Data protection

Last updated on 23.07.2024

We try to store as little data as possible about our users. However, in order to develop our prototype as efficiently as possible, we decided to integrate Microsoft Clarity. This tool enables us to understand how users use the platform and where problems and difficulties arise. We do not actively pass on your data and of course we do not sell it. However, there are some providers, such as our web server providers, to whom we inevitably pass on data. You can find a list of all these providers here: The prototype is developed with Bubble and hosted on their platform. (To Bubble’s privacy policy ) As far as we know, images are stored by Bubble using Amazon Web Services. In order to contact you by email, we use the email marketing tool loops.so and you can find their privacy policy here. Our website (hacky.ch) was implemented with WordPress, with the help of Elementor and is hosted on Metanet servers. We use Google Fonts and Google Analytics, as well as Microsoft Clarity. You can find the complete data protection provisions in “legalese” here: https://hacky.ch/datenschutz/

Also interesting

Do I need a test environment?

No. The conditions for the hackers should be as real as possible. Normally your productive system/network is tested directly. This allows you to find gaps that may be closed on the test server but still exist in production or in components that only exist there.
Aktualisiert: 27.04.2024

What are the hackers allowed to do?

On our platform, you – and of course our hackers – will find a precise list of what is permitted and what is prohibited. You can include or exclude further points. We are also happy to assist you if you have any questions. However, if you are unsure, we recommend that you simply use the Hacky template, as it includes and excludes everything relevant and will certainly be ideal for you to start with.
Aktualisiert: 27.04.2024

What do all these terms mean?

We always try to communicate as clearly and simply as possible. It may happen that we use a term that you are not familiar with. We would therefore like to discuss how we define and interpret certain terms.
Hacker, Expert, White Hat, Ethical Hacker
A person who has excellent knowledge of computer security and specializes in finding vulnerabilities in networks, software and systems. We always act ethically and never exploit these vulnerabilities, but report them immediately to the individuals and companies concerned.
Bug Bounty
If a reward is paid to the finder for reporting a vulnerability or bug.
Bug, Vulnerability, Vulnerability, Gap
When a system or software does not behave as expected. This behavior of the software could then potentially alienate purpose.
(Hacker) Community
All hackers who search for possible vulnerabilities in the listed infrastructures on our platform and report them to us.
bounty, reward
If a hacker reports a valid vulnerability, they will receive a reward for it.
Scope
Defines the area or the systems that may be tested for bugs/vulnerabilities and the methods with which these tests are permitted.  
Aktualisiert: 27.04.2024