Master the rules to become a cybersecurity expert
For the best experience, we recommend players have an active internet connection and the ability to perform online searches. While not mandatory, internet access significantly enhances gameplay.
Some challenges (especially OSINT cards) become much more engaging with access to search engines, reverse image search, geolocation tools, and metadata readers. Players without internet can skip these cards and draw from other themes.
Game Launch
1 or 2 minutes
Players
2 to 6 players
The game includes:
Game Mode Icons:
Look at your phone's battery level. The player with the highest battery percentage starts the game!
he can choose any theme except for special cards.
đ¯ Goal: Reach the last square of the Safe zone to win the game.
â ī¸ Warning: If you reach the last square of the Hacked zone, you're eliminated!
The player draws a mini-game card
Success: Move one square forward to the Safe zone
Failure: Move one square backward to the Hack zone
The most classical mode. Only 1 player answers the question.
Winner: Advances or attempts difficult question for bonus/malus card
Loser: Moves one square backward
The player chooses an opponent to face in a duel.
Winner: Advances or attempts difficult question for bonus/malus card
Loser: stays on the same tile
All players compete against each other.
Winner (first to solve): Moves one square forward
Loser (last to solve): stays on the same tile
Intermediate players: Stay on the same tile
After succeeding in a challenge, players have a crucial decision:
Move forward one square toward the Safe zone
Attempt a very difficult question and draw a random card from the special pile:
đĄī¸ ANTIVIRUS
Effect: The player who gets this bonus can move 2 squares forward
đĸ ADWARE
Effect: The player who gets this malus can make an opponent move 2 squares backward
Phishing Detection
đ Educational Objective:
Learn to spot phishing clues
đ Principle:
Examples:
Open Source Intelligence
đ Educational Objective:
Understanding the dangers of information and metadata leaks
đ Principle:
â ī¸ IMPORTANT: Internet Required
OSINT challenges require players to search for information outside the game using real investigation tools:
đ No internet connection? Players can choose to draw any other theme card instead!
Example Questions:
Rock-Paper-Scissors Style
đ Educational Objective:
Illustrate that weak security = playing at random against hackers
đ Principle:
Balance of Power:
Free For All
đ Educational Objective:
Cybersecurity vocabulary + understanding that a good password can be complex without being unreadable
đ Principle:
Examples:
Winner gets an explanation of the term
Multiple Choice Questions
đ Educational Objective:
Technical knowledge in cybersecurity
đ Principle:
Multiple-choice questions about types of viruses, web vulnerabilities, best practices, etc.
Example Questions:
"What type of virus encrypts your files?"
A. Malware
B. Ransomware â
C. Trojan
"What is the weakness of a password like '123456'?"
"What is the role of a firewall?"
The resolution is the same for all mini-games:
Advances by one square
OR
Attempts a harder question for bonus/malus card
Steps back one square