

Draft unique characters, then take turns to locate, manipulate, or download hidden data packs scattered across the table. To eliminate opponents, engage in risky bets or lure others into dangerous territory. The winner of each bet must then prove their skill and memory—or face the consequences.




A thrilling and dynamic card based memory game where strategy, bluffing, and risk-taking collide. Quick to learn but fiercely competitive, this game tests your wits and courage in a minimalist yet intense showdown.


Overview
Digital empires rise and fall in the shadows. As a black hat, you engage in a covert battle for supremacy, navigating a net filled with encrypted data and deadly traps. Each turn, you must decide whether to quietly gather intelligence or take daring risks by attempting to hack and expose your opponents. One mistake could lead to detection and the downfall of your organization. One successful hack could change your fate.

The game





Unique blend of memory, gambling and bluffing.
Short and snappy game sessions. Perfect as an in-betweener or game on-the-go.
Minimalistic yet deep rules system. Can be taught in 5 minutes.
High replayability with character combinations.
Premium presentation with immersive art work. Both a board game and shelf piece.

What do you get?
-
A beautiful black mat game box with luxurious features such as pull tabs and magnetic closing.
-
A rules book with custom art work, additional game modes and lore.
-
18 golden CXIN tokens in metal.
-
60 half sized, linen playing cards to minimize table space.
-
12 unique, hand-drawn character cards that offer varying play styles.
-
6 sheet cheats that fits most of the rules system.



The beat

1
Deplete all opponents' CXINs to win.
All cards are placed face-down on the table. It’s your challenge to remember what you’ve seen.
2
On your turn, choose to either search for data cards or place a bet on how many you think you can find.
Opponents can raise your bet, and the highest bidder earns the right to hack.
-
The hacker flips over cards on the table until they reach their bet or encounter a trap.
-
If they succeed, all opponents must pay up. If they fail, the hacker is the one who pays.
3

Memory gambling

Some cards are dangerous, some highly valuable, and some require precise positioning to unlock their potential. With each character and shifting board state, your strategy will need to adapt. Will you play the long game, watching as your opponents fall victim to their own greed? Or will you strike aggressively, testing your memory and skill to bleed everyone dry?

C
H
A
R
A
C
T
E
R
S

The physical world is merely a fading backdrop to the true battlefield: the net; a living, breathing entity - it echoes with the sins of those who seek to control its vast, uncharted depths. It's where the cyber wars are raging on as the unaware go on about their everyday lives, where empires rise and fall in the shadows, and where the border between life and death is as thin as a line of code