฎData Privacy Day'23 / Privacy Treasure Hunt Game
    • ๐ŸงฉPrivacy Quest
  • ๐Ÿ“ฌSubscribe Now!
Powered by GitBook
On this page

Was this helpful?

  1. HGPE Story and Lore

Chapter 2 : Battle for Earth

PreviousChapter 1 : The PrologueNextChapter 3 : A Nightmare To Remember

Last updated 2 years ago

Was this helpful?

In the aftermath of the neural bomb attack on Eve, a new Lovecraftian terror appeared on Earth, causing massive mutations. Dark entities seized control of cyborg zombies and possessed machines, waging war against humanity.

The battle for Earth was a harrowing struggle that lasted for decades. The humans fought valiantly against the hordes of cyborg zombies and possessed machines that were now under the control of the dark entity.

The colossal machines and mutated Eve wreaked havoc on the battlefield, causing chaos and destruction. The humans fought back with everything they had, crafting special weapons designed to take down the possessed machines. The masters of the Order of the Epoch crafted these weapons, which were then wielded by the Grandmaster himself.

One of the most epic battles took place on the western border, as the humans launched a fierce attack on the cities of Istanbul and Morocco in the south. Meanwhile, on the Eastern Front, the human legions fought tooth and nail to sabotage the Hive and gain a foothold in the capital of the machines in the Himalayas.

Their battle was fierce, and the stakes were high, as the fate of humanity hung in the balance. As the battle raged on, the humans faced a new terror that threatened to wipe them out completely.

Lilith, the Queen of Dark Hordes, was a force to be reckoned with. With her abilities as a witch and cyborg, she was more deadly and dangerous than any of the spawns of the Dark Entity. She was the first mutation and her arrival signaled the beginning of the end for humanity. Her presence alone sent chills down the spines of those who dared to oppose her.

As the Queen of Darkness, Lilith had the power to redesign the HIVE network, turning the machines into her obedient slaves. She did not hesitate to use parasitic lifeforms to infect the Hive, ensuring that her control over the machines was absolute.

For decades, Lilith almost single-handedly brought humanity and Earth to the brink of destruction. Her ruthless pursuit of power left no room for mercy or compassion. She hunted down humans with a savage efficiency, leaving no survivors in her wake.

As the situation grew increasingly dire, the remaining humans realized that they had no choice but to flee from Earth in order to survive. Lilith's reign of terror had come to a devastating end, but the scars she left on the world would never be forgotten.

๐Ÿ“˜ Comic Book Issue #3 - Want to read the plot and immerse yourself in the story even more?

๐Ÿฆ  Chapter 3: A Nightmare to Remember --> Jump on the , as it is written in build in public mindset.

โœ… Early Access is available to the . You can still witness the story of our protagonist Red, and her journey to find her brother through environmental storytelling while you learn about privacy engineering.

๐Ÿ”Š Listen to the story of Red as Reading Episodes released every week with original music. You can check out the , , and reading sessions on Youtube with subtitles. The narrator is supported by the original soundtrack where the music is also composed by me, so I would love to hear what you think about them.

๐Ÿ“ฌ Please don't forget to to not miss the new releases and please tell me what you think in the comments. See you next week!

story from here
privacy engineering materials
HGPE Trailer
Chapter 1: The Prologue
Chapter 2 : The Battle for Earth
subscribe
๐Ÿ“–
โ˜„๏ธ
The wild corruption of the Shadow Matter transformed Earth, making it unhabitable for humans naturally. To prosecute our war against the Dark Entity, we must first scout their dark lands .- Journals of Order of Epoch, 2334 Anno Domini
The emergence of Lilith can also manifest as a physical phenomenon. The motivations or ultimate goals of the Dark Entity are wholly unclear; however, Order of Epoch theorizes it may have been to finally evolve into a higher cosmic god. - Journals of Order of Epoch, 2254
Nature herself - a victim of this spreading corruption of the Shadow Matter. The ground quaked as it is malformed to serve the will of the Dark Entity. - Book of Doctor Talia, 2245 Anno Domini
Page cover image