Terms of Use

This site and hosted challenges are developed and owned by Dan Myo. This site welcomes you to try and test your cybersecurity skills. You are provided with two terms of service to advise you of the legal obligations you assume when you engage with the features associated with the site ("Services"). By accessing or using the services in any manner, including without limitation by visiting or browsing the site, you affirm that you have read, understand, and agree to be bound by the Terms of Use, Cookie Policy, Privacy Policy.

Content Permissions

  • You agree not to share the solutions "publicly" via various channels such as Vimeo, Youtube, Facebook, Twitter.
  • You agree not to use the site in commercial way of any sorts such as using it in paid training.

Automatic Vulnerability Scanning

You agree not use to perform automated vulnerability scanning against the site in an attempt to find solutions for the challenges.

Cookie Policy

A cookie is a small piece of text that allows a website to recognize your device and maintain a consistent, cohesive experience throughout multiple sessions. We use cookies that generated by the challenge lessons as well as third-party - Google Analytics, Facebook Button.

The Third-party Analytics uses cookie is used to identify actual human users, a result of which causes to store and process some information about you and your visits to the site. Statistics will assist in deciding whether the site's offering is still useful up to the current Cyber Security standard and whether promotion of the site publicity should be made.

Privacy Policy

We use scripts that receive and record information from your browser or mobile device, such as your Internet Protocol (IP) address,unique device identifier, browser information, country of origin based on IP address. However, those data are not tagged with your Ninja ID automatically generated during your registration.

Regarding social login feature, we store only SHA3 hashed version of your email address.

As we believe security should be enforced technically, your email will be checked whether it has been in data leakage incidents using HaveIBeenPwned and Avast service. If your email had been exposed, we would block you from using our service.

From time to time, we may host affiliate advertisements that we deem suitable for you. Those advertisements programs may use tracking codes. Currently we use the following but not limited to: