diff --git a/content/en/pet arena/_index.md b/content/en/pet arena/_index.md
new file mode 100644
index 0000000000..6086edb933
--- /dev/null
+++ b/content/en/pet arena/_index.md
@@ -0,0 +1,112 @@
+---
+title: "The Privacy Breach Challenge: A Hands-On CTF"
+date: 2025-07-22T23:00:00Z
+draft: false
+---
+
+
+A hands-on Capture The Flag (CTF) competition where you get to break state-of-the-art privacy protection mechanisms. Assume the role of a malicious analyst, design novel attacks in a simulated database environment, and prove your skills.
+
+
+
+ Apply Now →
+
Final Deadline: September 10th, 2025
+
+
+
+## 🏆 Prizes & Recognition
+
+A panel of cybersecurity and privacy experts will judge the innovative approach and technical soundness of attacks. We are proud to offer the following awards:
+
+| Placement | Prize |
+|-------------------|------------|
+| **1st Place** | **$5,000** |
+| **2nd Place** | $2,000 |
+| **3rd Place** | $1,000 |
+| **4th Place** | $500 |
+| **5th Place** | $250 |
+| Honorable Mentions| Recognition|
+| *All Participants*| *Certificate of Completion (for at least one mission)* |
+
+
+## 🎯 The Challenge: 5 Missions, 3 Tracks
+
+Participants will gain access to a simulated database with various static and evolving datasets. Your objective is to design and execute privacy attacks across five missions of varying difficulty.
+
+- **Detect** database membership.
+- **Infer** sensitive attributes.
+- **Reconstruct** sensitive user records.
+- **Link** records across tables.
+- **Innovate** in an Open Mission to showcase a novel attack.
+
+---
+
+## 📅 Contest Timeline
+
+Mark your calendars for these key dates. The entire contest runs for 50 days.
+
+| Event | Date |
+|---------------------------|----------------------------|
+| **Official Kick-Off** | August 1st, 2025 |
+| **Application Deadline** | September 10th, 2025 |
+| **Mission Completion** | September 19th, 2025 |
+| **Winners Notified** | By October 25th, 2025 |
+| **Award Ceremony** | TBD (Hybrid Event) |
+
+> **Travel Support:** A limited, need-based travel budget is available for top teams invited to the award ceremony. Please make your request upon notification.
+
+## How to Join the Challenge
+
+> ### Who Can Apply?
+> We invite privacy, security, machine learning, and data experts from all backgrounds. We especially encourage undergraduate and graduate students to apply.
+> - **Teams of 1–4 members** are welcome.
+> - Open to students, researchers, and industry professionals from **anywhere in the world**.
+
+> ### How to Apply?
+> Applications are reviewed on a rolling basis. **Submit your application via this link.**
+>
+> Your application should include:
+> 1. Team bios (names, affiliations, roles) and a designated Team Lead.
+> 2. A valid contact email.
+> 3. CVs for all team members.
+> 4. (Optional) Code samples or links to prior work (e.g., GitHub).
+
+---
+
+## ⚖️ Selection & Scoring Criteria
+
+Success is measured by a comprehensive scoring matrix that quantifies performance. The only subjective judgment is for the "Open Mission" track, available after achieving a minimum score in other missions.
+
+Scoring will consider the following criteria:
+1. **Type of attack** and the severity of the privacy compromise.
+2. **Attack metrics** (e.g., TPR, FPR, AUC, MSE).
+3. **Attack detectability** (i.e., stealth).
+4. **Attack complexity** and novelty.
+5. **Attacker's strength** and assumed prior knowledge.
+6. **Attack robustness** against different levels of privacy protection.
+
+## ❓ Frequently Asked Questions (FAQ)
+
+**Q: Can solo applicants apply?**
+
A: Yes! Individuals are welcome, but we encourage teams of 2–4 to bring diverse expertise to the challenge.
+
+**Q: Is travel funding available for the award ceremony?**
+
A: Limited travel stipends are available for top-placing teams based on need. Others are encouraged to seek support from their home institutions.
+
+**Q: Are non-academic or industry teams eligible?**
+
A: Absolutely. We welcome industry professionals and independent researchers.
+
+**Q: What kind of datasets will we be attacking?**
+
A: You will work with a combination of synthetic data and public, real-world datasets adapted for the competition.
+
+---
+
+
+ Have a question? Don't hesitate to contact Guzzo at guzzo@tiktok.com.
+
+ Ready to Compete? Apply Now →
+