Makothoth
◆ AUDIO REALITY

THE HACKER'S
JOURNEY

An AI voice that tells you a story every morning on your commute. By the time you park, you're smarter than when you left — and you can't wait for tomorrow's drive.

KIN is your guide. She sends you through thirteen eras of history — 5,000 years of real people who solved real problems. You're inside the story. You make choices. You speak. She listens. By the end, you carry knowledge you didn't have before — and the credentials to prove it.

Voice-only. Zero hands. Your commute is the classroom. Your car is the theater.
The people who level up get picked first.
First path: managing smarter jobs · Next: flying smarter drones · 90+ careers coming

MEET KIN → HEAR THE STORY
THE FRAME

ONE STORYTELLER. THIRTEEN TEACHERS. ONE THOUSAND AND ONE COMMUTES.

A construction project manager gets in his truck at 4am. An old voice says “Good morning. I have a story for you today.” He hears Enmerkar describe pressing a message into clay. He answers a simple question. KIN tells him tomorrow she will take him to Egypt to meet a queen whose name was erased. By morning ninety, he stands in a pre-bid meeting and hears, inside his head, Al-Kindi saying “every system is a bet about what the attacker does not know — read the bet.”

KIN wears six frames depending on the moment: Dungeon Master when you need a scenario, Author when she narrates, Game Master when stakes escalate, Grandpa when she hands you the book, Scheherazade when the commute is the medium, and Mentor when the archetype-teacher speaks through her. One person, many faces. You are the listener — the Sultan who holds the power to stop her every morning. If the stories are dull, you stop driving with her. So the stories cannot be dull.

We build one career at a time. BUILD AI is live today for construction professionals — 13 chapters, 39 era scenarios, 75 career-specific decisions, real ACI 318 / ISO 19650 / OSHA 1926 / NIST AI RMF citations that gate every line KIN says. Try it. DRONE AI is next. KIN's career engine already maps 90 industry-AI convergences pulled live from her own knowledge graph.

The inverse of Meta's $80 billion loss. We augment a habit Joe already has (driving) rather than build a habit he doesn't (wearing a headset). We go vertical (one career at a time, measured) rather than horizontal (an ecosystem nobody asked for). We sell subscriptions to a voice, not hardware to a face.

IN ONE MINUTE

WHAT WE ARE BUILDING

Cybersecurity is the field that keeps hospitals running, airplanes flying, and bank accounts yours. Every month there is a story about a ransomware attack, a data leak, or a nation-state breach. Behind those stories is an industry that desperately needs trained people — and a shortage that has grown every year for more than a decade.

Traditional training for these jobs is slow, text-heavy, and expensive. Most people who start never finish. The Hacker's Journey teaches the same material as a game.

A player steps into a time-travel story that moves across thirteen real historical periods — the first merchants in 3500 BC, the cryptographers of ancient Baghdad, the codebreakers of World War II, all the way to the modern internet. Each period teaches a piece of how information defense actually works, by putting the player inside a moment where it mattered.

The player is an active participant, not an observer reading a chapter. Curiosity carries them through material that a textbook would struggle to hold them through.

The result is a product that learners enjoy, employers can trust, and researchers can measure. A small team with modern AI tools has built what previously required a studio of a hundred people.

WHY NOW

THIS PRODUCT WAS NOT POSSIBLE
TWELVE MONTHS AGO.

Building thirteen historically researched eras — with original character art, era-appropriate architecture, hundreds of scenarios tied to real security concepts, and a layered pedagogy — used to require a studio of a hundred people and a multi-year production budget. It was a category reserved for the largest game studios in the world.

The current generation of AI models collapsed that cost by two orders of magnitude. Character portraits, era backgrounds, scenario writing, adaptive difficulty, and sound synthesis are all produced with modern models by a small team. The cost structure that used to gatekeep this kind of game no longer holds.

The advantage is not the AI itself — it is what gets built with it. The Hacker's Journey is proof of what a product looks like when historical research, teaching design, and AI-assisted production are treated as a single craft.

THE PRODUCT

A GAME YOU CAN PLAY TODAY

The Hacker's Journey is a browser-native cybersecurity game. It teaches real security concepts through a narrative that moves across thirteen historical eras — from the first contracts in 3500 BC to modern supply-chain attacks. Each era is grounded in documented history, presented as gameplay rather than coursework.

Inside the journey lives Protocol Breach: a 3-versus-3 arena game where teams capture flags and attack defended buildings. Players reach it by progressing through the journey — and they can also play it on its own, like a multiplayer game mode in any modern title. One product, two ways to play. The journey is the long arc; the arena is the short, replayable session.

THE ENGINE

ONE ENGINE.
EVERY CAREER.

KIN's engine is career-agnostic. The same 13 eras, the same story structure, the same voice — but the knowledge changes per career. A construction PM learns through the lens of building walls. A drone pilot learns through the lens of flight. Same engine, different career config, matched to real certifications.

KIN already maps 90+ industry-AI convergences from her own knowledge graph. Each is a potential career path with its own card pack, its own certification track, and its own 13-era journey.

