Next steps for students’ project

I teach a basic course on game development, in which students design a game idea and write a digital prototype in Unity – about 5 minutes demonstrating the main idea and gameplay. Some of the teams did really great jobs and I would like to encourage them to continue developing their game beyond the course, but I am not sure what the next steps should be. In particular:

  • Where can they get more professional review on their prototype? There are websites that review games, but usually they are looking for complete games, not just prototypes.
  • Where can they get playtesters that will help them improve their prototype and make it a full game? Currently their game is in itch.io, but it is hard to draw attention to it.

Website design process and steps.

Hello guys please, can you give some advice for my website design process? I'll be very grateful.

Fist I will describe the steps I take for the design process , then I'll try to explain it and give more details about it.

      1. First contact
      2. Determine the project size, direction and scope.
      3. Site map and wire-framing in XD or Figma sometimes I use Edraw Mind Map
      4. Content gather and categorize and if it is necessary(in the most cases) generate it…

Website design process and steps.

I want to use the output of Solve and/or Reduce in next steps. But the output comes in the form of a rule [duplicate]

In a program I want to use the output of Solve and/or Reduce in next steps. But the output comes in the form of a rule, where what I want is the numerical solution. Here is an example. Say I write s=Solve[x+2==5,x]. In the next step I want to use this solution, so I write: y=2 s +3. This returns {{3+2(x->3)}}. This is a very basic need, but hours combing through the documentation leads nowhere.

Trying to understand the encryption used at various steps of Tor

So I read up on "Diffie-Hellman" key exchange which to my knowledge is a way for two parties to create a "shared secret" but I don’t really know if this is a public key or a private key or something else entirely.

When I look up how Tor works, many videos use the analogy of the locked box. We establish an entry node, relay node, exit node (call them A, B, C). I send a locked box to A who unlocks it and inside is another locked box with a message included, "send this to B." A sends this box to B, who unlocks it and sees another locked box with a note, "send this to C." B sends the box to C, who unlocks it and sees a message, "Fetch the contents of somewebsite.com" (the final request).

I don’t know if this analogy makes sense or if it’s even accurate.

Is this key exchange something that is done with the client and each of the three nodes, and that is how I am able to encrypt the message several times? Or is there some other algorithm used instead? I see that Tor uses RSA but I’m still unclear on how it all works together.

Trying to understand what is going on. It would help to see a minimal example using the actual encryption techniques.

What steps can I do if I know that someone[Goverment, Special agents,..etc] is spying on me?

if I know someone is trying to spying on me, and he/they tracking me on both online and reality, what steps can I do to neutralize the risk? keep in mind, that I’m a normal person with limited resources.

these steps comes in mind:

  1. Setup & use a self-hosted VPN service(to prevent ISP as Man-in-The-Middle and prevent DNS Leaks), on trusted hosting provider.
  2. Encrypt all my emails with PGP keys, and make sure that the usage of PGP keys is the default.
  3. Secure login to all chat apps, with Password/Fingerprint.
  4. Encrypt the full disk of my computer.

in general, I think of:

  1. Securing the communication on the internet (using VPN, fake identity, PGP Keys..etc).
  2. Securing the data on devices by encryption, and add authentication layers.

is there something more I miss?