Security
At Chicken Road Game, the security of our users is a top priority. We understand the importance of protecting your personal and financial information, and we are committed to providing a safe, trustworthy environment for gameplay and transactions.
1. Data Encryption
All communication between your device and our servers is encrypted using TLS (Transport Layer Security), the industry standard for secure online communication. This ensures that your personal and payment data is always transmitted securely.
2. Secure Payment Processing
We partner only with reputable payment providers who are PCI DSS compliant. This guarantees that your credit card and banking details are handled using top-tier security protocols, including tokenization and fraud detection.
3. Account Security
We encourage all players to create strong, unique passwords and to enable two-factor authentication (2FA) where possible. We never store your passwords in plain text — all credentials are hashed using secure cryptographic methods.
4. Monitoring and Intrusion Detection
Our system continuously monitors for unusual activity, brute-force attacks, and potential breaches. If any anomaly is detected, our security team is immediately alerted, and protective measures are enforced.
5. Regular Security Audits
We regularly perform internal and third-party security audits to test and reinforce our systems against new threats. Vulnerability scans, penetration testing, and compliance checks are all part of our routine protocols.
6. User Responsibility
While we take all necessary steps to secure our platform, users also play an important role. Always:
- Use strong passwords and avoid sharing them.
- Log out after your session, especially on shared devices.
- Do not click on suspicious links or provide your credentials to unverified sources.
7. Secure Software Architecture
Our backend architecture is built using modular, isolated microservices to limit the impact of any potential breach. Sensitive operations are sandboxed and run with minimal permissions, greatly reducing risk exposure.
8. Responsible Disclosure
We encourage white-hat researchers and ethical hackers to report any potential vulnerabilities via our bug bounty program. Verified reports may be eligible for rewards based on the severity and impact.
9. Privacy-First Policy
Security and privacy go hand in hand. We minimize the amount of data collected, retain it only for as long as necessary, and anonymize it wherever possible. Read more in our Privacy Policy.
10. Contacting Our Security Team
If you believe your account has been compromised or have discovered a vulnerability, please contact our security team immediately at [email protected]. We take every report seriously and will investigate promptly.