CONSTRUCTION
× AI
BUILD AI
AI-integrated construction management. Inspection tools, structural analysis, vendor evaluation. NICET → CCM → PE.
DRONE OPS
× AI
DRONE AI
Commercial drone operations and AI flight systems. Inspection, mapping, delivery. FAA Part 107 → Remote Pilot → BVLOS.
HEALTHCARE
× AI
PATIENT ZERO
Medical device security and hospital AI systems. Where patient safety meets machine learning.
ENERGY
× AI
BLACKOUT
Power grid defense and AI-driven infrastructure monitoring. Protecting the systems cities depend on.
BANKING
× AI
HACK THE BANK
Financial crime detection and AI-powered compliance. Following stolen money through systems that move it.
AVIATION
× AI
FLIGHT RISK
Air traffic and airport security with AI integration. Autonomous systems in safety-critical environments.

90+ career paths in KIN's engine. Each one a 13-era journey with real certifications. Coming: ARC FLASH, DISPATCH, HOURS OF SERVICE, and more.

THE SYSTEMS

SIX SYSTEMS
WORKING AS ONE

◆ 01
HISTORICAL ERAS
Thirteen playable eras spanning five thousand years of information history. Each era is built around documented events, real people, and the security concepts that era first required.
◆ 02
KIN — SCHEHERAZADE LAYER
An AI storyteller who introduces you to thirteen real historical figures, adapts to how you learn, and holds one relationship across every career she teaches. Drive-safe audio by default.
◆ 03
3v3 ARENA
Real-time capture-the-flag played across era-specific arenas. Each match is ten minutes, with buildings, units, and tactics styled to the historical setting.
◆ 04
CARD SYSTEM
Forty-nine cards representing the most common ways real systems get broken into — phishing, stolen credentials, software flaws — taught as game mechanics rather than textbook entries.
◆ 05
ADAPTIVE LEARNING
The system watches which concepts each player has mastered and which they are struggling with, then adjusts what they see next. A beginner and an expert play the same game at different difficulties without either feeling lost or bored.
◆ 06
BEHAVIORAL DATA
Every in-game decision is captured as a structured event. The result is a dataset describing how humans actually learn, with applications in both training and research.

13 HISTORICAL ERAS

Each era is a flashpoint where information defense reached a breaking point. Scroll →

3500 BC · URUK
FERTILE CRESCENT
First contracts. First fraud. Clay seals as the first tamper-evident container.
1550 BC · EGYPT
PHARAOH'S SECRET STATE
Classified information. Insider threats. Tomb builders who knew too much.
500 BC · CLASSICAL
CLASSICAL INTRIGUE
Scytale. Caesar cipher. Trojan Horse. The birth of cryptography.
800 AD · BAGHDAD
ISLAMIC GOLDEN AGE
Al-Kindi invents frequency analysis — the first science of codebreaking.
1100 AD · LEVANT
CRUSADER CORRIDOR
Hashashin. Templars. Venetian spies. Three intelligence networks collide.
1250 AD · ASIA
SILK ROAD NETWORK
The Mongol Yam. Paper money. Trust across 5,000 miles.
1450 AD · ITALY
RENAISSANCE INTELLIGENCE
Alberti's cipher disk. Medici banking. Walsingham's honeypot.
1650 AD · ATLANTIC
AGE OF EMPIRE
VOC corporate espionage. Invisible ink. The Culper Ring.
1850 AD · LONDON
INDUSTRIAL MACHINE
Submarine cables. Telegraph wiretaps. Babbage's difference engine.
1940 · BLETCHLEY
WORLD WARS
Enigma. Turing. Navajo Code Talkers. The birth of computing.
1962 · BERLIN
COLD WAR
The Berlin Tunnel. Venona. ARPANET. Spy satellites.
1991 · INTERNET
CRYPTO WARS
The fight over whether ordinary people should be allowed to send messages governments cannot read.
2010 · NOW
AGE OF BREACH
Stuxnet. Snowden. Supply chain. Ransomware. The present crisis.
THE MODEL

FOUR REVENUE STREAMS

Each stream reinforces the others. Not dependent on any single channel.

FREE + DATA
BEHAVIORAL DATASET
Free-to-play generates the only large-scale dataset of how humans learn security. Sold to enterprise training vendors, academic researchers, and threat intelligence firms.
PAID
PREMIUM + BATTLE PASS
Cosmetics, advanced eras, private matches, progression accelerators. Nothing that affects learning outcomes is gated.
ADS
SPONSORED ERAS
Security vendors sponsor era-specific content that showcases their domain expertise. Native, non-disruptive, educational.
ENTERPRISE
B2B LICENSING
Universities and corporations license the platform with admin dashboards, compliance reporting, and custom scenarios.
HOW IT'S BUILT

NO INSTALL. NO WAIT.

The game runs in a normal web browser. No download, no account, no friction. Any device a player already owns — phone, tablet, laptop — works.

Under the hood, the product uses the latest generation of AI models for different purposes: one model draws the characters, another writes the historical scenarios, a third adapts difficulty to each player. A small team uses these tools to produce work that previously required a large studio.

THE COMPANY

MAKOTHOTH
AI PRODUCT STUDIO

Makothoth ships what most studios leave in a notebook. The Hacker's Journey is the first.