Scene Image

Secure Publishing

Who needs a key when you can pick the lock with code?

As a hacker trying to take down a corrupt corporation, you must use your hacking skills to exploit vulnerabilities in the company's publishing system to leak sensitive information and bring the corporation to its knees. But be careful, the corporation has powerful cybersecurity measures in place to stop you.