A cybersecurity puzzle game where you design network routes to deliver a data packet safely from client to server. You must avoid hacker sniffing zones, collect encryption keys, and obtain authentication tokens – all while obeying the rules of a zero‑trust network. The game simulates real‑world network security concepts in a minimalist, digi‑punk interface.

How to Play

  • Draw a path – Tap/click the client tile, then drag through adjacent tiles (up, down, left, right) to reach the server.
  • Follow the rules – You cannot cross walls or step directly on hackers.
  • Hackers have a 3×3 sniff zone; entering it without a good encryption key will expose your data and fail the mission.
  • Collect green encryption keys (good) to protect your payload.
  • Red keys (bad) will encrypt your data with a honeypot key – safe‑looking but the hacker can still break it.
  • In later levels, you must also grab an auth token (mTLS), or the server will drop your packet.
  • Execute – Once the path connects client-to-server, hit Execute Route and watch the packet travel step‑by‑step, checking each tile.
  • Learn from failure – The terminal log explains exactly why a route failed, teaching you how to improve.
  • Mental & Psychological Skills Improved Strategic Planning & Routing – You learn to think ahead, plan multi‑step paths, and anticipate risks.
  • Logical Reasoning – Understanding the order of operations (encrypt before crossing a sniff zone, authenticate before reaching the server) strengthens logical sequencing.
  • Problem‑Solving under Constraints – Walls, multiple hackers, and limited paths force you to find creative solutions – like backtracking or taking longer, safer routes.
  • Cybersecurity Intuition – You internalise key security concepts (AES‑256, mTLS, honeypots, zero‑trust architecture) in a practical, visual way.
  • Resilience & Trial‑Error Learning – Failing is part of the game; each attempt improves your understanding and builds a growth mindset.
  • Attention to Detail – Spotting fake keys vs. real keys trains focused observation.
  • Working Memory – You must hold the state of your packet (encrypted? authenticated?) in mind while building the path.
  • The game transforms abstract network security into a tangible, addictive puzzle – making you a sharper thinker in both tech and everyday logic.



    Leave a comment

    Log in with itch.io to leave a comment.